Rand Paul

The Pronk Pops Show 1183, December 6, 2018, Story 1: The Smoking Gun Email Chain of The Clinton Obama Democrat Criminal Conspiracy — Videos — Story 2: Time Running Out For $25 Billion of Federal Funding of Wall — Trump Should Not Sign Any Bills Without Inclusion of Wall Funding of $25 Billion — Shut Government Down — Videos — Story 3: President Trump Will Nominate Former U.S. Attorney General William Barr as Permanent Replacement for Former AG Jeff Sessions — Videos — Story 4: United States Net Oil Exporter — First Time Since 1949 — Videos

Posted on December 7, 2018. Filed under: 2016 Presidential Candidates, 2018 United States Elections, Addiction, American History, Applications, Barack H. Obama, Benghazi, Bill Clinton, Blogroll, Breaking News, Bribery, Bribes, Budgetary Policy, Cartoons, Central Intelligence Agency, Clinton Obama Democrat Criminal Conspiracy, Communications, Computers, Congress, Constitutional Law, Corruption, Countries, Crime, Culture, Deep State, Defense Spending, Disasters, Donald J. Trump, Donald J. Trump, Donald Trump, Economics, Education, Elections, Empires, Employment, Energy, European History, Fast and Furious, Federal Bureau of Investigation (FBI), Federal Bureau of Investigation (FBI) and Department of Justice (DOJ), Federal Government, Fifth Amendment, First Amendment, Fiscal Policy, Foreign Policy, Former President Barack Obama, Fourth Amendment, Freedom of Speech, Government, Government Dependency, Government Spending, Hardware, Health, Health Care, Health Care Insurance, High Crimes, Hillary Clinton, Hillary Clinton, Hillary Clinton, Hillary Clinton, Hillary Clinton, History, House of Representatives, Human, Human Behavior, Illegal Immigration, Illegal Immigration, Immigration, Independence, Iran Nuclear Weapons Deal, James Comey, Law, Legal Immigration, Libya, Life, Lying, Media, Mexico, Middle East, Monetary Policy, National Interest, National Security Agency, Natural Gas, Natural Gas, News, Obama, Oil, Oil, People, Philosophy, Photos, Politics, President Trump, Public Corruption, Public Relations, Qatar, Radio, Rand Paul, Raymond Thomas Pronk, Regulation, Resources, Robert S. Mueller III, Rule of Law, Saudi Arabia, Scandals, Second Amendment, Senate, Servers, Social Networking, South America, South Korea, Spying, Spying on American People, Surveillance and Spying On American People, Surveillance/Spying, Tax Policy, Taxation, Taxes, Technology, Ted Cruz, Treason, Trump Surveillance/Spying, Unemployment, United Kingdom, United States Constitution, United States of America, United States Supreme Court, Videos, Violence, War, Wealth, Wisdom | Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , |

 

 Project_1

The Pronk Pops Show Podcasts

Pronk Pops Show 1183 December 6, 2018

Pronk Pops Show 1182 December 5, 2018

Pronk Pops Show 1181 December 4, 2018

Pronk Pops Show 1180 December 3, 2018

Pronk Pops Show 1179 November 27, 2018

Pronk Pops Show 1178 November 26, 2018

Pronk Pops Show 1177 November 20, 2018

Pronk Pops Show 1176 November 19, 2018

Pronk Pops Show 1175 November 16, 2018

Pronk Pops Show 1174 November 15, 2018

Pronk Pops Show 1173 November 14, 2018

Pronk Pops Show 1172 November 9, 2018

Pronk Pops Show 1171 November 8, 2018

Pronk Pops Show 1170 November 7, 2018

Pronk Pops Show 1169 November 5, 2018

Pronk Pops Show 1168 November 2, 2018

Pronk Pops Show 1167 November 1, 2018

Pronk Pops Show 1166 October 31, 2018

Pronk Pops Show 1165 October 30, 2018

Pronk Pops Show 1164 October 29, 2018

Pronk Pops Show 1163 October 26, 2018

Pronk Pops Show 1162 October 24, 2018

Pronk Pops Show 1161 October 23, 2018

Pronk Pops Show 1160 October 22, 2018

Pronk Pops Show 1159 October 19, 2018

Pronk Pops Show 1158 October 18, 2018

Pronk Pops Show 1157 October 16, 2018

Pronk Pops Show 1156 October 15, 2018

Pronk Pops Show 1155 October 12, 2018

Pronk Pops Show 1154 October 11, 2018

Pronk Pops Show 1153 October 10, 2018

Pronk Pops Show 1152 October 5, 2018

Pronk Pops Show 1151 October 4, 2018

Pronk Pops Show 1150 October 3, 2018

Pronk Pops Show 1149, October 1, 2018

Pronk Pops Show 1148, September 28, 2018

Pronk Pops Show 1147, September 27, 2018

Pronk Pops Show 1146, September 25, 2018

Pronk Pops Show 1145, September 24, 2018

Pronk Pops Show 1144, September 20, 2018

Pronk Pops Show 1143, September 19, 2018

Pronk Pops Show 1142, September 18, 2018

Pronk Pops Show 1141, September 17, 2018

Pronk Pops Show 1140, September 14, 2018

Pronk Pops Show 1139, September 13, 2018

Pronk Pops Show 1138, September 12, 2018

Pronk Pops Show 1137, September 7, 2018

Pronk Pops Show 1136, September 6, 2018

Pronk Pops Show 1135, September 5, 2018

Pronk Pops Show 1134, September 4, 2018

Clinton Obama Democrat Criminal Conspiracy

See the source imageSee the source image

See the source imageSee the source image

See the source image

Story 1: The Smoking Gun Email Chain of The Clinton Obama Democrat Criminal Conspiracy — Videos —

Sean Hannity 12/6/18 – Hannity Fox News December 6, 2018

Sean Hannity Fox News 12/6/18 Breaking Fox News December 6, 2018

Hannity 12/06/18 1AM | December 06, 2018 Breaking News

FBI email chain may provide most damning evidence of FISA abuses yet

12/5/2018

By John Solomon
Opinion Contributor

Just before Thanksgiving, House Republicans amended the list of documents they’d like President Trump to declassify in the Russia investigation. With little fanfare or explanation, the lawmakers, led by House Intelligence Committee Chairman Devin Nunes (R-Calif.), added a string of emails between the FBI and the Department of Justice (DOJ) to their wish list.

Sources tell me the targeted documents may provide the most damning evidence to date of potential abuses of the Foreign Intelligence Surveillance Act (FISA), evidence that has been kept from the majority of members of Congress for more than two years.

The email exchanges included then-FBI Director James Comey, key FBI investigators in the Russia probe and lawyers in the DOJ’s national security division, and they occurred in early to mid-October, before the FBI successfully secured a FISA warrant to spy on Trump campaign adviser Carter Page.

The email exchanges show the FBI was aware — before it secured the now-infamous warrant — that there were intelligence community concerns about the reliability of the main evidence used to support it: the Christopher Steele dossier.

The exchanges also indicate FBI officials were aware that Steele, the former MI6 British intelligence operative then working as a confidential human source for the bureau, had contacts with news media reporters before the FISA warrant was secured.

The FBI fired Steele on Nov. 1, 2016 — two weeks after securing the warrant — on the grounds that he had unauthorized contacts with the news media.

But the FBI withheld from the American public and Congress, until months later, that Steele had been paid to find his dirt on Trump by a firm doing political opposition research for the Democratic Party and for Democratic presidential candidate Hillary Clinton, and that Steele himself harbored hatred for Trump.

If the FBI knew of his media contacts and the concerns about the reliability of his dossier before seeking the warrant, it would constitute a serious breach of FISA regulations and the trust that the FISA court places in the FBI.

That’s because the FBI has an obligation to certify to the court before it approves FISA warrants that its evidence is verified, and to alert the judges to any flaws in its evidence or information that suggest the target might be innocent.

We now know the FBI used an article from Yahoo News as independent corroboration for the Steele dossier when, in fact, Steele had talked to the news outlet.

If the FBI knew Steele had that media contact before it submitted the article, it likely would be guilty of circular intelligence reporting, a forbidden tactic in which two pieces of evidence are portrayed as independent corroboration when, in fact, they originated from the same source.

These issues are why the FBI email chain, kept from most members of Congress for the past two years, suddenly landed on the declassification list.

The addition to the list also comes at a sensitive time, as House Republicans prepare on Friday to question Comey, who signed off on the FISA warrant while remaining an outlier in the intelligence community about the Steele dossier.

Most intelligence officials, such as former CIA Director John Brennan and former Director of National Intelligence James Clapper, have embraced the concerns laid out in the Steele dossier of possible — but still unproven — collusion between the Trump campaign and Russia.

Yet, 10 months after the probe started and a month after Robert Mueller was named special counsel in the Russia probe, Comey cast doubt on the the Steele dossier, calling it “unverified” and “salacious” in sworn testimony before Congress.

Former FBI lawyer Lisa Page further corroborated Comey’s concerns in recent testimony before House lawmakers, revealing that the FBI had not corroborated the collusion charges by May 2017, despite nine months of exhaustive counterintelligence investigation.

Lawmakers now want to question Comey about whether the information in the October email string contributed to the former FBI director’s assessment.

The question long has lingered about when the doubts inside the FBI first surfaced about the allegations in the Steele dossier.

Sources tell me the email chain provides the most direct evidence that the bureau, and possibly the DOJ, had reasons to doubt the Steele dossier before the FISA warrant was secured.

Sources say the specifics of the email chain remain classified, but its general sentiments about the Steele dossier and the media contacts have been discussed in nonclassified settings.

“If these documents are released, the American public will have clear and convincing evidence to see the FISA warrant that escalated the Russia probe just before Election Day was flawed and the judges [were] misled,” one knowledgeable source told me.

Congressional investigators also have growing evidence that some evidence inserted into the fourth and final application for the FISA — a document signed by current Deputy Attorney General Rod Rosenstein — was suspect.

Nunes hinted as much himself in comments he made on Sean Hannity’s Fox News TV show on Nov. 20, when he disclosed the FBI email string was added to the declassification request. The release of the documents will “give finality to everyone who wants to know what their government did to a political campaign” and verify that the Trump campaign did not collude with Russia during the election, Nunes said.

As more of the secret evidence used to justify the Russia probe becomes public, an increasingly dark portrait of the FBI’s conduct emerges.

The bureau, under a Democratic-controlled Justice Department, sought a warrant to spy on the duly nominated GOP candidate for president in the final weeks of the 2016 election, based on evidence that was generated under a contract paid by his political opponent.

That evidence, the Steele dossier, was not fully vetted by the bureau and was deemed unverified months after the warrant was issued.

At least one news article was used in the FISA warrant to bolster the dossier as independent corroboration when, it fact, it was traced to a news organization that had been in contact with Steele, creating a high likelihood it was circular intelligence reporting.

And the entire warrant, the FBI’s own document shows, was being rushed to approval by two agents who hated Trump and stated in their own texts that they wanted to “stop” the Republican from becoming president.

If ever there were grounds to investigate the investigators, these facts provide the justification.

Director Comey and Deputy Attorney General Rosenstein likely hold the answers, as do the still-classified documents. It’s time all three be put under a public microscope.

John Solomon is an award-winning investigative journalist whose work over the years has exposed U.S. and FBI intelligence failures before the Sept. 11 attacks, federal scientists’ misuse of foster children and veterans in drug experiments, and numerous cases of political corruption. He is The Hill’s executive vice president for video.

https://thehill.com/hilltv/rising/419901-fbi-email-chain-may-provide-most-damning-evidence-of-fisa-abuses-yet

 

FBI Knew Steele Dossier Was Bogus Before Using In FISA Application: Solomon

A string of emails quietly requested by House Republicans for declassification by President Trump may be the smoking gun that the FBI and DOJ committed egregious abuses of the Foreign Intelligence Surveillance Act (FISA), according to The Hill‘s John Solomon.

The email exchanges – kept from Congressional investigators for over two years, “included then-FBI Director James Comey, key FBI investigators in the Russia probe and lawyers in the DOJ’s national security division,” according to the report – and took place in early to mid-October of 2016, prior to the FBI successfully securing a FISA warrant to spy on Trump campaign adviser Carter Page.

The email exchanges show the FBI was aware — before it secured the now-infamous warrant — that there were intelligence community concerns about the reliability of the main evidence used to support it: the Christopher Steele dossier.

The exchanges also indicate FBI officials were aware that Steele, the former MI6 British intelligence operative then working as a confidential human source for the bureau, had contacts with news media reporters before the FISA warrant was secured. –The Hill

Recommended videos
Two weeks after the FBI secured the FISA warrant using the Steele Dossier, Steele was fired by the FBI on November 1, 2016 for inappropriate communications with the news media.

Also withheld from both Congress and the general public until months later is the fact that Steele had been paid by Fusion GPS – an opposition research firm hired by Hillary Clinton and the DNC to dig up dirt on Donald Trump. Moreover, Steele absolutely hated Donald Trump.

And as Solomon notes; “If the FBI knew of his media contacts and the concerns about the reliability of his dossier before seeking the warrant, it would constitute a serious breach of FISA regulations and the trust that the FISA court places in the FBI.”

That’s because the FBI has an obligation to certify to the court before it approves FISA warrants that its evidence is verified, and to alert the judges to any flaws in its evidence or information that suggest the target might be innocent. –The Hill

The FBI, however, went to extreme lengths to convince the FISA judge that Steele (“Source #1”), was reliable when they could not verify the unsubstantiated claims in his dossier – while also having to explain why they still trusted his information after having terminated Steele’s contract over inappropriate disclosures he made to the media.

“Not withstanding Source1’s reason for conducting the research into Candidate1’s ties to Russia, based on Source1’s previous reporting history with the FBI, whereby Source1 provided reliable information to the FBI, the FBI believes Source 1s reporting herein to be credible

Chuck Ross@ChuckRossDC

On top of that, Bill Priestap told Congress that corroboration of the dossier was in its “infancy” when FISAs were being granted. An FBI unit found dossier was only “minimally” corroborated.

120 people are talking about this

Of course, none of this mattered to the FBI – which painted Carter Page in the most criminal light possible, as intended, in order to convince the FISA judge to grant the warrant.In order to reinforce their argument, the FBI presented various claims from the dossier as facts, such as “The FBI learned that Page met with at least two Russian officials” – when in fact that was simply another unverified claim from the dossier.

It flat out accuses Page of being a Russian spy who was recruited by the Kremlin, which sought to “undermine and influence the outcome of the 2016 U.S. presidential election in violation of U.S. criminal law,” the application reads.

Paul Sperry@paulsperry_

ALERT: The declassified FBI warrant application attests to secret FISA court that “THE FBI LEARNED that Page met with at least two Russian officials during the trip,”as if FBI learned this independently,when in fact it’s clear it relied on Clinton-paid dossier for the information

1,291 people are talking about this

Chuck Ross@ChuckRossDC

FBI represented to a federal judge that investigators knew for certain that Carter Page met w/ Igor Sechin and Diveykin. Except, the FISA app acknowledges this intel came from Steele dossier. And FBI has acknowledged dossier was not verifieid. http://dailycaller.com/2018/07/21/doj-release-carter-page-fisa/ 

1,718 people are talking about this

Another approach used to beef up the FISA application’s curb appeal was circular evidence, via the inclusion of a letter from Democratic Senate Minority Leader Harry Reid (NV) to former FBI Director James Comey, citing information Reid got from John Brennan, which was in turn from the Clinton-funded dossier.

Meanwhile – current and former members of the US intelligence community continue to hinge their theories of Trump-Russia collusion on the Steele Dossier, despite Comey admitting that it was “salacious” and “unverified” during sworn testimony.

Most intelligence officials, such as former CIA Director John Brennan and former Director of National Intelligence James Clapper, have embraced the concerns laid out in the Steele dossier of possible — but still unproven — collusion between the Trump campaign and Russia.

Yet, 10 months after the probe started and a month after Robert Mueller was named special counsel in the Russia probe, Comey cast doubt on the the Steele dossier, calling it “unverified” and “salacious” in sworn testimony before Congress.

Former FBI lawyer Lisa Page further corroborated Comey’s concerns in recent testimony before House lawmakers, revealing that the FBI had not corroborated the collusion charges by May 2017, despite nine months of exhaustive counterintelligence investigation. –The Hill

Congressional investigators now want to question Comey about the October email string and whether it contributed to his assessment. According to Solomon, the newly requested email chain “provides the most direct evidence that the bureau, and possibly the DOJ, had reasons to doubt the Steele dossier before the FISA warrant was secured.”

“If these documents are released, the American public will have clear and convincing evidence to see the FISA warrant that escalated the Russia probe just before Election Day was flawed and the judges [were] misled,” one source told Solomon.

What’s more, House GOP investigators now have a growing pile of evidence that some of the information inserted into a fourth and final application for the FISA – signed by Deputy Attorney General Rod Rosenstein, was suspect – as evidence by hints by House Intelligence Committee member Devin Nunes (R-CA) on Fox News‘s Sean Hannity TV show November 20. Nunes said that the declassification of the requested documents will “give finality to everyone who wants to know what their government did to a political campaign.”

As Solomon bluntly puts it:

The bureau, under a Democratic-controlled Justice Department, sought a warrant to spy on the duly nominated GOP candidate for president in the final weeks of the 2016 election, based on evidence that was generated under a contract paid by his political opponent.

That evidence, the Steele dossier, was not fully vetted by the bureau and was deemed unverified months after the warrant was issued.

At least one news article was used in the FISA warrant to bolster the dossier as independent corroboration when, it fact, it was traced to a news organization that had been in contact with Steele, creating a high likelihood it was circular intelligence reporting.

And the entire warrant, the FBI’s own document shows, was being rushed to approval by two agents who hated Trump and stated in their own texts that they wanted to “stop” the Republican from becoming president.

No wonder Comey wanted a public testimony – where he wouldn’t have to discuss any of this.

https://www.zerohedge.com/news/2018-12-06/fbi-knew-steele-dossier-was-bogus-using-fisa-application-solomon

Obama Political Spying Scandal: Trump Associates Were Not the First Targets

(Reuters photo: Jonathan Ernst)

This list includes Dennis Kucinich and investigative journalists.In 2011, Dennis Kucinich was still a Democratic congressman from Ohio. But he was not walking in lockstep with President Obama — at least not on Libya. True to his anti-war leanings, Kucinich was a staunch opponent of Obama’s unauthorized war against the Qaddafi regime.

Kucinich’s very public efforts included trying to broker negotiations between the administration and the Qaddafi regime, to whom the White House was turning a deaf ear. It was in that context that he took a call in his Washington office from Saif al-Islam Qaddafi, the ruler’s son and confidant. Four years later, as he recalled in a recent opinion piece, Kucinich learned that the call had been recorded and leaked to the Washington Times.

To be sure, it is not a solid case. Kucinich is now a commentator at Fox News, on whose website he explains his side of the story, and on whose programming ardently pro-Trump contributors are a staple — including contributors who have been sympathetic to the new president’s claim that he was monitored by his predecessor. The gist of Kucinich’s piece is to “vouch for the fact that extracurricular surveillance does occur.” The express point is to counter the ridicule heaped on Trump’s claim that he personally was wiretapped at Trump Tower.

As we’ve repeatedly noted (see, e.g., herehere, and here), there is no known support for Trump’s narrow claim (made in a series of March 4 tweets). Yet, there is now overwhelming evidence that the Obama administration monitored Trump associates and campaign and transition officials. There were, moreover, leaks of classified information to the media — particularly in the case of Trump’s original national-security adviser, Michael Flynn, whose telephone communications with Russia’s ambassador to the U.S. were unlawfully disclosed to the Washington Post.

The answer is no.

In an important analysis published by Tablet magazine, Lee Smith considers the likely abuse of foreign-intelligence-collection authority by the Obama administration in connection with negotiations over Iran’s nuclear program. The White House knew there would be vigorous Israeli opposition to the Iran deal — just as there was ardent American opposition to the highly objectionable pact. Notwithstanding that Israel is an important ally, Prime Minister Benjamin Netanyahu and Ron Dermer, Israel’s ambassador to the U.S., became surveillance targets — agents of a foreign power, treated no differently under the law than such operatives of hostile foreign powers. Fair enough — it is simply a fact that allies occasionally spy on each other. Obviously, their interests sometimes diverge.

But there was something different about this monitoring initiative. It was not targeted merely at Israeli officials plotting their opposition strategy. The Wall Street Journal, Smith notes, reported in late December 2015 that the targeting “also swept up the contents of some of [the Israeli officials’] private conversations with U.S. lawmakers and American-Jewish groups.”

“At some point, the administration weaponized the NSA’s legitimate monitoring of communications of foreign officials to stay one step ahead of domestic political opponents,” says a pro-Israel political operative who was deeply involved in the day-to-day fight over the Iran Deal. “The NSA’s collections of foreigners became a means of gathering real-time intelligence on Americans engaged in perfectly legitimate political activism — activism, due to the nature of the issue, that naturally involved conversations with foreigners. We began to notice the White House was responding immediately, sometimes within 24 hours, to specific conversations we were having. At first, we thought it was a coincidence being amplified by our own paranoia. After a while, it simply became our working assumption that we were being spied on.

This is what systematic abuse of foreign-intelligence collection for domestic political purposes looks like: Intelligence collected on Americans, lawmakers, and figures in the pro-Israel community was fed back to the Obama White House as part of its political operations. The administration got the drop on its opponents by using classified information, which it then used to draw up its own game plan to block and freeze those on the other side. And — with the help of certain journalists whose stories (and thus careers) depend on high-level access — terrorize them.

Once you understand how this may have worked, it becomes easier to comprehend why and how we keep being fed daily treats of Trump’s nefarious Russia ties. The issue this time isn’t Israel, but Russia, yet the basic contours may very well be the same.

Do you really think the Obama administration, which turned the Internal Revenue Service and the Justice Department into process cudgels for beating Obama detractors, would be above that sort of thing?

At her website, Sharyl Attkisson provides a very useful “Obama-era Surveillance Timeline” — with “surveillance” broadly construed to encompass many varieties of government power to collect and coerce the production of information. Attkisson notes, for example:

‐The IRS’s targeting of conservative groups seeking tax-exempt status, a politicized initiative that stymied the groups’ ability to contest Obama’s reelection in 2012.

‐The administration’s targeting of journalists, including (a) attorney general Eric Holder’s approval of the seizure of personal and business phone records of Associated Press reporters en masse (i.e., not a particularized search targeting a specific journalist suspected of wrongdoing); and (b) Holder’s approval of a warrant targeting the e-mails of Fox News reporter James Rosen in a leak investigation — based on an application in which the government represented to a federal court that the journalist could be guilty of a felony violation of the Espionage Act in connection with a leak of classified information (in addition to purportedly being a “flight risk”).

‐The administration’s 2011 loosening of minimization procedures to enable more-liberal scrutiny of communications of American citizens incidentally swept up in foreign-intelligence gathering

‐The CIA’s accessing of Senate Intelligence Committee computers and staff e-mails — which CIA director John Brennan initially denied, then apologized for after it was confirmed by an inspector-general report.

‐The investigation of Trump associate Carter Page, including a Foreign Intelligence Surveillance Act warrant based on the claim that Page was a Russian agent, which would have authorized monitoring of Page’s communications — including any with Trump, then the Republican nominee for president.

‐The criminal leaking to the media of former Trump national-security adviser Michael Flynn’s communications with the Russian ambassador to the U.S.

‐The “unmasking” of identities of Americans (connected to Trump) at the behest of Obama national-security adviser Susan Rice, a White House staffer and Obama confidant.

Ms. Attkisson also has her own story to tell. Formerly at CBS News, she was one of the few journalists at mainstream outlets who aggressively reported on the Fast and Furious scandal and the Benghazi massacre. In the latter, we recall, Rice and other Obama officials falsely told the public that the attack, which resulted in the killing of four Americans including the U.S. ambassador, grew out of spontaneous protest against an anti-Muslim video (rather than being a coordinated jihadist strike). The Obama administration later used its criminal-prosecution authority to trump up a case against its chosen scapegoat: the video producer.

Attkisson’s reporting prompted internal administration complaints that she was “out of control.”

As a tale of political spying intrigue, Dennis Kucinich’s story would not be worth telling. But can it so easily be dismissed after the spying on American critics of the Iran deal?

Based on examinations by two forensic experts, Attkisson and CBS eventually reported that her personal and work computers were “accessed by an unauthorized, external, unknown party on multiple occasions.” Was this “unknown party” the government? The experts say it was a highly advanced intruder, which “used sophisticated methods to remove all possible indications of unauthorized activity.” Moreover, one computer was infiltrated remotely by the use of “new spy software proprietary to a federal agency.”

It is a good bet that the National Security Agency was monitoring the communications of Qaddafi’s son and other regime figures in 2011. If so, it is likely that then-congressman Kucinich was lawfully intercepted “incidentally.” It is also entirely possible, however, that the Libyans themselves were recording their conversations with prominent Americans and that the Kucinich–Qaddafi call was found after the regime fell.

The Washington Times reporters did not reveal to Kucinich how they had gotten the tape, but the paper’s related stories had referred to “secret audio recordings recovered from Tripoli.” Moreover, if the Obama administration had been behind a vindictive leak against Kucinich, one might have expected the leak to have happened in 2011, during Kucinich’s prominent opposition to the Libya war, rather than four years later, when the regime had long been toppled and Kucinich had retired from Congress.

On the other hand, Kucinich recounts that the recording is very clear on both ends (one might expect a Libyan recording would be distinctly clearer on the Libyan end). The Washington Timesalso does not seem the most natural destination for a secret disclosure from Libya. Furthermore, Kucinich explains, he made routine FOIA requests regarding information pertinent to him before leaving Congress in 2012. Although he did not learn of the recording until 2015, these FOIA requests would have covered his communication with Qaddafi, he adds. Kucinich says that some of the intelligence agencies have failed to respond.

On its own, Dennis Kucinich’s story would not be worth telling — not as a tale of political spying intrigue. But can it so easily be dismissed after the spying on American critics of the Iran deal? The measures taken to make “incidental” monitoring of Americans easier, its fruits far more widely disseminated and, inevitably, criminally leaked? The shocking abuse of IRS processes to collect information on, and procedurally persecute, Barack Obama’s political adversaries? Fast and Furious — the use of government police powers to create a political anti-gun narrative, then the contemptuous cover-up when it went horribly wrong, resulting in a Border Patrol officer’s death? The scandalous Benghazi cover-up — including a bogus prosecution of a pathetic video producer to help prop up the fraud? The monitoring of Trump associates and members of his campaign and transition staffs — the unmasking, the intentional wide dissemination of raw intelligence, the willful felony publication of classified information?

There is considerably more evidence that the Obama administration grossly abused its awesome intelligence-gathering and law-enforcement powers than that Russian meddling had a meaningful impact on the 2016 election. And these abuses of power certainly did not start with the targeting of Donald Trump’s campaign.

— Andrew C. McCarthy is a senior policy fellow at the National Review Institute and a contributing editor of National Review.

Editor’s Note: This piece has been emended since its initial posting.

https://www.nationalreview.com/2017/04/barack-obama-spying-journalists-dennis-kucinich-sharyl-attkisson-donald-trump-campaign-transition/

Could the President Spy on His Political Opponents?

Under the government’s current interpretation of the law, unfortunately, the answer is yes.

he controversy continues over President Trump’s Twitter storm accusing President Obama of wiretapping him. On Monday, members of Congress peppered FBI Director James Comey with questions about the claims, who once again dismissed them as lacking support. Even Devin Nunes, the Republican chairman of the House Intelligence Committee, who originally defended Trump’s claims, has defected. “I don’t think there was an actual tap of Trump Tower,” the congressman said last week at a news conference. None of these statements seem to have affected President Trump, however, who continues to stand by his accusations.

But regardless of whether these claims turn out to be completely false, which is all but certain now, they do raise a question that shouldn’t be casually dismissed: Could President Obama’s administration have surveiled his political opponents under its interpretation of the law? Could President Trump’s administration now do the same?

The answer, unfortunately, is yes. And that should make Republicans and Democrats nervous enough to work together to reform our surveillance laws.

Many have dismissed President Trump’s accusations as the unsubstantiated ramblings of a Twitter addict with little understanding of how our intelligence laws work. These may be fair criticisms—today the president cannot simply order the intelligence agencies to wiretap his domestic political opponents. But many of our surveillance authorities have been interpreted so broadly that they put vast amounts of Americans’ data easily within the president’s reach. Without significant reform, exploiting this immense pool of data may one day prove irresistible. Thus, whether President Trump’s accusations are true or not, the potential for White House officials to abuse our spying laws for political purposes is real.

It is important to remember that surveilling political opponents in the name of security is something of an American pastime. In the 1960s, the FBI targeted political activists, including Martin Luther King Jr., claiming they posed “national security” threats. Cesar Chavez, the prominent labor and civil-rights activist, was similarly tracked for years because of his supposed communist ties.

In response to many of these types of abuses, Congress created the Church Committee to investigate surveillance practices. The widespread crimes and abuse they uncovered led to the passage of the Foreign Intelligence Surveillance Act (FISA) in 1978. But recent disclosures demonstrate that the law did not go far enough. Moreover, passage of the Patriot Act in 2001 and other laws have undercut the protections in FISA, further opening the door to biased, unjustified, or politically motivated spying. There are jarringly few protections against these abuses.

The result: if the president wanted to surveil his critics, he could exploit at least three national security authorities.

Section 702 of FISA

Section 702 of FISA was passed at the request of the Bush administration and extended at the request of the Obama administration with bipartisan support. Now the Trump administration is reportedly pushing for reauthorization of this law when it is set to expire in 2017, with the nominee for the director of national intelligence calling it the “crown jewels” of the intelligence community. FBI Director Comey once again defended the controversial program.

While Section 702 was passed to protect against international terrorism, its tentacles reach much farther. Under the law, the government collects emails and phone calls—without a warrant—of nearly 100,000 foreign “targets.” These include their conversations with people in the United States. These targets can include journalists, human-rights workers, and other individuals who have no connection to terrorism or criminal activity, and whose only offense may be discussing information related to “foreign affairs”—a nebulous term.

Over 250 million internet communications alone are collected under Section 702 annually. While the government refuses to disclose how many Americans have been swept up in this dragnet, analysis of leaked documents suggests that at least half those communications contain information about a U.S. citizen or resident. If that’s accurate, the Trump administration will collect over 125 million internet communications that contain information about someone in the United States. Given that much of the data collected under Section 702 is stored for five years or longer, it means the government likely has access to hundreds of millions of stored emails and phone calls.

Once collected, the government asserts that they can mine this information to scrutinize the activities of Americans—opening the door to political abuse. For example, if the intelligence agencies under President Obama had wanted to search through Section 702 data for information about Senate Majority Leader Mitch McConnell (R-Ky.), on the argument that McConnell might possess information about “foreign affairs,” no technological barrier or explicit provision in Section 702 would have stopped them. Under current procedures, no court would have needed to approve this and Senator McConnell would not need to be notified that he had been the subject of such a search.

Under the government’s current interpretation of the law, this information could then be used as the basis for a criminal prosecution, criminal investigation, civil action, or additional surveillance.

Executive Order (EO) 12333

Under Executive Order 12333, the government engages in the bulk collection of communications and data—with no approval from a court or any other independent judicial body. This surveillance primarily takes place abroad. While the government is not supposed to target Americans under EO 12333, this spying likely results in the collection of information of millions of Americans. We know, for example, that the government reportedly relied on EO 12333 to steal data transmitted between certain Yahoo and Google data centers; to capture the content of all phone calls to, from, and within the Bahamas and other countries; and to collect millions of text messages from individuals around the world.

Under EO 12333, the government can target foreigners for “foreign intelligence” purposes, which, similar to Section 702, is a category so broad that it easily encompasses individuals who have no nexus to a national-security threat. As a result of recent NSA procedures, agencies across the federal government now have the right to request access to the raw information collected under EO 12333, which can contain the information of both Americans and foreigners.

While NSA officials have said there are procedures that limit the ability of the NSA to search through electronic surveillance captured under EO 12333 for information about Americans, those procedures are largely secret and can be modified purely at the discretion of the president. Moreover, the government has taken the position that information collected under the executive order can be used to prosecute Americans for certain ordinary domestic crimes—even though it was collected without a warrant.

In practice, this means that if the president decided to unilaterally change EO 12333 procedures to allow him to search for information for purposes unrelated to national security, he would have broad latitude to do so under the government’s current legal interpretations. In addition, it means that if the government stumbles across information related to these individuals in the trove of data they collect, they may assert the right to use it as the basis to prosecute or further investigate these individuals, without ever notifying them. This creates a bizarre incentive for any ill-intentioned president: the more information collected under EO 12333 in the name of security, the more information that can be mined for other purposes.

“Traditional” FISA

Although FISA was passed with the admirable goal of halting many of the surveillance abuses of the 1960s, this statutory scheme is not nearly as protective as a warrant. Specifically, unlike an ordinary warrant or wiretapping order, a traditional FISA order does not require the government to believe that its spying will produce evidence of a crime, and the secrecy surrounding the FISA court undermines effective oversight. For these reasons, the ACLU has long cautioned that FISA authorities are prone to abuse.

Under FISA, when the government seeks to conduct electronic surveillance, it must submit an application to the secret intelligence court demonstrating that there is probable cause that its individual target is a “foreign power or an agent of a foreign power,” and it must identify the particular phone line or communications facility used by the target. The terms “foreign power or agent of a foreign power” are broadly defined. They include foreign government officials, foreign political organizations not substantially composed of U.S. citizens or green-card holders, and foreign individuals engaged in terrorism. While this authority is certainly narrower than EO 12333 or Section 702, it too leaves room for abuse.

For example, under traditional FISA, the government would have the authority to surveil virtually any foreign government official—including that official’s entirely legal conversations with individuals in the United States. These communications can be retained or disseminated under procedures that are more lenient than those that apply to federal wiretaps. For instance, in the wiretapping context, the government is supposed to immediately purge communications that are considered irrelevant. FISA, by contrast, permits retention, analysis, and dissemination of Americans’ information for years, regardless of whether there is any evidence of criminal activity.

The Potential for Abuse Is Real, No Matter What the Intel Community Says

The intelligence agencies would argue that these authorities do not permit the government to deliberately “target” Americans—at least not without a warrant—mitigating constitutional concerns. But that explanation only tells half the story. The reality is that these authorities are used to vacuum up large amounts of Americans’ data, do not prevent the government from knowingly capturing the communications that Americans have with tens of thousands of foreign “targets,” and, in some cases, routinely collect purely domestic communications. Moreover, once Americans’ information is collected, there are inadequate safeguards to ensure that such data is not inappropriately used.  

The fact that our intelligence-gathering laws leave room for politically motivated surveillance should give us pause. And it’s not enough for President Trump or members of Congress to simply express outrage that the private communications of political leaders could have been surveilled. With the expiration of Section 702 looming, they have the opportunity to push for a complete overhaul of our surveillance authorities, and ensure that they are brought fully in line with the requirements of our Constitution.  

In other words, President Trump should match his action to his tweets, and demand that Section 702 and other authorities be reformed.

Neema Singh Guliani is a legislative counsel at the ACLU focusing on surveillance, privacy, and national-security issues. Prior to the ACLU, she worked at the Department of Homeland Security and as an investigative counsel with the House Oversight and Government Reform Committee.

https://www.theamericanconservative.com/articles/could-the-president-spy-on-his-political-opponents/

Story 2: Time Running Out For Federal $25 Billion Funding Appropriation $25 Billion of for Trump’s  Wall — Videos

Pelosi takes hard line on paying for Trump’s border wall

an hour ago
Nancy Pelosi

House Democratic Leader Nancy Pelosi of California, meets with reporters at her weekly news conference on Capitol Hill in Washington, Thursday, Dec. 6, 2018. (AP Photo/J. Scott Applewhite)

WASHINGTON (AP) — House Democratic leader Nancy Pelosi on Thursday rejected the idea of paying for President Donald Trump’s border wall in exchange for helping hundreds of thousands of young immigrants avoid deportation.

Funding for the wall — a top Trump priority — and legal protections for so-called Dreamers, a key Democratic goal, should not be linked, Pelosi said.

“They’re two different subjects,” she said.

Her comments came as the House and Senate approved a stopgap bill Thursday to keep the government funded through Dec. 21. The measure, approved by voice votes in near-empty chambers, now goes to the White House.

Trump has promised to sign the two-week extension to allow for ceremonies this week honoring former President George H.W. Bush, who died Nov. 30. But he wants the next funding package to include at least $5 billion for his proposed wall, something Democrats have rejected. Trump is set to meet Tuesday at the White House with Pelosi and Senate Democratic leader Chuck Schumer.

Pelosi, who is seeking to become House speaker in January, said the lame-duck Congress should now pass a half-dozen government funding bills that key committees have already agreed on, along with a separate measure funding the Department of Homeland Security, which oversees the border. Funding for the homeland agency should address border security and does not necessarily include a wall, Pelosi said.

Most Democrats consider the wall “immoral, ineffective and expensive,” Pelosi said, noting that Trump promised during the 2016 campaign that Mexico would pay for it, an idea Mexican leaders have repeatedly rejected.

Even if Mexico did pay for the wall, “it’s immoral still,” Pelosi said.

Protecting borders “is a responsibility we honor, but we do so by honoring our values as well,” she added.

Schumer said Thursday that a bipartisan Senate plan for $1.6 billion in border security funding does not include money for the 30-foot-high (9-meter-high) concrete wall Trump has envisioned. The money “can only be used for fencing” and technology that experts say is appropriate and makes sense as a security feature, Schumer said.

If Republicans object to the proposal because of pressure from Trump, Schumer said lawmakers should follow Pelosi’s advice and approve six appropriations bills and a separate measure extending current funding for Homeland Security.

Either option would avert a partial government shutdown, which lawmakers from both parties oppose, he said.

“The one and only way we approach a shutdown is if President Trump refuses both of our proposals and demands $5 billion or more for a border wall,” Schumer said. He called the wall “a nonstarter” for Democrats, who face increasing pressure from outside groups and liberal lawmakers to resist Trump’s continued push for the barrier, which Trump says is needed to stop an “invasion” of Central American migrants and others from crossing into the country illegally.

Schumer called the spat over the wall unnecessary, noting that the administration has not spent more than $1 billion approved for border security in the budget year that ended Sept. 30. “The idea that they haven’t spent last year’s money and they’re demanding such a huge amount this year makes no sense at all,” he said.

Senate Appropriations Committee Chairman Richard Shelby said he prefers to include Homeland Security in an omnibus package containing seven unresolved spending bills for the current budget year.

“I believe the best route is to keep all seven together and pass them,” the Alabama Republican told reporters Thursday. Lawmakers have “made a lot of progress” in recent weeks on the seven spending bills. “I’d like to conclude it,’” he said.

Missouri Sen. Roy Blunt, a member of Republican leadership, said the key question is whether Trump will sign a bill without funding for the wall.

“It doesn’t matter how much appetite there is for a shutdown anywhere else, if he is willing to have a shutdown over this issue,” Blunt said. “He has given every indication that he would.”

___

Associated Press writers Alan Fram and Padmananda Rama contributed to this story.

https://apnews.com/e3fd315c66554c22bfdf97710e0df711

 

Story 3: President Trump Will Nominate Former U.S. Attorney General William Bar as Permanent Replacement for Former AG Jeff Sessions

WASHINGTON (Reuters) – Former U.S. Attorney General William Barr, who served under former President George H.W. Bush, is the leading candidate for the job as a permanent replacement for Jeff Sessions, a source familiar with the matter said on Thursday.

The Washington Post reported earlier on Thursday that President Donald Trump could choose his nominee for attorney general in coming days, and that Trump had told advisers he plans to nominate Barr.

Sessions departed from the role last month, and Trump named Matthew Whitaker as the government’s top lawyer on an interim basis. With the current session of Congress set to soon end, anyone Trump nominates may have to wait until well into 2019 for confirmation.

Barr has worked in the private sector since serving as attorney general from 1991 to 1993, retiring from Verizon Communications (VZ.N) in 2008.

Reporting by Steve Holland and Lisa Lambert, Editing by David Gregorio and Bill Berkrot

Story 3: President Trump Will Nominate Former U.S. Attorney General William Bar as Permanent Replacement for Former AG Jeff Sessions — Videos

Trump eyeing Bush 41 attorney general to replace Sessions

President Trump To Tap Former Attorney General William Barr To Head Justice Department

William P. Barr

From Wikipedia, the free encyclopedia

Jump to navigationJump to search

Bill Barr
William Barr, official photo as Attorney General.jpg
77th United States Attorney General
In office
November 26, 1991 – January 20, 1993
President George H. W. Bush
Preceded by Dick Thornburgh
Succeeded by Janet Reno
25th United States Deputy Attorney General
In office
May 1990 – November 26, 1991
President George H. W. Bush
Preceded by Donald B. Ayer
Succeeded by George J. Terwilliger III
United States Assistant Attorney Generalfor the Office of Legal Counsel
In office
April 1989 – May 1990
President George H. W. Bush
Preceded by Douglas Kmiec
Succeeded by J. Michael Luttig
Personal details
Born
William Pelham Barr

May 23, 1950 (age 68)
New York CityNew York, U.S.

Political party Republican
Spouse(s) Christine Moynihan
Children 3
Education Columbia University (BAMA)
George Washington University(JD)

William Pelham Barr (born May 23, 1950) is an American attorney who served as the 77th Attorney General of the United States. He is a Republican and served as Attorney General from 1991 to 1993 during the administration of President George H. W. Bush.

 

Early life, education, and career

Barr was born in New York City. The son of Columbia University faculty members Mary and Donald Barr, he grew up on the Upper West Side, attended the Corpus Christi School and Horace Mann School. He received his B.A. degree in government in 1971 and his M.A. degree in government and Chinese studies in 1973, both from Columbia University. He received his J.D. degree with highest honors in 1977 from the George Washington University Law School.[1]

Barr with President Ronald Reaganin 1983

From 1973-77, he was employed by the Central Intelligence Agency. Barr was a law clerk to Judge Malcolm Wilkey of the U.S. Court of Appeals for the District of Columbia Circuit from 1977 through 1978. He served on the domestic policy staff at the Reagan White House from 1982 to 1983. He was also in private practice for nine years with the Washington law firm of Shaw, Pittman, Potts & Trowbridge.[2]

Department of Justice

Barr and Dan Quayle watch as President George H. W. Bush signs the Civil Rights Commission Reauthorization Act in the Rose Garden of the White House in 1991

During 1989, at the beginning of his administration, President George H. W. Bush appointed Barr to the U.S. Department of Justice as Assistant Attorney General for the Office of Legal Counsel, an office which functions as the legal advisor for the President and executive agencies. Barr was known as a strong defender of Presidential power and wrote advisory opinions justifying the U.S. invasion of Panama and arrest of Manuel Noriega, and a controversial opinion that the F.B.I. could enter onto foreign soil without the consent of the host government to apprehend fugitives wanted by the United States government for terrorism or drug-trafficking.[3]

During May 1990, Barr was appointed Deputy Attorney General, the official responsible for day-to-day management of the Department. According to media reports, Barr was generally praised for his professional management of the Department.[4]

Acting Attorney General of the United States

During August 1991, when then-Attorney General Richard Thornburgh resigned to campaign for the Senate, Barr was named Acting Attorney General.[5] Three days after Barr accepted that position, 121 Cuban inmates, awaiting deportation to Cuba as extremely violent criminals, seized 9 hostages at the Talladega federal prison. He directed the FBI’s Hostage Rescue Team to assault the prison, which resulted in rescuing all hostages without loss of life.[6]

Nomination and confirmation

It was reported that President Bush was impressed with Barr’s management of the hostage crisis, and weeks later, President Bush nominated him as Attorney General.[7]

Barr’s two-day confirmation hearing was “unusually placid” and he received a good reception from both Republicans and Democrats on the Senate Judiciary Committee.[8] Asked whether he thought a constitutional right to privacy included the right to an abortion, Barr responded that he believed the constitution was not originally intended to create a right to abortion; that Roe v. Wade was thus wrongly decided; and that abortion should be a “legitimate issue for state legislators”.[8] Committee Chairman, Senator Joe Biden, though disagreeing with Barr, responded that it was the “first candid answer” he had heard from a nominee on a question that witnesses would normally evade.[9] Barr was approved unanimously by the Senate Judiciary Committee. Chairman Biden hailed Barr as “a throwback to the days when we actually had attorneys general that would talk to you.”[9]

Attorney General of the United States

Tenure

Analysis

The media described Barr as staunchly conservative.[10] The New York Times described the “central theme” of his tenure to be: “his contention that violent crime can be reduced only by expanding Federal and state prisons to jail habitual violent offenders.”[10] At the same time, reporters consistently described Barr as affable with a dry, self-deprecating wit.[11]

Subsequent career

After his tenure at the Department of Justice, Barr spent more than 14 years as a senior corporate executive. At the end of 2008 he retired from Verizon Communications, having served as Executive Vice President and General Counsel of GTE Corporation from 1994 until that company merged with Bell Atlantic to become Verizon. During his corporate tenure, Barr directed a successful litigation campaign by the local telephone industry to achieve deregulation by scuttling a series of FCC rules, personally arguing several cases in the federal courts of appeals and the Supreme Court.[12] Barr currently serves with several corporate boards.[citation needed]

In his adopted home state of Virginia, Barr was appointed during 1994 by then-Governor George Allen to co-chair a commission to reform the criminal justice system and abolish parole in the state.[13] He served on the Board of Visitors of the College of William & Mary in Williamsburg from 1997 to 2005.[14]

He became an independent director of Time Warner (now WarnerMedia) in July 2009.

In 2009, Barr was of counsel to Kirkland & Ellis and joined the firm in 2017.[15]

On December 6, 2018, it was reported that President Donald Trump was considering Barr to be Attorney General.[16][17]

Policy positions

Immigration

As deputy attorney general, Barr successfully challenged a proposed rule by the Department of Health and Human Services to allow people with HIV/AIDS into the United States.[18] He also advocated the use of Guantanamo Bay to prevent Haitian refugees and HIV infected peoples from claiming asylum in the United States.[19]

Crime and security

Social issues

Barr has stated that he believed the constitution was not originally intended to create a right to abortion; that Roe v. Wade was thus wrongly decided; and that abortion should be a “legitimate issue for state legislators”.[8]

Health care reform

Energy and environment

Executive power

Personal life

Barr is an avid bagpiper, an avocation he began at age 8, and has played competitively in Scotland with a major American pipe band; he was a member for some time of the City of Washington Pipe Band.[20]

Barr is a Roman Catholic. He married Christine Moynihan in June 1973, and they have three grown daughters. He is a resident of Virginia.[citation needed]

References … 

https://en.wikipedia.org/wiki/William_P._Barr

Story 4: United States Net Oil Exporter — First Time Since 1949 — Videos

See the source image

See the source image

OPEC set to curb oil supply? | DW News

The US Is Making Its Mark On The Global Oil Market, But How Long Will It Last?

Study: US Could Be a Net Energy Exporter

Analysts: OPEC Meeting in Vienna to Result in Less Production

The U.S. Just Became a Net Oil Exporter for the First Time in 75 Years

 Updated on 
  • Crude, refined products exports exceed imports in weekly data
  • Shale boom has boosted U.S. crude oil shipments to record
Oil Analyst Sankey Sees OPEC Cuts Stabilizing Market Short-Term
Paul Sankey, analyst at Mizuho, examines what production cuts from OPEC+ can mean to the global oil market.

America turned into a net oil exporter last week, breaking 75 years of continued dependence on foreign oil and marking a pivotal — even if likely brief — moment toward what U.S. President Donald Trump has branded as “energy independence.”

The shift to net exports is the dramatic result of an unprecedented boom in American oil production, with thousands of wells pumping from the Permian region of Texas and New Mexico to the Bakken in North Dakota to the Marcellus in Pennsylvania.

While the country has been heading in that direction for years, this week’s dramatic shift came as data showed a sharp drop in imports and a jump in exports to a record high. Given the volatility in weekly data, the U.S. will likely remain a small net importer most of the time.

“We are becoming the dominant energy power in the world,” said Michael Lynch, president of Strategic Energy & Economic Research. “But, because the change is gradual over time, I don’t think it’s going to cause a huge revolution, but you do have to think that OPEC is going to have to take that into account when they think about cutting.”

The shale revolution has transformed oil wildcatters into billionaires and the U.S. into the world’s largest petroleum producer, surpassing Russia and Saudi Arabia. The power of OPEC has been diminished, undercutting one of the major geopolitical forces of the last half century. The cartel and its allies are meeting in Vienna this week, trying to make a tough choice to cut output and support prices, risking the loss of more market share to the U.S.

American Oil Renaissance

U.S. net imports of crude oil and refined petroleum products

Sources: 1918-1948 courtesy of Michael Lynch and adapted from American Petroleum Institute’s ‘Petroleum Facts and Figures 1959’; for 1949-2017 U.S. EIA ‘Monthly Energy Review’. 2018 and 2019 are forecast from the EIA.

The U.S. sold overseas last week a net 211,000 barrels a day of crude and refined products such as gasoline and diesel, compared to net imports of about 3 million barrels a day on average so far in 2018, and an annual peak of more than 12 million barrels a day in 2005, according to the U.S. Energy Information Administration.

The EIA said the U.S. has been a net oil importer in weekly data going back to 1991 and monthly data starting in 1973. Oil historians that have compiled even older annual data using statistics from the American Petroleum Institute said the country has been a net oil importer since 1949, when Harry Truman was at the White House.

On paper, the shift to net oil imports means that the U.S. is today energy independent, achieving a rhetorical aspiration for generations of American politicians, from Jimmy Carter to George W. Bush. Yet, it’s a paper tiger achievement: In reality, the U.S. remains exposed to global energy prices, still affected by the old geopolitics of the Middle East.

U.S. crude exports are poised to rise even further, with new pipelines from the Permian in the works and at least nine terminals planned that will be capable of loading supertankers. The only facility currently able to load the largest ships, the Louisiana Offshore Oil Port, is on pace to load more oil in December than it has in any other month.

The massive Permian may be even bigger than previously thought. The Delaware Basin, the less drilled part of the field, holds more than twice the amount of crude as its sister, the Midland Basin, the U.S. Geological Service said Thursday.

While the net balance shows the U.S. is selling more petroleum than buying, American refiners continue to buy millions of barrels each day of overseas crude and fuel. The U.S. imports more than 7 million barrels a day of crude from all over the globe to help feed its refineries, which consume more than 17 million barrels each day. In turn, the U.S. has become the world’s top fuel supplier.

“The U.S. is now a major player in the export market,” said Brian Kessens, who helps manage $16 billion at Tortoise in Leawood, Kansas. “We continue to re-tool our export infrastructure along the Gulf Coast to expand capacity, and you continue to see strong demand globally for crude oil.”

— With assistance by Jessica Summers

https://www.bloomberg.com/news/articles/2018-12-06/u-s-becomes-a-net-oil-exporter-for-the-first-time-in-75-years

 

The Pronk Pops Show Podcasts Portfolio

Listen To Pronk Pops Podcast or Download Shows 1182-1183

Listen To Pronk Pops Podcast or Download Shows 1174-1181

Listen To Pronk Pops Podcast or Download Shows 1168-1173

Listen To Pronk Pops Podcast or Download Shows 1159-1167

Listen To Pronk Pops Podcast or Download Shows 1151-1158

Listen To Pronk Pops Podcast or Download Shows 1145-1150

Listen To Pronk Pops Podcast or Download Shows 1139-1144

Listen To Pronk Pops Podcast or Download Shows 1131-1138

Listen To Pronk Pops Podcast or Download Shows 1122-1130

Listen To Pronk Pops Podcast or Download Shows 1112-1121

Listen To Pronk Pops Podcast or Download Shows 1101-1111

Listen To Pronk Pops Podcast or Download Shows 1091-1100

Listen To Pronk Pops Podcast or Download Shows 1082-1090

Listen To Pronk Pops Podcast or Download Shows 1073-1081

Listen To Pronk Pops Podcast or Download Shows 1066-1073

Listen To Pronk Pops Podcast or Download Shows 1058-1065

Listen To Pronk Pops Podcast or Download Shows 1048-1057

Listen To Pronk Pops Podcast or Download Shows 1041-1047

Listen To Pronk Pops Podcast or Download Shows 1033-1040

Listen To Pronk Pops Podcast or Download Shows 1023-1032

Listen To Pronk Pops Podcast or Download Shows 1017-1022

Listen To Pronk Pops Podcast or Download Shows 1010-1016

Listen To Pronk Pops Podcast or Download Shows 1001-1009

Listen To Pronk Pops Podcast or Download Shows 993-1000

Listen To Pronk Pops Podcast or Download Shows 984-992

Listen To Pronk Pops Podcast or Download Shows 977-983

Listen To Pronk Pops Podcast or Download Shows 970-976

Listen To Pronk Pops Podcast or Download Shows 963-969

Listen To Pronk Pops Podcast or Download Shows 955-962

Listen To Pronk Pops Podcast or Download Shows 946-954

Listen To Pronk Pops Podcast or Download Shows 938-945

Listen To Pronk Pops Podcast or Download Shows 926-937

Listen To Pronk Pops Podcast or Download Shows 916-925

Listen To Pronk Pops Podcast or Download Shows 906-915

Listen To Pronk Pops Podcast or Download Shows 889-896

Listen To Pronk Pops Podcast or Download Shows 884-888

Listen To Pronk Pops Podcast or Download Shows 878-883

Listen To Pronk Pops Podcast or Download Shows 870-877

Listen To Pronk Pops Podcast or Download Shows 864-869

Listen To Pronk Pops Podcast or Download Shows 857-863

Listen To Pronk Pops Podcast or Download Shows 850-856

Listen To Pronk Pops Podcast or Download Shows 845-849

Listen To Pronk Pops Podcast or Download Shows 840-844

Listen To Pronk Pops Podcast or Download Shows 833-839

Listen To Pronk Pops Podcast or Download Shows 827-832

Listen To Pronk Pops Podcast or Download Shows 821-826

Listen To Pronk Pops Podcast or Download Shows 815-820

Listen To Pronk Pops Podcast or Download Shows 806-814

Listen To Pronk Pops Podcast or Download Shows 800-805

Listen To Pronk Pops Podcast or Download Shows 793-799

Listen To Pronk Pops Podcast or Download Shows 785-792

Listen To Pronk Pops Podcast or Download Shows 777-784

Listen To Pronk Pops Podcast or Download Shows 769-776

Listen To Pronk Pops Podcast or Download Shows 759-768

Listen To Pronk Pops Podcast or Download Shows 751-758

Listen To Pronk Pops Podcast or Download Shows 745-750

Listen To Pronk Pops Podcast or Download Shows 738-744

Listen To Pronk Pops Podcast or Download Shows 732-737

Listen To Pronk Pops Podcast or Download Shows 727-731

Listen To Pronk Pops Podcast or Download Shows 720-726

Listen To Pronk Pops Podcast or Download Shows 713-719

Listen To Pronk Pops Podcast or Download Shows 705-712

Listen To Pronk Pops Podcast or Download Shows 695-704

Listen To Pronk Pops Podcast or Download Shows 685-694

Listen To Pronk Pops Podcast or Download Shows 675-684

Listen To Pronk Pops Podcast or Download Shows 668-674

Listen To Pronk Pops Podcast or Download Shows 660-667

Listen To Pronk Pops Podcast or Download Shows 651-659

Listen To Pronk Pops Podcast or Download Shows 644-650

Listen To Pronk Pops Podcast or Download Shows 637-643

Listen To Pronk Pops Podcast or Download Shows 629-636

Listen To Pronk Pops Podcast or Download Shows 617-628

Listen To Pronk Pops Podcast or Download Shows 608-616

Listen To Pronk Pops Podcast or Download Shows 599-607

Listen To Pronk Pops Podcast or Download Shows 590-598

Listen To Pronk Pops Podcast or Download Shows 585- 589

Listen To Pronk Pops Podcast or Download Shows 575-584

Listen To Pronk Pops Podcast or Download Shows 565-574

Listen To Pronk Pops Podcast or Download Shows 556-564

Listen To Pronk Pops Podcast or Download Shows 546-555

Listen To Pronk Pops Podcast or Download Shows 538-545

Listen To Pronk Pops Podcast or Download Shows 532-537

Listen To Pronk Pops Podcast or Download Shows 526-531

Listen To Pronk Pops Podcast or Download Shows 519-525

Listen To Pronk Pops Podcast or Download Shows 510-518

Listen To Pronk Pops Podcast or Download Shows 500-509

Listen To Pronk Pops Podcast or Download Shows 490-499

Listen To Pronk Pops Podcast or Download Shows 480-489

Listen To Pronk Pops Podcast or Download Shows 473-479

Listen To Pronk Pops Podcast or Download Shows 464-472

Listen To Pronk Pops Podcast or Download Shows 455-463

Listen To Pronk Pops Podcast or Download Shows 447-454

Listen To Pronk Pops Podcast or Download Shows 439-446

Listen To Pronk Pops Podcast or Download Shows 431-438

Listen To Pronk Pops Podcast or Download Shows 422-430

Listen To Pronk Pops Podcast or Download Shows 414-421

Listen To Pronk Pops Podcast or Download Shows 408-413

Listen To Pronk Pops Podcast or Download Shows 400-407

Listen To Pronk Pops Podcast or Download Shows 391-399

Listen To Pronk Pops Podcast or Download Shows 383-390

Listen To Pronk Pops Podcast or Download Shows 376-382

Listen To Pronk Pops Podcast or Download Shows 369-375

Listen To Pronk Pops Podcast or Download Shows 360-368

Listen To Pronk Pops Podcast or Download Shows 354-359

Listen To Pronk Pops Podcast or Download Shows 346-353

Listen To Pronk Pops Podcast or Download Shows 338-345

Listen To Pronk Pops Podcast or Download Shows 328-337

Listen To Pronk Pops Podcast or Download Shows 319-327

Listen To Pronk Pops Podcast or Download Shows 307-318

Listen To Pronk Pops Podcast or Download Shows 296-306

Listen To Pronk Pops Podcast or Download Shows 287-295

Listen To Pronk Pops Podcast or Download Shows 277-286

Listen To Pronk Pops Podcast or Download Shows 264-276

Listen To Pronk Pops Podcast or Download Shows 250-263

Listen To Pronk Pops Podcast or Download Shows 236-249

Listen To Pronk Pops Podcast or Download Shows 222-235

Listen To Pronk Pops Podcast or Download Shows 211-221

Listen To Pronk Pops Podcast or Download Shows 202-210

Listen To Pronk Pops Podcast or Download Shows 194-201

Listen To Pronk Pops Podcast or Download Shows 184-193

Listen To Pronk Pops Podcast or Download Shows 174-183

Listen To Pronk Pops Podcast or Download Shows 165-173

Listen To Pronk Pops Podcast or Download Shows 158-164

Listen To Pronk Pops Podcast or Download Shows 151-157

Listen To Pronk Pops Podcast or Download Shows 143-150

Listen To Pronk Pops Podcast or Download Shows 135-142

Listen To Pronk Pops Podcast or Download Shows 131-134

Listen To Pronk Pops Podcast or Download Shows 124-130

Listen To Pronk Pops Podcast or Download Shows 121-123

Listen To Pronk Pops Podcast or Download Shows 118-120

Listen To Pronk Pops Podcast or Download Shows 113 -117

Listen To Pronk Pops Podcast or Download Show 112

Listen To Pronk Pops Podcast or Download Shows 108-111

Listen To Pronk Pops Podcast or Download Shows 106-108

Listen To Pronk Pops Podcast or Download Shows 104-105

Listen To Pronk Pops Podcast or Download Shows 101-103

Listen To Pronk Pops Podcast or Download Shows 98-100

Listen To Pronk Pops Podcast or Download Shows 94-97

Listen To Pronk Pops Podcast or Download Show 93

Listen To Pronk Pops Podcast or Download Show 92

Listen To Pronk Pops Podcast or Download Show 91

Listen To Pronk Pops Podcast or Download Shows 88-90

Listen To Pronk Pops Podcast or Download Shows 84-87

Listen To Pronk Pops Podcast or Download Shows 79-83

Listen To Pronk Pops Podcast or Download Shows 74-78

Listen To Pronk Pops Podcast or Download Shows 71-73

Listen To Pronk Pops Podcast or Download Shows 68-70

Listen To Pronk Pops Podcast or Download Shows 65-67

Listen To Pronk Pops Podcast or Download Shows 62-64

Listen To Pronk Pops Podcast or Download Shows 58-61

Listen To Pronk Pops Podcast or Download Shows 55-57

Listen To Pronk Pops Podcast or Download Shows 52-54

Listen To Pronk Pops Podcast or Download Shows 49-51

Listen To Pronk Pops Podcast or Download Shows 45-48

Listen To Pronk Pops Podcast or Download Shows 41-44

Listen To Pronk Pops Podcast or Download Shows 38-40

Listen To Pronk Pops Podcast or Download Shows 34-37

Listen To Pronk Pops Podcast or Download Shows 30-33

Listen To Pronk Pops Podcast or Download Shows 27-29

Listen To Pronk Pops Podcast or Download Shows 17-26

Listen To Pronk Pops Podcast or Download Shows 16-22

Listen To Pronk Pops Podcast or Download Shows 10-15

Listen To Pronk Pops Podcast or Download Shows 1-9

&nbsp

Read Full Post | Make a Comment ( None so far )

The Pronk Pops Show 938, August 1, 2017: Story 1: Vice-President On The Trump Doctrine In Speech Delivered From Estonia, Latvia, and Lithuania — Videos — Story 2: President Trump Will Sign Sanctions Bill For Russia, North Korea, and Islamic Republic of Iran — Videos — Story 3: Washington War Fever with Neocon Republicans and Progressive Democrats United Against Russia — Masking Incompetency — Videos

Posted on August 1, 2017. Filed under: American History, Banking System, Blogroll, Bombs, Breaking News, Budgetary Policy, City, Coal, College, Communications, Congress, Corruption, Countries, Crime, Cruise Missiles, Defense Spending, Donald J. Trump, Donald J. Trump, Donald J. Trump, Donald Trump, Donald Trump, Drones, Economics, Elections, Empires, Employment, Energy, European History, Federal Government, Fiscal Policy, Foreign Policy, Former President Barack Obama, Fourth Amendment, Free Trade, Freedom of Speech, Government, Government Dependency, Government Spending, Health, Health Care, Health Care Insurance, Hillary Clinton, History, House of Representatives, Human, Human Behavior, Illegal Immigration, Immigration, Labor Economics, Law, Legal Immigration, Life, Lying, Media, Medicare, Middle East, Mike Pence, MIssiles, Monetary Policy, National Interest, Natural Gas, Nerve Gas, Nuclear, Nuclear, Oil, Philosophy, Photos, Politics, Polls, President Barack Obama, President Trump, Progressives, Radio, Rand Paul, Rand Paul, Raymond Thomas Pronk, Rule of Law, Scandals, Second Amendment, Senate, Solar, Spying, Success, Tax Policy, Taxation, Taxes, Terror, Terrorism, Trade Policy, Unemployment, United States Constitution, United States of America, Videos, Violence, War, Wealth, Weapons, Weapons of Mass Destruction, Wisdom | Tags: , , , , , , , , , , , , , , , , , , , , , |

Project_1

The Pronk Pops Show Podcasts

Pronk Pops Show 938,  August 1, 2017

Pronk Pops Show 937,  July 31, 2017

Pronk Pops Show 936,  July 27, 2017

Pronk Pops Show 935,  July 26, 2017

Pronk Pops Show 934,  July 25, 2017

Pronk Pops Show 934,  July 25, 2017

Pronk Pops Show 933,  July 24, 2017

Pronk Pops Show 932,  July 20, 2017

Pronk Pops Show 931,  July 19, 2017

Pronk Pops Show 930,  July 18, 2017

Pronk Pops Show 929,  July 17, 2017

Pronk Pops Show 928,  July 13, 2017

Pronk Pops Show 927,  July 12, 2017

Pronk Pops Show 926,  July 11, 2017

Pronk Pops Show 925,  July 10, 2017

Pronk Pops Show 924,  July 6, 2017

Pronk Pops Show 923,  July 5, 2017

Pronk Pops Show 922,  July 3, 2017 

Pronk Pops Show 921,  June 29, 2017

Pronk Pops Show 920,  June 28, 2017

Pronk Pops Show 919,  June 27, 2017

Pronk Pops Show 918,  June 26, 2017 

Pronk Pops Show 917,  June 22, 2017

Pronk Pops Show 916,  June 21, 2017

Pronk Pops Show 915,  June 20, 2017

Pronk Pops Show 914,  June 19, 2017

Pronk Pops Show 913,  June 16, 2017

Pronk Pops Show 912,  June 15, 2017

Pronk Pops Show 911,  June 14, 2017

Pronk Pops Show 910,  June 13, 2017

Pronk Pops Show 909,  June 12, 2017

Pronk Pops Show 908,  June 9, 2017

Pronk Pops Show 907,  June 8, 2017

Pronk Pops Show 906,  June 7, 2017

Pronk Pops Show 905,  June 6, 2017

Pronk Pops Show 904,  June 5, 2017

Pronk Pops Show 903,  June 1, 2017

Pronk Pops Show 902,  May 31, 2017

Pronk Pops Show 901,  May 30, 2017

Pronk Pops Show 900,  May 25, 2017

Pronk Pops Show 899,  May 24, 2017

Pronk Pops Show 898,  May 23, 2017

Pronk Pops Show 897,  May 22, 2017

Pronk Pops Show 896,  May 18, 2017

Pronk Pops Show 895,  May 17, 2017

Pronk Pops Show 894,  May 16, 2017

Pronk Pops Show 893,  May 15, 2017

Pronk Pops Show 892,  May 12, 2017

Pronk Pops Show 891,  May 11, 2017

Pronk Pops Show 890,  May 10, 2017

Pronk Pops Show 889,  May 9, 2017

Pronk Pops Show 888,  May 8, 2017

Pronk Pops Show 887,  May 5, 2017

Pronk Pops Show 886,  May 4, 2017

Pronk Pops Show 885,  May 3, 2017

Pronk Pops Show 884,  May 1, 2017

Pronk Pops Show 883 April 28, 2017

Pronk Pops Show 882: April 27, 2017

Pronk Pops Show 881: April 26, 2017

Pronk Pops Show 880: April 25, 2017

Pronk Pops Show 879: April 24, 2017

Pronk Pops Show 878: April 21, 2017

Pronk Pops Show 877: April 20, 2017

Pronk Pops Show 876: April 19, 2017

Pronk Pops Show 875: April 18, 2017

Pronk Pops Show 874: April 17, 2017

Pronk Pops Show 873: April 13, 2017

Pronk Pops Show 872: April 12, 2017

Pronk Pops Show 871: April 11, 2017

Pronk Pops Show 870: April 10, 2017

Pronk Pops Show 869: April 7, 2017

Pronk Pops Show 868: April 6, 2017

Pronk Pops Show 867: April 5, 2017

Pronk Pops Show 866: April 3, 2017

Image result for mike pencejuly 31, 2017 speech

Image result for nato nationsImage result for cartoons on sanctions bill on russia, iran and north korea august 1, 2017Image result for definition of neoconsImage result for definition of neoconsImage result for neoconsImage result for mike pence august 1, 2017 trump will sign sanctions bill georgia

Image result for nato nations

Image result for nato nations who pays their fair share

Image result for nato nations who pays their fair share

Vice President Pence Speaks to Troops from Estonia, Latvia and Lithuania

Published on Jul 31, 2017

Vice President Pence Speaks to troops from Estonia, Latvia, USA and Lithuania during Visit to Eastern Europe, the Baltic’s…

How Trump Will Reshape Foreign Policy

Gen. Jack Keane on what the ‘Trump Doctrine’ might be

Experts Agree: Trump Is Planning Limited North Korean Strike Next Month

What Fake News Won’t Admit: Trump Is A Foreign Policy Genius and International Media Superstar

Lionel Nation Live Stream: The World Pivots Towards War and the Fake News MSM Go Full Mooch

Vice President Mike Pence Arrives in Montenegro as Part of Tour of Baltic States

 

The Trump Doctrine is easy to understand — Just look at his background

Foreign policy experts all over Washington seem completely stupefied when it comes to understanding President Trump’s national security goals. And for a long time, I was one of them.

In happy hours all over town where we love to gather, some experts would describe Trump’s approach as “uneducated,”“unsophisticated” or even “unprofessional.”

Rubbish. They just can’t get over the fact that he doesn’t share their often overly polished and overly sophisticated perspectives. I should know, it’s my profession.

The simple fact is this: you don’t need a Ph.D. from Yale or Cambridge to understand Trump’s vision for America’s place in the world—you just need to take the time to study his background.

He doesn’t care about your foreign policy schools of thoughts, deep historical perspective or game-theory workshops. He just wants the best “deals” for America. Period. End of story.

Washington’s foreign policy brain trust would be wise to take heed the words of a 900-year-old Jedi master named Yoda: “Unlearn what you have learned”.

Understanding the Trump Doctrine is child’s play—just don’t overthink it.

Put away your Hans Morgenthau, Kenneth Waltz or just war theory training because President Trump has his own ideas when it comes to global affairs.

Our new president is very different than almost any other we can remember in modern times.

He does not have the professorial pontification skills or deeply intellectual mindset of Barack Obama. Nor does he have the government experience of George W. Bush, Bill Clinton, George H.W. Bush, Ronald Reagan, Jimmy Carter, Gerald R. Ford, Richard Nixon, Lyndon Johnson or JFK.

Trump is cut from a different cloth—he’s a street fighter and certainly not a slick, ivy league educated foreign policy expert.

The Donald is a rough and tumble, school of hard knocks, New York City businessman. He doesn’t care about your foreign policy schools of thoughts, deep historical perspective or game-theory workshops. He just wants the best “deals” for America. Period. End of story.

All of this is exactly what the American people voted for. Something different—with the old models of thinking being clearly rejected. And we need to make our peace with it.

But that doesn’t mean he isn’t sophisticated or doesn’t have a sense of vision when it comes to international affairs.

In fact, Trump has his own loosely crafted foreign policy playbook, based on his own success and failures as a New York City businessman, entrepreneur and branding genius.

Our new president is taking his business acumen and applying it on a global stage. He has, at least in my opinion, what can be best described as a foreign policy balance sheet in his head. Trump looks at where he thinks America is “winning,” code for where Washington’s interests are moving forward, and losing, where America’s interests are not being served. And he tackles the ‘losses’ on that balance sheet with ruthless efficiency.

And that all makes Trump’s global agenda, one in which he takes on the toughest of problems—problems that have been festering for decades—a very hard task, but one that is worth pursuing.

Taking on China over North Korea will be an immense challenge—creating tensions in a relationship with the two biggest global economies and militaries. Taking on trade deals that many times were not always in America’s best interests might be even harder. Asking our allies to spend more towards our common defense won’t be easy. But who said change ever was?

Making all of this even more difficult is when people misinterpret the president’s own words or cherry pick his ideas to change his message, all in an effort to take him down.

Will Trump abandon NATO, leave South Korea on its own to confront a nuclear North Korea and withdraw to some sort of fortress America? Never.

Again, his past clues you into his thinking. Like any CEO, our president is using his background in business to strike the best terms for the nation in its relationships. And just like any CEO, he is not going to break a signed deal, like alliances with key partners the world over – that’s bad for the business of the nation. But he will try to ask for a little more—just like many of us do in our own lives and business deals. Shocker.

What unnerves people is the patented Trump approach—blunt and straightforward—and almost never politically correct in how he sometimes goes about striking a deal. That will get smoothed out in the months and years to come, just like many other presidents in the past. The stature of the office, the highest in the land, has that impact on the occupant.

But Trump is not going to change his core thinking or personality—that much is clear.

World leaders at the G-20 should already understand by now who our president is and his approach.

Trump is not going to coddle you, make you feel all warm and fuzzy when you do something against America’s national interests—he is not Barack Obama. He’s going to tell you in his own Trumpian way he is not impressed—and press you to change your position. And he might even do it on Twitter. And the media will go crazy over it, only amplifying the power of his message.

In fact, there might be a foreign policy vision that personifies the Trump Doctrine after all: mega-realism on steroids—and it’s what the American people asked for. Trump has stayed true to what he said he would do in foreign affairs, and it’s simple to understand, you just have to see the world through his own training and life experience—not yours.

Let Yoda be your guide.

Harry J. Kazianis (@grecianformula) is director of defense studies at the Center for the National Interest, founded by former President Richard M. Nixon.

http://www.foxnews.com/opinion/2017/07/07/trump-doctrine-is-easy-to-understand-just-look-at-his-background.html

VOICE

There Is No Trump Doctrine, and There Will Never Be One

There Is No Trump Doctrine, and There Will Never Be One

“Neither a wise man nor a brave man lies down on the tracks of history to wait for the train of the future to run over him,” Dwight D. Eisenhower observed in 1952. Managing the future’s course is no small task, but in foreign policy the development and execution of sound strategy are a leader’s best hope. In January, on the eve of Donald Trump’s inauguration, we warned in Foreign Policy that Trump’s approach to foreign policy was dangerously nearsighted and posed unacceptable risks to national security. Absent a course correction, a trainwreck is all but assured.

Six months later, there is little indication that the president and his advisors have developed the kind of strategy — what academics call “grand strategy” and pundits refer to as “doctrine” — designed to impose America’s will on the world, rather than vice versa. Indeed, it seems there will never be a Trump doctrine. In resisting the careful patience required to develop and execute a purposive course of action over time, the administration’s method of policymaking is explicitly anti-strategic.

Trending Articles

During Whirlwind Week in Washington, VP Pence Comforts…

What White House infighting?

This deficiency results from three operational and philosophical principles that orient the president’s decision-making: a focus on short-term wins rather than longer-term strategic foresight; a “zero-sum” worldview where all gains are relative and reciprocity is absent; and a rejection of values-based policymaking. The shortcomings of this approach — which we dubbed “tactical transactionalism” — are already apparent in the Trump administration’s foreign-policy record to date.

First, Trump has made no secret of his desire to “win,” a worldview that privileges short-term, tactical triumphs.

Nowhere was this attitude more evident than in Trump’s decision to fire off 59 cruise missiles in retaliation for a Syrian government chemical weapons attack. Although administration officials herald this decision in public and private as a signal accomplishment of Trump’s foreign policy, the strike actually had little effect: The targeted airfield was operational again within days, and the attack’s muddled rationale obscured any intended signal to American adversaries. Nonetheless, the arresting images of U.S. Navy destroyers launching missiles remain the most vivid exemplar of the Trump administration’s foreign policy in its first six months.

This short-termism was also apparent in the initial enthusiastic response to the Gulf crisis that began on June 5, when Saudi Arabia, the United Arab Emirates, Bahrain, and Egypt cut diplomatic ties with Qatar and announced a blockade on the country. Trump, eager to claim a win from his trip to the Middle East, tweeted his support for the move. Even as Secretary of State Rex Tillerson tried to take a more strategic view of the crisis — recognizing the centrality of the Al-Udeid Air Base in Qatar to the U.S.-led counter-Islamic State campaign — Trump undermined his chief diplomat with bravado, doubling down on his criticism of Qatar and asserting, “If we ever needed another military base, you have other countries that would gladly build it.” Unsurprisingly, when the secretary of state attempted a well-publicized diplomatic effort to find a regional solution, U.S. partners refused to participate.

Though well suited to splashy successes — or at least the tweetable impression of them — a tactical-transactional approach blinds the president to the second- and third-order effects of his actions, making sound strategy nearly impossible.

Second, the Trump foreign policy is characterized by a zero-sum worldview: Every win for another country is a loss for the United States, and Washington’s best bet is to out-negotiate both allies and adversaries at every turn. Cooperation, according to the perspective explicitly articulated by top advisors H.R. McMaster and Gary Cohn, emerges only when narrow self-interests exactly align.

In an illustration of this principle, on his fourth day in office, Trump signed an executive order that withdrew the United States from the Trans-Pacific Partnership (TPP) trade agreement. He did so after expressing a series of deep misunderstandings about the TPP’s likely impact on jobs and wages, its power over U.S. decision-making, and its inability to deal with Chinese and Japanese currency manipulation. In its place, Trump has promised to “fix” America’s trade relations with all of its trading partners through bilateral deals. “Wait till you see what we’re going to do on trade,” Trump boasted this week to the New York Times, without offering any supporting details (as always). Meanwhile, the TPP, the text of which overwhelmingly reflected American preferences, is now being redrafted without American participation; meanwhile, China is advancing its own trade agenda through the Regional Comprehensive Economic Partnership.

The zero-sum perspective even extends to U.S. allies, which the president views more as competitors than enduring strategic partners. Despite Seoul’s vital role in addressing the North Korean nuclear crisis — undoubtedly the national security issue atop Trump’s agenda — the president has threatened to terminate the American bilateral trade agreement with South Korea and tried to renege on the U.S. commitment to pay for the THAAD anti-missile defense system.

By ignoring the multidimensional nature of international politics and denying the value of reciprocity, this relentless unilateralism denies the United States critical cooperative tools in countering threats and seizing opportunities.

Finally, tactical transactionalism is devoid of moral or ethical considerations.

President Trump has demonstrated an intuitive adoration for authoritarian leaders.

President Trump has demonstrated an intuitive adoration for authoritarian leaders. In April, he praised Egyptian President Abdel Fattah al-Sisi, a habitual human rights abuser, for doing a “fantastic job in a very difficult situation.” Later in the month, he called Philippine President Rodrigo Duterte to congratulate him, telling the man behind the deaths of thousands of his own citizens: “I am hearing of the unbelievable job on the drug problem.… Keep up good work. You are doing an amazing job.” Perhaps most dramatically, he called North Korea’s Kim Jong Un a “pretty smart cookie,” whom he would be “honored” to meet.Though it may enhance the unpredictability Trump prizes, a foreign policy unmoored from values results in a foreign policy oriented exclusively — and nihilistically — around pursuit of the “best deal.”

Over the past six months, in the wake of Trump’s cruise missile strikes in Syria and again with soaring speeches in Saudi Arabia and Poland, foreign-policy analysts have attempted to weave the administration’s actions into a coherent strategic doctrine. Senior administration officials are in on the game as well, with various factions vying to impose their strategic vision of “America First” in a bizarre, latter-day Kennan sweepstakes. But for all the op-ed ink that’s been spilled, these attempts are little more than a fool’s errand.

Even if analysts and advisors could impose intellectual coherence on Trump’s constellation of instincts and predilections, tactical transactionalism all but guarantees the inconsistent translation of those preferences into policy.

Even Trump’s well-documented antipathy toward American allies is not a reliable guide to his actual conduct of foreign relations: Despite decades of bashing both Japan and Germany, over the past six months, Trump has embraced Japanese Prime Minister Shinzo Abe — who cleverly came bearing golden golf clubs to Trump Tower in New York last November — while spurning German Chancellor Angela Merkel.

Moreover, the administration lacks the capacity to implement any strategic vision — particularly one that requires the use of non-hard-power tools. Military officials have wisely emphasized that lasting solutions to the wars in Afghanistan, Syria, and even Yemen are primarily the responsibility and role of the State Department. But the State Department itself has been gutted and demoralized. The White House’s fiscal year 2018 budget request was a paltry $37.6 billion for the State Department and U.S. Agency for International Development (a 33 percent decrease over the previous budget) and $639 billion for the Department of Defense (representing a 10 percent increase). Tillerson has also refused to fill an unprecedented number of senior diplomatic posts and ambassadorships, claiming that it would be pointless until the State Department had been fully reorganized.

To some extent, the inability of the Trump administration to develop and execute grand strategy has resulted in an astounding degree of continuity with Barack Obama-era foreign policies. Despite Trump’s pronouncement that Obama’s “strategic patience” with North Korea is over, the “peaceful pressure” policy is not discernibly distinct. Similarly, the administration’s still-secret strategy to defeat the Islamic State clearly entails tactical intensification but remains strategically similar to the Obama approach.

While surely desirable in some instances, stability is not necessarily the best response to a dynamic world.

While surely desirable in some instances, stability is not necessarily the best response to a dynamic world.Without a grand strategy, the United States cannot seize the initiative on the world stage and, simply by default, will cede ground to hostile powers, as the effects of a reactive foreign policy accrue exponentially over time. The unpredictability that Trump prizes has already injected uncertainty into America’s alliances, as international partners question whether Washington can be trusted to uphold its security commitments. Around the world, public opinion is turning against the United States, and foreign capitals can be expected to reorient their foreign policies accordingly.Come fall, the administration will likely release a wave of strategy documents, from the overarching National Security Strategy to more specific ones like the Nuclear Posture Review. These documents may provide the fleeting illusion of strategy, but they cannot elide a fundamental truth: So long as Trump’s tactical transactionalism governs the formation of U.S. foreign policy, the United States is condemned to be the object, rather than the agent, of history.

Rebecca Friedman Lissner is a Stanton nuclear security fellow at the Council on Foreign Relations.

Micah Zenko is a senior fellow at the Council on Foreign Relations. 

There Is No Trump Doctrine, and There Will Never Be One

Story 2: President Trump Will Sign Sanctions Bill For Russia, North Korea, and Islamic Republic of Iran — Videos

Congress and the Public

Image result for summary U. S. sanctions on iran, russia, north korea

Pence: Trump Will Sign Russian Sanctions Bill

Russia Ousts U.S. Diplomats in Sanction Retaliation

Kremlin Seizes U.S. Properties, Orders Diplomats To Leave. #US #Kremlin #Breaking #Russia

BREAKING: No deal! EU up in arms over US Russia sanctions

Will Trump sign Russia sanctions bill on his desk?

Russians See Sanctions Regime as a Blessing in Disguise

What Are Sanctions?

What Are Economic Sanctions?

US senate votes to slap further sanctions on Russia, Iran and North Korea

Fox News: Rep. Yoho Discusses Sanctions on Russia, Iran, and N. Korea

United States push new SANCTIONS against North Korea, Iran and Russia

Pence Condemns ‘Russia’s Occupation’ Of Georgian Soil

Gorka on North Korea: This is a results-driven presidency

Trump’s North Korea sanctions to cause trade war with China?

China responds to North Korea tensions

North Korea’s ICBM Test is a Win for Iran

 

U.S. Says Time To Talk About North Korea Is Over

Massive Leak Just Exposed What Trump Is About To Do To North Korea – Kim Jong-un Is DONE

US Senate approves Iran, Russia, North Korea sanctions

Trump will sign bill imposing stiff sanctions on Russia, Iran and North Korea

President Donald Trump said he would sign a series of bills that will impose stiff financial sanctions on Russia.

The announcement comes after Congress this week overwhelmingly approved packages to punish Moscow for allegedly meddling in U.S. elections.

After Congress approved the sanctions, Moscow said it was reducing the number of U.S. diplomats in Russia in retaliation.

In a statement late Friday, press secretary Sarah Huckabee Sanders said Trump had “reviewed the final version and, based on its responsiveness to his negotiations, approves the bill and intends to sign it.”

The legislation is aimed at punishing Moscow for interfering in the 2016 presidential election and for its military aggression in Ukraine and Syria, where the Kremlin has backed President Bashar Assad. It also imposes financial sanctions against Iran and North Korea.

Before Trump’s decision to sign the bill into law, Sen. John McCain, R-Ariz., said the bill’s passage was long overdue, a jab at Trump and the GOP-controlled Congress. McCain, chairman of the Armed Services Committee, has called Putin a murderer and a thug.

“Over the last eight months what price has Russia paid for attacking our elections?” McCain asked. “Very little.”

Russia’s Foreign Ministry on Friday said it is ordering the U.S. Embassy in Russia to reduce the number of its diplomats by Sept. 1. Russia will also close down the embassy’s recreational retreat on the outskirts of Moscow as well as warehouse facilities.

Meanwhile, some European countries expressed concerns that the measures targeting Russia’s energy sector would harm its businesses involved in piping Russian natural gas. Germany’s foreign minister said his country wouldn’t accept the U.S. sanctions against Russia being applied to European companies.

A spokesman for the European Commission said Friday that European officials will be watching the U.S. effort closely, vowing to “remain vigilant.”

The North Korea sanctions are intended to thwart Pyongyang’s ambition for nuclear weapons by cutting off access to the cash the reclusive nation needs to follow through with its plans. The bill prohibits ships owned by North Korea or by countries that refuse to comply with U.N. resolutions against it from operating in American waters or docking at U.S. ports.

Goods produced by North Korea’s forced labor would be prohibited from entering the United States, according to the bill.

The sanctions package imposes mandatory penalties on people involved in Iran’s ballistic missile program and anyone who does business with them. The measure would apply terrorism sanctions to the country’s Revolutionary Guards and enforce an arms embargo.

http://www.foxnews.com/politics/2017/07/28/trump-to-sign-bill-levying-sanctions-on-russia-iran-and-north-korea-white-house-says.html

How U.S. Sanctions Are Working (Or Not) in 5 Countries

Jul 31, 2017

Sanctions are back in the news — though if you’re President Donald Trump, that’s not a good thing. Here’s a look at the current state of U.S. sanctions on a few key countries and how they’re faring.

Russia

This week, the U.S. House of Representatives voted on a new round of sanctions against Russia, targeting its intelligence, energy, defense, mining and railway industries. The U.S. has had sanctions in place against Russia since the 2014 invasion of Ukraine and annexation of Crimea, but this latest round also hits Russia for meddling in the 2016 U.S. election. Sanctions take years to have full effect—in the short term, they’re mainly a shot across the bow (and one to which Putin has already retaliated). But you don’t often see a Republican-led Congress using sanctions as a shot across the bow of a Republican president.

Near-universal support from Congress (the sanctions bill passed the Senate by a 98-2 margin; the House of Representatives went 419-3) undermines Trump’s ability to unilaterally lift sanctions against Russia—compromising the traditional power of the president to lead the country’s foreign policy (if Trump wants to try to lift these sanctions, Congress has 30 days to approve or reject this request). The bipartisan bill had been held up by ferocious White House lobbying, but the realization has since set in that the bill will pass, even if Congress has to override a presidential veto. Trump still says that accusations his campaign colluded with the Russian government are “fake news.” Fake or not, concerns about his relations with Russia are beginning to have real impact on policy.

North Korea

While the Russia component of the bill is receiving the lion’s share of media attention, it also ramps up penalties against North Korea (in addition to Iran—see below). The U.S. has kept sanctions on the North Koreans since the Korean War. Not that they’ve done much beyond adding to the misery inside a country where 41 percent of people are undernourished and more than 70 percent depend on food aid. The Kim dynasty remains in power and continues to develop the country’s nuclear program. In fact, U.S. intelligence revised estimates just this week to say that Pyongyang could develop the capability to deliver a nuclear weapon to the continental US within a year. Some experts believe an ICBM tested on Friday could already put U.S. cities at risk.

But recent North Korea sanctions have also ricocheted on China, North Korea’s primary benefactor and link to the outside world. More than 90 percent of North Korea’s trade volume comes from China, not to mention most of its food and energy. North Korea uses Chinese banks to fund transactions throughout the rest of the world, and recent rounds of sanctions have targeted those Chinese banks and companies. Trump continues to complain that Beijing should place more pressure on the Kim regime; this is one way to add more encouragement. It’s highly unlikely to be enough to change Beijing’s mind though, given Chinese fears of extreme instability on the Korean peninsula.

Iran

Sanctions on Iran, on the other hand, have shown some results, because unlike North Korea, Iran wants a deeper commercial and political engagement with the rest of the world. Cutting off access to global markets and investments, as well as freezing $56 billion in assets, hit the country hard. Iran had hoped that signing the 2015 nuclear deal would breathe new life into its economy by allowing it to return to oil markets, and it has—though not by as much as moderates like President Hassan Rouhani had hoped.

Iran is still being kept in the cold despite the nuclear deal because the U.S. has retained sanctions over Iran’s ballistic missiles program, human rights abuses, and state sponsorship of groups like Hezbollah that Washington considers terrorist organizations. The country’s also being held back by plummeting oil prices: when Iran first signed the 2013 interim deal that would ultimately become the nuclear deal we know today, oil was selling at $111 and Iran was producing about 2.8 million barrels a day. Today, it’s producing nearly 4 millionbarrels daily, but oil is only selling at just over $50. Sometimes, the free market can be crueler than sanctions.

Syria

U.S. sanctions against Syria have been in place since 2004, long before the country descended into civil war. The Bush and Obama administrations accused the Assad regime of supporting terrorism, pursuing weapons of mass destruction, and undermining the U.S. in neighboring Iraq.

But instituting country-wide sanctions gets harder when the country in question is falling apart. The latest round have been more precisely targeted: following Assad’s use of sarin gas against civilian populations, the U.S. government levied sanctions against 271 Syrian individuals who work for the government agency making chemical weapons in April 2017. Members of Assad’s family saw their U.S. assets frozen in May. A strength of sanctions is that they can be aimed directly at individual sectors and officials, limiting damage to ordinary citizens and creating incentives for more cooperative behavior. But that advantage isn’t worth much when the government in question is already fighting for its life.

Cuba

More than 80 percent of Americans (not to mention a majority of Republicans) supported lifting the Cuban travel embargo back in 2015; 58 percent of Americans favored reestablishing diplomatic relations. Despite that, Trump has rolled back some of those Obama provisions by limiting commerce with Cuban businesses affiliated with the military, which owns almost all of the island’s retail chains and hotels. Trump has also ordered that any American who wants to visit the island for “educational” purposes must do so through a licensed tour group. The embassies in Washington and Havana will remain open.

The U.S. has been sanctioning Cuba in one form or another since the Dwight Eisenhower administration in the late 1950s. John F. Kennedy expanded sanctions further, and they remained in place for more than 50 years until Obama eased many restrictions. Over the decades, Cuba estimates that the U.S. embargo has cost the country nearly $117 billion, yet the island is still governed by Raul Castro following his brother’s death in November.

The lesson of sanctions: context is everything. About 10 years ago, I wrote a book called The J-Curve, where I envisioned all the countries in the world plotted on an X-Y axis.

On the far left of the curve are countries like North Korea and Cuba, whose regimes are stable precisely because they’re closed off from the rest of the world. On the far right of the curve are open countries like Germany and the U.S., whose governments are stable precisely because they engage with the rest of the world. Sanctions generally shift countries further left along the curve; sometimes, if the sanctions are significant enough, they can shift the entire curve downwards for a single country.

Put another way: a government like Syria’s that is fighting for its life will always have bigger problems than sanctions guiding its choices. But when sanctions are imposed on governments that feel safer outside the international system like those in North Korea and Cuba (i.e. on the far left of the J-Curve), the penalties are unlikely to bring about change — especially when they can rely on a deep-pocketed patron. (Cuba has recently opened mainly because the friendly Chavista government in Venezuela seems fated to join the Soviet Union on the ash heap of history.)

A larger country on the left-hand side of the J-curve like Russia is more vulnerable to its own economic shortcomings than to Western sanctions. But pressure on a country like Iran (also on the left side of the J-Curve, but near the dip), one that wants to plug into international commerce but that remains small enough to isolate, has more potential for success.

http://time.com/4875370/sanctions-russia-north-korea-iran-donald-trump/

Russia sanctions bill heads to Trump after Senate approval

 July 27

WASHINGTON — The Senate voted decisively on Thursday to approve a new package of stiff financial sanctions against Russia, Iran and North Korea, sending the popular bill to President Donald Trump for his signature after weeks of intense negotiations.Never in doubt, however, was a cornerstone of the legislation that bars Trump from easing or waiving the additional penalties on Russia unless Congress agrees. The provisions were included to assuage concerns among lawmakers that the president’s push for better relations with Russian President Vladimir Putin might lead him to relax the penalties without first securing concessions from the Kremlin.The Senate passed the bill, 98-2, two days after the House pushed the measure through by an overwhelming margin, 419-3. Both are veto proof numbers as the White House has wavered on whether the president would sign the measure into law.The legislation is aimed at punishing Moscow for meddling in the 2016 presidential election and its military aggression in Ukraine and Syria, where the Kremlin has backed President Bashar Assad.

Sen. John McCain, R-Ariz., said the bill’s passage was long overdue, a jab at Trump and the GOP-controlled Congress. McCain, chairman of the Armed Services Committee, has called Putin a murderer and a thug.

Sen. John McCain, R-Ariz., speaks to reporters on Capitol Hill in Washington, Thursday, July 27, 2017. The Senate voted decisively to approve a new package of stiff financial sanctions against Russia, Iran and North Korea, sending the popular bill to President Donald Trump for his signature after weeks of intense negotiations. The legislation is aimed at punishing Moscow for meddling in the 2016 presidential election and its military aggression in Ukraine and Syria, where the Kremlin has backed President Bashar Assad. McCain said the bill’s passage was long overdue, a jab at Trump and the GOP-controlled Congress. McCain, chairman of the Armed Services Committee, has called Putin a murderer and a thug. (Cliff Owen/Associated Press)

“Over the last eight months what price has Russia paid for attacking our elections?” McCain asked. “Very little.”

Trump had privately expressed frustration over Congress’ ability to limit or override the power of the president on national security matters, according to Trump administration officials and advisers. They spoke on the condition of anonymity to discuss internal White House deliberations.

But faced with heavy bipartisan support for the bill in the House and Senate, the president has little choice but to sign the bill into law. Trump’s communications director, Anthony Scaramucci, suggested earlier Thursday on CNN’s New Day that Trump might veto the bill and “negotiate an even tougher deal against the Russians.”

Sen. Bob Corker, R-Tenn., said that would be a serious mistake and called Scaramucci’s remark an “off-handed comment.” If Trump rejected the bill, Corker said, Congress would overrule him.

“I cannot imagine anybody is seriously thinking about vetoing this bill,” said Corker, chairman of the Senate Foreign Relations Committee. “It’s not good for any president — and most governors don’t like to veto things that are going to be overridden. It shows a diminishment of their authority. I just don’t think that’s a good way to start off as president.”

Still, signing a bill that penalizes Russia’s election interference would mark a significant shift for Trump. He’s repeatedly cast doubt on the conclusion of U.S. intelligence agencies that Russia sought to tip the election in his favor. And he’s blasted as a “witch hunt” investigations into the extent of Russia’s interference and whether the Trump campaign colluded with Moscow.

The 184-page bill seeks to hit Putin and the oligarchs close to him by targeting Russian corruption, human rights abusers, and crucial sectors of the Russian economy, including weapons sales and energy exports.

The bill underwent revisions to address concerns voiced by American oil and natural gas companies that sanctions specific to Russia’s energy sector could backfire on them to Moscow’s benefit. The bill raised the threshold for when U.S. firms would be prohibited from being part of energy projects that also included Russian businesses.

Lawmakers said they also made adjustments so the sanctions on Russia’s energy sector didn’t undercut the ability of U.S. allies in Europe to get access to oil and gas resources outside of Russia.

The North Korea sanctions are intended to thwart Pyongyang’s ambition for nuclear weapons by cutting off access to the cash the reclusive nation needs to follow through with its plans. The bill prohibits ships owned by North Korea or by countries that refuse to comply with U.N. resolutions against it from operating in American waters or docking at U.S. ports. Goods produced by North Korea’s forced labor would be prohibited from entering the United States, according to the bill.

The sanctions package imposes mandatory penalties on people involved in Iran’s ballistic missile program and anyone who does business with them. The measure would apply terrorism sanctions to the country’s Revolutionary Guards and enforce an arms embargo.

Sens. Bernie Sanders, I-Vt., and Rand Paul, R-Ky., voted against the sanctions bill.

https://www.washingtonpost.com/politics/congress/russia-sanctions-bill-heads-to-trump-after-senate-approval/2017/07/27/21f0a93c-7324-11e7-8c17-533c52b2f014_story.html?utm_term=.d85fb5faaa55

Now I am going to read you a list of institutions in American society.

Please tell me how much confidence you, yourself, have in each one — a great deal, quite a lot, some, or very little? Congress

 

Great deal Quite a lot Some Very little None (vol.) No opinion
% % % % % %
2017 Jun 7-11 6 6 39 44 3 1
2016 Jun 1-5 3 6 35 52 3 *
2015 Jun 2-7 4 4 37 48 5 1
2014 Jun 5-8 4 3 36 50 7 1
2013 Jun 1-4 5 5 37 47 5 1
2012 Jun 7-10 6 7 34 47 5 1
2011 Jun 9-12 6 6 40 44 4 1
2010 Jul 8-11 4 7 37 45 5 2
2009 Jun 14-17 6 11 45 34 4 1
2008 Jun 9-12 6 6 45 38 3 2
2007 Jun 11-14 4 10 46 36 3 1
2006 Jun 1-4 5 14 44 32 3 2
2005 May 23-26 8 14 51 25 1 1
2004 May 21-23 11 19 48 20 1 1
2003 Jun 9-10 10 19 50 19 1 1
2002 Jun 21-23 9 20 53 16 1 1
2001 Jun 8-10 10 16 49 20 2 3
2000 Jun 22-25 7 17 47 24 3 2
1999 Jun 25-27 9 17 51 21 1 1
1998 Jun 5-7 10 18 48 20 2 2
1997 Jul 25-27 9 13 50 24 3 1
1996 May 28-29 6 14 50 26 2 2
1995 Apr 21-24 9 12 48 28 2 1
1994 Mar 25-29 7 11 48 29 0 2
1993 Mar 22-24 8 10 40 35 4 2
1991 Oct 10-13 7 11 43 33 3 3
1991 Feb 28-Mar 3 11 19 44 21 2 3
1990 Aug 16-19 9 15 43 28 2 3
1989 Sep 7-10 13 19 42 21 3 2
1988 Sep 23-26 8 27 45 16 2 2
1987 Jul 10-13
1986 Jul 11-14 10 31 43 12 1 3
1985 May 17-20 9 30 42 15 2 3
1984 Oct 6-10 12 17 40 28 4
1983 Aug 5-8 6 22 42 23 2 5
1981 Nov 20-23 8 21 41 22 6 3
1979 Apr 6-9 11 23 39 23 1 3
1977 Jan 7-10 12 28 34 17 1 7
1975 May 30-Jun 2 14 26 38 18 1 3
1973 May 4-7 15 27 35 11 3 8
(vol.) = Volunteered response; * Less than 0.5%
GALLUP

http://www.gallup.com/poll/1600/congress-public.aspx

 

Story 3: Washington War Fever with Neocon Republicans and Progressive Democrats — Masking Incompetency — Videos

The US Deep State & neocons bang phony “Russian Threat” drum because it’s all they have – Jim Jatras

‘DEEP STATE DETERMINED TO BRING DOWN TRUMP’ – PAT BUCHANAN ON RUSSIA HYSTERIA

The 3 Coming False Flag Attacks

Deep State – False Flag Attacks

Who are the NeoConservatives?

Understanding NeoConservatism

Betrayal Of The Constitution-An Expose of the Neo-Conservative Agenda

Tucker Carlson Destroys Warmongering Neocon

Tucker vs critic who calls him cheerleader for Russia

9/11 – U.S. Neocons Planned Middle East Destabilization Since 2000?

Documentary about Neocons Influence on Iraq War 1/4

Documentary about Neocons Influence on Iraq War 2/4

Documentary about Neocons Influence on Iraq War 3/4

Documentary about Neocons Influence on Iraq War 4/4

BBC Panorama – The War Party pt 1/5

BBC Panorama – The War Party pt 2 /5

BBC Panorama – The War Party pt 3 /5

BBC Panorama – The War Party pt 4 /5

BBC Panorama – The War Party pt 5 /5

Ukraine and the Neocon Plan for a New World Order

Pat Buchanan: National Review “neocons” are “terrified” of Trump

Megyn Kelly asks Rand Paul what is a “Neocon”

Neoconservatism: An Obituary for an Idea (Cato Institute Book Forum, 2011)

Neo-cons: Invasion of the Party Snatchers Part 1

Neo-cons: Invasion of the Party Snatchers Part 2

Neo-cons: Invasion of the Party Snatchers Part 3

“You’re Humiliating Yourself!” Tucker’s MOST INTENSE INTERVIEW EVER on Russia

What Will Happen to America in August 21, 2017 Paul Craig ROBERTS Revelations

PAUL CRAIG ROBERTS Putin Is A Danger To American Control Of The World

Paul Craig Roberts ‘It’s OVER For Trump Anti Russian Neocons Are In Charge Business As Usual ‘

Dr. Paul Craig Roberts : Trump Is Over (April 2017)

How Steve Bannon sees the world

RON PAUL URGENT WARNING TO TRUMP — A “Shadow Government” Will Infiltrate Your Cabinet!!!

Ron Paul: Dick Cheney Wants War With Russia – Deep State Desperate For WW3

Published on Mar 29, 2017

During a recent episode of The Ron Paul Liberty Report, Dr. Paul called out the recent statement from Dick Cheney that Russia meddling in the U.S. election is an “act of war.”
So the irresponsibly pro destruction viewpoint of warhawk globalists is once again on full display.

Ron Paul: Shadow Government Will Stage False Flags To Bring Trump Into War

Ron Paul – Neo-CONNED!

Elvis Presley Fever 1960

 

Is Donald Trump Morphing Into A Neocon Interventionist?

04/20/2017 07:45 am ET | Updated Apr 20, 2017

Candidate Donald Trump offered a sharp break from his predecessors. He was particularly critical of neoconservatives, who seemed to back war at every turn.

Indeed, he promised not to include in his administration “those who have perfect resumes but very little to brag about except responsibility for a long history of failed policies and continued losses at war.” And he’s generally kept that commitment, for instance rejecting as deputy secretary of state Elliot Abrams, who said Trump was unfit to be president.

Substantively candidate Trump appeared to offer not so much a philosophy as an inclination. Practical if not exactly Realist, he cared more for consequences than his three immediate predecessors, who had treated wars as moral crusades in Somalia, the Balkans, Afghanistan, Iraq, Libya, and Syria. In contrast, Trump promised: “unlike other candidates for the presidency, war and aggression will not be my first instinct.”

Yet so far the Trump administration is shaping up as a disappointment for those who hoped for a break from the liberal interventionist/neoconservative synthesis.

The first problem is staffing. In Washington people are policy. The president can speak and tweet, but he needs others to turn ideas into reality and implement his directives. It doesn’t appear that he has any foreign policy realists around him, or anyone with a restrained view of America’s international responsibilities.

Rex Tillerson, James Mattis, and Herbert McMaster are all serious and talented, and none are neocons. But all seem inclined toward traditional foreign policy approaches and committed to moderating their boss’s unconventional thoughts. Most of the names mentioned for deputy secretary of state have been reliably hawkish—Abrams, John Bolton, the rewired Jon Huntsman.

President Trump appears to be most concerned with issues that have direct domestic impacts, and especially with economic nostrums about which he is most obviously wrong. He’s long been a protectionist (his anti-immigration opinions are of more recent vintage). Yet his views have not changed even as circumstances have. The Chinese once artificially limited the value of the renminbi, but recently have taken the opposite approach. The U.S. is not alone in losing manufacturing jobs, which are disappearing around the world and won’t be coming back. Multilateral trade agreements are rarely perfect, but they are not zero sum games. They usually offer political as well as economic benefits.

The administration’s repudiation of the Trans-Pacific Partnership was particularly damaging. His decision embarrassed Japanese Prime Minister Shinzo Abe, who made important economic concessions to join. More important, Trump has abandoned the economic field to the People’s Republic of China, which is pushing two different accords. Australia, among other U.S. allies, has indicated that it now will deal with Beijing, which gets to set the Pacific trade agenda.

In contrast, on more abstract foreign policy issues President Trump seems ready to treat minor concessions as major victories and move on. For years he criticized America’s Asian and European allies for taking advantage of U.S. defense generosity. In his speech hosted by the Center for the National Interest he complained that “our allies are not paying their fair share.” During the campaign he suggested refusing to honor NATO’s Article 5 commitment and leave countries failing to make sufficient financial contributions to their fate.

Yet Secretaries Mattis and Tillerson have insisted that Washington remains committed to the same alliances incorporating dependence on America. Worse, in his speech to Congress the president took credit for the small uptick in military outlays by European NATO members which actually began in 2015: “based on our very strong and frank discussions, they are beginning” to “meet their financial obligations.” Although he declared with predictable exaggeration that “the money is pouring in,” no one believes that Germany, which will go from 1.19 to 1.22 percent of GDP this year, will nearly double its outlays to hit even the NATO standard of two percent. Yet after recently meeting alliance officials he even repudiated his criticism of NATO as “obsolete.”

President Trump’s signature policy initiative, rapprochement with Russia, appears dead in the water. Unfortunately, the president’s strange personal enthusiasm for Vladimir Putin undercut his desire to accommodate a great power which has no fundamental, irresolvable conflicts with the America. Moreover, President Trump’s attempt to improve relations faces strong ideological opposition from neoconservatives determined to have a new enemy and partisan resistance from liberal Democrats committed to undermining the new administration.

President Trump also appears to have no appointees who share his commitment on this issue. At least Trump’s first National Security Adviser, Mike Flynn, wanted better relations with Russia, amid other, more dubious beliefs, but now the president seems alone. In fact, Secretary Tillerson sounded like he was representing the Obama administration when he demanded Moscow’s withdrawal from Crimea, a policy nonstarter. Ambassador-designate Huntsman’s views are unclear, but he will be constrained by the State Department bureaucracy.

The president is heading in an uncertain direction regarding China. How best to handle America’s one potential peer competitor is a matter of serious debate, but even before taking office President Trump launched what appeared to be confrontation on multiple fronts: Taiwan, trade, South China Sea, North Korea. Secretary Tillerson also took a highly adversarial position, suggesting in Senate testimony that the U.S. might blockade the PRC’s claimed Pacific possessions, a casus belli, and “compel,” whatever that means, compliance with sanctions against North Korea. Yet after meeting with Chinese President Xi Jinping President Trump appeared ready to take a more balanced approach to China. More seasoned Asia experts have yet to be appointed, however.

The Trump policy in the Middle East seems in confused flux. During the campaign he briefly pushed an “even-handed” approach to Israel and the Palestinians, before going all in backing the hardline Likud government’s practical repudiation of a two-state solution and expanded colonization of the West Bank. Since then, however, he, like other presidents before him, has backed away—though perhaps only temporarily—from the promise to move the U.S. embassy to Jerusalem. Moreover, President Trump has emphasized his desire to make a peace deal, which obviously would require concessions on both sides.

The president appears to be stepping into the Syrian and Iraq quagmires despite his election promises to the contrary. He sharply criticized previous policy in the Mideast: “Logic replaced with foolishness and arrogance, which led to one foreign policy disaster after another.” He explicitly denounced interventions in Iraq and Libya, promising to get out “of the nation-building business,” and emphasized the defeat of the Islamic State rather than overthrow of Bashar al-Assad.

Yet the administration launched missile strikes on Syria and UN Ambassador Nikki Haley loudly joined the “oust Assad” bandwagon. The president also proposed creating “safe zones” in Syria, which would require an extensive and potentially long-term U.S. military presence.

The Pentagon introduced a Marine Corps artillery battalion and other forces to assist in capturing the ISIS capital of Raqqa, Syria. Despite complaining about inadequate burden-sharing principle in the Middle East, President Trump risks encouraging the Gulf States and Turkey to reduce their efforts to defeat the Islamic State. There are reports that the administration is considering an extended military role in Iraq as well.

Finally, the president appears to have reversed himself on Afghanistan. Early in the campaign he said America should end its longest war, which has devolved into a forlorn attempt to create a centralized, liberal democratic state in Central Asia. More recently, however, he indicated he planned to keep U.S. forces there. In December he told Afghan President Ashraf Ghani that he “would certainly continue to support Afghanistan security.” There may be no conflict which less advances serious American interests than attempting to sustain an incompetent, corrupt, and failing central government in Kabul.

Where the president stands on other issues is unclear. During the campaign he indicated a willingness to talk with North Korea’s Kim Jong-un. But his secretary of state rejected that course, instead threatening military action—backed by an aircraft carrier battle group off of the North’s coast. President Trump’s support for Brexit has roiled relations with Europe, which also worries about his protectionist beliefs—highlighted by his attack on Germany’s alleged currency manipulation—and potentially softer approach to Russia.

Despite being highly critical of the Iran nuclear accord, he has not yet challenged the pact. He appears to be restoring Washington’s uncritical embrace of Saudi Arabia, which will undermine his expressed desire for greater burden-sharing by allies and yield long-term problems in Yemen. He has barely noticed Africa and South America.

It remains early for the Trump administration, and there’s no there there in much of the State and Defense departments, as well as other agencies. The president still could move in a more pragmatic, Realist direction. However, without allies in his administration that prospect seems small. Hopefully the American people, having voted against the promiscuous military intervention of his predecessors, will not end up with more of the same foreign policy.

http://www.huffingtonpost.com/entry/is-donald-trump-morphing-into-a-neocon-interventionist_us_58f898dae4b081380af51913

 

 

The Pronk Pops Show Podcasts Portfolio

Listen To Pronk Pops Podcast or Download Shows 938

Listen To Pronk Pops Podcast or Download Shows 926-937

Listen To Pronk Pops Podcast or Download Shows 916-925

Listen To Pronk Pops Podcast or Download Shows 906-915

Listen To Pronk Pops Podcast or Download Shows 889-896

Listen To Pronk Pops Podcast or Download Shows 884-888

Listen To Pronk Pops Podcast or Download Shows 878-883

Listen To Pronk Pops Podcast or Download Shows 870-877

Listen To Pronk Pops Podcast or Download Shows 864-869

Listen To Pronk Pops Podcast or Download Shows 857-863

Listen To Pronk Pops Podcast or Download Shows 850-856

Listen To Pronk Pops Podcast or Download Shows 845-849

Listen To Pronk Pops Podcast or Download Shows 840-844

Listen To Pronk Pops Podcast or Download Shows 833-839

Listen To Pronk Pops Podcast or Download Shows 827-832

Listen To Pronk Pops Podcast or Download Shows 821-826

Listen To Pronk Pops Podcast or Download Shows 815-820

Listen To Pronk Pops Podcast or Download Shows 806-814

Listen To Pronk Pops Podcast or Download Shows 800-805

Listen To Pronk Pops Podcast or Download Shows 793-799

Listen To Pronk Pops Podcast or Download Shows 785-792

Listen To Pronk Pops Podcast or Download Shows 777-784

Listen To Pronk Pops Podcast or Download Shows 769-776

Listen To Pronk Pops Podcast or Download Shows 759-768

Listen To Pronk Pops Podcast or Download Shows 751-758

Listen To Pronk Pops Podcast or Download Shows 745-750

Listen To Pronk Pops Podcast or Download Shows 738-744

Listen To Pronk Pops Podcast or Download Shows 732-737

Listen To Pronk Pops Podcast or Download Shows 727-731

Listen To Pronk Pops Podcast or Download Shows 720-726

Listen To Pronk Pops Podcast or DownloadShows 713-719

Listen To Pronk Pops Podcast or DownloadShows 705-712

Listen To Pronk Pops Podcast or Download Shows 695-704

Listen To Pronk Pops Podcast or Download Shows 685-694

Listen To Pronk Pops Podcast or Download Shows 675-684

Listen To Pronk Pops Podcast or Download Shows 668-674

Listen To Pronk Pops Podcast or Download Shows 660-667

Listen To Pronk Pops Podcast or Download Shows 651-659

Listen To Pronk Pops Podcast or Download Shows 644-650

Listen To Pronk Pops Podcast or Download Shows 637-643

Listen To Pronk Pops Podcast or Download Shows 629-636

Listen To Pronk Pops Podcast or Download Shows 617-628

Listen To Pronk Pops Podcast or Download Shows 608-616

Listen To Pronk Pops Podcast or Download Shows 599-607

Listen To Pronk Pops Podcast or Download Shows 590-598

Listen To Pronk Pops Podcast or Download Shows 585- 589

Listen To Pronk Pops Podcast or Download Shows 575-584

Listen To Pronk Pops Podcast or Download Shows 565-574

Listen To Pronk Pops Podcast or Download Shows 556-564

Listen To Pronk Pops Podcast or Download Shows 546-555

Listen To Pronk Pops Podcast or Download Shows 538-545

Listen To Pronk Pops Podcast or Download Shows 532-537

Listen To Pronk Pops Podcast or Download Shows 526-531

Listen To Pronk Pops Podcast or Download Shows 519-525

Listen To Pronk Pops Podcast or Download Shows 510-518

Listen To Pronk Pops Podcast or Download Shows 500-509

Listen To Pronk Pops Podcast or Download Shows 490-499

Listen To Pronk Pops Podcast or Download Shows 480-489

Listen To Pronk Pops Podcast or Download Shows 473-479

Listen To Pronk Pops Podcast or Download Shows 464-472

Listen To Pronk Pops Podcast or Download Shows 455-463

Listen To Pronk Pops Podcast or Download Shows 447-454

Listen To Pronk Pops Podcast or Download Shows 439-446

Listen To Pronk Pops Podcast or Download Shows 431-438

Listen To Pronk Pops Podcast or Download Shows 422-430

Listen To Pronk Pops Podcast or Download Shows 414-421

Listen To Pronk Pops Podcast or Download Shows 408-413

Listen To Pronk Pops Podcast or Download Shows 400-407

Listen To Pronk Pops Podcast or Download Shows 391-399

Listen To Pronk Pops Podcast or Download Shows 383-390

Listen To Pronk Pops Podcast or Download Shows 376-382

Listen To Pronk Pops Podcast or Download Shows 369-375

Listen To Pronk Pops Podcast or Download Shows 360-368

Listen To Pronk Pops Podcast or Download Shows 354-359

Listen To Pronk Pops Podcast or Download Shows 346-353

Listen To Pronk Pops Podcast or Download Shows 338-345

Listen To Pronk Pops Podcast or Download Shows 328-337

Listen To Pronk Pops Podcast or Download Shows 319-327

Listen To Pronk Pops Podcast or Download Shows 307-318

Listen To Pronk Pops Podcast or Download Shows 296-306

Listen To Pronk Pops Podcast or Download Shows 287-295

Listen To Pronk Pops Podcast or Download Shows 277-286

Listen To Pronk Pops Podcast or Download Shows 264-276

Listen To Pronk Pops Podcast or Download Shows 250-263

Listen To Pronk Pops Podcast or Download Shows 236-249

Listen To Pronk Pops Podcast or Download Shows 222-235

Listen To Pronk Pops Podcast or Download Shows 211-221

Listen To Pronk Pops Podcast or Download Shows 202-210

Listen To Pronk Pops Podcast or Download Shows 194-201

Listen To Pronk Pops Podcast or Download Shows 184-193

Listen To Pronk Pops Podcast or Download Shows 174-183

Listen To Pronk Pops Podcast or Download Shows 165-173

Listen To Pronk Pops Podcast or Download Shows 158-164

Listen To Pronk Pops Podcast or Download Shows 151-157

Listen To Pronk Pops Podcast or Download Shows 143-150

Listen To Pronk Pops Podcast or Download Shows 135-142

Listen To Pronk Pops Podcast or Download Shows 131-134

Listen To Pronk Pops Podcast or Download Shows 124-130

Listen To Pronk Pops Podcast or Download Shows 121-123

Listen To Pronk Pops Podcast or Download Shows 118-120

Listen To Pronk Pops Podcast or Download Shows 113 -117

Listen To Pronk Pops Podcast or Download Show 112

Listen To Pronk Pops Podcast or Download Shows 108-111

Listen To Pronk Pops Podcast or Download Shows 106-108

Listen To Pronk Pops Podcast or Download Shows 104-105

Listen To Pronk Pops Podcast or Download Shows 101-103

Listen To Pronk Pops Podcast or Download Shows 98-100

Listen To Pronk Pops Podcast or Download Shows 94-97

Listen To Pronk Pops Podcast or Download Show 93

Listen To Pronk Pops Podcast or Download Show 92

Listen To Pronk Pops Podcast or Download Show 91

Listen To Pronk Pops Podcast or Download Shows 88-90

Listen To Pronk Pops Podcast or Download Shows 84-87

Listen To Pronk Pops Podcast or Download Shows 79-83

Listen To Pronk Pops Podcast or Download Shows 74-78

Listen To Pronk Pops Podcast or Download Shows 71-73

Listen To Pronk Pops Podcast or Download Shows 68-70

Listen To Pronk Pops Podcast or Download Shows 65-67

Listen To Pronk Pops Podcast or Download Shows 62-64

Listen To Pronk Pops Podcast or Download Shows 58-61

Listen To Pronk Pops Podcast or Download Shows 55-57

Listen To Pronk Pops Podcast or Download Shows 52-54

Listen To Pronk Pops Podcast or Download Shows 49-51

Listen To Pronk Pops Podcast or Download Shows 45-48

Listen To Pronk Pops Podcast or Download Shows 41-44

Listen To Pronk Pops Podcast or Download Shows 38-40

Listen To Pronk Pops Podcast or Download Shows 34-37

Listen To Pronk Pops Podcast or Download Shows 30-33

Listen To Pronk Pops Podcast or Download Shows 27-29

Listen To Pronk Pops Podcast or Download Shows 17-26

Listen To Pronk Pops Podcast or Download Shows 16-22

Listen To Pronk Pops Podcast or Download Shows 10-15

Listen To Pronk Pops Podcast or Download Shows 1-9

Read Full Post | Make a Comment ( None so far )

The Pronk Pops Show 925, Story 1: Republicans Rush To Pass Repeal and Replace Obamacare Before August Recess with Pence, Cruz and McConnell Leading The Way — Videos — Story 2: Total Repeal of Obamacare Requires Total Repeal of All Obamacare Regulations Including Requiring Guaranteed Issue In Individual Health Insurance Market For Those With Preexisting Conditions, Community Rating Premiums and 10 Essential Health Care Benefits as Well As Repeal of The Individual and Employer Mandates and All Obamacare-Related Taxes– Address Individuals With Preexisting Conditions by State Special Risk Pools Insurance Coverage With State Subsidies Only and No Federal Subsidies — Otherwise Guaranteed Failure Just Like Obamacare Due To Adverse Selection — Leading To Single Government Payer Health Care System — Total Repeal of Obamacare Now Or Replace Your Representative and Senators Both Democrat and Republican Next November — It’s Now Or Never (O Sole Mio) — Videos

Posted on July 10, 2017. Filed under: American History, Biology, Blogroll, Breaking News, Communications, Computer, Congress, Countries, Donald J. Trump, Donald J. Trump, Donald J. Trump, Donald Trump, Donald Trump, Education, Elections, Employment, Freedom of Speech, Government, Government Spending, Health Care, Health Care Insurance, History, House of Representatives, Human, Insurance, Investments, Language, Law, Life, Media, Medical, Medicine, Mike Pence, National Interest, News, People, Philosophy, Photos, Politics, Polls, President Barack Obama, President Trump, Progressives, Rand Paul, Rand Paul, Raymond Thomas Pronk, Rule of Law, Science, Security, Senate, Success, Taxation, Taxes, Ted Cruz, Ted Cruz, United States of America, Videos, Wealth, Wisdom | Tags: , , , , , , , , , , , |

Project_1

The Pronk Pops Show Podcasts

Pronk Pops Show 925,  July 10, 2017

Pronk Pops Show 924,  July 6, 2017

Pronk Pops Show 923,  July 5, 2017

Pronk Pops Show 922,  July 3, 2017 

Pronk Pops Show 921,  June 29, 2017

Pronk Pops Show 920,  June 28, 2017

Pronk Pops Show 919,  June 27, 2017

Pronk Pops Show 918,  June 26, 2017 

Pronk Pops Show 917,  June 22, 2017

Pronk Pops Show 916,  June 21, 2017

Pronk Pops Show 915,  June 20, 2017

Pronk Pops Show 914,  June 19, 2017

Pronk Pops Show 913,  June 16, 2017

Pronk Pops Show 912,  June 15, 2017

Pronk Pops Show 911,  June 14, 2017

Pronk Pops Show 910,  June 13, 2017

Pronk Pops Show 909,  June 12, 2017

Pronk Pops Show 908,  June 9, 2017

Pronk Pops Show 907,  June 8, 2017

Pronk Pops Show 906,  June 7, 2017

Pronk Pops Show 905,  June 6, 2017

Pronk Pops Show 904,  June 5, 2017

Pronk Pops Show 903,  June 1, 2017

Pronk Pops Show 902,  May 31, 2017

Pronk Pops Show 901,  May 30, 2017

Pronk Pops Show 900,  May 25, 2017

Pronk Pops Show 899,  May 24, 2017

Pronk Pops Show 898,  May 23, 2017

Pronk Pops Show 897,  May 22, 2017

Pronk Pops Show 896,  May 18, 2017

Pronk Pops Show 895,  May 17, 2017

Pronk Pops Show 894,  May 16, 2017

Pronk Pops Show 893,  May 15, 2017

Pronk Pops Show 892,  May 12, 2017

Pronk Pops Show 891,  May 11, 2017

Pronk Pops Show 890,  May 10, 2017

Pronk Pops Show 889,  May 9, 2017

Pronk Pops Show 888,  May 8, 2017

Pronk Pops Show 887,  May 5, 2017

Pronk Pops Show 886,  May 4, 2017

Pronk Pops Show 885,  May 3, 2017

Pronk Pops Show 884,  May 1, 2017

Pronk Pops Show 883 April 28, 2017

Pronk Pops Show 882: April 27, 2017

Pronk Pops Show 881: April 26, 2017

Pronk Pops Show 880: April 25, 2017

Pronk Pops Show 879: April 24, 2017

Pronk Pops Show 878: April 21, 2017

Pronk Pops Show 877: April 20, 2017

Pronk Pops Show 876: April 19, 2017

Pronk Pops Show 875: April 18, 2017

Pronk Pops Show 874: April 17, 2017

Pronk Pops Show 873: April 13, 2017

Pronk Pops Show 872: April 12, 2017

Pronk Pops Show 871: April 11, 2017

Pronk Pops Show 870: April 10, 2017

Pronk Pops Show 869: April 7, 2017

Pronk Pops Show 868: April 6, 2017

Pronk Pops Show 867: April 5, 2017

Pronk Pops Show 866: April 3, 2017

Image result for individual health insurance market and pre-existing conditions and cost of

Image result for individual health insurance market and pre-existing conditions and cost ofImage result for most common pre-existing conditions in the united States

Image result for most common pre-existing conditions in the united States

Image result for individual health insurance market and pre-existing conditions and cost of

Image result for individual health insurance market and pre-existing conditions and cost of

Image result for difference between group and individual health care insurance

 

Image result for individual health insurance market and pre-existing conditions and cost of

Image result for who is covered under obamacare

 

 

Story 1: Republicans Rush To Pass Repeal and Replace Obamacare Before August Recess with Pence, Cruz and McConnell Leading The Way — Videos —

Ronald Reagan speaks out on Socialized Medicine – Audio

Is the GOP plan to replace ObamaCare dead?

Vice President Pence ‘s Obamacare Listening Session with Ohio Small Business Owners

Trump’s push to replace Obamacare in trouble as Congress returns from recess

Sen. Cruz on ‘Face the Nation’ – July 9, 2017

Sen Mike Lee on the push to repeal ObamaCare

Lawmakers respond to Senate health care proposal

Sen. Rand Paul: Senate health care bill needs more Obamacare ‘repeal’

Sen. Rand Paul: We shouldn’t try to fix government intervention with more intervention. – 6/22/17

I won’t vote to keep ObamaCare: Rand Paul

Coolidge: The Best President You Don’t Know

Amity Shlaes on Coolidge’s life, ideas, and success in bringing about low taxes and small government

Uncommon Knowledge: The Great Depression with Amity Shlaes

Amity Shlaes: Calvin Coolidge, Better Than Reagan?

Archie Bunker on Democrats

 

Trump prods Congress to pass stalled healthcare overhaul

By Susan Cornwell and Ian Simpson | WASHINGTON

President Donald Trump on Monday prodded the Republican-led U.S. Congress to pass major healthcare legislation but huge obstacles remained, with a senior lawmaker saying the Senate was unlikely to take up the stalled bill until next week.

The House of Representatives approved its healthcare bill in May but the Senate’s version appeared to be in growing trouble as lawmakers returned to Washington from a week-long recess.

“I cannot imagine that Congress would dare to leave Washington without a beautiful new HealthCare bill fully approved and ready to go!” Trump wrote on Twitter, referring to the seven-year Republican quest to dismantle Democratic former President Barack Obama’s signature legislative achievement.

Lawmakers are set to take another recess from the end of July until Sept. 5.

Repealing and replacing the Affordable Care Act, dubbed Obamacare, was a central campaign pledge for the Republican president. But Senate Republican leaders have faced a revolt within their ranks, with moderate senators uneasy about the millions of Americans forecast to lose their medical insurance under the legislation and hard-line conservatives saying it leaves too much of Obamacare intact.

They were struggling to find a compromise that could attract the 50 votes needed for passage in a chamber Republicans control by a 52-48 margin, with Vice President Mike Pence casting a potential tie-breaking vote in the face of unified Democratic opposition.

No. 2 Senate Republican John Cornyn said Republicans could release an updated draft of their bill by the end of the week and told Fox News that senators could vote as early as Tuesday or Wednesday of next week.

 
U.S. President Donald Trump waves as walks on the South Lawn of the White House upon his return to Washington, U.S., from the G20 Summit in Hamburg, July 8, 2017. REUTERS/Yuri Gripas
“We’re going to continue to talk and listen and exchange ideas on how we can continue to make improvements,” Cornyn said on the Senate floor.

Also speaking on the Senate floor, Majority Leader Mitch McConnell gave no timetable for the bill. McConnell signaled his determination to keep working and said mere legislative “band-aids” would not suffice.

Senate Democratic leader Chuck Schumer said he had written to McConnell urging a bipartisan effort to stabilize the health insurance market, noting that McConnell had been quoted recently as saying Congress would need to shore up that market if lawmakers fail to repeal Obamacare.

The U.S. Centers for Medicare and Medicaid Services issued data on Monday showing a 38 percent decrease in applications by insurers to sell health plans in the Obamacare individual market in 2018 compared to this year. The agency said insurers continue to flee the exchanges, the online marketplace for health insurance set up under Obamacare.

MORE AMERICANS UNINSURED

With uncertainty hanging over the healthcare system, the percentage of U.S. adults without health insurance grew in the April-May-June period to 11.7 percent, up from 11.3 percent in the first quarter of 2017, according to Gallup-Sharecare Well-Being Index figures released on Monday. That translates into nearly 2 million more Americans who have become uninsured.

Scores of protesters voiced opposition to the legislation outside the Republican National Committee headquarters and at the offices of some Republican lawmakers including House of Representatives Speaker Paul Ryan, chanting slogans including “Trumpcare kills” and “Healthcare is a human right.”

U.S. Capitol Police said in a statement 80 people were arrested at 13 locations in House and Senate office buildings after they refused “to cease and desist with their unlawful demonstration activities.”

Republicans criticize Obamacare as a costly government intrusion into the healthcare system. Democrats call the Republican legislation a giveaway to the rich that would hurt millions of the most vulnerable Americans.

The Senate legislation would phase out the Obamacare expansion of the Medicaid health insurance program for the poor and disabled, sharply cut federal Medicaid spending beginning in 2025, repeal most of Obamacare’s taxes, end a penalty on Americans who do not obtain insurance and overhaul Obamacare’s subsidies to help people buy insurance with tax credits.

Leerink Partners analyst Ana Gupte said investors remained in a “wait-and-see” mode regarding the Senate legislation.

(For a graphic on who’s covered under Medicaid, click bit.ly/2u3O2Mu)

(Additional reporting by Susan Heavey, Eric Beech and Doina Chiacu; Writing by Will Dunham; Editing by Tom Brown)

http://www.reuters.com/article/us-usa-politics-healthcare-idUSKBN19V0YP

 

The Health 202: Cruz picks government health care subsidies as lesser of two evils

 July 10 at 9:03 AM
THE PROGNOSIS

Even conservatives acknowledge that the sickest Americans need help in paying their own steep insurance costs. In an ironic twist, some would rather have the government make up the difference rather than spreading expenses among the healthy.

Health insurance markets are so complicated, and the policy around them is so complex and intertwined, that politicians don’t always land ideologically on the issue where you’d think. Just look at how GOP Sen. Ted Cruz of Texas is trying to change the Obamacare overhaul that Senate Republicans will try to pass in the next three weeks before August recess. The former presidential candidate last week touted his ideas and on the Sunday shows yesterday, my colleague Sean Sullivan reports.

Cruz’s so-called “Consumer Freedom Amendment” — which conservatives have been rallying around as the revision they most want — would essentially free the healthiest Americans from covering the costs of the sickest Americans. But the sick would be even more heavily reliant on federal assistance as a result.

“You would likely see some market segmentation” Cruz told Vox last month. “But the exchanges have very significant federal subsidies, whether under the tax credits or under the stabilization funds.”

The Cruz amendment, which is being scored by the Congressional Budget Office as one of several potential changes to the Senate health-care bill, would result in segmenting the individual insurance market into two groups, experts say. Under it, insurers could sell cheaper, stripped-down plans free of Obamacare coverage requirements like essential health benefits or even a guarantee of coverage. These sparser plans would appeal to the healthiest Americans, who would gladly exchange fewer benefits for lower monthly premiums.

But insurers would also have to sell one ACA-compliant plan. The sickest patients would flock to these more expansive and expensive plans because they need more care and medications covered on a day-to-day basis. As a result, premiums for people with expensive and serious medical conditions like diabetes or cancer would skyrocket because all those with such serious conditions would be pooled together.

“The question is, would there be a premium spiral on the ACA-complaint market?” said Cori Uccello, a senior health fellow with the American Academy of Actuaries. “Can they ever price those premiums adequately if it’s just going to be the sickest people in there?”

It’s true that government subsidies — which under the Senate plan would be available to those earning up to 350 percent of the federal poverty level — would be even more crucial in order for these sicker Americans to afford the cost of their coverage, as would an extra infusion of federal “stabilization” money for states to cover their steep expenses.

Cruz hasn’t laid out all the details of how his amendment would work, nor is it even certain Senate Majority Leader Mitch McConnell (R-Ky.) will accept it as part of his health-care bill. But should it be adopted, and the Senate bill ultimately made law, the Cruz amendment would significantly shift how the individual insurance market operates.

But in Cruz’s mind, it would solve one of the biggest problems with Obamacare: that it robs the healthy to pay for the sick. He’s spent the last week pitching it as the legislative solution for passing the Senate bill.

“I think really the consumer freedom option is the key to bringing Republicans together and getting this repeal passed,” Cruz said on ABC yesterday.

Of course, everyone paying into the system for those who most need care is the way insurance is fundamentally supposed to work. The ACA requires insurers to offer a wider ranger of benefits in plans sold to everyone regardless of their health status. But to Cruz and his compatriots, requiring healthier people to buy cushier plans than they want or need is an abridgment of personal freedom and oversteps federal regulatory authority. So they’re more worried at the moment about rolling back more ACA regulations and less worried about federal spending.

“I think for conservatives it’s become a question of picking their poison,” Larry Levitt, president of the Kaiser Family Foundation, told me. “Is it government spending, or regulation? It’s almost like with this amendment, Sen. Cruz is acknowledging the need for a government entitlement program.”

Conservative groups that want a much fuller Obamacare repeal than the Senate bill provides have been jumping on the Cruz bandwagon, including Club for Growth, FreedomWorks and Tea Party Patriots.

.@SenTedCruz@SenMikeLee ‘Consumer Choice’ amendment, aka individual Obamacare Opt Out, is real step toward . We Support it!

From Tea Party Patriots founder Jenny Beth Martin:

If the Senate adopts the Cruz-Lee Amdt to the health care bill, @TPPatriots will be more likely to support the bill http://www.teapartypatriots.org/news/tea-party-patriots-signals-support-for-cruz-lee-amendment-to-senate-health-care-bill/ 

Photo published for Tea Party Patriots Signals Support for Cruz-Lee Amendment to Senate Health Care Bill

Tea Party Patriots Signals Support for Cruz-Lee Amendment to Senate Health Care Bill

Atlanta, GA – Tea Party Patriots President and co-founder Jenny Beth Martin released the following statement today regarding the amendment to the Senate health care bill offered by Senators Ted Cruz…

teapartypatriots.org

On the flip side, the Cruz amendment could help kill the Senate health-care bill in the end because it’s prompting fears among moderates (whose votes are also needed to pass the legislation) that patients with preexisting conditions could be harmed.

“I think that reopens an issue that I can’t support, that it would make it too difficult for people with preexisting conditions to get coverage,” Sen. Shelley Moore Capito (R-W.Va.) told the Charleston Gazette-Mail.

Cruz has said the Senate bill’s $100 billion stabilization fund for states could help cover costs for the resulting pricier coverage for those with preexisting conditions under his amendment. And to parry concerns about the increased federal spending, which to some is more than ironic coming from Cruz? The  talking point Capitol Hill aides and conservative wonks are adopting: Directly subsidizing costs for those with preexisting conditions is a more “honest” approach by the government than forcing healthy people to indirectly pay for their care by buying comprehensive coverage.

“If you’re going to have a subsidy, have it come directly from the taxpayer and call it a subsidy rather than try to dragoon people to do the government’s work,” said Chris Jacobs, a former GOP Hill staffer and founder of Juniper Research Group.

“It’s more honest and fair to have the government than to have healthy, middle-class families pay for it,” Conn Carroll, a spokesman for Sen. Mike Lee (R-Utah) said.

A co-sponsor of Cruz’s amendment, Lee is insisting it be added to the Senate bill before he’ll vote for it. Sens. Rand Paul of Kentucky and Ron Johnson of Wisconsin have sent similar signals. And remember — if more than two Republicans defect, the measure would be sunk in the Senate and the GOP effort to repeal-and-replace Obamacare would most likely meet a bitter end.

Some exciting news over at The Daily 202 from my colleague James Hohmann, whose newsletter makes its debut on Amazon Echo devices and Google Home as a flash briefing called “The Daily 202’s Big Idea.” Every morning, you can listen to James analyze one of the day’s most important political stories, along with three headlines you need to know. To learn how to add The Daily 202’s Big Idea to your flash briefings on your Echo device or Google Home, visit this page. You can also get the briefing on Apple Podcasts or wherever you get your podcasts.

https://www.washingtonpost.com/news/powerpost/paloma/the-health-202/2017/07/10/the-health-202-cruz-picks-government-health-care-subsidies-as-lesser-of-two-evils/59611958e9b69b7071abcae4/?utm_term=.7137a797b4cf

GOP, White House Plot ‘Urgent Blitz’ For Repeal Votes | The Last Word | MSNBC

Story 2: Total Repeal of Obamacare Requires Total Repeal of All Obamacare Regulations Including Requiring Guaranteed Issue In Individual Health Insurance Market For Those With Preexisting Conditions, Community Rating Premiums and 10 Essential Health Care Benefits as Well As Repeal of The Individual and Employer Mandates and All Obamacare-Related Taxes– Address Individuals With Preexisting Conditions by State Special Risk Pools Insurance Coverage With State Subsidies Only and No Federal Subsidies — Otherwise Guaranteed Failure Just Like Obamacare Due To Adverse Selection — Leading To Single Government Payer Health Care System — Total Repeal of Obamacare Now Or Replace Your Representative and Senators Both Democrat and Republican Next November — It’s Now Or Never (O Sole Mio) — Videos

Rush Limbaugh Podcast 7/11/17 – Exclusive: Vice President Mike Pence Calls the Show

AHCA Myth No. 1: People with Pre-existing Conditions Will Lose Coverage

Fox News host says coverage for preexisting conditions is a ‘luxury’

Dr. Siegel breaks down the pre-existing conditions challenge

The Pre-Existing Condition Scam

Should pre-existing conditions be left to the states?

Debate over pre-existing conditions stalling health-care reform?

Obamacare Replacement, Hill’s Blame Game, Prince Phil Says No Mas and the World Slides Into Insanity

Molyneux and Schiff For Liberty – Discrimination and Pre-Existing Conditions in Health Insurance

ObamaCare Revealed – Pre-Existing Conditions Coverage

Why Exactly Trump’s Healthcare Plan Failed

We Now Have Proof Obamacare Was Designed to Fail… and Here’s Why

Why Is Healthcare So Expensive?

Single-Payer Health Care: America Already Has It

Big Government Kills Small Businesses

Are You on the Wrong Side of History?

Socialism Makes People Selfish

Democratic Socialism is Still Socialism

Elvis – It’s Now Or Never (O Sole Mio)

 

 

It’s Now or Never
It’s now or never,
Come hold me tight
Kiss me my darling,
Be mine tonight
Tomorrow will be too late,
It’s now or never
My love won’t wait.
When I first saw you
With your smile so tender
My heart was captured,
My soul surrendered
I’d spend a lifetime
Waiting for the right time
Now that your near
The time is here at last.
It’s now or never,
Come hold me tight
Kiss me my darling,
Be mine tonight
Tomorrow will be too late,
It’s now or never
My love won’t wait.
Just like a willow,
We would cry an ocean
If we lost true love
And sweet

 

FACT VERSUS FEAR: THE AHCA AND PRE-EXISTING CONDITIONS

On May 4, 2017, the House of Representatives passed the American Health Care Act (AHCA), a bill to repeal and replace many provisions of the Affordable Care Act (ACA). Immediately following the vote, misinformation about the bill began spreading like wildfire, stoking fears and outrage. The issue which seems to be getting the most attention is the potential impact this legislation could have on people with pre-existing conditions. However, as the legislation now moves to the Senate for further consideration and amendment, it is important that all stakeholders be well informed, and understand what the legislation actually says and who may realistically be impacted by any possible changes to current law.

  • The number of people in the U.S. with a condition that would likely qualify as pre-existing is not easily known, primarily because there is not a specific, pre-determined list of conditions. Estimates vary depending on how one defines “pre-existing.”
  • Even the range included in a recent report from the Department of Health and Human Services varied by a margin of more than 2:1, from between 61 million to 133 million people.[1] That said, it is likely that approximately as many as a quarter of Americans, and possibly more, have a pre-existing health condition, making it understandable why some are concerned.
  • As the AHCA is currently written, the only people who could be charged a premium based on their health status are those with a pre-existing condition who are not enrolled in a large group health plan, are also living in a state that obtains a waiver, and have let their insurance lapse in the past year for 63 days or more. In this case, the increased premium would only be allowed for one year. Further, no one may be denied insurance because of a pre-existing condition.

Background

Before passage of the ACA, most laws pertaining to the regulation of the individual health insurance market were passed at the state level and could vary widely from one state to another. The McCarran-Ferguson Act of 1945 provided states primary responsibility for regulating the business of insurance.

The Employee Retirement Income Security Act of 1974 (ERISA) imposed federal standards on certain types and with respect to certain provisions of large group (employer-sponsored) health plans, some of which supersede state law.[2] Among the provisions included in ERISA is a requirement that plans be offered on a guaranteed-issue basis, meaning that insurers are prohibited from denying coverage to the group based on medical claims history; though, the policy may be medically underwritten, meaning the premiums are based on the insured’s health status.

In 1996, the Health Insurance Portability and Accountability Act (HIPAA) was passed and imposed additional federal health insurance standards across the individual, small group, and large group markets. In response to concerns of “job-lock”—the fear that leaving a job could result in the inability to regain health insurance if an individual had a pre-existing condition—HIPAA required all states to guarantee renewability of health insurance coverage to anyone who had creditable coverage for the past 18 months, with no more than a 63-day gap in coverage during that time.[3] However, while insurers were required to renew an individual’s policy from one year to the next, they were still not prohibited from medically underwriting individuals. Thus, some individuals found that while a plan was still technically available to them, the premium may have effectively priced them out of the market. Even those without a pre-existing condition may have found the cost of insurance to be significantly higher without the added employer contribution and tax advantage that such plans receive, which could make maintaining coverage, and HIPAA eligibility, more difficult.

Very few states previously had guarantee issue or renewability requirements or other protections for individuals not covered by HIPAA.[4] Most states permitted insurers to impose pre-existing condition exclusions, in which a pre-existing condition could be used to deny coverage altogether, or would not be covered by an individual’s new insurance policy for at least a certain amount of time, if not indefinitely. Varying “look-back” periods were also prevalent, which regulated the amount of time during which the insurer may check an individual’s claims history to make such a determination.

Current Law

The ACA attempted to mitigate these issues by imposing federal guaranteed issue requirements paired with community rating, which prohibits medical underwriting, across all health insurance markets. For many, these protections became the most important provisions of the ACA. However, there are economic consequences associated with such protections; primarily, higher average premiums in the individual market and increased spending by federal taxpayers. Multiple risk mitigation programs were included in order to help subsidize the cost of insuring high-risk, high-cost individuals, but the funding has not been sufficient. Insurers continue to lose money in the individual market, despite tens of billions of dollars in federal payments each year. In fact, many insurers have found the markets to be so unprofitable due to the many enhanced regulations, that they have decided they can no longer participate in the individual market in many states.[5]

The AHCA

The AHCA, passed by the House of Representatives on May 4, would repeal and replace many provisions of the ACA. One of the ACA’s most well-known provisions, the individual mandate which requires everyone to obtain health insurance, would be repealed (practically speaking, though not technically) and replaced with a continuous coverage provision.[6] These two policies are similar. The individual mandate imposes an annual penalty for not being insured equal to the greater of $695 per adult or 2.5 percent of household income.[7] The continuous coverage provision in this legislation would, instead of federally mandating that everyone buy insurance, incentivize individuals to remain insured by allowing for the imposition of a 30 percent premium surcharge for one year on individuals who signed up for coverage if they were uninsured for more than two months in the previous year.[8] After paying the surcharge for one year, individuals would return to paying regular community-rated premiums.

One provision that would not be repealed is the federal guaranteed issue requirement; insurers in every state would still be prohibited from denying insurance coverage to anyone on the basis of a pre-existing condition. In no circumstance would this protection be denied, though it seems much confusion surrounding this protection has stemmed from the adoption of several amendments to the underlying legislation.

The first relevant amendment is one that was negotiated by Rep. Mark Meadows (R-NC), on behalf of the Freedom Caucus. This amendment includes a provision pertaining to the “essential health benefits” established by the ACA—ten categories of care which are now required to be covered under every health insurance plan. The amendment would permit states, rather than the federal government, to define the EHB standards for themselves beginning in 2018.[9] However, this provision was ultimately struck.

A second amendment was offered by Rep. Tom MacArthur (R-NJ) to address concerns that states would drastically reduce benefit requirements. The MacArthur amendment reinstates the federal EHB standards, but would allow states to apply for waivers to a number of provisions, under certain conditions. Waivers would be permitted for the following: beginning in 2018, a change in age-rating restrictions (which determine how much more an insurer may charge an older person relative to a younger person); beginning in 2019, changes to the community rating provisions, which prohibit insurers from medically underwriting individuals; and, beginning in 2020, changes to the federal EHB standards, permitting states to set their own.

Any state seeking to obtain a community rating waiver must first have in place a program to help high-risk individuals enroll in coverage or a program providing incentives to insurers to enter the market and stabilize premiums, or an invisible risk-sharing program, as defined by the Schweikert/Palmer amendment.[10] All of these programs would be at least partially funded by the $138 billion provided over the next ten years by the Patient and State Stability Fund created by AHCA. The state must also specify how the waiver it is requesting would assist in: reducing average premiums in the state, increasing the number insured, stabilizing the health insurance market, stabilizing premiums for people with pre-existing conditions, or increasing plan choice in the state. If a state demonstrates it has met these conditions and obtains such a waiver, then it may permit insurers to waive the community rating protections, though only for individuals who have not maintained continuous coverage (save for the 63-day allowance) seeking to enroll in coverage in the individual and small group markets. In other words, individuals who would otherwise face a 30 percent surcharge as a result of not maintaining continuous coverage, would instead be medically underwritten for one year. However, under no circumstance may the gender rating protections be waived; insurers would continue to be prohibited from charging different rates based on whether an individual is a male or female.

Thus, the only people who could be charged a premium based on their health status are those with a pre-existing condition, not enrolled in a large group health plan, living in a state that obtains a waiver, who have let their insurance lapse in the past year for 63 days or more, and then only for one year. All others would continue to be protected by the community rating provisions currently in place under the ACA. Further, no one could be denied coverage because of the existence of a pre-existing condition, or even face a lock-out period.

Conclusion

The AHCA would not provide for the return to the status quo prior to the ACA. It is unlikely that many Americans will be impacted by the provisions of the MacArthur amendment. Finally, the AHCA must still be passed by the Senate and is likely to undergo significant reforms before it does, in which case, the legislation would again have to be passed by the House.

 

[1] https://aspe.hhs.gov/system/files/pdf/255396/Pre-ExistingConditions.pdf

[2] https://www.nahu.org/consumer/GroupInsurance.cfm

[3] There are some exceptions to the guaranteed renewability requirements.

[4] http://www.ncsl.org/research/health/individual-health-insurance-in-the-states.aspx

[5] http://kff.org/health-reform/issue-brief/2017-premium-changes-and-insurer-participation-in-the-affordable-care-acts-health-insurance-marketplaces/

[6] Technically, the mandate would not be repealed because legislative rules prohibit such a change through the reconciliation process, but the applicable penalty would be set to $0, rendering the mandate moot.

[7] https://www.healthcare.gov/fees/fee-for-not-being-covered/

[8] The continuous coverage provisions which match the 63-day rule of the HIPAA requirements.

[9] https://rules.house.gov/sites/republicans.rules.house.gov/files/115/policymngr-amdt.pdf

[10] https://rules.house.gov/sites/republicans.rules.house.gov/files/115/AHCA/Palmer-Schweikert%20Amendment.pdf

Read more: https://www.americanactionforum.org/insight/fact-versus-fear-ahca-pre-existing-conditions/#ixzz4mSiu1KRn
Follow us: @AAF on Twitter

The Pronk Pops Show Podcasts Portfolio

Listen To Pronk Pops Podcast or Download Shows 916-925

Listen To Pronk Pops Podcast or Download Shows 906-915

Listen To Pronk Pops Podcast or Download Shows 889-896

Listen To Pronk Pops Podcast or Download Shows 884-888

Listen To Pronk Pops Podcast or Download Shows 878-883

Listen To Pronk Pops Podcast or Download Shows 870-877

Listen To Pronk Pops Podcast or Download Shows 864-869

Listen To Pronk Pops Podcast or Download Shows 857-863

Listen To Pronk Pops Podcast or Download Shows 850-856

Listen To Pronk Pops Podcast or Download Shows 845-849

Listen To Pronk Pops Podcast or Download Shows 840-844

Listen To Pronk Pops Podcast or Download Shows 833-839

Listen To Pronk Pops Podcast or Download Shows 827-832

Listen To Pronk Pops Podcast or Download Shows 821-826

Listen To Pronk Pops Podcast or Download Shows 815-820

Listen To Pronk Pops Podcast or Download Shows 806-814

Listen To Pronk Pops Podcast or Download Shows 800-805

Listen To Pronk Pops Podcast or Download Shows 793-799

Listen To Pronk Pops Podcast or Download Shows 785-792

Listen To Pronk Pops Podcast or Download Shows 777-784

Listen To Pronk Pops Podcast or Download Shows 769-776

Listen To Pronk Pops Podcast or Download Shows 759-768

Listen To Pronk Pops Podcast or Download Shows 751-758

Listen To Pronk Pops Podcast or Download Shows 745-750

Listen To Pronk Pops Podcast or Download Shows 738-744

Listen To Pronk Pops Podcast or Download Shows 732-737

Listen To Pronk Pops Podcast or Download Shows 727-731

Listen To Pronk Pops Podcast or Download Shows 720-726

Listen To Pronk Pops Podcast or DownloadShows 713-719

Listen To Pronk Pops Podcast or DownloadShows 705-712

Listen To Pronk Pops Podcast or Download Shows 695-704

Listen To Pronk Pops Podcast or Download Shows 685-694

Listen To Pronk Pops Podcast or Download Shows 675-684

Listen To Pronk Pops Podcast or Download Shows 668-674

Listen To Pronk Pops Podcast or Download Shows 660-667

Listen To Pronk Pops Podcast or Download Shows 651-659

Listen To Pronk Pops Podcast or Download Shows 644-650

Listen To Pronk Pops Podcast or Download Shows 637-643

Listen To Pronk Pops Podcast or Download Shows 629-636

Listen To Pronk Pops Podcast or Download Shows 617-628

Listen To Pronk Pops Podcast or Download Shows 608-616

Listen To Pronk Pops Podcast or Download Shows 599-607

Listen To Pronk Pops Podcast or Download Shows 590-598

Listen To Pronk Pops Podcast or Download Shows 585- 589

Listen To Pronk Pops Podcast or Download Shows 575-584

Listen To Pronk Pops Podcast or Download Shows 565-574

Listen To Pronk Pops Podcast or Download Shows 556-564

Listen To Pronk Pops Podcast or Download Shows 546-555

Listen To Pronk Pops Podcast or Download Shows 538-545

Listen To Pronk Pops Podcast or Download Shows 532-537

Listen To Pronk Pops Podcast or Download Shows 526-531

Listen To Pronk Pops Podcast or Download Shows 519-525

Listen To Pronk Pops Podcast or Download Shows 510-518

Listen To Pronk Pops Podcast or Download Shows 500-509

Listen To Pronk Pops Podcast or Download Shows 490-499

Listen To Pronk Pops Podcast or Download Shows 480-489

Listen To Pronk Pops Podcast or Download Shows 473-479

Listen To Pronk Pops Podcast or Download Shows 464-472

Listen To Pronk Pops Podcast or Download Shows 455-463

Listen To Pronk Pops Podcast or Download Shows 447-454

Listen To Pronk Pops Podcast or Download Shows 439-446

Listen To Pronk Pops Podcast or Download Shows 431-438

Listen To Pronk Pops Podcast or Download Shows 422-430

Listen To Pronk Pops Podcast or Download Shows 414-421

Listen To Pronk Pops Podcast or Download Shows 408-413

Listen To Pronk Pops Podcast or Download Shows 400-407

Listen To Pronk Pops Podcast or Download Shows 391-399

Listen To Pronk Pops Podcast or Download Shows 383-390

Listen To Pronk Pops Podcast or Download Shows 376-382

Listen To Pronk Pops Podcast or Download Shows 369-375

Listen To Pronk Pops Podcast or Download Shows 360-368

Listen To Pronk Pops Podcast or Download Shows 354-359

Listen To Pronk Pops Podcast or Download Shows 346-353

Listen To Pronk Pops Podcast or Download Shows 338-345

Listen To Pronk Pops Podcast or Download Shows 328-337

Listen To Pronk Pops Podcast or Download Shows 319-327

Listen To Pronk Pops Podcast or Download Shows 307-318

Listen To Pronk Pops Podcast or Download Shows 296-306

Listen To Pronk Pops Podcast or Download Shows 287-295

Listen To Pronk Pops Podcast or Download Shows 277-286

Listen To Pronk Pops Podcast or Download Shows 264-276

Listen To Pronk Pops Podcast or Download Shows 250-263

Listen To Pronk Pops Podcast or Download Shows 236-249

Listen To Pronk Pops Podcast or Download Shows 222-235

Listen To Pronk Pops Podcast or Download Shows 211-221

Listen To Pronk Pops Podcast or Download Shows 202-210

Listen To Pronk Pops Podcast or Download Shows 194-201

Listen To Pronk Pops Podcast or Download Shows 184-193

Listen To Pronk Pops Podcast or Download Shows 174-183

Listen To Pronk Pops Podcast or Download Shows 165-173

Listen To Pronk Pops Podcast or Download Shows 158-164

Listen To Pronk Pops Podcast or Download Shows151-157

Listen To Pronk Pops Podcast or Download Shows 143-150

Listen To Pronk Pops Podcast or Download Shows 135-142

Listen To Pronk Pops Podcast or Download Shows 131-134

Listen To Pronk Pops Podcast or Download Shows 124-130

Listen To Pronk Pops Podcast or Download Shows 121-123

Listen To Pronk Pops Podcast or Download Shows 118-120

Listen To Pronk Pops Podcast or Download Shows 113 -117

Listen To Pronk Pops Podcast or Download Show 112

Listen To Pronk Pops Podcast or Download Shows 108-111

Listen To Pronk Pops Podcast or Download Shows 106-108

Listen To Pronk Pops Podcast or Download Shows 104-105

Listen To Pronk Pops Podcast or Download Shows 101-103

Listen To Pronk Pops Podcast or Download Shows 98-100

Listen To Pronk Pops Podcast or Download Shows 94-97

Listen To Pronk Pops Podcast or Download Show 93

Listen To Pronk Pops Podcast or Download Show 92

Listen To Pronk Pops Podcast or Download Show 91

Listen To Pronk Pops Podcast or Download Shows 88-90

Listen To Pronk Pops Podcast or Download Shows 84-87

Listen To Pronk Pops Podcast or Download Shows 79-83

Listen To Pronk Pops Podcast or Download Shows 74-78

Listen To Pronk Pops Podcast or Download Shows 71-73

Listen To Pronk Pops Podcast or Download Shows 68-70

Listen To Pronk Pops Podcast or Download Shows 65-67

Listen To Pronk Pops Podcast or Download Shows 62-64

Listen To Pronk Pops Podcast or Download Shows 58-61

Listen To Pronk Pops Podcast or Download Shows 55-57

Listen To Pronk Pops Podcast or Download Shows 52-54

Listen To Pronk Pops Podcast or Download Shows 49-51

Listen To Pronk Pops Podcast or Download Shows 45-48

Listen To Pronk Pops Podcast or Download Shows 41-44

Listen To Pronk Pops Podcast or Download Shows 38-40

Listen To Pronk Pops Podcast or Download Shows 34-37

Listen To Pronk Pops Podcast or Download Shows 30-33

Listen To Pronk Pops Podcast or Download Shows 27-29

Listen To Pronk Pops Podcast or Download Shows 17-26

Listen To Pronk Pops Podcast or Download Shows 16-22

Listen To Pronk Pops Podcast or Download Shows 10-15

Listen To Pronk Pops Podcast or Download Shows 1-9

 

 

 

Read Full Post | Make a Comment ( None so far )

The Pronk Pops Show 913, June 16, 2017, Story 1: President Trump Reverses Obama’s Cuba Policies — Videos — Story 2: Political Elitist Establishment vs. The American People — Three Sticks Mueller Hires Clinton and Obama Donors and Lawyers For Elite Political Hit Squad Targeting President Trump For Fake Obstruction of Justice —  Trump Should Fire Mueller and Initiate A Justice Department and FBI Criminal Investigation of Barack Obama,Valery Jarrett, Hillary and Bill Clinton, Susan Rice, Loretta Lynch, James Comey and Their Staffs For Massive Criminal Activity Including Miss Handling Of Classified Documents and Destruction of Government Records, Public Corruption, Misconduct in Office, Obstruction of Justice, Perjury and Conspiracy to commit perjury and Using Intelligence Community To Spy on American People Including Republican Candidates and Trump For Political Purposes — Videos

Posted on June 16, 2017. Filed under: 2016 Presidential Candidates, Addiction, American History, Barack H. Obama, Ben Carson, Bernie Sanders, Bill Clinton, Blogroll, Books, Breaking News, Communications, Computers, Congress, Constitutional Law, Corruption, Countries, Crime, Culture, Donald J. Trump, Donald J. Trump, Donald J. Trump, Donald Trump, Donald Trump, Education, Empires, Employment, Federal Bureau of Investigation (FBI), Federal Government, Freedom of Speech, Government, Government Dependency, Government Spending, Hillary Clinton, Hillary Clinton, Hillary Clinton, History, House of Representatives, Human Behavior, Illegal Immigration, Immigration, Independence, Insurance, Investments, Jeb Bush, Language, Law, Legal Immigration, Lying, Marco Rubio, Mike Pence, National Security Agency, People, Rand Paul, Senate, United States of America | Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , |

 

Project_1

The Pronk Pops Show Podcasts

Pronk Pops Show 913,  June 16, 2017

Pronk Pops Show 912,  June 15, 2017

Pronk Pops Show 911,  June 14, 2017

Pronk Pops Show 910,  June 13, 2017

Pronk Pops Show 909,  June 12, 2017

Pronk Pops Show 908,  June 9, 2017

Pronk Pops Show 907,  June 8, 2017

Pronk Pops Show 906,  June 7, 2017

Pronk Pops Show 905,  June 6, 2017

Pronk Pops Show 904,  June 5, 2017

Pronk Pops Show 903,  June 1, 2017

Pronk Pops Show 902,  May 31, 2017

Pronk Pops Show 901,  May 30, 2017

Pronk Pops Show 900,  May 25, 2017

Pronk Pops Show 899,  May 24, 2017

Pronk Pops Show 898,  May 23, 2017

Pronk Pops Show 897,  May 22, 2017

Pronk Pops Show 896,  May 18, 2017

Pronk Pops Show 895,  May 17, 2017

Pronk Pops Show 894,  May 16, 2017

Pronk Pops Show 893,  May 15, 2017

Pronk Pops Show 892,  May 12, 2017

Pronk Pops Show 891,  May 11, 2017

Pronk Pops Show 890,  May 10, 2017

Pronk Pops Show 889,  May 9, 2017

Pronk Pops Show 888,  May 8, 2017

Pronk Pops Show 887,  May 5, 2017

Pronk Pops Show 886,  May 4, 2017

Pronk Pops Show 885,  May 3, 2017

Pronk Pops Show 884,  May 1, 2017

Pronk Pops Show 883 April 28, 2017

Pronk Pops Show 882: April 27, 2017

Pronk Pops Show 881: April 26, 2017

Pronk Pops Show 880: April 25, 2017

Pronk Pops Show 879: April 24, 2017

Pronk Pops Show 878: April 21, 2017

Pronk Pops Show 877: April 20, 2017

Pronk Pops Show 876: April 19, 2017

Pronk Pops Show 875: April 18, 2017

Pronk Pops Show 874: April 17, 2017

Pronk Pops Show 873: April 13, 2017

Pronk Pops Show 872: April 12, 2017

Pronk Pops Show 871: April 11, 2017

Pronk Pops Show 870: April 10, 2017

Pronk Pops Show 869: April 7, 2017

Pronk Pops Show 868: April 6, 2017

Pronk Pops Show 867: April 5, 2017

Pronk Pops Show 866: April 3, 2017

Pronk Pops Show 865: March 31, 2017

Pronk Pops Show 864: March 30, 2017

Pronk Pops Show 863: March 29, 2017

Pronk Pops Show 862: March 28, 2017

Pronk Pops Show 861: March 27, 2017

Pronk Pops Show 860: March 24, 2017

Pronk Pops Show 859: March 23, 2017

Pronk Pops Show 858: March 22, 2017

Pronk Pops Show 857: March 21, 2017

Pronk Pops Show 856: March 20, 2017

Pronk Pops Show 855: March 10, 2017

Pronk Pops Show 854: March 9, 2017

Pronk Pops Show 853: March 8, 2017

Pronk Pops Show 852: March 6, 2017

Pronk Pops Show 851: March 3, 2017

Pronk Pops Show 850: March 2, 2017

Pronk Pops Show 849: March 1, 2017

Image result for president trump speech 16 june 2017 florida on cuba

Image result for trump tweets on special counsel leaks colllusion and now obstructionImage result for mueller hit squad of lawyers

Story 1: President Trump Reverses Obama’s Cuba Policies — Videos —

Image result for president trump speech 16 june 2017 florida on cuba Image result for trump speech on cuba in florida June 16, 2017

Trump’s new Cuba policy, explained

Image result for branco cartoon on mueller

Image result for cartoons on trump reversing cuba policies

President Trump cancels Obama-era policy on Cuba, restores embargo

FULL SPEECH: President Donald Trump: “I am cancelling” Obama’s deal with Cuba! MAGA MUST SHARE 6/16

Watch Marco Rubio Slam Obama And Praise President Donald Trump For Support Of Cuba 6/16/2017

President Donald Trump Cuba Policy Change Speech Full

Cuba

Trump ‘canceling’ Obama’s Cuba policy but leaves much in place

Ramon Espinosa/AP
WATCHTrump ‘canceling’ Obama Cuba policy but leaves much in place

After nearly three years of warming relations between the United States and Cuba, President Donald Trump has announced that his administration will unravel many of his predecessor’s policies on the communist state.

Speaking in Miami, Florida, Trump announced changes to President Barack Obama’s historic rapprochement with Cuba — fulfilling a promise to the anti-Castro voting bloc he believes helped his campaign clinch the state, but stirring fear among others he could set back business interests and Cuba’s potential for a more prosperous private sector.

The Cuban government said in a statement published in the state-run newspaper Granma, “Again, the United States Government resorted to coercive methods of the past, adopting measures to intensify the blockade, in force since February 1962, which not only causes damage and deprivation to the Cuban people and constitutes an undeniable obstacle to the development of our economy, but also affects the sovereignty and interests of other countries, inciting international rejection.”

The statement continues, “The Cuban Government denounces the new measures to tighten the blockade, which are destined to fail as has been shown repeatedly in the past, and which will not achieve its purpose to weaken the revolution or to defeat the Cuban people, whose resistance to the aggressions of any type and origin has been proven over almost six decades.”

Decades of contention before Obama

In one form or another, the embargo on Cuba has been in place since the Eisenhower administration. But beginning in late 2014, Obama and Cuban President Raul Castro began a process that gradually thawed diplomatic tensions and eased commercial and travel restrictions between the two countries.

This process culminated in significant economic opportunities for both the U.S. and Cuba. American businesses, including airlines, cruise lines, and telecommunications companies, earned 26 agreements with the Cuban government from 2015 to 2017.

Hundreds of millions of U.S. dollars flowed into privately owned businesses in Cuba, The Associated Press reported , spurring the growth of a nascent middle-class that could thrive independent from the government.

For Cuba, there have been tangible benefits in tourism and telecommunications. According to the Cuban Ministry, 74 percent more American citizens visited the island in 2016 than in 2015 and, following through on a pledge to Obama, Castro opened nearly 400 new public Wi-Fi access points around Cuba.

However, the U.S. International Trade Administration told ABC News it hasn’t yet released its 2016 statistics on outbound travel and therefore could not confirm those numbers from the Cuban Ministry on U.S. tourism.

While Obama did not end the embargo on Cuba, since only Congress has that power, the U.S. and Cuba reopened embassies in each other’s capitals for the first time since 1961. The U.S. and Cuba have also signed multiple bilateral agreements to work together on everything from human and drug trafficking to maritime security and migration.

Finally, Obama ended the “wet foot, dry foot” immigration policy that applied only to Cubans. Previously, Cubans who reached U.S. shores earned automatic visas. Now, Cubans have to follow the same process as other refugees and immigrants.

What is Trump reversing?

Trump is not reversing all of Obama’s changes, but he is redefining what it means to be part of the Cuban military, which could prevent U.S. companies from doing business in Cuba. The White House explained in a fact sheet released earlier today that the policy aims to keep the Grupo de Administración Empresarial (GAESA), a conglomerate managed by the Cuban military, from benefiting from the opening in U.S.-Cuba relations.

“The profits from investment and tourism flow directly to the military. The regime takes the money and owns the industry,” Trump said. “The outcome of last administration’s executive action has been only more repression and a move to crush the peaceful democratic movement. Therefore, effective immediately, I am canceling the last administration’s completely one-sided deal with Cuba.”

This comes amid concerns that the Cuban military could be the beneficiary of increased American private investment, at a time when Castro has failed to take action on human rights. In 2016, there were 9,940 short-term detentions of protesters, up from 8,899 in 2014, the AP reports.

According to senior White House officials, Trump is also revisiting trade and travel policies toward Cuba, clamping down on individual people-to-people travel. There will still be certain exceptions under which Americans can travel to Cuba and family travel will continue to be authorized. Importantly, no changes will go into effect until the Treasury and Commerce Departments issue new regulations that conform with the administration’s policy.

Trump continued, “We will not lift sanctions on the Cuban regime until all political prisoners are free, freedoms of assembly and expression are respected, all political parties are legalized and free and internationally supervised elections are scheduled.”

The changes will certainly harm relations between Cuba and the U.S. In a hearing before the Senate Foreign Relations Committee on Tuesday, Secretary of State Rex Tillerson explained, “The general approach, if I can say that, is to allow as much of this continued commercial and engagement activity to go on as possible because we do see the sunny side, as I described it. We do see the benefits of that to the Cuban people.”

But then Tillerson qualified his statement. “On the other hand, we think we’ve achieved very little in terms of changing the behavior of the regime in Cuba and its treatment of people,” he said, “and it has little incentive to change that.”

What about diplomatic ties?

Senior White House officials say that Trump will not close the newly re-opened U.S. Embassy in Havana. He will also not reinstate the “wet foot, dry foot” policy.

To avoid alienating the Cuban-American community, which largely votes Republican, Trump will not re-implement limits on remittances — U.S. based money transfers — that Cuban-Americans can give their families back on the island. But if the administration follows through on redefining what it means to be part of the Cuban military, that could affect policies on remittances down the line.

PHOTO: Tourists ride in classic American convertible cars past the United States embassy in Havana, Cuba, Jan. 12, 2017. Ramon Espinosa/AP, file
Tourists ride in classic American convertible cars past the United States embassy in Havana, Cuba, Jan. 12, 2017.

Lobbying Trump on Cuba

Sen. Marco Rubio and Rep. Mario Diaz-Balart, both Republican, Cuban-American hardliners, lobbied Trump hard toward reversal. Importantly, the Trump administration wants to build good rapport with both. Rubio sits on the Senate Intelligence Committee, which is currently looking into the Trump campaign’s supposed contacts with Russian officials. He spoke in Miami briefly before Trump took the stage.

Rubio and Diaz-Balart won out, though there’s no shortage of actors lobbying the White House the other way. Last week, a group of House Republicans sent a letter to Trump opposing “reversing course” on Cuba. A similar group of Senate Republicans wrote to Tillerson and national security adviser H.R. McMaster, citing the entrepreneurial and national security benefits of continued engagement. Airbnb, Google and other notable businesses have also spoken out recently in support of maintaining current policies.

Tillerson had privately expressed support for Obama’s Cuba policy during the transition, according to sources. Secretary of Agriculture Sonny Perdue, when governor of Georgia in 2010, led a delegation to Cuba and said at the time to the Atlanta Journal-Constitution, “I think business cures a lot of ills.”

Leading human rights organizations, including Amnesty International and Human Rights Watch, have also urged the administration to keep Cuba open.

“More travel, more communications access, and more dialogue with Cuba are the way forward for human rights in Cuba,” Amnesty International wrote in a blog post, adding that Obama’s trip to Cuba last year opened the door to “scrutiny and transparency” of human rights on the island for the first time in nearly 10 years.

Reversing policy is bad for Cubans, Human Rights Watch said in a statement, “and insisting on human rights progress as a precondition to a new policy is unlikely to bring about change.”

What did Candidate Trump say?

During the campaign, Candidate Trump slammed Obama’s Cuba policy, telling a crowd in Miami: “All the concessions that Barack Obama has granted the Castro regime were done through executive order, which means the next president can reverse them. And that I will do unless the Castro regime meets our demands.”

But at the same time, Trump often criticizes regulations on the business community as “burdensome” and “job-killing.”

Today’s speech

Delivering a speech at the historic Manuel Artime Theater in Miami’s Little Havana neighborhood, Trump made his policy known in the center of the Cuban-American community. The president fed off of a boisterous, rowdy crowd, seeming to even attempt a Cuban accent, shouting “Little Havana!” when he took the stage. By rescinding certain Obama-era Cuba policies, he went against the advice of Democrats, Republicans and business interests. He did, however, fulfill a campaign promise.

ABC News’ Katherine Faulders, Serena Marshall and Adam Kelsey contributed to this report. 

http://abcnews.go.com/Politics/trumps-cuba-policy/story?id=48058622

Trump’s Cuba Policy Will Fail

The architect of Obama’s Cuba opening argues that the president’s rollback is a pointless mistake.

Juan Carlos Ulate / Reuters
One of the most depressing things about President Donald Trump’s decision to roll back elements of the Cuba opening is how predictable it was. A Republican candidate for president makes last-minute campaign promises to a hard-line Cuban American audience in South Florida. Senator Marco Rubio and Congressman Mario Diaz-Balart hold him to those promises. The U.S. government announces changes that will hurt ordinary Cubans, harm the image of the United States, and make it harder for Americans to do business and travel somewhere they want to go.

While President Obama raised the hopes of Americans and Cubans alike with a forward-looking opening in diplomatic, commercial and people-to-people ties, President Trump is turning back the clock to a tragically failed Cold War mindset by reimposing restrictions on those activities. While not a full reversal of the Obama opening, Trump’s actions have put relations between the United States and Cuba back into the prison of the past—setting back the prospects for reform inside of Cuba, and ignoring the voices of the Cuban people and a majority of Americans just so that he can reward a small and dwindling political constituency.

It didn’t have to be this way, and it won’t stay this way.

 

In the fall of 2014, after 16 months of secret negotiations, I travelled to the Vatican to tell representatives of Pope Francis that the United States and Cuba were prepared to begin normalizing relations. The Vatican diplomats met separately with the U.S. and Cuban delegations to verify that we were telling the truth. Then we all met together and read aloud the steps we were prepared to take. A Cardinal said the world would be moved by this example of former adversaries putting aside the past. One Vatican official who had lived in Cuba had tears in his eyes, a look of deep remembrance on his face.Cuba has long played an outsized role in the world’s imagination. To Americans, it has been the setting for the drama of mobsters, Castros, the Cold War, assassination attempts, boatlifts, and ideological conflict—mixed with the allure of a culture that finds full expression in Miami. To Latin America, Cuba has been a symbol for how United States tries to dictate the politics of the hemisphere—a legacy of democracy and economic progress, as well as coups and death squads. To the developing world, Cuba has been a symbol of sovereignty and resistance, and a supporter of revolution—for good or bad. From the Missile Crisis to the anti-apartheid movement; from the Kennedys to Obama era, this small island has put itself at the center of world events.

But Cuba is also a place where more than 11 million people live, and for decades they have suffered because of the U.S. embargo stacked on top of socialist economics and stifled political dissent. Basic goods are unavailable. Businesses cannot attract investment. Farmers are denied equipment to grow more food. Those classic cars? Cubans have had to keep them running because they’re imprisoned in an economy that is not allowed to grow along with the rest of the world. Meanwhile, Americans—who are supposed to value freedom above everything else—have been told that the only country in the world where we cannot travel is 90 miles from Florida.

Yes, the Cuban government shoulders its share of the blame. But there are dozens of authoritarian governments; we do not impose embargoes on China or Vietnam, Kazakhstan or Egypt. Last month, President Trump travelled to Saudi Arabia—a country ruled by a family, where people are beheaded and women can’t drive. He announced tens of billions of dollars in arms sales, and said: “We are not here to lecture. We are not here to tell other people how to live.” Can anyone credibly argue that Trump’s Cuba policy is motivated by a commitment to promote human rights around the world? No. Moreover, as a democracy-promotion vehicle, the embargo has been a failure. For more than 50 years, it has been in place; for more than 50 years, a Castro has governed Cuba. If anything, the embargo has provided a justification for the Cuban government to suppress political dissent in the name of protecting Cuban sovereignty.By breaking with this past, the Obama administration improved the lives of the Cuban people, and brought hope to people who had learned to live without it. The nascent Cuban private sector—shops, restaurants, taxis—grew dramatically, fueled by unlimited remittances from the United States. Over a quarter of Cubans today work in the private sector. This represents both an improvement in their quality of life, and in their human rights, as they are no longer reliant on the state for their livelihoods.
With the establishment of direct flights, cruise lines, and broadened authorization for travel to Cuba, the number of Americans visiting increased by 50 percent to over 500,000 in 2016. These travelers brought new ideas and more resources directly to the Cuban people—Airbnb estimates that $40 million in revenue have reached Cuban hosts since April 2015. Cuba also expanded access to the Internet and mobile phones. U.S. technology companies like Google took advantage of the opening to forge new agreements, including one that enhances access to the Internet for Cubans.Two governments that once plotted how to undermine one another began working together. Embassies were opened, and bilateral cooperation was initiated on the types of issues that usually guide diplomacy between neighbors: counter-narcotics, law enforcement, agriculture, testing vaccines for cancer, and responding to natural disasters like oil spills and hurricanes. In the final days of the Obama administration, the so-called Wet Foot Dry Foot policy was terminated, ending an arrangement in which any Cuban who reached the United States was paroled into the country—a hostile policy that endangered the lives of Cubans who made long overland crossings, and robbed Cuba of young people who simply came to the United States.The opening to Cuba also opened up new opportunities in Latin America and around the world. In 2015, instead of spending a Summit of the Americas defending why Cuba wasn’t allowed to attend, the United States found itself in the new position of being celebrated. U.S. diplomats participated in Cuban-hosted talks that helped end Colombia’s 40-year civil war. Cuban health care workers helped us stamp out the Ebola epidemic in West Africa.
While Trump did not take dramatic steps to restrict travel, he made it more difficult. U.S. travelers now have to go through the absurd process of figuring out if a hotel they’re staying at is owned by the Cuban military, which applies to most of Old Havana. Ominous language about requiring Americans to document their activities, and warning that they could be audited, will have a chilling effect. Despite rhetoric about supporting Cuban entrepreneurs, any reduction in travel is going to hit them—common sense suggests that someone who stays at a military-owned hotel will also ride in taxis, eat in restaurants, and shop at stores owned by ordinary Cubans. Those are the Cubans that Trump is hurting—not hotel owners who will still welcome tourists other countries.
The consequences in Latin America, and around the world, are even worse. Critics of Obama’s opening accused us of making concessions to the Cuban government. But by restoring diplomatic relations, we brought about a symbolic end to the U.S.-Cuban conflict even though we did not lift the embargo or return Guantanamo Naval Base. It’s not a “concession” to allow Americans to travel and do business somewhere. But Trump just gave the Cuban government a huge concession: Even though he didn’t fully reverse Obama’s policy, Cuba will now claim the high ground in a renewed ideological conflict with the U.S., and will find support for that position around the world.The instinct for isolation that Trump embraced will fail. Ironically, the hard-liners who pressed Trump to make these changes are only condemning themselves to future irrelevance. Polls show that over 70 percent of Americans—including a majority of Republicans—support lifting the embargo. Younger Cuban Americans are far more likely to support lifting the embargo than their parents and grandparents. Fifty-five senators have co-sponsored a bill to lift the travel ban, and Republicans from states that depend on agriculture want to promote business in Cuba. Meanwhile, the Washington Post reported that a poll showed 97 percent of the Cuban people supporting normalization with the United States.Donald Trump is delivering his remarks on Cuba at the Manuel Artime Theater, named for a leader of the Bay of Pigs Invasion. He couldn’t have found a better symbol for the past. But ultimately, the past must give way to the wishes of the people. Fidel Castro is dead. A new generation, in Cuba and the United States, doesn’t want to be defined by quarrels that pre-date their birth. The embargo should—and will—be discarded. Engagement should—and will—prevail. That is why Trump’s announcement should be seen for what it is: not as a step forward for democracy, but as the last illogical gasp of a strain of American politics with a 50-year track record of failure; one that wrongly presumes we can control what happens in Cuba. The future of Cuba will be determined by the Cuban people, and those Americans who want to help them, not hurt them.https://www.theatlantic.com/international/archive/2017/06/cuba-trump-obama-opening/530568/

Story 2: Political Elitist Establishment vs. The American People — Three Sticks Mueller Hires Clinton and Obama Donors and Lawyers For Elite Political Hit Squad Targeting President Trump For Fake Obstruction of Justice —  Trump Should Fire Mueller and Initiate A Justice Department and FBI Investigation of Barack Obama,Valery Jarrett, Hillary and Bill Clinton, Susan Rice, Loretta Lynch, James Comey and Their Staffs For Massive Criminal Activity Including Miss Handling Of Classified Documents and Destruction of Government Records, Public Corruption, Obstruction of Justice and Using Intelligence Community To Spy on American People Including Republican Candidates and Trump For Political Purposes — Videos

Image result for cartoons on obama spying on trump and american people

Image result for cartoons on obama spying on trump and american people

Image result for trump tweets june 16, 2017 They made up a phony collusion with the Russians story, found zero proof, so now they go for obstruction of justice on the phony story. Nice

Image result for branco cartoon on mueller

Image result for branco cartoon on mueller

Image result for branco cartoon on muellerImage result for branco cartoon on mueller

Image result for branco cartoon on mueller

Image result for branco cartoon on mueller

Image result for cartoons on obama spying on trump and american people

Image result for branco cartoon on mueller

Image result for cartoons on obama spying on trump and american people

Image result for cartoons on obama spying on trump and american people

Image result for cartoons on obama spying on trump and american people

Image result for branco cartoon on mueller

Image result for branco cartoon on mueller

Image result for branco cartoon on muellerImage result for cartoons on obama spying on trump and american people

Image result for cartoons on obama spying on trump and american peopleImage result for cartoons on obama spying on trump and american peopleTrump lashes out over reported obstruction of justice probe

President Trump now under INVESTIGATION for obstruction of justice by Robert Mueller 6/14/2017

Gingrich calls for special counsel to probe special counsel

Anderson Cooper CNN Panel on reports that President Trump is now under investigation by Robert Mueller

Jay Sekulow on The Laura Ingraham Show (6/16/2017)

Jared Kushner’s business dealings now under investigation by Robert Mueller 6/15/2017

HANNITY – FIRE ROBERT MUELLER. Massive conflicts of interests

Trump confidant Christopher Ruddy says Mueller has ‘real conflicts’ as special counsel

What Would Happen If President Donald Trump Tried To Fire Robert Mueller? | For The Record | MSNBC

Rosenstein says only he can fire special counsel

Mark Levin: Robert Mueller is investigating Trump for possible obstruction of justice (June 15 2017)

Rush Limbaugh: It wouldn’t bother me if Trump fired special counsel Robert Mueller… (06-13-2017)

Should Mueller recuse himself from the Trump-Russia inquiry?

Roger Stone: Mueller Coached Comey For Last Week Testimony

Roger Stone The Fix Is In, Mueller Hired To Indict The President

Mueller is Out for Trump’s Head! Dick Morris TV: Lunch ALERT!

Ben Shapiro: Jeff Sesstios hearing, Trump’s Cabinet meeting, Can Bob Mueller be fired & other topics

Trump Has Discovered Why Deep State Is Desperate To Stop Him

Tom Fitton discusses Prosecution of Trump, Pursuit of Comey Memos, & Lawsuit over Obama Shakedown

Justice department names Robert Mueller as special counsel in Russia investigation

Mueller assembles elite team of prosecutors

Newt Gingrich – On Special Counsel “THESE ARE BAD PEOPLE” – GMA

Michele Malkin & Lou Dobbs Target The Deep Deep Dark State Cabal That Is Rosenstein,Mueller & Comey

You Gotta Watch Jay Sekulow The President’s Lawyer Prosecute The Case Against The Deep State

Lou Dobbs & Legal Expert Delineate The Number Of Crimes Comey & Mueller Have Already Committed

Jay Sekulow The President’s Lawyer Explains Why Trump Must Clean His Legal House Now! 6 / 14 / 2017

Lou Dobbs : Is the left trying to overthrow Trump’s presidency? : 6/15/2017

Should President Trump fire special counsel Mueller?

“It’s Utterly Outrageous!” Tucker and Ann Coulter React to Comey Testimony

Fox and Friends : Ingraham slams ‘fake news’ about Trump firing Mueller : 6/13/2017

Lou Dobbs : Lt. Col. Shaffer: White House needs to get on the offensive : 6/13/2017

Lou Dobbs : Rep. Biggs: We need to turn the tables on Trump’s enemies : 6/13/2017

Trump dropped biggest bombshell on Loretta Lynch: Judge Napolitano

Judge Jeanine Talks To Jay Sekulow On Why Comey My Face Serious Legal Matters

Russia Collusion is a total hoax – 6/9/2017 – with Victor Davis Hanson

BREAKING: Kellyanne Reveals Sick Thing Special Counsel Mueller Is Doing to Trump. Should He Be Fired

Report: Mueller Team Investigating Trump Has Major Obama-Hillary Ties

Calls for Special Counsel Mueller to Step Down or Recuse.

A New Interview with Kellyanne Conway! She is So Good!

Ann Coulter Finally Weighs in on the James Comey Thimgamabob!

Must See… The Always Amazing Ann Coulter Tear It Up On Tucker 6 / 2 / 2017

Should the special counsel’s probe be shut down?

Gohmert: “Get Rid of Mueller – He Created All Kinds of Problems …”

Gohmert: ‘We Have a Conspiracy Remaining Afoot in Department of Justice’

Gohmert: ‘There’s So Much Collusion – Real Collusion in the Justice Department’

Gohmert on Comey Hearing: “He was 100% Loyal to Loretta Lynch & Hillary Clinton”

Gohmert on Comey: ‘The More We Find Out, This Guy Needed To Go’

As Calls Get Louder To Investigate Loretta Lynch So Do The Calls For Mueller Firing

Hume: Mueller-Comey friendship raises an ethical question

Sen Rand Paul Speaks on Gingrich: GOP “DELUSIONAL” to think Mueller Will Be Fair. #RandPaul

While Most Sing Mueller’s Praises, Louie Gohmert Says He’s a Big Problem!

Trump dropped biggest bombshell on Loretta Lynch: Judge Napolitano

Kurtz: Mueller on the hot seat

Gregg Jarrett: Mueller should resign as special counsel

Lou Dobbs : Rep. Gohmert: James Comey is loyal to Lynch and Clinton : 6/8/2017

Cavuto : Can Democrats move beyond James Comey and the Russia probe? : 6/9/2017

Lou Dobbs : Chris Farrell: Comey’s testimony proved he is a dirty cop : 6/8/2017

Will media admit they were ‘dead wrong’ about Russia?

Leftist Host Chris Matthews Admits Russia Collusion Narrative Destroyed

Roger Stone: It Is Time For Us To Go On Attack

 

Rosenstein warns Americans to ‘exercise caution’ about anonymous reports

Deputy Attorney General Rod Rosenstein said Thursday evening that Americans should “exercise caution” before believing anonymously sourced reports, an apparent reference to ongoing leaks surrounding the investigation into alleged connections between Russian officials and President Trump’s campaign.

“Americans should exercise caution before accepting as true any stories any stories attributed to anonymous ‘officials,'” Rosenstein said in a statement, “particularly when they do not identify the country — let alone the branch or agency of government — with which the alleged sources supposedly are affiliated.”

Though Rosenstein’s statement did not reference the Russia investigation specifically, it was released hours after the Washington Post reported that Special Counsel Robert Mueller is investigating Jared Kushner — Trump’s senior adviser and son-in-law — over his finances and business dealings.

ROBERT MUELLER APPOINTMENT TO LEAD RUSSIA PROBE WINS BIPARTISAN PRAISE

Peter Carr, a spokesman for Mueller, did not comment on the Post report when reached by Fox News, but did say that the special counsel’s office “has undertaken stringent controls to prohibit unauthorized disclosures that deal severely with any member who engages in this conduct.”

Trump and his supporters have repeatedly complained about leaked reports about the progress of Mueller’s investigation, many of which have appeared in either the Post or The New York Times.

On Wednesday, the Post reported that Mueller was examining whether Trump has tried to obstruct justice and was seeking interviews with three administration officials: Dan Coats, the director of national intelligence; Michael Rogers, the head of the National Security Agency; and Richard Ledgett, the former NSA deputy director.

Mark Corallo, a spokesman for Trump’s personal lawyer, responded Wednesday evening to the Post report by saying: “The FBI leak of information regarding the president is outrageous, inexcusable and illegal.”

The Post report cited anonymous sources who were briefed on requests made by investigators. It was not immediately clear whether the FBI was the source of the information.

The president himself took to Twitter Wednesday morning to complain about the “phony story” in the Post, then did so again in the afternoon to question why Hillary Clinton’s conduct during the probe of her private email server was not under more scrutiny.

Rosenstein, who appointed Mueller special counsel in the Russia investigation last month, testified to lawmakers Tuesday that he has seen no evidence of good cause to fire Mueller and that he is confident that Mueller will have “the full independence he needs” to investigate thoroughly.

http://www.foxnews.com/politics/2017/06/16/rosenstein-warns-americans-to-exercise-caution-about-anonymous-reports.html

 

CORRECTED: Three members of Mueller’s team have donated to Democrats

CORRECTED: Three members of Mueller's team have donated to Democrats
© Greg Nash

Three members of special counsel Robert Mueller’s team on the Russia probe have donated to Democratic presidential campaigns and organizations, according to Federal Election Commission filings.

Jeannie Rhee, a member of Mueller’s team, donated $5,400 to Hillary Clinton’s presidential campaign PAC Hillary for America. 

Andrew Weissmann, who serves in a top post within the Justice Department’s fraud practice, is the most senior lawyer on the special counsel team, Bloomberg reported. He served as the FBI’s general counsel and the assistant director to Mueller when the special counsel was FBI director.

Before he worked at the FBI or Justice Department, Weissman worked at the law firm Jenner & Block LLP, during which he donated six times to political action committees for Obama in 2008 for a total of $4,700.

James Quarles, who served as an assistant special prosecutor on the Watergate Special Prosecution Force, has donated to over a dozen Democratic PACs since the late 1980s. He was also identified by the Washington Post as a member of Mueller’s team.

Starting in 1987, Quarles donated to Democratic candidate Michael Dukakis’s presidential PAC, Dukakis for President. Since then, he has also contributed in 1999 to Sen. Al Gore’s run for the presidency, then-Sen. John Kerry’s (D-Mass.) presidential bid in 2005, Obama’s presidential PAC in 2008 and 2012, and Clinton’s presidential pac Hillary for America in 2016.

He also donated to two Republicans, Rep. Jason Chaffetz (R-Utah) in 2015 and Sen. George Allen (R-Va.) in 2005.

The political affiliations of Mueller’s team have been spotlighted by former House Speaker Newt Gingrich (R-Ga.) an ally of Trump.

After initially hailing Mueller’s appointment as special counsel, Gingrich questioned for former FBI director’s ability to be impartial on Monday because of “who he is hiring.”

Michael R. Dreeben, who serves as the Justice Department’s deputy solicitor general, is working on a part-time basis for Mueller, The Washington Post reported Friday.

The FEC database shows a donation from a Michael W. Dreeben in 2006 of $1,000 dollars to Hillary Clinton’s Senate political action committee (PAC), Friends of Hillary. But a spokesman for the special counsel said this is not the Dreeben working for Mueller, who has a different middle initial. The FEC database identifies the Dreeben who made the contribution as deputy solicitor general in the Justice Department.

Several of the figures on Mueller’s team are well known and respected for their work at the Department of Justice.

Dreeben has reportedly received bipartisan praise for his handling of the department’s criminal appellate cases, the Post reported.

Weissmann is well-known for his work in the investigation on Volkswagen cheating on their diesel emissions tests, which they pleaded guilty to earlier this year.

Mueller, who formerly served as FBI director, was first appointed by Republican President George W. Bush in 2001.

Deputy Attorney General Rod Rosenstein appointed Mueller as special counsel last month.

CORRECTION: This story was updated at 10:03 a.m. to reflect the special counsel spokesman’s statement that Dreeben did not give a donation to Clinton. 

http://thehill.com/homenews/administration/337428-four-top-legal-experts-on-muellers-team-donated-to-democratic-causes

 

TWEET STORM

Trump Declares War on Rosenstein: ‘He Has No Qualms About Throwing Him Under a Bus’

With one tweet, the president confirmed he’s under investigation and put the man in charge of that investigation on blast.

President Donald Trump woke up on Friday and decided to publicly confirm that he is under criminal investigation—and to put his deputy attorney general in the line of fire.

After 48 hours of Trump’s allies lobbing allegations of illegal “deep state” leaks and fake-news hit jobs, Trump took to Twitter and corroborated a Wednesday report by The Washington Post that he is the target of a federal investigation into potential obstruction of justice after firing FBI Director James Comey.

“I am being investigated for firing the FBI Director by the man who told me to fire the FBI Director!” Trump wrote, apparently referring to Deputy Attorney General Rod Rosenstein. Since Rosenstein is the senior Justice Department official overseeing the inquiry after Attorney General Jeff Sessions recused himself.

Trump has stewed with anger at the Justice Department over the Russia probe, to the point where Sessions had reportedly offered his resignation. For his part, Sessions testified to the Senate on Tuesday that he was merely concurring with Rosenstein when he assented to firing Comey.

“He’s furious at Rosenstein, but the list of his people who enrage him is ever-growing,” a longtime Trump confidant, who recently spoke to the president, told The Daily Beast. “He has no qualms about throwing [Rosenstein] under a bus.”

That single tweet threatens to upend the administration’s legal and public-relations strategies surrounding an FBI probe into alleged Russian election-meddling that has expanded in recent months to include an obstruction investigation and a probe of the finances of Trump aides and associates.

 A frustrated senior Trump administration official quipped in response to the tweet, “Has anyone read him his Miranda rights?” The implication being that Trump would do well to remain silent on the issue of his own criminal investigation.

Officials spoke on the condition of anonymity so as to speak freely.

Trump digs hole, keeps going

The escalation of the probe is packed with irony. Trump’s insistence that he was not personally under investigation led him to fire the man leading the probe, which ensured a special prosecutor, which ensured Trump came personally under investigation. Now, in raging against circumstances his actions brought about, Trump has given Mueller another building block for the investigation.

“It’s clear that this tweet has not been vetted by his [Trump’s] attorney,” said former federal prosecutor Renato Mariotti. “In addition to confirming that he is under investigation, the tweet makes a factual statement regarding the president’s decision to fire James Comey, which is a subject of the investigation. You can bet that when the president testifies regarding his role in Comey’s firing, he will be asked about this tweet.”

Mueller will inevitably investigate the exact circumstances leading to the Comey firing, which he is likely to interview both Trump and Rosenstein—now in conflict with each other—about.

Even Trump’s senior aides blame the president for bringing the obstruction inquiry upon himself and the White House.

“The president did this to himself,” one senior administration official told The Daily Beast on Wednesday.

In recent weeks, the president has become increasingly convinced that forces in the FBI and the “deep state” are “out for his scalp,” as one White House aide described it. This sentiment is shared by some of his closest advisers, including his chief strategist Steve Bannon.

One senior White House official told The Daily Beast that the Trump tweet was directed, of course, specifically at Rosenstein. The official noted that it reflects what the president has been venting privately for the past couple of days regarding the “irony” of Rosenstein having a role in the sacking of Comey and his current role in the investigations that have taken over as Trump’s main obsession.

The line, according to the White House official, is emerging as one of President Trump’s preferred talking points and complaints.

Another White House official said Friday morning that they are not shocked anymore whenever the president goes off script during early-morning tweetstorms, and for “all the heartburn and misery” they might cause internally, senior aides and advisers should all have a tough callus at this stage in the presidency.

“If you haven’t made this a settled factor in your morning routine, why are you still here?” the official asked, rhetorically.

But while the president is stewing, the White House is still trying to maintain its official separation from dealing with the fallout from the investigation. Instead they’re directing press inquiries to Trump’s personal lawyer.

Asked to clarify that Trump’s tweet was referring specifically to Rosenstein, White House deputy press secretary Sarah Sanders told The Daily Beast: “Best to contact Marc Kasowitz and his team for all questions related to this matter.”

Dianne Feinstein, the senior Democrat on the Senate Judiciary Committee, took it as a direct threat to the deputy AG.

“I’m growing increasingly concerned that the president will attempt to fire not only Robert Mueller, the special counsel investigating possible obstruction of justice, but also Deputy Attorney General Rosenstein who appointed Mueller,” she said in a statement.

Can or should Rosenstein stay?

Former Justice Department officials said that Trump’s tweet has put Rosenstein, who just months ago enjoyed a sterling reputation, in an untenable position. At the minimum, Rosenstein is likely to come under overwhelming pressure to recuse himself from his role overseeing special counsel Robert Mueller’s investigation of Trump.

A former senior DOJ official said Trump’s tweet accuses Rosenstein of lying to Congress. Trump claims Rosenstein “told me to fire the FBI Director!” Shortly after Comey was fired, Rosenstein said in a statement to Congress that the memo said was “not a statement of reasons to justify a for-cause termination,” even though he “thought it was appropriate to seek a new leader” for the FBI.

“The question is, is this a bridge too far for Rod?” the former official said.

The last time the White House characterized Rosenstein as the hatchet man, he “drew a line in the sand,” as the official put it, and reportedly threatened to resign. Shortly after, Trump told NBC News that he would have fired Comey regardless of Rosenstein’s memo.

Still, it’s undeniable that Rosenstein’s memo aided Trump in firing Comey. That means the senior Justice Department official responsible for Mueller’s investigation is also a likely witness in that investigation.

“It’s long seemed to me that Rosenstein would inevitably have to recuse himself in this investigation, because he was a witness to the events surrounding the firing of James Comey and may have participated in the firing of Mr. Comey,” Mariotti continued.

“This latest statement by the president may hasten Rosenstein’s recusal or put pressure on Rosenstein to step aside or step down.”

Rosenstein has quietly acknowledged that he may need to step aside, according to ABC News. He has already testified to a House panel that he is in consultation with Justice Department ethics officials to determine if his recusal is necessary.

“You don’t recuse yourself from an investigation because a subject of the investigation is accusing you of misconduct,” said Ed Dowd, a former U.S. Attorney who helped run the special counsel investigation of the Waco raid. “This may be putting pressure on Rosenstein to say, ‘Do I really need this?’ It may be putting pressure on him to get out, but that is not a proper reason to recuse himself, there’s no question about that.”

“It should not have an effect on him in terms of recusing himself. He should not recuse himself based on tweets by someone who’s under investigation”

It has been a spectacular fall for Rosenstein. As recently as February, pillars of the legal establishment breathed a sigh of relief when the highly respected prosecutor became deputy attorney general. Instead, they have watched in horror as he wrote a legal memo in May at Trump’s request that was widely seen as a pretext for firing the FBI chief. Brookings Institution scholar Ben Wittes, editor of the influential legal blog Lawfare and a friend of Comey’s, has speculated that Rosenstein might have given Trump the “loyalty” assurance the president sought unsuccessfully from the ex-FBI director.

As respected as Rosenstein was, he also has a reputation for ambition. The view of him in legal circles, according to a former Justice Department official who wished to remain anonymous, is, “he’s wanted to be the DAG [deputy attorney general] for a long, long time.”

Should Rosenstein recuse himself—or lose his job—the next Justice Department official in line to oversee the Mueller probe is Associate Attorney General Rachel Brand, who was legal-policy chief in the George W. Bush-era department and more recently served on the government’s privacy watchdog, the Privacy and Civil Liberties Oversight Board. The conservative Brand has a reputation, former colleagues say, for extreme intelligence and integrity. Of course, the same used to be said of Rosenstein.

During one of his rare public appearances as FBI director, he laid out his position on the tyranny of the law: “We live in dangerous times, but we are not the first generation of Americans to face threats to our security,” he explained. “Like those before us, we will be judged by future generations on how we react to this crisis. And by that I mean not just whether we win the war on terrorism, because I believe we will, but also whether, as we fight that war, we safeguard for our citizens the very liberties for which we are fighting.”

Unlike many in Washington, where such sentiments can often sound like platitudes, he really means it. As former Attorney General Richard Thornburgh, who has known Mueller for more than 30 years, explained to me, “People are smart not to test him on those issues.” Larry Thompson, who, like Comey, also served as deputy attorney general under Ashcroft, told me, “When he has a point of view, you know it’s held honestly and openly. There’s no subterranean agenda.”

Mueller overall sees little gray in the world; he’s a black-or-white guy, right or wrong. His father, who was captain of a World War II Navy sub chaser, impressed on him early the importance of credibility and integrity. “You did not shade or even consider shading with him,” Mueller recalls, and ever since, matters of honor and principle had been simple. “Occasionally he’ll be a pain in the ass because he’s so strait-laced,” his late college friend and one-time FBI counselor Lee Rawls told me years ago. “There have been a couple of instances I’ve advocated cowardice and flight, and he wouldn’t have it.”

Cowardice and flight is indeed not Mueller’s style. After he and Rawls graduated from Princeton in the 1960s, before Vietnam had become the political and cultural flash point that it did later in the decade, Mueller volunteered to join the Marines and fight—earning a Purple Heart and a Bronze Star with valor for his role in an intense firefight. In Officer Candidate School, his only demerit came in a trait that would be familiar to anyone who later dealt with him as FBI director and one that should, again, worry the Trump White House today: Robert Swan Mueller III received a D in “Delegation.”

Mueller’s longtime friend Tom Wilner explained to me, “Bob’s the best of the old prep school tradition. He stands for service, integrity and has the confidence to never bend. He doesn’t do anything for himself.”

“The things that most of us would struggle with the most come relatively easy to him because his moral compass is so straight,” one aide at the FBI told me, with reflection and envy. “It’s got to be quite comforting in its own way.”

Mueller was at home at the FBI in part because it removed any hint of partisanship. The FBI, Mueller believes, is the government’s honest broker—an agency free of political interference and pressure, priding itself on objectivity and independence. “You’re free to do what you think is right,” he told me. “It’s much easier than if you have to consider the political currents.”

He had a deep appreciation as director for the bureau’s traditions and its esprit de corps. He famously, almost religiously, wore white shirts and dark suits as director—the picture of a stereotypical Hoover-era G-man—and would even gently mock aides and agents who dared to show up in his office wearing, horror of horrors, pink or even blue shirts. I long attributed his habit to his personal style and strait-laced nature, but, after he finished as director, I once asked him: Why the cult of the white shirt? He answered more philosophically than I’d ever seen him speak before—explaining that he knew he was leading the FBI through a period of wrenching change, converting it to a global intelligence agency focused around counterterrorism, and that he felt it important to keep recognizable totems of the past in place—like the tradition of the white shirt—to help agents understand it was still the same FBI they’d signed up to join.

***

A year after the showdown over STELLAR WIND, Comey journeyed from the Justice Department up the Baltimore-Washington Parkway to Fort Meade, Maryland, the headquarters of the NSA. His speech that day was purportedly in recognition of Law Day, but it carried a coded message for those few in the room who knew what had transpired in the showdown of the Terrorist Surveillance Program.

The nation of the United States, Comey explained, was a country of laws, not men. Public officials swore oaths to the Constitution, not to the president. It’s the job of the lawyers, he explained, to remove the looming crisis from a decision and examine how it will look down the road.

He then continued with words that echo more than a decade later and presage the weeks to come on Capitol Hill, where he will once again be in his element. “We know that our actions, and those of the agencies we support, will be held up in a quiet, dignified, well-lit room, where they can be viewed with the perfect, and brutally unfair, vision of hindsight,” he told the gathered NSA crowd. “We know they will be reviewed in hearing rooms or courtrooms where it is impossible to capture even a piece of the urgency and exigency felt during a crisis.”

That perfect hindsight, he argued was why the most important thing in a lawyer’s life was understanding the test of history. As he said, “‘No’ must be spoken into a storm of crisis, with loud voices all around.”

Sometime soon, in a quiet, dignified, well-lit room on Capitol Hill, Jim Comey’s going to get another chance to explain why he said no. And while he does, Bob Mueller will be toiling away, reaching deep into the government and the annals of the Trump campaign, to understand exactly what transpired last year and the events that led up to Comey’s firing.

Even at 72, Mueller has plenty of energy left—where his predecessor Louis Freeh had the same chief of staff for nearly his entire tenure, Mueller burned through chiefs of staff almost every year. “He drives at such speed that he can burn up people around him,” Comey told me of Mueller. “Some people burn people up because they’re assholes. Bob burns them up by sheer exertion.”

The night of the STELLAR WIND showdown, Mueller arrived at the hospital moments after the White House aides departed after they were unable to get Comey or Ashcroft to reauthorize the program. Mueller spoke briefly with Comey in the hallway and then entered Ashcroft’s hospital room.

“Bob, I don’t know what’s happening,” the confused attorney general told him.

“There comes a time in every man’s life when he’s tested, and you passed your test tonight,” Mueller replied, comfortingly.

While Comey and Mueller might have both thought that they had aced their biggest challenge in the early 2000s, keeping the nation safe after 9/11, as it turns out, they’re both now embarking on what history will likely remember as their ultimate test.

CORRECTION: An earlier version of this piece misidentified the mafia boss Comey prosecuted. His name was John Gotti.

http://www.politico.com/magazine/story/2017/05/18/james-comey-trump-special-prosecutor-robert-mueller-fbi-215154

Special counsel is investigating Trump for possible obstruction of justice, officials say

Special counsel investigating Trump for possible obstruction of justice
The special counsel overseeing the investigation into Russia’s role in the 2016 election is interviewing senior intelligence officials to determine whether President Trump attempted to obstruct justice, officials said. (Patrick Martin, McKenna Ewen/The Washington Post)
The special counsel overseeing the investigation into Russia’s role in the 2016 election is interviewing senior intelligence officials as part of a widening probe that now includes an examination of whether President Trump attempted to obstruct justice, officials said.The move by special counsel Robert S. Mueller III to investigate Trump’s conduct marks a major turning point in the nearly year-old FBI investigation, which until recently focused on Russian meddling during the presidential campaign and on whether there was any coordination between the Trump campaign and the Kremlin. Investigators have also been looking for any evidence of possible financial crimes among Trump associates, officials said.

Trump had received private assurances from then-FBI Director James B. Comey starting in January that he was not personally under investigation. Officials say that changed shortly after Comey’s firing.

Five people briefed on the interview requests, speaking on the condition of anonymity because they were not authorized to discuss the matter publicly, said that Daniel Coats, the current director of national intelligence, Mike Rogers, head of the National Security Agency, and Rogers’s recently departed deputy, Richard Ledgett, agreed to be interviewed by Mueller’s investigators as early as this week. The investigation has been cloaked in secrecy, and it is unclear how many others have been questioned by the FBI.

The NSA said in a statement that it will “fully cooperate with the special counsel” and declined to comment further. The office of the director of national intelligence and Ledgett declined to comment.

The White House now refers all questions about the Russia investigation to Trump’s personal attorney, Marc Kasowitz.

“The FBI leak of information regarding the president is outrageous, inexcusable and illegal,” said Mark Corallo, a spokesman for Kasowitz.

The officials said Coats, Rogers and Ledgett would appear voluntarily, though it remains unclear whether they will describe in full their conversations with Trump and other top officials or will be directed by the White House to invoke executive privilege. It is doubtful that the White House could ultimately use executive privilege to try to block them from speaking to Mueller’s investigators. Experts point out that the Supreme Court ruled during the Watergate scandal that officials cannot use privilege to withhold evidence in criminal prosecutions.

The obstruction-of-justice investigation of the president began days after Comey was fired on May 9, according to people familiar with the matter. Mueller’s office has taken up that work, and the preliminary interviews scheduled with intelligence officials indicate that his team is actively pursuing potential witnesses inside and outside the government.

The interviews suggest that Mueller sees the question of attempted obstruction of justice as more than just a “he said, he said” dispute between the president and the fired FBI director, an official said.

With the term whirling around Washington, a former federal prosecutor explains what to know about the criminal charge of obstruction of justice. (Jenny Starrs/The Washington Post)

Investigating Trump for possible crimes is a complicated affair, even if convincing evidence of a crime were found. The Justice Department has long held that it would not be appropriate to indict a sitting president. Instead, experts say, the onus would be on Congress to review any findings of criminal misconduct and then decide whether to initiate impeachment proceedings.

Comey confirmed publicly in congressional testimony on March 20 that the bureau was investigating possible coordination between the Trump campaign and the Russians.

Comey’s statement before the House Intelligence Committee upset Trump, who has repeatedly denied that any coordination with the Russians took place. Trump had wanted Comey to disclose publicly that he was not personally under investigation, but the FBI director refused to do so.

Soon after, Trump spoke to Coats and Rogers about the Russia investigation.

Officials said one of the exchanges of potential interest to Mueller took place on March 22, less than a week after Coats was confirmed by the Senate to serve as the nation’s top intelligence official.

Coats was attending a briefing at the White House with officials from several other government agencies. When the briefing ended, as The Washington Post previously reported, Trump asked everyone to leave the room except for Coats and CIA Director Mike Pompeo.

Coats told associates that Trump had asked him whether Coats could intervene with Comey to get the bureau to back off its focus on former national security adviser Michael Flynn in its Russia probe, according to officials. Coats later told lawmakers that he never felt pressured to intervene.

A day or two after the March 22 meeting, Trump telephoned Coats and Rogers to separately ask them to issue public statements denying the existence of any evidence of coordinationbetween his campaign and the Russian government.

Coats and Rogers refused to comply with the president’s requests, officials said.

It is unclear whether Ledgett had direct contact with Trump or other top officials about the Russia probe, but he wrote an internal NSA memo documenting the president’s phone call with Rogers, according to officials.

As part of the probe, the special counsel has also gathered Comey’s written accounts of his conversations with Trump. The president has accused Comey of lying about those encounters.

Mueller is overseeing a host of investigations involving people who are or were in Trump’s orbit, people familiar with the probe said. The investigation is examining possible contacts with Russian operatives as well as any suspicious financial activity related to those individuals.

Last week, Comey told the Senate Intelligence Committee that he had informed Trump that there was no investigation of the president’s personal conduct, at least while he was leading the FBI.

Comey’s carefully worded comments, and those of Andrew McCabe, who took over as acting FBI director, suggested to some officials that an investigation of Trump for attempted obstruction may have been launched after Comey’s departure, particularly in light of Trump’s alleged statements regarding Flynn.

“I took it as a very disturbing thing, very concerning, but that’s a conclusion I’m sure the special counsel will work towards, to try and understand what the intention was there, and whether that’s an offense,” Comey testified last week.

Mueller has not publicly discussed his work, and a spokesman for the special counsel declined to comment.

Accounts by Comey and other officials of their conversations with the president could become central pieces of evidence if Mueller decides to pursue an obstruction case.

Investigators will also look for any statements the president may have made publicly and privately to people outside the government about his reasons for firing Comey and his concerns about the Russia probe and other related investigations, people familiar with the matter said.

Comey testified before the Senate Intelligence Committee last week that he was certain his firing was due to the president’s concerns about the Russia probe, rather than over his handling of a now-closed FBI investigation into Hillary Clinton’s use of a private email server as secretary of state, as the White House had initially asserted. “It’s my judgment that I was fired because of the Russia investigation,” Comey said. “I was fired, in some way, to change — or the endeavor was to change the way the Russia investigation was being conducted.”

The fired FBI director said ultimately it was up to Mueller to make a determination whether the president crossed a legal line.

In addition to describing his interactions with the president, Comey told the Intelligence Committee that while he was FBI director he told Trump on three occasions that he was not under investigation as part of a counterintelligence probe looking at Russian meddling in the election.

Republican lawmakers seized on Comey’s testimony to point out that Trump was not in the FBI’s crosshairs when Comey led the bureau.

After Comey’s testimony, in which he acknowledged telling Trump that he was not under investigation, Trump tweeted that he felt “total and complete vindication.” It is unclear whether McCabe, Comey’s successor, has informed Trump of the change in the scope of the probe.

https://www.washingtonpost.com/world/national-security/special-counsel-is-investigating-trump-for-possible-obstruction-of-justice/2017/06/14/9ce02506-5131-11e7-b064-828ba60fbb98_story.html?utm_term=.ddf5961ef89d

Eight Laws Hillary Clinton Could Be Indicted For Breaking

Photo of Kenneth P. Bergquist

KENNETH P. BERGQUIST
Brigadier General, U.S. Army (Ret)

As a former Justice Department official, I have, of late, been asked by both Democratic and Republican friends whether Hillary Clinton could be indicted for her email related actions. The simple answer is yes — she, and perhaps some of her senior staff, could be indicted for violating a number of federal criminal statutes. But for reasons that will be discussed later, it is unlikely that she will be.

Nevertheless, it is well worth discussing the various criminal provisions of federal law that she and others may have been violated based on mainstream news reports. Remember that news reporting can be incorrect or incomplete — and that Hillary Clinton, and anyone else involved, deserves every presumption of innocence. Also keep in mind that an indictment is not a conviction but rather the informed opinion of a grand jury that probable cause exists to believe one or more violations of federal criminal statutes have transpired.

This intellectual and legal research exercise should commence with a brief review of the basics of criminal jurisprudence: There are two elements of a criminal offense: the prohibited conduct as defined in statute; and the mens rea or mental intent of the individual or individuals engaging in the prohibited conduct. Thus, to gain a conviction on a criminal count in an indictment, a prosecutor must prove beyond a reasonable doubt that: (1) the prohibited conduct occurred, (2) the prohibited conduct was undertaken by the defendant, and (3) the defendant had the requisite mens rea or intent at the time.

1.) 18 U.S. Code § 793 – Gathering, transmitting or losing defense information
18 U.S. Code § 798 – Disclosure of classified information

A federal prosecutor would naturally focus first on the most serious allegations: willfully transmitting or willfully retaining Top Secret and Compartmented (TS/SCI) material using a private server system. The individual who transmits and the individual who receives and retains TS/SCI information on a private server jointly share the culpability for risking the compromise and exploitation of the information by hostile intelligence services. The prosecutor’s charging document would likely include felony counts under 18 U.S. Code § 793 and under 18 U.S. Code § 798 against each transmitting individual as well as separate counts against each receiving and retaining individual. Violation of either provision of the U.S. Code cited above is a felony with a maximum prison term of ten years.

The prohibited conduct is the insecure transmission of highly classified information, as well as the receipt and retention of highly classified information in an unapproved manner. The requisite mens rea is the willful commission of the prohibited conduct and the knowledge that compromised information could result in prejudice or injury to the United States or advantage to any foreign nation. Proof of intent to disclose the classified information is not required.

2.) U.S. Code § 1924 – Unauthorized removal and retention of classified documents or material

If the federal prosecutors are of a charitable disposition and an accused person has been cooperative, the felony charges under 18 U.S. Code § 793 and 18 U.S. Code § 798 may be “pled-down” to a single or to multiple misdemeanor counts under 18 U.S. Code § 1924. A misdemeanor conviction would probably result in a period of probation and a less significant fine. The prohibited conduct is the unauthorized removal of classified information from government control or its retention in an unauthorized location. The mens rea required is the intent to remove from government control or the intent to store the classified information in an unauthorized location.

3.) 18 U.S. Code § 2071(b) — Concealment, removal, or mutilation generally

To sustain a charge under 18 U.S. Code § 2071(b), a federal prosecutor need only prove that the accused transferred and held the only copies of official government records (whether classified or not), the very existence of which was concealed from government records custodians. The mens rea required is that an accused knows that official government records were transferred or removed from the control of government records custodians. Violation of 18 U.S. Code § 2071(b) is a felony with a maximum prison term of three years.

4.) 18 U.S. Code § 641 – Public money, property or records

Again, if the federal prosecutors are of a charitable disposition and accused has been cooperative, the felony charges under 18 U.S. Code § 2071(b) can be “pled down” to a misdemeanor under 18 U.S. Code § 641. The prohibited conduct is the conversion of official records (whether classified or not) to the accused’s exclusive use and the mens rea is simply the intent to do so. Conviction on the lesser misdemeanor charge would likely result in a period of probation and the imposition of a fine.

5.) 18 U.S. Code § 1505 – Obstruction of proceedings before departments, agencies, and committees

If it can be proven that an accused destroyed, withheld, or concealed the existence of official records being sought under subpoena by a committee of Congress, the accused can be convicted of obstruction under 18 U.S. Code § 1505. The prohibited conduct includes destruction, concealment and withholding of documents, thereby impeding or obstructing the committee’s rightful pursuit of information. The mens rea is knowledge of the committee’s interest in obtaining the official records in the accused’s custody or control. Violation of 18 U.S. Code § 1505 is a felony with a maximum prison term of five years.

6.) 18 U.S. Code § 1519 — Destruction, alteration, or falsification of records in federal investigations

If it can be proven that an accused knowingly concealed the existence of official records being sought by the Department of State Inspector General (DOS/IG) or by the Federal Bureau of Investigation (FBI), such accused can be convicted of obstruction. The prohibited conduct is the concealment and withholding of documents that impede or obstruct an investigation. The mens rea is the intent to conceal or withhold. Violation of 18 U.S. Code § 1519 is a felony with a maximum prison term of twenty years.

7.) 18 U.S. Code § 1031 — Fraud against the United States
18 U.S. Code § 1343 – Fraud by wire, radio or television
18 U.S. Code § 1346 — Definition of “scheme or artifice to defraud”
18 U.S. Code § 371 – Conspiracy to defraud the United States

If it can be proven that an accused arranged for the Department of State to hire an Information Technology (IT) specialist to primarily administer and maintain a private server system owned by the accused, then the accused can be convicted of conspiracy to commit honest services fraud and probably wire fraud. The prohibited conduct is having the United States pay an employee salary and/or official travel funds for performing private services on behalf of accused. The mens rea is simply the knowledge of the employee’s status as a public servant and that the government was not fully reimbursed for the costs to the government of such services. The wire fraud conviction can be sought if it can be proven that accused used electronic means of communication in undertaking such scheme or artifice to defraud.

8.) 18 U.S. Code § 371 – Conspiracy to commit a federal offense

If any accused and any third party can be proven to have colluded in any violation of federal, criminal law, then all involved can be charged with criminal conspiracy as well as being charged with the underlying offense.

Indictment?

The old adage, that a good prosecutor can get a ham sandwich indicted, is bad news for any public servant who risks the compromise of classified information or otherwise violates any of the other federal criminal statutes listed above. Specifically, this Administration has a history of vigorously prosecuting and winning convictions in the mishandling of classified information and other criminal violations of the public trust.

However, Hillary Clinton is anything but a ham sandwich; and she knows it. She and her senior aides will not even be formally investigated by this Justice Department, much less indicted. The president will allow Hillary Clinton and her aides to “tough it out” for as long it is politically possible. However, if and when the political and public opinion costs of a “tough it out” tactic become too great, President Obama will simply use that famous pen of his to issue a succinct pardon and make formal mockery of the concept of equal justice.

Kenneth Bergquist served as a Deputy Assistant Attorney General in the United States Department of Justice during the Reagan Administration and serves now aspro bono legal counsel to the Special Operations Education Fund (OPSEC).

http://dailycaller.com/2015/09/21/eight-laws-hillary-clinton-could-be-indicted-for-breaking/

Yes, There Could Be Serious Legal Problems if Obama Admin Involved in Illegal Surveillance

President Trump recently tweeted claiming that former President Obama wiretapped him during his campaign. One can only imagine how nuts the media would have gone if the roles had been reversed: President Trump wiretapping either Obama or the Clintons, though his DOJ could have authority to do just that given the expansive leaks of intelligence information by Obama and Clinton supporters the last few months. Heck, he could wiretap the media at this point, legally and legitimately, as the sources of these unlawful leaks, for which Obama himself set precedent. Do liberals understand what Pandora’s Box Obama opened up by Obama using the powers of the NSA, CIA and FBI to spy on his political opponents? Even Nixon never did that.

If the stories are correct, Obama or his officials might even face prosecution. But, we are still early in all of this and there are a lot of rumors flying around so the key is if the reports are accurate. We just don’t know at this time. The stories currently are three-fold: first, that Obama’s team tried to get a warrant from a regular, Article III federal court on Trump, and was told no by someone along the way (maybe the FBI), as the evidence was that weak or non-existent; second, Obama’s team then tried to circumvent the federal judiciary’s independent role by trying to mislabel the issue one of “foreign agents,” and tried to obtain a warrant from the Foreign Intelligence Surveillance Act “courts”, and were again turned down, when the court saw Trump named (an extremely rare act of FISA court refusal of the government, suggesting the evidence was truly non-existent against Trump); and so, third, Obama circumvented both the regular command of the FBI and the regularly appointed federal courts, by placing the entire case as a FISA case (and apparently under Sally Yates at DOJ) as a “foreign” case, and then omitted Trump’s name from a surveillance warrant submitted to the FISA court, which the FISA court unwittingly granted, which Obama then misused to spy on Trump and many connected to Trump. Are these allegations true? We don’t know yet, but if any part of them are then Obama and/or his officials could face serious trouble.

Can a President be charged with a crime? Only once out of office. While in office, impeachment remains the exclusive remedy in order to avoid a single judicial branch trying to overturn an election, such as a grand jury in any part of the country could. Once out of office, a President remains immune from civil liability for his duties while President, under a 1982 decision of the United States Supreme Court. However, as the Nixon pardon attests, nothing forecloses a criminal prosecution of the President after his presidency is complete for crimes against the country. Obama, the Constitutional lawyer, should know that.

What crimes could have been committed? Ironically, for Democrats falsely accusing Attorney General Sessions, perjury and conspiracy to commit perjury, as well as intentional violations of FISA. Rather shockingly, no law currently forbids misusing the power of the presidency to spy on one’s adversaries. What the law does forbid is lying to any judicial officer to obtain any means of surveillance. What the law does forbid, under criminal penalty, is the misuse of FISA. Both derive from the protections of the Fourth Amendment itself. Under section 1809, FISA makes it a crime for anyone to either “engage in” electronic surveillance under “color of law” under FISA without following the law’s restrictions, or “disclose” or “use” information gathered from it in contravention of the statute’s sharp constrictions.

FISA, 50 USC 1801, et seq., is a very limited method of obtaining surveillance authority. The reason for its strict limits is that FISA evades the regular federal court process, by not allowing regularly, Constitutionally appointed federal judges and their magistrates to authorize surveillance the Fourth Amendment would otherwise forbid. Instead, the Chief Justice handpicks the FISA court members, who have shown an exceptional deference to the executive branch. This is because FISA court members trust the government is only bringing them surveillance about pending terror attacks or “grave hostile” war-like attacks, as the FISA statute limits itself to. Thus, a FISA application can only be used in very limited circumstances.

One important reminder about electronic surveillance. Occasionally, a law enforcement officer will hear or see or record information not allowed by the warrant, but incidental or accidental to otherwise lawful surveillance. Their job is to immediately stop listening, stop recording, and to delete such information. This is what you occasionally see in films where the agent in the van hears the conversation turn away from something criminal to a personal discussion, and the agent then turns off the listening device and stops the recording. Such films simply recognize long-standing legal practice.

FISA can only be used for “foreign intelligence information.” Now that sounds broad, but is in fact very limited under the law. The only “foreign intelligence information” allowed as a basis for surveillance is information necessary to protect the United States against actual or potential “grave” “hostile” attack, war-like sabotage or international terror. Second, it can only be used to eavesdrop on conversations where the parties to the conversation are a foreign power or an agent of a foreign power. An agent of a foreign power cannot be a United States person unless they are knowingly involved in criminal espionage. No warrant is allowed on that person unless a FISA court finds probable cause the United States person is knowingly engaged in criminal espionage. Even then, if it involves a United States person, special steps must be taken to “minimize the acquisition and retention, and prohibit the dissemination, of non publicly available information concerning un-consenting United States persons.”

This includes procedures that require they never identify the person, or the conversation, being surveilled, to the public where that information is not evidence of a particular crime. Third, the kind of information sought concerns solely information about a pending or actual attack on the country. That is why the law limits itself to sabotage incidents involving war, not any form or kind of “sabotage,” explicitly limiting itself to those acts identified in section 105 of Title 18 of the United States Code.

This bring us to Watergate-on-Steroids, or #ObamaGate. Here are the problematic aspects of the Obama surveillance on Trump’s team, and on Trump himself. First, it is not apparent FISA could ever be invoked. Second, it is possible Obama’s team may have perjured themselves before the FISA court by withholding material information essential to the FISA court’s willingness to permit the government surveillance. Third, it could be that Obama’s team illegally disseminated and disclosed FISA information in direct violation of the statute precisely prohibiting such dissemination and disclosure. FISA prohibits, under criminal penalty, Obama’s team from doing any of the three.

At the outset, the NSA should have never been involved in a domestic US election. Investigating the election, or any hacking of the DNC or the phishing of Podesta’s emails, would not be a FISA matter. It does not fit the definition of war sabotage or a “grave” “hostile” war-like attack on the United States, as constrictively covered by FISA. It is your run-of-the-mill hacking case covered by existing United States laws that require use of the regular departments of the FBI, Department of Justice, and Constitutionally Senate-appointed federal district court judges, and their appointed magistrates, not secretive, deferential FISA courts.

Out of 35,000+ requests for surveillance, the FISA court has only ever rejected a whopping 12. Apparently, according to published reports, you can add one more to that — even the FISA court first rejected Obama’s request to spy on Trump’s team under the guise of an investigation into foreign agents of a pending war attack, intelligence agents apparently returned to the court, where, it is my assumption, that they did not disclose or divulge all material facts to the court when seeking the surveillance the second time around, some of which they would later wrongfully disseminate and distribute to the public. By itself, misuse of FISA procedures to obtain surveillance is itself, a crime.

This raises the second problem: Obama’s team submission of an affidavit to to the FISA court. An application for a warrant of any kind requires an affidavit, and that affidavit may not omit material factors. A fact is “material” if it could have the possible impact of impacting the judicial officer deciding whether to authorize the warrant. Such affidavits are the most carefully drawn up, reviewed, and approved affidavits of law enforcement in our system precisely because they must be fully-disclosing, forthcoming, and include any information a judge must know to decide whether to allow our government to spy on its own. My assumption would be that intelligence officials were trying to investigate hacking of DNC which is not even a FISA covered crime, so therefore serious questions arise about what Obama administration attorneys said to the FISA court to even consider the application. If the claim was “financial ties” to Russia, then Obama knew he had no basis to use FISA at all.

Since Trump was the obvious target, the alleged failure to disclose his name in the second application could be a serious and severe violation of the obligation to disclose all material facts. Lastly, given the later behavior, it is evident any promise in the affidavit to protect the surveilled information from ever being sourced or disseminated was a false promise, intended to induce the illicit surveillance. This is criminalized both by federal perjury statutes, conspiracy statutes, and the FISA criminal laws themselves.

That raises the third problem: it seems the FISA-compelled protocols for precluding the dissemination of the information were violated, and that Obama’s team issued orders to achieve precisely what the law forbids, if published reports are true about the administration sharing the surveilled information far-and-wide to promote unlawful leaks to the press. This, too, would be its own crime, as it brings back the ghost of Hillary’s emails — by definition, FISA information is strictly confidential or it’s information that never should have been gathered. FISA strictly segregates its surveilled information into two categories: highly confidential information of the most serious of crimes involving foreign acts of war; or, if not that, then information that should never have been gathered, should be immediately deleted, and never sourced nor disseminated. It cannot be both.

Recognizing this information did not fit FISA meant having to delete it and destroy it. According to published reports, Obama’s team did the opposite: order it preserved, ordered the NSA to search it, keep it, and share it; and then Obama’s Attorney General issued an order to allow broader sharing of information and, according to the New York Times, Obama aides acted to label the Trump information at a lower level of classification for massive-level sharing of the information. The problem for Obama is simple — if it could fit a lower level of classification, then it had to be deleted and destroyed, not disseminated and distributed, under crystal clear FISA law. Obama’s team’s admission it could be classified lower, yet taking actions to insure its broadest distribution, could even put Obama smack-middle of the biggest unlawful surveillance and political-opponent-smear campaign since Nixon. Except even Nixon didn’t use the FBI and NSA for his dirty tricks.

Watergate would have never happened if Nixon felt like he could just ask the FBI or NSA to tape the calls. This is Hoover-esque abuses of the kind Bob Woodward pal, former FBI Assistant Director Mark Felt (otherwise known as Deep Throat), routinely engaged in at the FBI until convicted and removed from office. (You didn’t know that Deep Throat was really a corrupt part of Deep State, did you? Guess who ran the famous COINTELPRO? That’s right — Deep Throat. How would the public have reacted if they knew the media had been in bed with the deep state all the way back then? Maybe that was the reason Woodward, Bernstein and Bradley kept Deep Throat’s identity secret all those years?)

Democrats may regret Sessions’ recusal, as his replacement is a mini-Sessions: a long-respected, a-political, highly ethical prosecutor, Dana Boente, whose reputation is well-warranted from his service at the Tax Division, and who won’t be limited by any perceived ties to Trump, given his prior appointment by Obama. Obama himself appeared scared of Boente, as he removed Boente from the successor-to-Sessions position during the lame-duck part of Obama’s presidency, but Trump restored Boente to that role earlier this month. Democrats may get the investigation they wanted, but it may be their own that end up named in the indictment.

Robert Barnes is a California-based trial attorney whose practice focuses on tax defense, civil rights and First Amendment law. You can follow him at @Barnes_Law

http://lawnewz.com/high-profile/yes-obama-could-be-prosecuted-if-involved-with-illegal-surveillance/

The Endless Ironies of Donald J. Trump

by VICTOR DAVIS HANSON June 13, 2017 4:00 AM @VDHANSON

Pandemonium can be a revivifying purgative.

Here are the ironies of Donald Trump as president. 1) For the Left (both Political and Media)

The Left was mostly untroubled for eight years about the often unconstitutional abuses of Barack Obama — given that they saw their shared noble aims as justifying almost any means necessary to achieve them.

There was the not uncommon Rice-Gruber-Rhodes-Holder sort of deception (on Benghazi, on the conduct of Bowe Bergdahl, on the Affordable Care Act, the Iran deal, on Fast and Furious, etc.) — a required tactic because so much of the Obama agenda was antithetical to the wishes and preferences of the American electorate and thus had to be disguised and camouflaged to become enacted.

There was the pen-and-phone mockery of established federal law (the suspension of the ACA employer mandate, the Chrysler creditor reversal, the non-enforcement of federal immigration law, the institutionalization of sanctuary-city nullification).

There was the constant mythmaking (from faux red lines, deadlines, and step-over lines to the fatuity of the Cairo Speech and Iran-deal harangues). There were the abuses of presidential power (the surveillance of journalists, the selective release of the bin Laden trove to pet journalists, the likely surveilling, unmasking, and leaking through reversed targeting of political enemies).

No one worried much when Obama promised on a hot mic to Medvedev that he would be more flexible with the Russians after his reelection, as if they were to conform to a desired sort of behavior in service to Obama that would earn them dividends from him later on — the kind of unapologetic partisan “collusion” that would have earned Trump a Comey-induced indictment.

No one cared that Obama pulled all peacekeepers out of Iraq and thereby ruined what the surge had saved.

Nor did anyone fret much about the serial scandals at the GSA, the VA, the IRS, and the Secret Service, or his disastrous reset policy with Russia and the implosion of the Middle East or the strange spectacles of Obama’s interview with GloZell or polarizing Oval Office guests, such as the rapper whose album cover portrayed celebrations over a dead white judge.

True, none of these were impeachable or even major offenses. But all of them recalibrated the bar of presidential behavior.

So along came the next Republican president, empowered by Obama’s exemptions to do almost anything he wished, albeit without the thin exculpatory veneer of Ivy League pretension, multicultural indemnity, and studied smoothness.

In biblical “there is a season” fashion, for every sermon about not building your business, making too much money, or profiting at the wrong time, there was a Trump retort to profit as never before.

For every too-frequent gala golf outing of a metrosexual Obama decked out in spiffy attire, there is a plumper Trump swinging away, oblivious to the angry pack of reporters that Obama once so carefully courted. For every rapper with an ankle bracelet that went off in the White House, there is now a White House photo-op with Ted Nugent.

For every executive-order suspension of federal immigration enforcement, there is an executive-order corrective.

For every lecture on the crusades, sermons on Western genocidal history, apology tour, or Islamic mythmaking, there is an American Greatness pride in everything.

The progressive ironies continued.

If the media were to be believed when they insisted that Obama was a “god,” or that he was the smartest man ever to achieve the presidency, or that the first lady was Jackie Kennedy incarnate, or that Obama was capable of sending electrical shocks down a reporter’s leg or was sure to be a brilliant president on the basis of his pants crease or because he talked in the manner of Washington elites, then surely it could not be believed when Trump was smeared as a veritable dunce, crook, buffoon, and naïf worthy of impeachment or that his wife (fluent in several languages) was an airhead former escort girl.

By their former unhinged adoration and obsequiousness, progressives and the media undermined all future credibility in their unhinged venom and loathing of Donald Trump. Now they live with the reality that by elevating Obama into a deity, they unleashed their own worst nightmare and have reduced themselves to irrelevance.

In the end, no one believes the current venom of a CNN or a New York Times precisely because no one could have believed their prior slavish adulation.

Anderson Cooper has become Keith Olbermann, as Nancy Pelosi and Chuck Schumer meld into Maxine Waters: now malevolent rather than previously sycophantic, but in their extremism still no more credible in 2017 than they were in 2009. 2) For the Orphaned Never Trump Right (as Overrepresented in the Punditocracy as Underrepresented in the Electorate)

Even the most die-hard Never Trump conservative has had to make some adjustments. Despite assurances that Trump would not get the nomination, he did. Despite assurances that he could never be elected, he was. Despite prognostications that Trump was a liberal wolf hiding in conservative fleece, Trump’s appointments, his executive orders, his legislation pending before the Congress, his abrupt withdrawal from the Paris global-warming accords, his fierce support for vouchers, his pro-life advocacy, and his immigration normality were so far orthodoxly conservative.

Most Never Trumpers now concede that something had gone terribly wrong with their top-down party, although they resent that it was raucous billionaire Donald Trump who administered the diagnosis.

Despite suspicions that Trump’s appeal to the working class was nursed on racism, fanatic nationalism, xenophobia, and nativism, the appeal instead grew from a shared disgust with blue-stocking Republicans who were perceived in word and deed as little different from coastal Democratic look-alikes. Most Never Trumpers now concede that something had gone terribly wrong with their top-down party, although they resent that it was raucous billionaire Donald Trump who administered the diagnosis.

Where Never Trump conservatives worried that Trump was too uninformed or too reckless (e.g., pulling out of an “obsolete” NATO, rejecting Article 5 of the NATO alliance, starting a trade war with China, or erecting tariffs in 1920s style), Trump was forced to separate his past rhetoric from present reality — confirming in a way his transparent art-of-the-deal negotiating style of asking for twice what he could acceptably settle for, or acting unhinged to unsettle negotiators, enemies, and rivals. Given these surprises, the Never Trump position has now receded to a simpler proposition: The uncouth character of Donald J. Trump is not worth the conservative agenda that he may well enact, as we all will eventually and inevitably learn. Or how can conservative moralists stomach such a supposedly immoral incarnation of their own views? Such a paradox hinges on four corollaries, many of them dubious.

One: The ideological trajectory of a probable 16 years of Obama–Hillary Clinton progressive transformation of the country was never as dangerous as turning over executive power to someone as purportedly uncouth and unpredictable as Trump.

Two: Trump’s character defects were like none other in a previous American president (which would include John Kennedy’s pathological and dangerous womanizing, Lyndon Johnson’s in-office profiteering and crudity, Richard Nixon’s disrespect for truth and the law, Bill Clinton’s demonstrable White House sex escapades and lying under oath) and thus would cancel out the entire gamut of renewed energy production, deregulation, tax reform, deterrent foreign policy, Obamacare reform, and the sort of Cabinet appointment that will prune back the deep state.

Three: Ideas matter more than politics and governance. Being 51 (or far more) percent preferable is still either not being preferable at all or at least not enough to warrant pragmatic assent.

Four: Even snarky and “see, how I was right” attacks on Trump from the right keep conservatism honest, rather than implode it in the manner that the Left most assiduously avoids. (Was there ever a “Never Hillary” movement after the Democratic convention to protest her pollution of the Democratic National Committee?)

For now, the fallback position of “I told you so” hinges on Trump’s proving, in a downward spiral, far more recklessly obstreperous in the future than he has been so far, and on his agenda’s either fossilizing or reverting to his own 1980s liberal outlook. 3) Always Trump There are few ironies for Always Trumpers who supported Trump from well before the primaries. They wished an iron wrecking ball to be thrown into the deep-state glass, and they certainly got what they wished for. The uncouthness of Trump is not vulgarity for them. It’s the necessary tough antidote to what they see as the polished crudity of the elite class, who are quite indecent in their sanctimonious lectures on amnesties or globalized free but unfair trade — while having the personal means of navigating around the deleterious consequences of their own advocacy. Trump’s nihilistic and self-destructive tweets are yet again, for the Always Trumpers, the Semtex that helps blow up the entire spectacle of the feeding frenzy Washington press conference, the embarrassment of the White House Correspondents Dinner, the soft-ball televised interview, and the moral preening of television’s talking heads. Dr. Sawbones Trump smelled a festering wound, ripped off the scab, and proclaimed that the exposure would aerate and cure the gangrenous mass below. For the Always Trumpers, without the Trump shock, we would never have fully appreciated just how politically crude a Stephen Colbert really was, or just how obscene was a Tom Perez or

3) Always Trump There are few ironies for Always Trumpers who supported Trump from well before the primaries. They wished an iron wrecking ball to be thrown into the deep-state glass, and they certainly got what they wished for. The uncouthness of Trump is not vulgarity for them. It’s the necessary tough antidote to what they see as the polished crudity of the elite class, who are quite indecent in their sanctimonious lectures on amnesties or globalized free but unfair trade — while having the personal means of navigating around the deleterious consequences of their own advocacy. Trump’s nihilistic and self-destructive tweets are yet again, for the Always Trumpers, the Semtex that helps blow up the entire spectacle of the feeding frenzy Washington press conference, the embarrassment of the White House Correspondents Dinner, the soft-ball televised interview, and the moral preening of television’s talking heads. Dr. Sawbones Trump smelled a festering wound, ripped off the scab, and proclaimed that the exposure would aerate and cure the gangrenous mass below. For the Always Trumpers, without the Trump shock, we would never have fully appreciated just how politically crude a Stephen Colbert really was, or just how obscene was a Tom Perez or a Senator Gillibrand, or how rankly partisan was a Chuck Schumer or how incapacitated a Nancy Pelosi. Dr. Sawbones Trump smelled a festering wound, ripped off the scab, and proclaimed that the exposure would aerate and cure the gangrenous mass below — however crudely administered the remedy without analgesics. In this view, Trump’s ostensibly counterproductive outbursts and Twitter rants are the unpleasant castor oil that was long ago needed to break up and pass on a constipated, corrupt, and incestuous elite.

4) Trump, Better Far Than the Alternative Lastly, there are the conservatives and Republicans (well over 90 percent) who voted for Trump on the grounds that, while he may not have been preferable to most of the alternatives in the primary, he most certainly was in the general election. For these pragmatists, there are both pleasant and occasionally worrisome ironies. On the upside, it seems clear that Trump is not just conservative to his word, but, in the first 100 days, conservative in terms of policy to a degree unlike any other Republican president or presidential nominee since Ronald Reagan. Mitt Romney would not have yanked the U.S. out of the jerry-rigged Paris climate accord. John McCain would not have appointed a Neal Gorsuch or proposed to radically recalibrate the tax code. Neither of the two Bushes would have felt politically secure enough to shut down the border to illegal immigration; neither would have pressed to finished the border wall. None since Reagan would have made the sort of conservative appointments at the cabinet and bureaucratic level as has Trump. If Trump were really a namby-pamby conservative, the sheer hatred of Trump the person by the progressive Left has had the predictable effect of making him against everything his loudest enemies are for. For the realist Trump supporters, Trump’s tweets or outbursts are often regrettable and occasionally bothersome, but not so much because they demonstrate an unprecedented level of presidential indecency. (Cynical realists with knowledge of history accept what FDR or JFK was capable of, and thus what they said in private conservations, and occasionally out loud.) Trump’s sin, then, is that he more often says out loud what prior presidents kept to their inner circle. Rather, their worry is more tactical and strategic: Trump, the bull-in-the-china-shop messenger, breaks up too much of the vital message of Trump. In public, they may cringe at Trump’s excesses (though enjoying in private how he forces sanctimonious progressives to melt down), but their worry over Trump’s overkill is mostly from the fear that no mortal 70-year-old male, without a traditionally loyal support staff, but with unhealthy sleep and diet habits, and under the stress of historic vituperation, could see through such an ambitious conservative agenda. They are worried, then, that the 24/7 and extraneous fights that Trump picks will eventually undo him, and with his demise will go his entire conservative resurgence for a generation. They admire enormously Mike Pence but concede that he would have been neither nominated nor elected. And should Trump fall, Pence would be unable amid the nuclear fallout to press the conservative agenda further. And yet there is some doubt even here as well. Trump’s tweets can be as prescient as they are reckless.

Take the infamous “Just found out that Obama had my ‘wires tapped’ in Trump Tower just before the victory” and substitute “Obama administration” for Obama, and “surveil” for “wires tapped,” and Trump’s tweet about the former president’s intelligence agencies improperly monitoring him may yet prove in a broad sense correct.

In other words, cringe-worthy Trump behavior so often is the lubricant that oils his success against cringe-worthy opponents, turning upside down the Heraclitean axiom that character is destiny, or rather redefining it, because Trump’s targets so often were hubristic and deserved the nemesis sent their way.

For the realist Trump supporters, Trump’s tweets or outbursts are often regrettable and occasionally bothersome, but not so much because they demonstrate an unprecedented level of presidential indecency. (Cynical realists with knowledge of history accept what FDR or JFK was capable of, and thus what they said in private conservations, and occasionally out loud.)

Trump’s sin, then, is that he more often says out loud what prior presidents kept to their inner circle. Rather, their worry is more tactical and strategic: Trump, the bull-in-the-china-shop messenger, breaks up too much of the vital message of Trump. In public, they may cringe at Trump’s excesses (though enjoying in private how he forces sanctimonious progressives to melt down), but their worry over Trump’s overkill is mostly from the fear that no mortal 70-year-old male, without a traditionally loyal support staff, but with unhealthy sleep and diet habits, and under the stress of historic vituperation, could see through such an ambitious conservative agenda.

They are worried, then, that the 24/7 and extraneous fights that Trump picks will eventually undo him, and with his demise will go his entire conservative resurgence for a generation.

They admire enormously Mike Pence but concede that he would have been neither nominated nor elected. And should Trump fall, Pence would be unable amid the nuclear fallout to press the conservative agenda further. And yet there is some doubt even here as well. Trump’s tweets can be as prescient as they are reckless. Take the infamous “Just found out that Obama had my ‘wires tapped’ in Trump Tower just before the victory” and substitute “Obama administration” for Obama, and “surveil” for “wires tapped,” and Trump’s tweet about the former president’s intelligence agencies improperly monitoring him may yet prove in a broad sense correct. In other words, cringe-worthy Trump behavior so often is the lubricant that oils his success against cringe-worthy opponents, turning upside down the Heraclitean axiom that character is destiny, or rather redefining it, because Trump’s targets so often were hubristic and deserved the nemesis sent their way.

It may not be that Trump earns hatred for unnecessary provocation and vitriol, but instead that he or any other Republican would have earned such venom anyway; thus his own searing tactics and narcissistic belief in his own destiny are predicated on the assumption that his unhinged enemies will vaporize first. And he may be right. James Comey has underestimated Donald Trump every bit as much as Marco Rubio or Hillary Clinton or Barack Obama did. In the end, the pragmatists apparently believe conservatives will hang together or hang separately.

Never have so many bright people proved so dense.

Never have polls and politics proved so unreliable or partisan. Never have unintended consequences so replaced predictable results.

Yes, we are in chaos, but we sense also that the pandemonium is purgative of the worse that prompted it — and it is unpleasant mostly because it has so long been overdue.

NRO contributor Victor Davis Hanson is a senior fellow at the Hoover Institution and the author of The Second World Wars: How the First Global Conflict Was Fought and Won, to appear in October from Basic Books.

 http://www.nationalreview.com/article/448562/donald-trump-ironies-wrecking-ball-long-overdue-may-benefit-country

The Pronk Pops Show Podcasts Portfolio

Listen To Pronk Pops Podcast or Download Shows 906-913

Listen To Pronk Pops Podcast or Download Shows 889-896

Listen To Pronk Pops Podcast or Download Shows 884-888

Listen To Pronk Pops Podcast or Download Shows 878-883

Listen To Pronk Pops Podcast or Download Shows 870-877

Listen To Pronk Pops Podcast or Download Shows 864-869

Listen To Pronk Pops Podcast or Download Shows 857-863

Listen To Pronk Pops Podcast or Download Shows 850-856

Listen To Pronk Pops Podcast or Download Shows 845-849

Listen To Pronk Pops Podcast or Download Shows 840-844

Listen To Pronk Pops Podcast or Download Shows 833-839

Listen To Pronk Pops Podcast or Download Shows 827-832

Listen To Pronk Pops Podcast or Download Shows 821-826

Listen To Pronk Pops Podcast or Download Shows 815-820

Listen To Pronk Pops Podcast or Download Shows 806-814

Listen To Pronk Pops Podcast or Download Shows 800-805

Listen To Pronk Pops Podcast or Download Shows 793-799

Listen To Pronk Pops Podcast or Download Shows 785-792

Listen To Pronk Pops Podcast or Download Shows 777-784

Listen To Pronk Pops Podcast or Download Shows 769-776

Listen To Pronk Pops Podcast or Download Shows 759-768

Listen To Pronk Pops Podcast or Download Shows 751-758

Listen To Pronk Pops Podcast or Download Shows 745-750

Listen To Pronk Pops Podcast or Download Shows 738-744

Listen To Pronk Pops Podcast or Download Shows 732-737

Listen To Pronk Pops Podcast or Download Shows 727-731

Listen To Pronk Pops Podcast or Download Shows 720-726

Listen To Pronk Pops Podcast or DownloadShows 713-719

Listen To Pronk Pops Podcast or DownloadShows 705-712

Listen To Pronk Pops Podcast or Download Shows 695-704

Listen To Pronk Pops Podcast or Download Shows 685-694

Listen To Pronk Pops Podcast or Download Shows 675-684

Listen To Pronk Pops Podcast or Download Shows 668-674

Listen To Pronk Pops Podcast or Download Shows 660-667

Listen To Pronk Pops Podcast or Download Shows 651-659

Listen To Pronk Pops Podcast or Download Shows 644-650

Listen To Pronk Pops Podcast or Download Shows 637-643

Listen To Pronk Pops Podcast or Download Shows 629-636

Listen To Pronk Pops Podcast or Download Shows 617-628

Listen To Pronk Pops Podcast or Download Shows 608-616

Listen To Pronk Pops Podcast or Download Shows 599-607

Listen To Pronk Pops Podcast or Download Shows 590-598

Listen To Pronk Pops Podcast or Download Shows 585- 589

Listen To Pronk Pops Podcast or Download Shows 575-584

Listen To Pronk Pops Podcast or Download Shows 565-574

Listen To Pronk Pops Podcast or Download Shows 556-564

Listen To Pronk Pops Podcast or Download Shows 546-555

Listen To Pronk Pops Podcast or Download Shows 538-545

Listen To Pronk Pops Podcast or Download Shows 532-537

Listen To Pronk Pops Podcast or Download Shows 526-531

Listen To Pronk Pops Podcast or Download Shows 519-525

Listen To Pronk Pops Podcast or Download Shows 510-518

Listen To Pronk Pops Podcast or Download Shows 500-509

Listen To Pronk Pops Podcast or Download Shows 490-499

Listen To Pronk Pops Podcast or Download Shows 480-489

Listen To Pronk Pops Podcast or Download Shows 473-479

Listen To Pronk Pops Podcast or Download Shows 464-472

Listen To Pronk Pops Podcast or Download Shows 455-463

Listen To Pronk Pops Podcast or Download Shows 447-454

Listen To Pronk Pops Podcast or Download Shows 439-446

Listen To Pronk Pops Podcast or Download Shows 431-438

Listen To Pronk Pops Podcast or Download Shows 422-430

Listen To Pronk Pops Podcast or Download Shows 414-421

Listen To Pronk Pops Podcast or Download Shows 408-413

Listen To Pronk Pops Podcast or Download Shows 400-407

Listen To Pronk Pops Podcast or Download Shows 391-399

Listen To Pronk Pops Podcast or Download Shows 383-390

Listen To Pronk Pops Podcast or Download Shows 376-382

Listen To Pronk Pops Podcast or Download Shows 369-375

Listen To Pronk Pops Podcast or Download Shows 360-368

Listen To Pronk Pops Podcast or Download Shows 354-359

Listen To Pronk Pops Podcast or Download Shows 346-353

Listen To Pronk Pops Podcast or Download Shows 338-345

Listen To Pronk Pops Podcast or Download Shows 328-337

Listen To Pronk Pops Podcast or Download Shows 319-327

Listen To Pronk Pops Podcast or Download Shows 307-318

Listen To Pronk Pops Podcast or Download Shows 296-306

Listen To Pronk Pops Podcast or Download Shows 287-295

Listen To Pronk Pops Podcast or Download Shows 277-286

Listen To Pronk Pops Podcast or Download Shows 264-276

Listen To Pronk Pops Podcast or Download Shows 250-263

Listen To Pronk Pops Podcast or Download Shows 236-249

Listen To Pronk Pops Podcast or Download Shows 222-235

Listen To Pronk Pops Podcast or Download Shows 211-221

Listen To Pronk Pops Podcast or Download Shows 202-210

Listen To Pronk Pops Podcast or Download Shows 194-201

Listen To Pronk Pops Podcast or Download Shows 184-193

Listen To Pronk Pops Podcast or Download Shows 174-183

Listen To Pronk Pops Podcast or Download Shows 165-173

Listen To Pronk Pops Podcast or Download Shows 158-164

Listen To Pronk Pops Podcast or Download Shows151-157

Listen To Pronk Pops Podcast or Download Shows 143-150

Listen To Pronk Pops Podcast or Download Shows 135-142

Listen To Pronk Pops Podcast or Download Shows 131-134

Listen To Pronk Pops Podcast or Download Shows 124-130

Listen To Pronk Pops Podcast or Download Shows 121-123

Listen To Pronk Pops Podcast or Download Shows 118-120

Listen To Pronk Pops Podcast or Download Shows 113 -117

Listen To Pronk Pops Podcast or Download Show 112

Listen To Pronk Pops Podcast or Download Shows 108-111

Listen To Pronk Pops Podcast or Download Shows 106-108

Listen To Pronk Pops Podcast or Download Shows 104-105

Listen To Pronk Pops Podcast or Download Shows 101-103

Listen To Pronk Pops Podcast or Download Shows 98-100

Listen To Pronk Pops Podcast or Download Shows 94-97

Listen To Pronk Pops Podcast or Download Show 93

Listen To Pronk Pops Podcast or Download Show 92

Listen To Pronk Pops Podcast or Download Show 91

Listen To Pronk Pops Podcast or Download Shows 88-90

Listen To Pronk Pops Podcast or Download Shows 84-87

Listen To Pronk Pops Podcast or Download Shows 79-83

Listen To Pronk Pops Podcast or Download Shows 74-78

Listen To Pronk Pops Podcast or Download Shows 71-73

Listen To Pronk Pops Podcast or Download Shows 68-70

Listen To Pronk Pops Podcast or Download Shows 65-67

Listen To Pronk Pops Podcast or Download Shows 62-64

Listen To Pronk Pops Podcast or Download Shows 58-61

Listen To Pronk Pops Podcast or Download Shows 55-57

Listen To Pronk Pops Podcast or Download Shows 52-54

Listen To Pronk Pops Podcast or Download Shows 49-51

Listen To Pronk Pops Podcast or Download Shows 45-48

Listen To Pronk Pops Podcast or Download Shows 41-44

Listen To Pronk Pops Podcast or Download Shows 38-40

Listen To Pronk Pops Podcast or Download Shows 34-37

Listen To Pronk Pops Podcast or Download Shows 30-33

Listen To Pronk Pops Podcast or Download Shows 27-29

Listen To Pronk Pops Podcast or Download Shows 17-26

Listen To Pronk Pops Podcast or Download Shows 16-22

Listen To Pronk Pops Podcast or Download Shows 10-15

Listen To Pronk Pops Podcast or Download Shows 1-9

Read Full Post | Make a Comment ( None so far )

The Pronk Pops Show 892, May 12, 2017, Story 1: Lester _______ (Bolt, Colt, Dolt, Holt, Jolt, Volt) Interviews President Donald J. Trump — The Real Scandal Is Obama Surveillance and Spying On Republican Party Presidential Candidates Using The Intelligent Community (CIA, NSA, FBI, …) Product–Unmasked and Leaked! — Videos– Story 2: Big Lie Media Crazy Credibility Crisis — Fake News is Media McCarthyism — Videos — Story 3: President Trump Voter Fraud Commission — Videos

Posted on May 12, 2017. Filed under: Addiction, American History, Benghazi, Blogroll, Breaking News, Cartoons, Communications, Computers, Congress, Corruption, Countries, Crime, Culture, Donald J. Trump, Donald J. Trump, Donald Trump, Donald Trump, Economics, Education, Elections, Empires, Employment, Fast and Furious, Federal Bureau of Investigation (FBI), Federal Government, Foreign Policy, Freedom of Speech, Government, Government Dependency, Government Spending, Hate Speech, High Crimes, History, House of Representatives, Human, Human Behavior, Illegal Immigration, Iran Nuclear Weapons Deal, IRS, Language, Law, Life, Lying, Marco Rubio, Media, National Interest, National Security Agency, News, Obama, Philosophy, Photos, Politics, Polls, President Barack Obama, President Trump, Progressives, Radio, Rand Paul, Raymond Thomas Pronk, Regulation, Scandals, Security, Senate, Servers, Software, Spying, Surveillance and Spying On American People, Surveillance/Spying, Taxation, Terror, Terrorism, Trump Surveillance/Spying, United States of America, Videos, Violence, War, Wealth, Wisdom | Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , |

Project_1

The Pronk Pops Show Podcasts

Pronk Pops Show 892,  May 12, 2017

Pronk Pops Show 891,  May 11, 2017

Pronk Pops Show 891,  May 11, 2017

Pronk Pops Show 890,  May 10, 2017

Pronk Pops Show 889,  May 9, 2017

Pronk Pops Show 888,  May 8, 2017

Pronk Pops Show 887,  May 5, 2017

Pronk Pops Show 886,  May 4, 2017

Pronk Pops Show 885,  May 3, 2017

Pronk Pops Show 884,  May 1, 2017

Pronk Pops Show 883 April 28, 2017

Pronk Pops Show 882: April 27, 2017

Pronk Pops Show 881: April 26, 2017

Pronk Pops Show 880: April 25, 2017

Pronk Pops Show 879: April 24, 2017

Pronk Pops Show 878: April 21, 2017

Pronk Pops Show 877: April 20, 2017

Pronk Pops Show 876: April 19, 2017

Pronk Pops Show 875: April 18, 2017

Pronk Pops Show 874: April 17, 2017

Pronk Pops Show 873: April 13, 2017

Pronk Pops Show 872: April 12, 2017

Pronk Pops Show 871: April 11, 2017

Pronk Pops Show 870: April 10, 2017

Pronk Pops Show 869: April 7, 2017

Pronk Pops Show 868: April 6, 2017

Pronk Pops Show 867: April 5, 2017

Pronk Pops Show 866: April 3, 2017

Pronk Pops Show 865: March 31, 2017

Pronk Pops Show 864: March 30, 2017

Pronk Pops Show 863: March 29, 2017

Pronk Pops Show 862: March 28, 2017

Pronk Pops Show 861: March 27, 2017

Pronk Pops Show 860: March 24, 2017

Pronk Pops Show 859: March 23, 2017

Pronk Pops Show 858: March 22, 2017

Pronk Pops Show 857: March 21, 2017

Pronk Pops Show 856: March 20, 2017

Pronk Pops Show 855: March 10, 2017

Pronk Pops Show 854: March 9, 2017

Pronk Pops Show 853: March 8, 2017

Pronk Pops Show 852: March 6, 2017

Pronk Pops Show 851: March 3, 2017

Pronk Pops Show 850: March 2, 2017

Pronk Pops Show 849: March 1, 2017

Pronk Pops Show 848: February 28, 2017

Pronk Pops Show 847: February 27, 2017

Pronk Pops Show 846: February 24, 2017

Pronk Pops Show 845: February 23, 2017

Pronk Pops Show 844: February 22, 2017

Pronk Pops Show 843: February 21, 2017

Pronk Pops Show 842: February 20, 2017

Pronk Pops Show 841: February 17, 2017

Pronk Pops Show 840: February 16, 2017

Pronk Pops Show 839: February 15, 2017

Pronk Pops Show 838: February 14, 2017

Pronk Pops Show 837: February 13, 2017

Pronk Pops Show 836: February 10, 2017

Pronk Pops Show 835: February 9, 2017

Pronk Pops Show 834: February 8, 2017

Pronk Pops Show 833: February 7, 2017

Pronk Pops Show 832: February 6, 2017

Pronk Pops Show 831: February 3, 2017

Pronk Pops Show 830: February 2, 2017

Pronk Pops Show 829: February 1, 2017

 

Story 1: Lester _______ (Bolt, Colt, Dolt, Holt, Jolt, Volt) Interviews President Donald J. Trump — The Real Scandal Is Obama Surveillance and Spying On Trump and Associates Using The Intelligent Community (CIA, NSA, FBI, …) Product!  —  Videos — 

 

Image result for obama surveillance of trumpImage result for cartoons obama surveillance of trumpImage result for trump crisisImage result for cartoons obama surveillance of trumpImage result for cartoons obama surveillance of trumpImage result for cartoons obama surveillance of trumpImage result for cartoons obama surveillance of trumpImage result for cartoons obama surveillance of trump

Image result for intelligence community

Image result for intelligence community

President Trump Full Interview with Lester Holt NBC 5/11/17

“This Is TOTALLY FAKE!” Tucker Loses His Temper on Russia Conspiracy

Obama Might have Spied on Rand Paul and Other Republicans

Obama Administration Spying on Rand Paul | Michael Savage (Audio)

Did President Obama Spy On Donald Trump? | True News

The Truth About FBI Director James Comey: You’re Fired!

Hannity: James Comey is a national embarrassment

Full || FBI Director James Comey Press Conference On Hillary Clinton Email Investigation (7-5-16)

United States Intelligence Community

From Wikipedia, the free encyclopedia
United States Intelligence Community
United States Intelligence Community Seal.svg

Seal of the United States Intelligence Community
Agency overview
Formed December 4, 1981
Agency executive

The United States Intelligence Community (IC)[1] is a federation of 16 separate United States government agencies that work separately and together to conduct intelligence activities considered necessary for the conduct of foreign relations and national security of the United States. Member organizations of the IC include intelligence agencies, military intelligence, and civilian intelligence and analysis offices within federal executive departments. The IC is headed by the Director of National Intelligence (DNI), who reports to the President of the United States.

Among their varied responsibilities, the members of the Community collect and produce foreign and domestic intelligence, contribute to military planning, and perform espionage. The IC was established by Executive Order 12333, signed on December 4, 1981, by U.S. PresidentRonald Reagan.[2]

The Washington Post reported in 2010 that there were 1,271 government organizations and 1,931 private companies in 10,000 locations in the United States that are working on counterterrorism, homeland security, and intelligence, and that the intelligence community as a whole includes 854,000 people holding top-secret clearances.[3] According to a 2008 study by the Office of the Director of National Intelligence, private contractors make up 29% of the workforce in the U.S. intelligence community and account for 49% of their personnel budgets.[4]

Etymology

The term “Intelligence Community” was first used during Lt. Gen. Walter Bedell Smith‘s tenure as Director of Central Intelligence (1950–1953).[5]

History

Intelligence is information that agencies collect, analyze, and distribute in response to government leaders’ questions and requirements. Intelligence is a broad term that entails:

Collection, analysis, and production of sensitive information to support national security leaders, including policymakers, military commanders, and Members of Congress. Safeguarding these processes and this information through counterintelligence activities. Execution of covert operations approved by the President. The IC strives to provide valuable insight on important issues by gathering raw intelligence, analyzing that data in context, and producing timely and relevant products for customers at all levels of national security—from the war-fighter on the ground to the President in Washington.[6]

Executive Order 12333 charged the IC with six primary objectives:[7]

  • Collection of information needed by the President, the National Security Council, the Secretary of State, the Secretary of Defense, and other executive branch officials for the performance of their duties and responsibilities;
  • Production and dissemination of intelligence;
  • Collection of information concerning, and the conduct of activities to protect against, intelligence activities directed against the U.S., international terrorist and/or narcotics activities, and other hostile activities directed against the U.S. by foreign powers, organizations, persons and their agents;
  • Special activities (defined as activities conducted in support of U.S. foreign policy objectives abroad which are planned and executed so that the “role of the United States Government is not apparent or acknowledged publicly”, and functions in support of such activities, but which are not intended to influence United States political processes, public opinion, policies, or media and do not include diplomatic activities or the collection and production of intelligence or related support functions);
  • Administrative and support activities within the United States and abroad necessary for the performance of authorized activities and
  • Such other intelligence activities as the President may direct from time to time.

Organization

Members

The IC is headed by the Director of National Intelligence (DNI), whose statutory leadership is exercised through the Office of the Director of National Intelligence (ODNI). The 16 members of the IC are:[8]

The official seals of U.S. Intelligence Community members.

Agency/Office Parent Agency Federal Department Date est.
Defense Intelligence Agency none Defense 1961
National Geospatial-Intelligence Agency none Defense 1996
National Reconnaissance Office none Defense 1961
National Security Agency none Defense 1952
Military Intelligence Corps United States Army Defense 1863
Office of Naval Intelligence United States Navy Defense 1882
Twenty-Fifth Air Force United States Air Force Defense 1948
Marine Corps Intelligence United States Marine Corps Defense 1939
Coast Guard Intelligence United States Coast Guard Homeland Security 1915
Office of Intelligence and Analysis none Homeland Security 2007
Central Intelligence Agency none Independent agency 1947
Bureau of Intelligence and Research none State 1945
Office of Terrorism and Financial Intelligence none Treasury 2004
Office of National Security Intelligence Drug Enforcement Administration Justice 2006
Intelligence Branch Federal Bureau of Investigation Justice 2005
Office of Intelligence and Counterintelligence none Energy 1977

Programs

The IC performs under two separate programs:

  • The National Intelligence Program (NIP), formerly known as the National Foreign Intelligence Program as defined by the National Security Act of 1947 (as amended), “refers to all programs, projects, and activities of the intelligence community, as well as any other programs of the intelligence community designated jointly by the Director of National Intelligence (DNI) and the head of a United States department or agency or by the President. Such term does not include programs, projects, or activities of the military departments to acquire intelligence solely for the planning and conduct of tactical military operations by United States Armed Forces”. Under the law, the DNI is responsible for directing and overseeing the NIP, though the ability to do so is limited (see the Organization structure and leadership section).
  • The Military Intelligence Program (MIP) refers to the programs, projects, or activities of the military departments to acquire intelligence solely for the planning and conduct of tactical military operations by United States Armed Forces. The MIP is directed and controlled by the Under Secretary of Defense for Intelligence. In 2005 the Department of Defense combined the Joint Military Intelligence Program and the Tactical Intelligence and Related Activities program to form the MIP.

Since the definitions of the NIP and MIP overlap when they address military intelligence, assignment of intelligence activities to the NIP and MIP sometimes proves problematic.

Organizational structure and leadership

IC Circle.jpg

The overall organization of the IC is primarily governed by the National Security Act of 1947 (as amended) and Executive Order12333. The statutory organizational relationships were substantially revised with the 2004 Intelligence Reform and Terrorism Prevention Act (IRTPA) amendments to the 1947 National Security Act.

Though the IC characterizes itself as a federation of its member elements, its overall structure is better characterized as a confederation due to its lack of a well-defined, unified leadership and governance structure. Prior to 2004, the Director of Central Intelligence (DCI) was the head of the IC, in addition to being the director of the CIA. A major criticism of this arrangement was that the DCI had little or no actual authority over the budgetary authorities of the other IC agencies and therefore had limited influence over their operations.

Following the passage of IRTPA in 2004, the head of the IC is the Director of National Intelligence (DNI). The DNI exerts leadership of the IC primarily through statutory authorities under which he or she:

  • controls the “National Intelligence Program” budget;
  • establishes objectives, priorities, and guidance for the IC; and
  • manages and directs the tasking of, collection, analysis, production, and dissemination of national intelligence by elements of the IC.

However, the DNI has no authority to direct and control any element of the IC except his own staff—the Office of the DNI—neither does the DNI have the authority to hire or fire personnel in the IC except those on his own staff. The member elements in the executive branch are directed and controlled by their respective department heads, all cabinet-level officials reporting to the President. By law, only the Director of the Central Intelligence Agency reports to the DNI.

In light of major intelligence failures in recent years that called into question how well Intelligence Community ensures U.S. national security, particularly those identified by the 9/11 Commission (National Commission on Terrorist Attacks Upon the United States), and the “WMD Commission” (Commission on the Intelligence Capabilities of the United States Regarding Weapons of Mass Destruction), the authorities and powers of the DNI and the overall organizational structure of the IC have become subject of intense debate in the United States.

Interagency cooperation

Previously, interagency cooperation and the flow of information among the member agencies was hindered by policies that sought to limit the pooling of information out of privacy and security concerns. Attempts to modernize and facilitate interagency cooperation within the IC include technological, structural, procedural, and cultural dimensions. Examples include the Intellipediawiki of encyclopedic security-related information; the creation of the Office of the Director of National Intelligence, National Intelligence Centers, Program Manager Information Sharing Environment, and Information Sharing Council; legal and policy frameworks set by the Intelligence Reform and Terrorism Prevention Act of 2004, information sharing Executive Orders 13354 and Executive Order 13388, and the 2005 National Intelligence Strategy.

Budget

Data visualization of U.S. intelligence black budget (2013)

The U.S. intelligence budget (excluding the Military Intelligence Program) in fiscal year 2013 was appropriated as $52.7 billion, and reduced by the amount sequestered to $49.0 billion.[9] In fiscal year2012 it peaked at $53.9 billion, according to a disclosure required under a recent law implementing recommendations of the 9/11 Commission.[10]The 2012 figure was up from $53.1 billion in 2010,[11] $49.8 billion in 2009,[12] $47.5 billion in 2008,[13] $43.5 billion in 2007,[14] and $40.9 billion in 2006.[15]

About 70 percent of the intelligence budget went to contractors for the procurement of technology and services (including analysis), according to the May 2007 chart from the ODNI. Intelligence spending has increased by a third over ten years ago, in inflation-adjusted dollars, according to the Center for Strategic and Budgetary Assessments.[citation needed]

In a statement on the release of newdeclassified figures, DNI Mike McConnell said[when?] there would be no additional disclosures of classified budget information beyond the overall spending figure because “such disclosures could harm national security”. How the money is divided among the 16 intelligence agencies and what it is spent on is classified. It includes salaries for about 100,000 people, multibillion-dollar satellite programs, aircraft, weapons, electronic sensors, intelligence analysis, spies, computers, and software.

On August 29, 2013 the Washington Post published the summary of the Office of the Director of National Intelligence’s multivolume FY 2013 Congressional Budget Justification, the U.S. intelligence community’s top-secret “black budget.”[16][17][18] The IC’s FY 2013 budget details, how the 16 spy agencies use the money and how it performs against the goals set by the president and Congress. Experts said that access to such details about U.S. spy programs is without precedent. Steven Aftergood, Federation of American Scientists, which provides analyses of national security issues stated that “It was a titanic struggle just to get the top-line budget number disclosed, and that has only been done consistently since 2007 … but a real grasp of the structure and operations of the intelligence bureaucracy has been totally beyond public reach. This kind of material, even on a historical basis, has simply not been available.”[19] Access to budget details will enable an informed public debate on intelligence spending for the first time said the co-chair of the 9/11 Commission Lee H. Hamilton. He added that Americans should not be excluded from the budget process because the intelligence community has a profound impact on the life of ordinary Americans.[19]

Oversight

Intelligence Community Oversight duties are distributed to both the Executive and Legislative branches. Primary Executive oversight is performed by the President’s Foreign Intelligence Advisory Board, the Joint Intelligence Community Council, the Office of the Inspector General, and the Office of Management and Budget. Primary congressional oversight jurisdiction over the IC is assigned to two committees: the United States House Permanent Select Committee on Intelligence and the United States Senate Select Committee on Intelligence. The House Armed Services Committee and Senate Armed Services Committee draft bills to annually authorize the budgets of DoD intelligence activities, and both the House and Senate appropriations committees annually draft bills to appropriate the budgets of the IC. The Senate Committee on Homeland Security and Governmental Affairs took a leading role in formulating the intelligence reform legislation in the 108th Congress.

See also

References

  1. Jump up^ Agrawal, Nina. “There’s more than the CIA and FBI: The 17 agencies that make up the U.S. intelligence community”. latimes.com. Retrieved 2017-01-30.
  2. Jump up^ “Executive Order 12333”. Cia.gov. Retrieved 2013-01-23.
  3. Jump up^ Dana Priest & William M Arkin (19 July 2010). “A hidden world, growing beyond control”. The Washington Post.
  4. Jump up^ Priest, Dana (2011). Top Secret America: The Rise of the New American Security State. Little, Brown and Company. p. 320. ISBN 0-316-18221-4.
  5. Jump up^ Michael Warner; Kenneth McDonald. “US Intelligence Community Reform Studies Since 1947” (PDF). CIA. p. 4. Retrieved 28 June 2013.
  6. Jump up^ Rosenbach, Eric & Aki J. Peritz (12 June 2009). “Confrontation or Collaboration? Congress and the Intelligence Community” (PDF). Belfer Center for Science and International Affairs, Harvard Kennedy School. Retrieved 21 July 2009.
  7. Jump up^ Executive Order 12333 text
  8. Jump up^ User, Super. “Members of the IC”.
  9. Jump up^ “DNI Releases Budget Figure for 2013 National Intelligence Program”. Office of the Director of National Intelligence. 30 October 2013. Retrieved 2 August 2014.
  10. Jump up^ DNI Releases FY 2012 Appropriated Budget Figure. Dni.gov (2012-10-30). Retrieved on 2013-08-16.
  11. Jump up^ “DNI Releases Budget Figure for 2010 National Intelligence Program”(PDF). Office of the Director of National Intelligence. 2010-10-28. Retrieved 15 June 2013.
  12. Jump up^ “DNI Releases Budget Figure for 2009 National Intelligence Program”(PDF). Retrieved 15 June 2013.
  13. Jump up^ “DNI Releases Budget Figure for 2008 National Intelligence Program”(PDF). Retrieved 15 June 2013.
  14. Jump up^ “DNI Releases Budget Figure for 2007 National Intelligence Program”(PDF). Retrieved 15 June 2013.
  15. Jump up^ Hacket, John F. (2010-10-28). “FY2006 National Intelligence Program Budget, 10-28-10” (PDF). Office of the Director of National Intelligence. Retrieved 15 June 2013.
  16. Jump up^ Matt DeLong (29 August 2013). “Inside the 2013 U.S. intelligence ‘black budget'”. The Washington Post. Retrieved 31 August 2013.
  17. Jump up^ Matthews, Dylan (29 August 2013). “America’s secret intelligence budget, in 11 (nay, 13) charts”. The Washington Post. Retrieved 31 August 2013.
  18. Jump up^ DeLong, Matt (29 August 2013). “2013 U.S. intelligence budget: Additional resources”. The Washington Post. Retrieved 31 August 2013.
  19. ^ Jump up to:a b Barton Gellman & Greg Miller (29 August 2013). “U.S. spy network’s successes, failures and objectives detailed in ‘black budget’ summary”. The Washington Post. Retrieved 31 August 2013.

Further reading

External links

https://en.wikipedia.org/wiki/United_States_Intelligence_Community

National Security Agency

From Wikipedia, the free encyclopedia
National Security Agency
Seal of the U.S. National Security Agency.svg

Seal of the National Security Agency
Flag of the U.S. National Security Agency.svg

Flag of the National Security Agency
National Security Agency headquarters, Fort Meade, Maryland.jpg
NSA Headquarters, Fort Meade, Maryland
Agency overview
Formed November 4, 1952; 64 years ago[1]
Preceding agency
  • Armed Forces Security Agency
Headquarters Fort Meade, Maryland, U.S.
39°6′32″N 76°46′17″WCoordinates: 39°6′32″N 76°46′17″W
Motto “Defending Our Nation. Securing The Future.”
Employees Classified (30,000–40,000 estimate)[2][3][4][5]
Annual budget Classified (estimated $10.8 billion, 2013)[6][7]
Agency executives
Parent agency United States Department of Defense
Website www.nsa.gov

The National Security Agency (NSA) is a military intelligence organization and a constituent of the United States Department of Defense (DOD). The NSA is responsible for global monitoring, collection, and processing of information and data for foreign intelligence and counterintelligence purposes, a discipline known as signals intelligence (SIGINT). NSA is concurrently charged with protection of U.S. government communications and information systems against penetration and network warfare.[8][9] Although many of NSA’s programs rely on “passive” electronic collection, the agency is authorized to accomplish its mission through active clandestine means,[10] among which are physically bugging electronic systems[11] and allegedly engaging in sabotage through subversive software.[12][13] Moreover, NSA maintains physical presence in a large number of countries across the globe, where its Special Collection Service (SCS) inserts eavesdropping devices in difficult-to-reach places. SCS collection tactics allegedly encompass “close surveillance, burglary, wiretapping, breaking and entering.”[14][15]

Unlike the Defense Intelligence Agency (DIA) and the Central Intelligence Agency (CIA), both of which specialize primarily in foreign human espionage, NSA does not unilaterally conduct human-source intelligence gathering, despite often being portrayed so in popular culture. Instead, NSA is entrusted with assistance to and coordination of SIGINT elements at other government organizations, which are prevented by law from engaging in such activities without the approval of the NSA via the Defense Secretary.[16] As part of these streamlining responsibilities, the agency has a co-located organization called the Central Security Service (CSS), which was created to facilitate cooperation between NSA and other U.S. military cryptanalysis components. Additionally, the NSA Director simultaneously serves as the Commander of the United States Cyber Command and as Chief of the Central Security Service.

Originating as a unit to decipher coded communications in World War II, it was officially formed as the NSA by President Harry S. Truman in 1952. Since then, it has become one of the largest U.S. intelligence organizations in terms of personnel and budget,[6][17] operating as part of the Department of Defense and simultaneously reporting to the Director of National Intelligence.

NSA surveillance has been a matter of political controversy on several occasions, such as its spying on anti-Vietnam-war leaders or economic espionage. In 2013, the extent of some of the NSA’s secret surveillance programs was revealed to the public by Edward Snowden. According to the leaked documents, the NSA intercepts the communications of over a billion people worldwide, many of whom are United States citizens, and tracks the movement of hundreds of millions of people using cellphones. Internationally, research has pointed to the NSA’s ability to surveil the domestic Internet traffic of foreign countries through “boomerang routing”.[18]

Contents

 [show

History

Army predecessor

The origins of the National Security Agency can be traced back to April 28, 1917, three weeks after the U.S. Congress declared war on Germany in World War I. A code and cipher decryption unit was established as the Cable and Telegraph Section which was also known as the Cipher Bureau. It was headquartered in Washington, D.C. and was part of the war effort under the executive branch without direct Congressional authorization. During the course of the war it was relocated in the army’s organizational chart several times. On July 5, 1917, Herbert O. Yardley was assigned to head the unit. At that point, the unit consisted of Yardley and two civilian clerks. It absorbed the navy’s cryptoanalysis functions in July 1918. World War I ended on November 11, 1918, and MI-8 moved to New York City on May 20, 1919, where it continued intelligence activities as the Code Compilation Company under the direction of Yardley.[19][20]

Black Chamber

Western Union allowed MI-8 to monitor telegraphic communications passing through the company’s wires until 1929.[21]

MI-8 also operated the so-called “Black Chamber“.[22] The Black Chamber was located on East 37th Street in Manhattan. Its purpose was to crack the communications codes of foreign governments. Jointly supported by the State Department and the War Department, the chamber persuaded Western Union, the largest U.S. telegram company, to allow government officials to monitor private communications passing through the company’s wires.[23]

Other “Black Chambers” were also found in Europe. They were established by the French and British governments to read the letters of targeted individuals, employing a variety of techniques to surreptitiously open, copy, and reseal correspondence before forwarding it to unsuspecting recipients.[24]

Despite the American Black Chamber’s initial successes, it was shut down in 1929 by U.S. Secretary of State Henry L. Stimson, who defended his decision by stating: “Gentlemen do not read each other’s mail”.[21]

World War II and its aftermath

During World War II, the Signal Security Agency (SSA) was created to intercept and decipher the communications of the Axis powers.[25] When the war ended, the SSA was reorganized as the Army Security Agency (ASA), and it was placed under the leadership of the Director of Military Intelligence.[25]

On May 20, 1949, all cryptologic activities were centralized under a national organization called the Armed Forces Security Agency (AFSA).[25] This organization was originally established within the U.S. Department of Defense under the command of the Joint Chiefs of Staff.[26] The AFSA was tasked to direct Department of Defense communications and electronic intelligence activities, except those of U.S. military intelligence units.[26] However, the AFSA was unable to centralize communications intelligence and failed to coordinate with civilian agencies that shared its interests such as the Department of State, Central Intelligence Agency (CIA) and the Federal Bureau of Investigation (FBI).[26] In December 1951, President Harry S. Truman ordered a panel to investigate how AFSA had failed to achieve its goals. The results of the investigation led to improvements and its redesignation as the National Security Agency.[27]

The agency was formally established by Truman in a memorandum of October 24, 1952, that revised National Security Council Intelligence Directive (NSCID) 9.[28] Since President Truman’s memo was a classified document,[28] the existence of the NSA was not known to the public at that time. Due to its ultra-secrecy the U.S. intelligence community referred to the NSA as “No Such Agency”.[29]

Vietnam War

In the 1960s, the NSA played a key role in expanding America’s commitment to the Vietnam War by providing evidence of a North Vietnamese attack on the American destroyer USS Maddox during the Gulf of Tonkin incident.[30]

A secret operation, code-named “MINARET“, was set up by the NSA to monitor the phone communications of Senators Frank Church and Howard Baker, as well as major civil rights leaders, including Martin Luther King, Jr., and prominent U.S. journalists and athletes who criticized the Vietnam War.[31] However, the project turned out to be controversial, and an internal review by the NSA concluded that its Minaret program was “disreputable if not outright illegal”.[31]

The NSA mounted a major effort to secure tactical communications among U.S. forces during the war with mixed success. The NESTOR family of compatible secure voice systems it developed was widely deployed during the Vietnam War, with about 30,000 NESTOR sets produced. However a variety of technical and operational problems limited their use, allowing the North Vietnamese to exploit intercepted U.S. communications.[32] :Vol I, p.79

Church Committee hearings

In the aftermath of the Watergate scandal, a congressional hearing in 1975 led by Sen. Frank Church[33] revealed that the NSA, in collaboration with Britain’s SIGINT intelligence agency Government Communications Headquarters (GCHQ), had routinely intercepted the international communications of prominent anti-Vietnam war leaders such as Jane Fonda and Dr. Benjamin Spock.[34] Following the resignation of President Richard Nixon, there were several investigations of suspected misuse of FBI, CIA and NSA facilities.[35] Senator Frank Church uncovered previously unknown activity,[35] such as a CIA plot (ordered by the administration of President John F. Kennedy) to assassinate Fidel Castro.[36] The investigation also uncovered NSA’s wiretaps on targeted American citizens.[37]

After the Church Committee hearings, the Foreign Intelligence Surveillance Act of 1978 was passed into law. This was designed to limit the practice of mass surveillance in the United States.[35]

From 1980s to 1990s

In 1986, the NSA intercepted the communications of the Libyan government during the immediate aftermath of the Berlin discotheque bombing. The White House asserted that the NSA interception had provided “irrefutable” evidence that Libya was behind the bombing, which U.S. President Ronald Reagan cited as a justification for the 1986 United States bombing of Libya.[38][39]

In 1999, a multi-year investigation by the European Parliament highlighted the NSA’s role in economic espionage in a report entitled ‘Development of Surveillance Technology and Risk of Abuse of Economic Information’.[40] That year, the NSA founded the NSA Hall of Honor, a memorial at the National Cryptologic Museum in Fort Meade, Maryland.[41] The memorial is a, “tribute to the pioneers and heroes who have made significant and long-lasting contributions to American cryptology”.[41] NSA employees must be retired for more than fifteen years to qualify for the memorial.[41]

NSA’s infrastructure deteriorated in the 1990s as defense budget cuts resulted in maintenance deferrals. On January 24, 2000, NSA headquarters suffered a total network outage for three days caused by an overloaded network. Incoming traffic was successfully stored on agency servers, but it could not be directed and processed. The agency carried out emergency repairs at a cost of $3 million to get the system running again. (Some incoming traffic was also directed instead to Britain’s GCHQ for the time being.) Director Michael Hayden called the outage a “wake-up call” for the need to invest in the agency’s infrastructure.[42]

War on Terror

After Osama bin Laden moved to Afghanistan in the 1980s, the NSA recorded all of his phone calls via satellite, logging over 2,000 minutes of conversation[43]

In the aftermath of the September 11 attacks, the NSA created new IT systems to deal with the flood of information from new technologies like the Internet and cellphones. ThinThread contained advanced data mining capabilities. It also had a “privacy mechanism”; surveillance was stored encrypted; decryption required a warrant. The research done under this program may have contributed to the technology used in later systems. ThinThread was cancelled when Michael Hayden chose Trailblazer, which did not include ThinThread’s privacy system.[44]

Trailblazer Project ramped up in 2002 and was worked on by Science Applications International Corporation (SAIC), Boeing, Computer Sciences Corporation, IBM, and Litton Industries. Some NSA whistleblowers complained internally about major problems surrounding Trailblazer. This led to investigations by Congress and the NSA and DoD Inspectors General. The project was cancelled in early 2004.

Turbulence started in 2005. It was developed in small, inexpensive “test” pieces, rather than one grand plan like Trailblazer. It also included offensive cyber-warfare capabilities, like injecting malware into remote computers. Congress criticized Turbulence in 2007 for having similar bureaucratic problems as Trailblazer.[45] It was to be a realization of information processing at higher speeds in cyberspace.[46]

Global surveillance disclosures

The massive extent of the NSA’s spying, both foreign and domestic, was revealed to the public in a series of detailed disclosures of internal NSA documents beginning in June 2013. Most of the disclosures were leaked by former NSA contractor, Edward Snowden.

Scope of surveillance

It was revealed that the NSA intercepts telephone and Internet communications of over a billion people worldwide, seeking information on terrorism as well as foreign politics, economics[47] and “commercial secrets”.[48] In a declassified document it was revealed that 17,835 phone lines were on an improperly permitted “alert list” from 2006 to 2009 in breach of compliance, which tagged these phone lines for daily monitoring.[49][50][51] Eleven percent of these monitored phone lines met the agency’s legal standard for “reasonably articulable suspicion” (RAS).[49][52]

A dedicated unit of the NSA locates targets for the CIA for extrajudicial assassination in the Middle East.[53] The NSA has also spied extensively on the European Union, the United Nations and numerous governments including allies and trading partners in Europe, South America and Asia.[54][55]

The NSA tracks the locations of hundreds of millions of cellphones per day, allowing it to map people’s movements and relationships in detail.[56] It reportedly has access to all communications made via Google, Microsoft, Facebook, Yahoo, YouTube, AOL, Skype, Apple and Paltalk,[57] and collects hundreds of millions of contact lists from personal email and instant messaging accounts each year.[58] It has also managed to weaken much of the encryption used on the Internet (by collaborating with, coercing or otherwise infiltrating numerous technology companies), so that the majority of Internet privacy is now vulnerable to the NSA and other attackers.[59][60]

Domestically, the NSA collects and stores metadata records of phone calls,[61] including over 120 million US Verizon subscribers,[62] as well as Internet communications,[57] relying on a secret interpretation of the Patriot Act whereby the entirety of US communications may be considered “relevant” to a terrorism investigation if it is expected that even a tiny minority may relate to terrorism.[63] The NSA supplies foreign intercepts to the DEA, IRS and other law enforcement agencies, who use these to initiate criminal investigations. Federal agents are then instructed to “recreate” the investigative trail via parallel construction.[64]

The NSA also spies on influential Muslims to obtain information that could be used to discredit them, such as their use of pornography. The targets, both domestic and abroad, are not suspected of any crime but hold religious or political views deemed “radical” by the NSA.[65]

Although NSA’s surveillance activities are controversial, government agencies and private enterprises have common needs, and sometimes cooperate at subtle and complex technical levels. Big data is becoming more advantageous, justifying the cost of required computer hardware, and social media lead the trend. The interests of NSA and Silicon Valley began to converge as advances in computer storage technology drastically reduced the costs of storing enormous amounts of data and at the same time the value of the data for use in consumer marketing began to rise. On the other hand, social media sites are growing as voluntary data mining operations on a scale that rivals or exceeds anything the government could attempt on its own.[66]

According to a report in The Washington Post in July 2014, relying on information provided by Snowden, 90% of those placed under surveillance in the U.S. are ordinary Americans, and are not the intended targets. The newspaper said it had examined documents including emails, text messages, and online accounts that support the claim.[67]

Legal accountability

Despite President Obama’s claims that these programs have congressional oversight, members of Congress were unaware of the existence of these NSA programs or the secret interpretation of the Patriot Act, and have consistently been denied access to basic information about them.[68] Obama has also claimed that there are legal checks in place to prevent inappropriate access of data and that there have been no examples of abuse;[69] however, the secret FISC court charged with regulating the NSA’s activities is, according to its chief judge, incapable of investigating or verifying how often the NSA breaks even its own secret rules.[70] It has since been reported that the NSA violated its own rules on data access thousands of times a year, many of these violations involving large-scale data interceptions;[71] and that NSA officers have even used data intercepts to spy on love interests.[72] The NSA has “generally disregarded the special rules for disseminating United States person information” by illegally sharing its intercepts with other law enforcement agencies.[73] A March 2009 opinion of the FISC court, released by court order, states that protocols restricting data queries had been “so frequently and systemically violated that it can be fairly said that this critical element of the overall … regime has never functioned effectively.”[74][75] In 2011 the same court noted that the “volume and nature” of the NSA’s bulk foreign Internet intercepts was “fundamentally different from what the court had been led to believe”.[73] Email contact lists (including those of US citizens) are collected at numerous foreign locations to work around the illegality of doing so on US soil.[58]

Legal opinions on the NSA’s bulk collection program have differed. In mid-December 2013, U.S. District Court Judge Richard Leon ruled that the “almost-Orwellian” program likely violates the Constitution, and wrote, “I cannot imagine a more ‘indiscriminate’ and ‘arbitrary invasion’ than this systematic and high-tech collection and retention of personal data on virtually every single citizen for purposes of querying and analyzing it without prior judicial approval. Surely, such a program infringes on ‘that degree of privacy’ that the Founders enshrined in the Fourth Amendment. Indeed, I have little doubt that the author of our Constitution, James Madison, who cautioned us to beware ‘the abridgement of freedom of the people by gradual and silent encroachments by those in power,’ would be aghast.”[76]

Later that month, U.S. District Judge William Pauley ruled that the NSA’s collection of telephone records is legal and valuable in the fight against terrorism. In his opinion, he wrote, “a bulk telephony metadata collection program [is] a wide net that could find and isolate gossamer contacts among suspected terrorists in an ocean of seemingly disconnected data” and noted that a similar collection of data prior to 9/11 might have prevented the attack.[77]

An October 2014 United Nations report condemned mass surveillance by the United States and other countries as violating multiple international treaties and conventions that guarantee core privacy rights.[78]

Official responses

On March 20, 2013 the Director of National Intelligence, Lieutenant General James Clapper, testified before Congress that the NSA does not wittingly collect any kind of data on millions or hundreds of millions of Americans, but he retracted this in June after details of the PRISM program were published, and stated instead that meta-data of phone and Internet traffic are collected, but no actual message contents.[79] This was corroborated by the NSA Director, General Keith Alexander, before it was revealed that the XKeyscore program collects the contents of millions of emails from US citizens without warrant, as well as “nearly everything a user does on the Internet”. Alexander later admitted that “content” is collected, but stated that it is simply stored and never analyzed or searched unless there is “a nexus to al-Qaida or other terrorist groups”.[69]

Regarding the necessity of these NSA programs, Alexander stated on June 27 that the NSA’s bulk phone and Internet intercepts had been instrumental in preventing 54 terrorist “events”, including 13 in the US, and in all but one of these cases had provided the initial tip to “unravel the threat stream”.[80] On July 31 NSA Deputy Director John Inglis conceded to the Senate that these intercepts had not been vital in stopping any terrorist attacks, but were “close” to vital in identifying and convicting four San Diego men for sending US$8,930 to Al-Shabaab, a militia that conducts terrorism in Somalia.[81][82][83]

The U.S. government has aggressively sought to dismiss and challenge Fourth Amendment cases raised against it, and has granted retroactive immunity to ISPs and telecoms participating in domestic surveillance.[84][85] The U.S. military has acknowledged blocking access to parts of The Guardian website for thousands of defense personnel across the country,[86][87] and blocking the entire Guardian website for personnel stationed throughout Afghanistan, the Middle East, and South Asia.[88]

Organizational structure

Michael S. Rogers, the director of the NSA.

The NSA is led by the Director of the National Security Agency (DIRNSA), who also serves as Chief of the Central Security Service (CHCSS) and Commander of the United States Cyber Command (USCYBERCOM) and is the highest-ranking military official of these organizations. He is assisted by a Deputy Director, who is the highest-ranking civilian within the NSA/CSS.

NSA also has an Inspector General, head of the Office of the Inspector General (OIG), a General Counsel, head of the Office of the General Counsel (OGC) and a Director of Compliance, who is head of the Office of the Director of Compliance (ODOC).[89]

Unlike other intelligence organizations such as CIA or DIA, NSA has always been particularly reticent concerning its internal organizational structure.

As of the mid-1990s, the National Security Agency was organized into five Directorates:

  • The Operations Directorate, which was responsible for SIGINT collection and processing.
  • The Technology and Systems Directorate, which develops new technologies for SIGINT collection and processing.
  • The Information Systems Security Directorate, which was responsible for NSA’s communications and information security missions.
  • The Plans, Policy and Programs Directorate, which provided staff support and general direction for the Agency.
  • The Support Services Directorate, which provided logistical and administrative support activities.[90]

Each of these directorates consisted of several groups or elements, designated by a letter. There were for example the A Group, which was responsible for all SIGINT operations against the Soviet Union and Eastern Europe, and G Group, which was responsible for SIGINT related to all non-communist countries. These groups were divided in units designated by an additional number, like unit A5 for breaking Soviet codes, and G6, being the office for the Middle East, North Africa, Cuba, Central and South America.[91][92]

Structure

As of 2013, NSA has about a dozen directorates, which are designated by a letter, although not all of them are publicly known. The directorates are divided in divisions and units starting with the letter of the parent directorate, followed by a number for the division, the sub-unit or a sub-sub-unit.

The main elements of the organizational structure of the NSA are:[93]

  • F – Directorate only known from unit F6, the Special Collection Service (SCS), which is a joint program created by CIA and NSA in 1978 to facilitate clandestine activities such as bugging computers throughout the world, using the expertise of both agencies.[94]
  • G – Directorate only known from unit G112, the office that manages the Senior Span platform, attached to the U2 spy planes.[95]
  • I – Information Assurance Directorate (IAD), which ensures availability, integrity, authentication, confidentiality, and non-repudiation of national security and telecommunications and information systems (national security systems).
  • J – Directorate only known from unit J2, the Cryptologic Intelligence Unit
  • L – Installation and Logistics
  • M – Human Resources
  • Q – Security and Counterintelligence
  • R – Research Directorate, which conducts research on signals intelligence and on information assurance for the U.S. Government.[96]
  • S – Signals Intelligence Directorate (SID), which is responsible for the collection, analysis, production and dissemination of signals intelligence. This directorate is led by a director and a deputy director. The SID consists of the following divisions:
    • S1 – Customer Relations
    • S2 – Analysis and Production Centers, with the following so-called Product Lines:
      • S2A: South Asia, S2B: China and Korea, S2C: International Security, S2E: Middle East/Asia, S2F: International Crime, S2G: Counter-proliferation, S2H: Russia, S2I: Counter-terrorism, S2J: Weapons and Space, S2T: Current Threats
    • S3 – Data Acquisition, with these divisions for the main collection programs:
      • S31 – Cryptanalysis and Exploitation Services (CES)
      • S32 – Tailored Access Operations (TAO), which hacks into foreign computers to conduct cyber-espionage and reportedly is “the largest and arguably the most important component of the NSA’s huge Signal Intelligence (SIGINT) Directorate, consisting of over 1,000 military and civilian computer hackers, intelligence analysts, targeting specialists, computer hardware and software designers, and electrical engineers.”[97]
      • S33 – Global Access Operations (GAO), which is responsible for intercepts from satellites and other international SIGINT platforms.[98] A tool which details and maps the information collected by this unit is code-named Boundless Informant.
      • S34 – Collections Strategies and Requirements Center
      • S35 – Special Source Operations (SSO), which is responsible for domestic and compartmented collection programs, like for example the PRISM program.[98] Special Source Operations is also mentioned in connection to the FAIRVIEW collection program.[99]
  • T – Technical Directorate (TD)
  • Directorate for Education and Training
  • Directorate for Corporate Leadership
  • Foreign Affairs Directorate, which acts as liaison with foreign intelligence services, counter-intelligence centers and the UKUSA-partners.
  • Acquisitions and Procurement Directorate
  • Information Sharing Services (ISS), led by a chief and a deputy chief.[100]

In the year 2000, a leadership team was formed, consisting of the Director, the Deputy Director and the Directors of the Signals Intelligence (SID), the Information Assurance (IAD) and the Technical Directorate (TD). The chiefs of other main NSA divisions became associate directors of the senior leadership team.[101]

After president George W. Bush initiated the President’s Surveillance Program (PSP) in 2001, the NSA created a 24-hour Metadata Analysis Center (MAC), followed in 2004 by the Advanced Analysis Division (AAD), with the mission of analyzing content, Internet metadata and telephone metadata. Both units were part of the Signals Intelligence Directorate.[102]

A 2016 proposal would combine the Signals Intelligence Directorate with the Information Assurance Directorate into a Directorate of Operations.[103]

Watch centers

The NSA maintains at least two watch centers:

  • National Security Operations Center (NSOC), which is the NSA’s current operations center and focal point for time-sensitive SIGINT reporting for the United States SIGINT System (USSS). This center was established in 1968 as the National SIGINT Watch Center (NSWC) and renamed into National SIGINT Operations Center (NSOC) in 1973. This “nerve center of the NSA” got its current name in 1996.[104]
  • NSA/CSS Threat Operations Center (NTOC), which is the primary NSA/CSS partner for Department of Homeland Security response to cyber incidents. The NTOC establishes real-time network awareness and threat characterization capabilities to forecast, alert, and attribute malicious activity and enable the coordination of Computer Network Operations. The NTOC was established in 2004 as a joint Information Assurance and Signals Intelligence project.[105]

Employees

The number of NSA employees is officially classified[4] but there are several sources providing estimates. In 1961, NSA had 59,000 military and civilian employees, which grew to 93,067 in 1969, of which 19,300 worked at the headquarters at Fort Meade. In the early 1980s NSA had roughly 50,000 military and civilian personnel. By 1989 this number had grown again to 75,000, of which 25,000 worked at the NSA headquarters. Between 1990 and 1995 the NSA’s budget and workforce were cut by one third, which led to a substantial loss of experience.[106]

In 2012, the NSA said more than 30,000 employees worked at Fort Meade and other facilities.[2] In 2012, John C. Inglis, the deputy director, said that the total number of NSA employees is “somewhere between 37,000 and one billion” as a joke,[4] and stated that the agency is “probably the biggest employer of introverts.”[4] In 2013 Der Spiegel stated that the NSA had 40,000 employees.[5] More widely, it has been described as the world’s largest single employer of mathematicians.[107] Some NSA employees form part of the workforce of the National Reconnaissance Office (NRO), the agency that provides the NSA with satellite signals intelligence.

As of 2013 about 1,000 system administrators work for the NSA.[108]

Security issues

The NSA received criticism early on in 1960 after two agents had defected to the Soviet Union. Investigations by the House Un-American Activities Committee and a special subcommittee of the United States House Committee on Armed Services revealed severe cases of ignorance in personnel security regulations, prompting the former personnel director and the director of security to step down and leading to the adoption of stricter security practices.[109] Nonetheless, security breaches reoccurred only a year later when in an issue of Izvestia of July 23, 1963, a former NSA employee published several cryptologic secrets.

The very same day, an NSA clerk-messenger committed suicide as ongoing investigations disclosed that he had sold secret information to the Soviets on a regular basis. The reluctance of Congressional houses to look into these affairs had prompted a journalist to write, “If a similar series of tragic blunders occurred in any ordinary agency of Government an aroused public would insist that those responsible be officially censured, demoted, or fired.” David Kahn criticized the NSA’s tactics of concealing its doings as smug and the Congress’ blind faith in the agency’s right-doing as shortsighted, and pointed out the necessity of surveillance by the Congress to prevent abuse of power.[109]

Edward Snowden‘s leaking of the existence of PRISM in 2013 caused the NSA to institute a “two-man rule“, where two system administrators are required to be present when one accesses certain sensitive information.[108]Snowden claims he suggested such a rule in 2009.[110]

Polygraphing

Defense Security Service (DSS) polygraph brochure given to NSA applicants

The NSA conducts polygraph tests of employees. For new employees, the tests are meant to discover enemy spies who are applying to the NSA and to uncover any information that could make an applicant pliant to coercion.[111] As part of the latter, historically EPQs or “embarrassing personal questions” about sexual behavior had been included in the NSA polygraph.[111]The NSA also conducts five-year periodic reinvestigation polygraphs of employees, focusing on counterintelligence programs. In addition the NSA conducts periodic polygraph investigations in order to find spies and leakers; those who refuse to take them may receive “termination of employment”, according to a 1982 memorandum from the director of the NSA.[112]

File:NSApolygraphvideo.webm

NSA-produced video on the polygraph process

There are also “special access examination” polygraphs for employees who wish to work in highly sensitive areas, and those polygraphs cover counterintelligence questions and some questions about behavior.[112] NSA’s brochure states that the average test length is between two and four hours.[113] A 1983 report of the Office of Technology Assessment stated that “It appears that the NSA [National Security Agency] (and possibly CIA) use the polygraph not to determine deception or truthfulness per se, but as a technique of interrogation to encourage admissions.”[114] Sometimes applicants in the polygraph process confess to committing felonies such as murder, rape, and selling of illegal drugs. Between 1974 and 1979, of the 20,511 job applicants who took polygraph tests, 695 (3.4%) confessed to previous felony crimes; almost all of those crimes had been undetected.[111]

In 2010 the NSA produced a video explaining its polygraph process.[115] The video, ten minutes long, is titled “The Truth About the Polygraph” and was posted to the Web site of the Defense Security Service. Jeff Stein of The Washington Post said that the video portrays “various applicants, or actors playing them — it’s not clear — describing everything bad they had heard about the test, the implication being that none of it is true.”[116] AntiPolygraph.org argues that the NSA-produced video omits some information about the polygraph process; it produced a video responding to the NSA video.[115] George Maschke, the founder of the Web site, accused the NSA polygraph video of being “Orwellian“.[116]

After Edward Snowden revealed his identity in 2013, the NSA began requiring polygraphing of employees once per quarter.[117]

Arbitrary firing

The number of exemptions from legal requirements has been criticized. When in 1964 the Congress was hearing a bill giving the director of the NSA the power to fire at will any employee,The Washington Post wrote: “This is the very definition of arbitrariness. It means that an employee could be discharged and disgraced on the basis of anonymous allegations without the slightest opportunity to defend himself.” Yet, the bill was accepted by an overwhelming majority.[109]

Insignia and memorials

Seal of the U.S. National Security Agency.svg

The heraldic insignia of NSA consists of an eagle inside a circle, grasping a key in its talons.[118] The eagle represents the agency’s national mission.[118] Its breast features a shield with bands of red and white, taken from the Great Seal of the United States and representing Congress.[118] The key is taken from the emblem of Saint Peter and represents security.[118]

When the NSA was created, the agency had no emblem and used that of the Department of Defense.[119] The agency adopted its first of two emblems in 1963.[119] The current NSA insignia has been in use since 1965, when then-Director, LTG Marshall S. Carter (USA) ordered the creation of a device to represent the agency.[120]

The NSA’s flag consists of the agency’s seal on a light blue background.

National Cryptologic Memorial

Crews associated with NSA missions have been involved in a number of dangerous and deadly situations.[121] The USS Liberty incident in 1967 and USS Pueblo incident in 1968 are examples of the losses endured during the Cold War.[121]

The National Security Agency/Central Security Service Cryptologic Memorial honors and remembers the fallen personnel, both military and civilian, of these intelligence missions.[122] It is made of black granite, and has 171 names carved into it, as of 2013 .[122] It is located at NSA headquarters. A tradition of declassifying the stories of the fallen was begun in 2001.[122]

NSANet (NSA’s intranet)

Behind the Green Door – Secure communications room with separate computer terminals for access to SIPRNET, GWAN, NSANET, and JWICS

NSANet stands for National Security Agency Network and is the official NSA intranet.[123] It is a classified network,[124] for information up to the level of TS/SCI[125] to support the use and sharing of intelligence data between NSA and the signals intelligence agencies of the four other nations of the Five Eyes partnership. The management of NSANet has been delegated to the Central Security Service Texas (CSSTEXAS).[126]

NSANet is a highly secured computer network consisting of fiber-optic and satellite communication channels which are almost completely separated from the public Internet. The network allows NSA personnel and civilian and military intelligence analysts anywhere in the world to have access to the agency’s systems and databases. This access is tightly controlled and monitored. For example, every keystroke is logged, activities are audited at random and downloading and printing of documents from NSANet are recorded.[127]

In 1998, NSANet, along with NIPRNET and SIPRNET, had “significant problems with poor search capabilities, unorganized data and old information”.[128] In 2004, the network was reported to have used over twenty commercial off-the-shelf operating systems.[129] Some universities that do highly sensitive research are allowed to connect to it.[130]

The thousands of Top Secret internal NSA documents that were taken by Edward Snowden in 2013 were stored in “a file-sharing location on the NSA’s intranet site” so they could easily be read online by NSA personnel. Everyone with a TS/SCI-clearance had access to these documents and as a system administrator, Snowden was responsible for moving accidentally misplaced highly sensitive documents to more secure storage locations.[131]

National Computer Security Center

The DoD Computer Security Center was founded in 1981 and renamed the National Computer Security Center (NCSC) in 1985. NCSC was responsible for computer security throughout the federal government.[132] NCSC was part of NSA,[133] and during the late 1980s and the 1990s, NSA and NCSC published Trusted Computer System Evaluation Criteria in a six-foot high Rainbow Series of books that detailed trusted computing and network platform specifications.[134] The Rainbow books were replaced by the Common Criteria, however, in the early 2000s.[134]

Facilities

Headquarters

National Security Agency headquarters in Fort Meade, 2013

Headquarters for the National Security Agency is located at 39°6′32″N 76°46′17″W in Fort George G. Meade, Maryland, although it is separate from other compounds and agencies that are based within this same military installation. Ft. Meade is about 20 mi (32 km) southwest of Baltimore,[135] and 25 mi (40 km) northeast of Washington, DC.[136] The NSA has its own exit off Maryland Route 295 South labeled “NSA Employees Only”.[137][138] The exit may only be used by people with the proper clearances, and security vehicles parked along the road guard the entrance.[139]

NSA is the largest employer in the U.S. state of Maryland, and two-thirds of its personnel work at Ft. Meade.[140] Built on 350 acres (140 ha; 0.55 sq mi)[141] of Ft. Meade’s 5,000 acres (2,000 ha; 7.8 sq mi),[142] the site has 1,300 buildings and an estimated 18,000 parking spaces.[136][143]

NSA headquarters building in Fort Meade (left), NSOC (right)

The main NSA headquarters and operations building is what James Bamford, author of Body of Secrets, describes as “a modern boxy structure” that appears similar to “any stylish office building.”[144] The building is covered with one-way dark glass, which is lined with copper shielding in order to prevent espionage by trapping in signals and sounds.[144] It contains 3,000,000 square feet (280,000 m2), or more than 68 acres (28 ha), of floor space; Bamford said that the U.S. Capitol “could easily fit inside it four times over.”[144]

The facility has over 100 watchposts,[145] one of them being the visitor control center, a two-story area that serves as the entrance.[144] At the entrance, a white pentagonal structure,[146] visitor badges are issued to visitors and security clearances of employees are checked.[147] The visitor center includes a painting of the NSA seal.[146]

The OPS2A building, the tallest building in the NSA complex and the location of much of the agency’s operations directorate, is accessible from the visitor center. Bamford described it as a “dark glass Rubik’s Cube“.[148] The facility’s “red corridor” houses non-security operations such as concessions and the drug store. The name refers to the “red badge” which is worn by someone without a security clearance. The NSA headquarters includes a cafeteria, a credit union, ticket counters for airlines and entertainment, a barbershop, and a bank.[146] NSA headquarters has its own post office, fire department, and police force.[149][150][151]

The employees at the NSA headquarters reside in various places in the Baltimore-Washington area, including Annapolis, Baltimore, and Columbia in Maryland and the District of Columbia, including the Georgetown community.[152]

Power consumption

Due to massive amounts of data processing, NSA is the largest electricity consumer in Maryland.[140]

Following a major power outage in 2000, in 2003 and in follow-ups through 2007, The Baltimore Sun reported that the NSA was at risk of electrical overload because of insufficient internal electrical infrastructure at Fort Meade to support the amount of equipment being installed. This problem was apparently recognized in the 1990s but not made a priority, and “now the agency’s ability to keep its operations going is threatened.”[153]

Baltimore Gas & Electric (BGE, now Constellation Energy) provided NSA with 65 to 75 megawatts at Ft. Meade in 2007, and expected that an increase of 10 to 15 megawatts would be needed later that year.[154] In 2011, NSA at Ft. Meade was Maryland’s largest consumer of power.[140] In 2007, as BGE’s largest customer, NSA bought as much electricity as Annapolis, the capital city of Maryland.[153]

One estimate put the potential for power consumption by the new Utah Data Center at US$40 million per year.[155]

History of headquarters

Headquarters at Fort Meade circa 1950s

When the agency was established, its headquarters and cryptographic center were in the Naval Security Station in Washington, D.C. The COMINT functions were located in Arlington Hall in Northern Virginia, which served as the headquarters of the U.S. Army‘s cryptographic operations.[156] Because the Soviet Union had detonated a nuclear bomb and because the facilities were crowded, the federal government wanted to move several agencies, including the AFSA/NSA. A planning committee considered Fort Knox, but Fort Meade, Maryland, was ultimately chosen as NSA headquarters because it was far enough away from Washington, D.C. in case of a nuclear strike and was close enough so its employees would not have to move their families.[157]

Construction of additional buildings began after the agency occupied buildings at Ft. Meade in the late 1950s, which they soon outgrew.[157] In 1963 the new headquarters building, nine stories tall, opened. NSA workers referred to the building as the “Headquarters Building” and since the NSA management occupied the top floor, workers used “Ninth Floor” to refer to their leaders.[158] COMSEC remained in Washington, D.C., until its new building was completed in 1968.[157] In September 1986, the Operations 2A and 2B buildings, both copper-shielded to prevent eavesdropping, opened with a dedication by President Ronald Reagan.[159] The four NSA buildings became known as the “Big Four.”[159] The NSA director moved to 2B when it opened.[159]

Fort Meade shooting

On March 30, 2015, shortly before 9 am, a stolen sports utility vehicle approached an NSA police vehicle blocking the road near the gate of Fort Meade, after it was told to leave the area. NSA officers fired on the SUV, killing the 27-year-old driver, Mya Hall, and seriously injuring her 20-year-old passenger. An NSA officer’s arm was injured when Hall subsequently crashed into his vehicle.[160][161]

The two women were transgender[162] and had just gotten off from a night of partying at a motel with the man they’d stolen the SUV from that morning. They “attempted to drive a vehicle into the National Security Agency portion of the installation without authorization”, according to an NSA statement.[163] FBI spokeswoman Amy Thoreson said the incident is not believed to be related to terrorism.[164] In June 2015 the FBI closed its investigation into the incident and federal prosecutors have declined to bring charges against anyone involved.[165]

An anonymous police official told The Washington Post, “This was not a deliberate attempt to breach the security of NSA. This was not a planned attack.” The two are believed to have made a wrong turn off the highway, while fleeing from the motel after stealing the vehicle. A small amount of cocaine was found in the SUV. A local CBS reporter initially said a gun was found,[166] but her later revision does not.[167] Dozens of journalists were corralled into a parking lot blocks away from the scene, and were barred from photographing the area.[168]

Computing

In 1995, The Baltimore Sun reported that the NSA is the owner of the single largest group of supercomputers.[169]

NSA held a groundbreaking ceremony at Ft. Meade in May 2013 for its High Performance Computing Center 2, expected to open in 2016.[170] Called Site M, the center has a 150 megawatt power substation, 14 administrative buildings and 10 parking garages.[149] It cost $3.2 billion and covers 227 acres (92 ha; 0.355 sq mi).[149] The center is 1,800,000 square feet (17 ha; 0.065 sq mi)[149] and initially uses 60 megawatts of electricity.[171]

Increments II and III are expected to be completed by 2030, and would quadruple the space, covering 5,800,000 square feet (54 ha; 0.21 sq mi) with 60 buildings and 40 parking garages.[149] Defense contractors are also establishing or expanding cybersecurity facilities near the NSA and around the Washington metropolitan area.[149]

Other U.S. facilities

Buckley Air Force Base in Colorado

Utah Data Center

As of 2012, NSA collected intelligence from four geostationary satellites.[155] Satellite receivers were at Roaring Creek Station in Catawissa, Pennsylvania and Salt Creek Station in Arbuckle, California.[155] It operated ten to twenty taps on U.S. telecom switches. NSA had installations in several U.S. states and from them observed intercepts from Europe, the Middle East, North Africa, Latin America, and Asia.[155]

NSA had facilities at Friendship Annex (FANX) in Linthicum, Maryland, which is a 20 to 25-minute drive from Ft. Meade;[172] the Aerospace Data Facility at Buckley Air Force Base in Aurora outside Denver, Colorado; NSA Texas in the Texas Cryptology Center at Lackland Air Force Base in San Antonio, Texas; NSA Georgia at Fort Gordon in Augusta, Georgia; NSA Hawaii in Honolulu; the Multiprogram Research Facility in Oak Ridge, Tennessee, and elsewhere.[152][155]

On January 6, 2011 a groundbreaking ceremony was held to begin construction on NSA’s first Comprehensive National Cyber-security Initiative (CNCI) Data Center, known as the “Utah Data Center” for short. The $1.5B data center is being built at Camp Williams, Utah, located 25 miles (40 km) south of Salt Lake City, and will help support the agency’s National Cyber-security Initiative.[173] It is expected to be operational by September 2013.[155]

In 2009, to protect its assets and to access more electricity, NSA sought to decentralize and expand its existing facilities in Ft. Meade and Menwith Hill,[174] the latter expansion expected to be completed by 2015.[175]

The Yakima Herald-Republic cited Bamford, saying that many of NSA’s bases for its Echelon program were a legacy system, using outdated, 1990s technology.[176] In 2004, NSA closed its operations at Bad Aibling Station (Field Station 81) in Bad Aibling, Germany.[177] In 2012, NSA began to move some of its operations at Yakima Research Station, Yakima Training Center, in Washington state to Colorado, planning to leave Yakima closed.[178] As of 2013, NSA also intended to close operations at Sugar Grove, West Virginia.[176]

International stations

RAF Menwith Hill has the largest NSA presence in the United Kingdom.[175]

Following the signing in 1946–1956[179] of the UKUSA Agreement between the United States, United Kingdom, Canada, Australia and New Zealand, who then cooperated on signals intelligence and ECHELON,[180] NSA stations were built at GCHQ Bude in Morwenstow, United Kingdom; Geraldton, Pine Gap and Shoal Bay, Australia; Leitrim and Ottawa, Canada; Misawa, Japan; and Waihopai and Tangimoana,[181] New Zealand.[182]

NSA operates RAF Menwith Hill in North Yorkshire, United Kingdom, which was, according to BBC News in 2007, the largest electronic monitoring station in the world.[183] Planned in 1954, and opened in 1960, the base covered 562 acres (227 ha; 0.878 sq mi) in 1999.[184]

The agency’s European Cryptologic Center (ECC), with 240 employees in 2011, is headquartered at a US military compound in Griesheim, near Frankfurt in Germany. A 2011 NSA report indicates that the ECC is responsible for the “largest analysis and productivity in Europe” and focusses on various priorities, including Africa, Europe, the Middle East and counterterrorism operations.[185]

In 2013, a new Consolidated Intelligence Center, also to be used by NSA, is being built at the headquarters of the United States Army Europe in Wiesbaden, Germany.[186] NSA’s partnership with Bundesnachrichtendienst (BND), the German foreign intelligence service, was confirmed by BND president Gerhard Schindler.[186]

Thailand

Thailand is a “3rd party partner” of the NSA along with nine other nations.[187] These are non-English-speaking countries that have made security agreements for the exchange of SIGINT raw material and end product reports.

Thailand is the site of at least two US SIGINT collection stations. One is at the US Embassy in Bangkok, a joint NSA-CIA Special Collection Service (SCS) unit. It presumably eavesdrops on foreign embassies, governmental communications, and other targets of opportunity.[188]

The second installation is a FORNSAT (foreign satellite interception) station in the Thai city of Khon Kaen. It is codenamed INDRA, but has also been referred to as LEMONWOOD.[188] The station is approximately 40 ha (100 acres) in size and consists of a large 3,700–4,600 m2 (40,000–50,000 ft2) operations building on the west side of the ops compound and four radome-enclosed parabolic antennas. Possibly two of the radome-enclosed antennas are used for SATCOM intercept and two antennas used for relaying the intercepted material back to NSA. There is also a PUSHER-type circularly-disposed antenna array (CDAA) array just north of the ops compound.[189][190]

NSA activated Khon Kaen in October 1979. Its mission was to eavesdrop on the radio traffic of Chinese army and air force units in southern China, especially in and around the city of Kunming in Yunnan Province. Back in the late 1970s the base consisted only of a small CDAA antenna array that was remote-controlled via satellite from the NSA listening post at Kunia, Hawaii, and a small force of civilian contractors from Bendix Field Engineering Corp. whose job it was to keep the antenna array and satellite relay facilities up and running 24/7.[189]

According to the papers of the late General William Odom, the INDRA facility was upgraded in 1986 with a new British-made PUSHER CDAA antenna as part of an overall upgrade of NSA and Thai SIGINT facilities whose objective was to spy on the neighboring communist nations of Vietnam, Laos, and Cambodia.[189]

The base apparently fell into disrepair in the 1990s as China and Vietnam became more friendly towards the US, and by 2002 archived satellite imagery showed that the PUSHER CDAA antenna had been torn down, perhaps indicating that the base had been closed. At some point in the period since 9/11, the Khon Kaen base was reactivated and expanded to include a sizeable SATCOM intercept mission. It is likely that the NSA presence at Khon Kaen is relatively small, and that most of the work is done by civilian contractors.[189]

Mission

NSA’s eavesdropping mission includes radio broadcasting, both from various organizations and individuals, the Internet, telephone calls, and other intercepted forms of communication. Its secure communications mission includes military, diplomatic, and all other sensitive, confidential or secret government communications.[191]

According to the Washington Post, “[e]very day, collection systems at the National Security Agency intercept and store 1.7 billion e-mails, phone calls and other types of communications. The NSA sorts a fraction of those into 70 separate databases.”[192]

Because of its listening task, NSA/CSS has been heavily involved in cryptanalytic research, continuing the work of predecessor agencies which had broken many World War II codes and ciphers (see, for instance, Purple, Venona project, and JN-25).

In 2004, NSA Central Security Service and the National Cyber Security Division of the Department of Homeland Security (DHS) agreed to expand NSA Centers of Academic Excellence in Information Assurance Education Program.[193]

As part of the National Security Presidential Directive 54/Homeland Security Presidential Directive 23 (NSPD 54), signed on January 8, 2008 by President Bush, the NSA became the lead agency to monitor and protect all of the federal government’s computer networks from cyber-terrorism.[9]

Operations

Operations by the National Security Agency can be divided in three types:

  • Collection overseas, which falls under the responsibility of the Global Access Operations (GAO) division.
  • Domestic collection, which falls under the responsibility of the Special Source Operations (SSO) division.
  • Hacking operations, which falls under the responsibility of the Tailored Access Operations (TAO) division.

Collection overseas

Echelon

Echelon was created in the incubator of the Cold War.[194] Today it is a legacy system, and several NSA stations are closing.[176]

NSA/CSS, in combination with the equivalent agencies in the United Kingdom (Government Communications Headquarters), Canada (Communications Security Establishment), Australia (Defence Signals Directorate), and New Zealand (Government Communications Security Bureau), otherwise known as the UKUSA group,[195] was reported to be in command of the operation of the so-called ECHELON system. Its capabilities were suspected to include the ability to monitor a large proportion of the world’s transmitted civilian telephone, fax and data traffic.[196]

During the early 1970s, the first of what became more than eight large satellite communications dishes were installed at Menwith Hill.[197] Investigative journalist Duncan Campbell reported in 1988 on the ECHELON surveillance program, an extension of the UKUSA Agreement on global signals intelligence SIGINT, and detailed how the eavesdropping operations worked.[198] In November 3, 1999 the BBC reported that they had confirmation from the Australian Government of the existence of a powerful “global spying network” code-named Echelon, that could “eavesdrop on every single phone call, fax or e-mail, anywhere on the planet” with Britain and the United States as the chief protagonists. They confirmed that Menwith Hill was “linked directly to the headquarters of the US National Security Agency (NSA) at Fort Meade in Maryland”.[199]

NSA’s United States Signals Intelligence Directive 18 (USSID 18) strictly prohibited the interception or collection of information about “… U.S. persons, entities, corporations or organizations….” without explicit written legal permission from the United States Attorney General when the subject is located abroad, or the Foreign Intelligence Surveillance Court when within U.S. borders. Alleged Echelon-related activities, including its use for motives other than national security, including political and industrial espionage, received criticism from countries outside the UKUSA alliance.[200][201]

Protesters against NSA data mining in Berlin wearing Chelsea Manning and Edward Snowden masks.

Other SIGINT operations overseas

The NSA is also involved in planning to blackmail people with “SEXINT“, intelligence gained about a potential target’s sexual activity and preferences. Those targeted had not committed any apparent crime nor were charged with one.[202]

In order to support its facial recognition program, the NSA is intercepting “millions of images per day”.[203]

The Real Time Regional Gateway is a data collection program introduced in 2005 in Iraq by NSA during the Iraq War that consisted of gathering all electronic communication, storing it, then searching and otherwise analyzing it. It was effective in providing information about Iraqi insurgents who had eluded less comprehensive techniques.[204] This “collect it all” strategy introduced by NSA director, Keith B. Alexander, is believed by Glenn Greenwald of The Guardian to be the model for the comprehensive worldwide mass archiving of communications which NSA is engaged in as of 2013.[205]

BoundlessInformant

Edward Snowden revealed in June 2013 that between February 8 and March 8, 2013, the NSA collected about 124.8 billion telephone data items and 97.1 billion computer data items throughout the world, as was displayed in charts from an internal NSA tool codenamed Boundless Informant. It was reported that some of these data reflected eavesdropping on citizens in countries like Germany, Spain and France.[206]

BoundlessInformant employs big data databases, cloud computing technology, and Free and Open Source Software (FOSS) to analyze data collected worldwide by the NSA.[207]

Bypassing encryption

In 2013, reporters uncovered a secret memo that claims the NSA created and pushed for the adoption of the Dual_EC_DRBG encryption standard that contained built-in vulnerabilities in 2006 to the United States National Institute of Standards and Technology (NIST), and the International Organization for Standardization (aka ISO).[208][209] This memo appears to give credence to previous speculation by cryptographers at Microsoft Research.[210]Edward Snowden claims that the NSA often bypasses encryption altogether by lifting information before it is encrypted or after it is decrypted.[209]

XKeyscore rules (as specified in a file xkeyscorerules100.txt, sourced by German TV stations NDR and WDR, who claim to have excerpts from its source code) reveal that the NSA tracks users of privacy-enhancing software tools, including Tor; an anonymous email service provided by the MIT Computer Science and Artificial Intelligence Laboratory (CSAIL) in Cambridge, Massachusetts; and readers of the Linux Journal.[211][212]

Domestic activity

NSA’s mission, as set forth in Executive Order 12333 in 1981, is to collect information that constitutes “foreign intelligence or counterintelligence” while not “acquiring information concerning the domestic activities of United States persons“. NSA has declared that it relies on the FBI to collect information on foreign intelligence activities within the borders of the United States, while confining its own activities within the United States to the embassies and missions of foreign nations.[213] The appearance of a ‘Domestic Surveillance Directorate’ of the NSA was soon exposed as a hoax in 2013.[214][215]

NSA’s domestic surveillance activities are limited by the requirements imposed by the Fourth Amendment to the U.S. Constitution. The Foreign Intelligence Surveillance Court for example held in October 2011, citing multiple Supreme Court precedents, that the Fourth Amendment prohibitions against unreasonable searches and seizures applies to the contents of all communications, whatever the means, because “a person’s private communications are akin to personal papers.”[216] However, these protections do not apply to non-U.S. persons located outside of U.S. borders, so the NSA’s foreign surveillance efforts are subject to far fewer limitations under U.S. law.[217] The specific requirements for domestic surveillance operations are contained in the Foreign Intelligence Surveillance Act of 1978 (FISA), which does not extend protection to non-U.S. citizens located outside of U.S. territory.[217]

George W. Bush administration

George W. Bush, president during the 9/11 terrorist attacks, approved the Patriot Act shortly after the attacks to take anti-terrorist security measures. Title 1, 2, and 9 specifically authorized measures that would be taken by the NSA. These titles granted enhanced domestic security against terrorism, surveillance procedures, and improved intelligence, respectively. On March 10, 2004, there was a debate between President Bush and White House Counsel Alberto Gonzales, Attorney General John Ashcroft, and Acting Attorney General James Comey. The Attorney Generals were unsure if the NSA’s programs could be considered constitutional. They threatened to resign over the matter, but ultimately the NSA’s programs continued.[218] On March 11, 2004, President Bush signed a new authorization for mass surveillance of Internet records, in addition to the surveillance of phone records.This allowed the president to be able to override laws such as the Foreign Intelligence Surveillance Act, which protected civilians from mass surveillance. In addition to this, President Bush also signed that the measures of mass surveillance were also retroactively in place.[219]

Warrantless wiretaps

On December 16, 2005, The New York Times reported that, under White House pressure and with an executive order from President George W. Bush, the National Security Agency, in an attempt to thwart terrorism, had been tapping phone calls made to persons outside the country, without obtaining warrants from the United States Foreign Intelligence Surveillance Court, a secret court created for that purpose under the Foreign Intelligence Surveillance Act (FISA).[220]

One such surveillance program, authorized by the U.S. Signals Intelligence Directive 18 of President George Bush, was the Highlander Project undertaken for the National Security Agency by the U.S. Army 513th Military Intelligence Brigade. NSA relayed telephone (including cell phone) conversations obtained from ground, airborne, and satellite monitoring stations to various U.S. Army Signal Intelligence Officers, including the 201st Military Intelligence Battalion. Conversations of citizens of the U.S. were intercepted, along with those of other nations.[221]

Proponents of the surveillance program claim that the President has executive authority to order such action, arguing that laws such as FISA are overridden by the President’s Constitutional powers. In addition, some argued that FISA was implicitly overridden by a subsequent statute, the Authorization for Use of Military Force, although the Supreme Court’s ruling in Hamdan v. Rumsfeld deprecates this view. In the August 2006 case ACLU v. NSA, U.S. District Court Judge Anna Diggs Taylor concluded that NSA’s warrantless surveillance program was both illegal and unconstitutional. On July 6, 2007 the 6th Circuit Court of Appeals vacated the decision on the grounds that the ACLU lacked standing to bring the suit.[222]

On January 17, 2006, the Center for Constitutional Rights filed a lawsuit, CCR v. Bush, against the George W. Bush Presidency. The lawsuit challenged the National Security Agency’s (NSA’s) surveillance of people within the U.S., including the interception of CCR emails without securing a warrant first.[223][224]

In September 2008, the Electronic Frontier Foundation (EFF) filed a class action lawsuit against the NSA and several high-ranking officials of the Bush administration,[225] charging an “illegal and unconstitutional program of dragnet communications surveillance,”[226] based on documentation provided by former AT&T technician Mark Klein.[227]

As a result of the USA Freedom Act passed by Congress in June 2015, the NSA had to shut down its bulk phone surveillance program on November 29 of the same year. The USA Freedom Act forbids the NSA to collect metadata and content of phone calls unless it has a warrant for terrorism investigation. In that case the agency has to ask the telecom companies for the record, which will only be kept for six months.

AT&T Internet monitoring

In May 2006, Mark Klein, a former AT&T employee, alleged that his company had cooperated with NSA in installing Narus hardware to replace the FBI Carnivore program, to monitor network communications including traffic between American citizens.[228]

Data mining

NSA was reported in 2008 to use its computing capability to analyze “transactional” data that it regularly acquires from other government agencies, which gather it under their own jurisdictional authorities. As part of this effort, NSA now monitors huge volumes of records of domestic email data, web addresses from Internet searches, bank transfers, credit-card transactions, travel records, and telephone data, according to current and former intelligence officials interviewed by The Wall Street Journal. The sender, recipient, and subject line of emails can be included, but the content of the messages or of phone calls are not.[229]

A 2013 advisory group for the Obama administration, seeking to reform NSA spying programs following the revelations of documents released by Edward J. Snowden.[230] mentioned in ‘Recommendation 30’ on page 37, “…that the National Security Council staff should manage an interagency process to review on a regular basis the activities of the US Government regarding attacks that exploit a previously unknown vulnerability in a computer application.” Retired cyber security expert Richard A. Clarke was a group member and stated on April 11 that NSA had no advance knowledge of Heartbleed.[231]

Illegally obtained evidence

In August 2013 it was revealed that a 2005 IRS training document showed that NSA intelligence intercepts and wiretaps, both foreign and domestic, were being supplied to the Drug Enforcement Administration (DEA) and Internal Revenue Service (IRS) and were illegally used to launch criminal investigations of US citizens. Law enforcement agents were directed to conceal how the investigations began and recreate an apparently legal investigative trail by re-obtaining the same evidence by other means.[232][233]

Barack Obama administration

In the months leading to April 2009, the NSA intercepted the communications of American citizens, including a Congressman, although the Justice Department believed that the interception was unintentional. The Justice Department then took action to correct the issues and bring the program into compliance with existing laws.[234] United States Attorney General Eric Holder resumed the program according to his understanding of the Foreign Intelligence Surveillance Act amendment of 2008, without explaining what had occurred.[235]

Polls conducted in June 2013 found divided results among Americans regarding NSA’s secret data collection.[236] Rasmussen Reports found that 59% of Americans disapprove,[237] Gallup found that 53% disapprove,[238] and Pew found that 56% are in favor of NSA data collection.[239]

Section 215 metadata collection

On April 25, 2013, the NSA obtained a court order requiring Verizon‘s Business Network Services to provide metadata on all calls in its system to the NSA “on an ongoing daily basis” for a three-month period, as reported by The Guardian on June 6, 2013. This information includes “the numbers of both parties on a call … location data, call duration, unique identifiers, and the time and duration of all calls” but not “[t]he contents of the conversation itself”. The order relies on the so-called “business records” provision of the Patriot Act.[240][241]

In August 2013, following the Snowden leaks, new details about the NSA’s data mining activity were revealed. Reportedly, the majority of emails into or out of the United States are captured at “selected communications links” and automatically analyzed for keywords or other “selectors”. Emails that do not match are deleted.[242]

The utility of such a massive metadata collection in preventing terrorist attacks is disputed. Many studies reveal the dragnet like system to be ineffective. One such report, released by the New America Foundation concluded that after an analysis of 225 terrorism cases, the NSA “had no discernible impact on preventing acts of terrorism.”[243]

Defenders of the program say that while metadata alone can’t provide all the information necessary to prevent an attack, it assures the ability to “connect the dots”[244] between suspect foreign numbers and domestic numbers with a speed only the NSA’s software is capable of. One benefit of this is quickly being able to determine the difference between suspicious activity and real threats.[citation needed] As an example, NSA director General Keith Alexander mentioned at the annual Cybersecurity Summit in 2013, that metadata analysis of domestic phone call records after the Boston Marathon bombing helped determine that[clarification needed] another attack in New York was baseless.[244]

In addition to doubts about its effectiveness, many people argue that the collection of metadata is an unconstitutional invasion of privacy. As of 2015, the collection process remains legal and grounded in the ruling from Smith v. Maryland (1979). A prominent opponent of the data collection and its legality is U.S. District Judge Richard J. Leon, who issued a report in 2013[245] in which he stated: “I cannot imagine a more ‘indiscriminate’ and ‘arbitrary invasion’ than this systematic and high tech collection and retention of personal data on virtually every single citizen for purposes of querying and analyzing it without prior judicial approval…Surely, such a program infringes on ‘that degree of privacy’ that the founders enshrined in the Fourth Amendment”.

The PRISM program[edit]

PRISM: a clandestine surveillance program under which the NSA collects user data from companies like Microsoft and Facebook.

Under the PRISM program, which started in 2007,[246][247] NSA gathers Internet communications from foreign targets from nine major U.S. Internet-based communication service providers: Microsoft,[248] Yahoo, Google, Facebook, PalTalk, AOL, Skype, YouTube and Apple. Data gathered include email, video and voice chat, videos, photos, VoIP chats such as Skype, and file transfers.

June 2015 – WikiLeaks: Industrial espionage

In June 2015, Wikileaks published documents, which showed that NSA spied on French companies.[249]

July 2015 – WikiLeaks: Espionage against German federal ministries

In July 2015, WikiLeaks published documents, which showed that NSA spied on federal German ministries since 1990s.[250][251] Even Germany’s Chancellor Angela Merkel‘s cellphones and phone of her predecessors had been intercepted.[252]

Claims of prevented terrorist attacks

Former NSA director General Keith Alexander claimed that in September 2009 the NSA prevented Najibullah Zazi and his friends from carrying out a terrorist attack.[253] However, this claim has been debunked and no evidence has been presented demonstrating that the NSA has ever been instrumental in preventing a terrorist attack.[254][255][256][257]

Hacking operations

Besides the more traditional ways of eavesdropping in order to collect signals intelligence, NSA is also engaged in hacking computers, smartphones and their networks. These operations are conducted by the Tailored Access Operations (TAO) division.

NSA’s China hacking group

According to the Foreign Policy magazine, “… the Office of Tailored Access Operations, or TAO, has successfully penetrated Chinese computer and telecommunications systems for almost 15 years, generating some of the best and most reliable intelligence information about what is going on inside the People’s Republic of China.”[258][259]

Syrian internet blackout

In an interview with Wired magazine, Edward Snowden said the Tailored Access Operations division accidentally caused Syria‘s internet blackout in 2012.[260]

Suspected responsibility for hacking operations by the Equation Group

The espionage group named the Equation Group, described by discoverers Kaspersky Labs as one of the most advanced (if not the most advanced) in the world as of 2015,[261]:31 and connected to over 500 malware infections in at least 42 countries over many years, is suspected of being a part of NSA.[262][263] The group’s known espionage methods have been documented to include interdiction (interception of legitimate CDs sent by a scientific conference organizer by mail),[261]:15 and the “unprecedented” ability to infect and be transmitted through the hard drive firmware of several of the major hard drive manufacturers, and create and use hidden disk areas and virtual disk systems for its purposes, a feat demanding access to the manufacturer’s source code of each to achieve.[261]:16–18 The methods used to deploy the tools demonstrated “surgical precision”, going so far as to exclude specific countries by IP and allow targeting of specific usernames on discussion forums.[261]:23–26 The techniques and knowledge used by the Equation Group are considered in summary to be “out of the reach of most advanced threat groups in the world except [this group].[261]:31

Software backdoors

Linux kernel

Linus Torvalds, the founder of Linux kernel, joked during a LinuxCon keynote on September 18, 2013 that the NSA, who are the founder of SELinux, wanted a backdoor in the kernel.[264] However, later, Linus’ father, a Member of the European Parliament (MEP), revealed that the NSA actually did this.[265]

When my oldest son was asked the same question: “Has he been approached by the NSA about backdoors?” he said “No”, but at the same time he nodded. Then he was sort of in the legal free. He had given the right answer, everybody understood that the NSA had approached him.

— Nils Torvalds, LIBE Committee Inquiry on Electronic Mass Surveillance of EU Citizens – 11th Hearing, 11 November 2013[266]
Microsoft Windows

_NSAKEY was a variable name discovered in Microsoft‘s Windows NT 4 Service Pack 5 (which had been released unstripped of its symbolic debugging data) in August 1999 by Andrew D. Fernandes of Cryptonym Corporation. That variable contained a 1024-bit public key.

IBM Notes

IBM Notes was the first widely adopted software product to use public key cryptography for client–server and server–server authentication and for encryption of data. Until US laws regulating encryption were changed in 2000, IBM and Lotus were prohibited from exporting versions of Notes that supported symmetric encryption keys that were longer than 40 bits. In 1997, Lotus negotiated an agreement with the NSA that allowed export of a version that supported stronger keys with 64 bits, but 24 of the bits were encrypted with a special key and included in the message to provide a “workload reduction factor” for the NSA. This strengthened the protection for users of Notes outside the US against private-sector industrial espionage, but not against spying by the US government.[267][268]

Boomerang routing

While it is assumed that foreign transmissions terminating in the U.S. (such as a non-U.S. citizen accessing a U.S. website) subject non-U.S. citizens to NSA surveillance, recent research into boomerang routing has raised new concerns about the NSA’s ability to surveil the domestic Internet traffic of foreign countries.[18] Boomerang routing occurs when an Internet transmission that originates and terminates in a single country transits another. Research at the University of Toronto has suggested that approximately 25% of Canadian domestic traffic may be subject to NSA surveillance activities as a result of the boomerang routing of Canadian Internet service providers.[18]

Hardware implanting

Intercepted packages are opened carefully by NSA employees
A “load station” implanting a beacon

A document included in NSA files released with Glenn Greenwald‘s book No Place to Hide details how the agency’s Tailored Access Operations (TAO) and other NSA units gain access to hardware. They intercept routers, servers and other network hardware being shipped to organizations targeted for surveillance and install covert implant firmware onto them before they are delivered. This was described by an NSA manager as “some of the most productive operations in TAO because they preposition access points into hard target networks around the world.”[269]

Computers seized by the NSA due to interdiction are often modified with a physical device known as Cottonmouth.[270] Cottonmouth is a device that can be inserted in the USB port of a computer in order to establish remote access to the targeted machine. According to NSA’s Tailored Access Operations (TAO) group implant catalog, after implanting Cottonmouth, the NSA can establish Bridging (networking) “that allows the NSA to load exploit software onto modified computers as well as allowing the NSA to relay commands and data between hardware and software implants.”[271]

Role in scientific research and development

NSA has been involved in debates about public policy, both indirectly as a behind-the-scenes adviser to other departments, and directly during and after Vice Admiral Bobby Ray Inman‘s directorship. NSA was a major player in the debates of the 1990s regarding the export of cryptography in the United States. Restrictions on export were reduced but not eliminated in 1996.

Its secure government communications work has involved the NSA in numerous technology areas, including the design of specialized communications hardware and software, production of dedicated semiconductors (at the Ft. Meade chip fabrication plant), and advanced cryptography research. For 50 years, NSA designed and built most of its computer equipment in-house, but from the 1990s until about 2003 (when the U.S. Congress curtailed the practice), the agency contracted with the private sector in the fields of research and equipment.[272]

Data Encryption Standard

FROSTBURG was the NSA’s first supercomputer, used from 1991 to 1997

NSA was embroiled in some minor controversy concerning its involvement in the creation of the Data Encryption Standard (DES), a standard and public block cipher algorithm used by the U.S. government and banking community. During the development of DES by IBM in the 1970s, NSA recommended changes to some details of the design. There was suspicion that these changes had weakened the algorithm sufficiently to enable the agency to eavesdrop if required, including speculation that a critical component—the so-called S-boxes—had been altered to insert a “backdoor” and that the reduction in key length might have made it feasible for NSA to discover DES keys using massive computing power. It has since been observed that the S-boxes in DES are particularly resilient against differential cryptanalysis, a technique which was not publicly discovered until the late 1980s, but which was known to the IBM DES team.

The United States Senate Select Committee on Intelligence reviewed NSA’s involvement, and concluded that while the agency had provided some assistance, it had not tampered with the design.[273][274] In late 2009 NSA declassified information stating that “NSA worked closely with IBM to strengthen the algorithm against all except brute force attacks and to strengthen substitution tables, called S-boxes. Conversely, NSA tried to convince IBM to reduce the length of the key from 64 to 48 bits. Ultimately they compromised on a 56-bit key.”[275][276]

Advanced Encryption Standard

The involvement of NSA in the selection of a successor to Data Encryption Standard (DES), the Advanced Encryption Standard (AES), was limited to hardware performance testing (see AES competition).[277] NSA has subsequently certified AES for protection of classified information (for at most two levels, e.g. SECRET information in an unclassified environment[clarification needed]) when used in NSA-approved systems.[278]

NSA encryption systems

STU-III secure telephones on display at the National Cryptologic Museum

The NSA is responsible for the encryption-related components in these legacy systems:

  • FNBDT Future Narrow Band Digital Terminal[279]
  • KL-7 ADONIS off-line rotor encryption machine (post-WWII – 1980s)[280][281]
  • KW-26 ROMULUS electronic in-line teletypewriter encryptor (1960s–1980s)[282]
  • KW-37 JASON fleet broadcast encryptor (1960s–1990s)[281]
  • KY-57 VINSON tactical radio voice encryptor[282]
  • KG-84 Dedicated Data Encryption/Decryption[282]
  • STU-III secure telephone unit,[282] phased out by the STE[283]

The NSA oversees encryption in following systems which are in use today:

The NSA has specified Suite A and Suite B cryptographic algorithm suites to be used in U.S. government systems; the Suite B algorithms are a subset of those previously specified by NIST and are expected to serve for most information protection purposes, while the Suite A algorithms are secret and are intended for especially high levels of protection.[278]

SHA

The widely used SHA-1 and SHA-2 hash functions were designed by NSA. SHA-1 is a slight modification of the weaker SHA-0 algorithm, also designed by NSA in 1993. This small modification was suggested by NSA two years later, with no justification other than the fact that it provides additional security. An attack for SHA-0 that does not apply to the revised algorithm was indeed found between 1998 and 2005 by academic cryptographers. Because of weaknesses and key length restrictions in SHA-1, NIST deprecates its use for digital signatures, and approves only the newer SHA-2 algorithms for such applications from 2013 on.[288]

A new hash standard, SHA-3, has recently been selected through the competition concluded October 2, 2012 with the selection of Keccak as the algorithm. The process to select SHA-3 was similar to the one held in choosing the AES, but some doubts have been cast over it,[289][290] since fundamental modifications have been made to Keccak in order to turn it into a standard.[291] These changes potentially undermine the cryptanalysis performed during the competition and reduce the security levels of the algorithm.[289]

Dual_EC_DRBG random number generator cryptotrojan

NSA promoted the inclusion of a random number generator called Dual_EC_DRBG in the U.S. National Institute of Standards and Technology‘s 2007 guidelines. This led to speculation of a backdoor which would allow NSA access to data encrypted by systems using that pseudo random number generator.[292]

This is now deemed to be plausible based on the fact that the output of the next iterations of the PRNG can provably be determined if the relation between two internal elliptic curve points is known.[293][294] Both NIST and RSA are now officially recommending against the use of this PRNG.[295][296]

Clipper chip

Because of concerns that widespread use of strong cryptography would hamper government use of wiretaps, NSA proposed the concept of key escrow in 1993 and introduced the Clipper chip that would offer stronger protection than DES but would allow access to encrypted data by authorized law enforcement officials.[297] The proposal was strongly opposed and key escrow requirements ultimately went nowhere.[298] However, NSA’s Fortezza hardware-based encryption cards, created for the Clipper project, are still used within government, and NSA ultimately declassified and published the design of the Skipjack cipher used on the cards.[299][300]

Perfect Citizen

Perfect Citizen is a program to perform vulnerability assessment by the NSA on U.S. critical infrastructure.[301][302] It was originally reported to be a program to develop a system of sensors to detect cyber attacks on critical infrastructure computer networks in both the private and public sector through a network monitoring system named Einstein.[303][304] It is funded by the Comprehensive National Cybersecurity Initiative and thus far Raytheon has received a contract for up to $100 million for the initial stage.

Academic research

NSA has invested many millions of dollars in academic research under grant code prefix MDA904, resulting in over 3,000 papers (as of 2007-10-11). NSA/CSS has, at times, attempted to restrict the publication of academic research into cryptography; for example, the Khufu and Khafre block ciphers were voluntarily withheld in response to an NSA request to do so. In response to a FOIA lawsuit, in 2013 the NSA released the 643-page research paper titled, “Untangling the Web: A Guide to Internet Research,[305] ” written and compiled by NSA employees to assist other NSA workers in searching for information of interest to the agency on the public Internet.[306]

Patents

NSA has the ability to file for a patent from the U.S. Patent and Trademark Office under gag order. Unlike normal patents, these are not revealed to the public and do not expire. However, if the Patent Office receives an application for an identical patent from a third party, they will reveal NSA’s patent and officially grant it to NSA for the full term on that date.[307]

One of NSA’s published patents describes a method of geographically locating an individual computer site in an Internet-like network, based on the latency of multiple network connections.[308] Although no public patent exists, NSA is reported to have used a similar locating technology called trilateralization that allows real-time tracking of an individual’s location, including altitude from ground level, using data obtained from cellphone towers.[309]

Controversy

File:Ron Wyden and James Clapper - 12 March 2013.webm

Excerpt from when James Clapper lied to Congress on NSA surveillance programs

In the United States, at least since 2001,[310] there has been legal controversy over what signal intelligence can be used for and how much freedom the National Security Agency has to use signal intelligence.[311] The government has made, in 2015, slight changes in how it uses and collects certain types of data,[312] specifically phone records. President Barack Obama has asked lawyers and his national security team to look at the tactics that are being used by the NSA. President Obama made a speech on January 17, 2014 where he defended the national security measures, including the NSA, and their intentions for keeping the country safe through surveillance. He said that it is difficult to determine where the line should be drawn between what is too much surveillance and how much is needed for national security because technology is ever changing and evolving. Therefore, the laws cannot keep up with the rapid advancements.

President Obama did make some changes to national security regulations and how much data can be collected and surveyed.[citation needed] The first thing he added, was more presidential directive and oversight so that privacy and basic rights are not violated. The president would look over requests on behalf of American citizens to make sure that their personal privacy is not violated by the data that is being requested. Secondly, surveillance tactics and procedures are becoming more public, including over 40 rulings of the FISC that have been declassified.[citation needed] Thirdly, further protections are being placed on activities that are justified under Section 702, such as the ability to retain, search and use data collected in investigations, which allows the NSA to monitor and intercept interaction of targets overseas. Finally, national security letters, which are secret requests for information that the FBI uses in their investigations, are becoming less secretive. The secrecy of the information requested will not be indefinite and will terminate after a set time if future secrecy is not required.[citation needed] Concerning the bulk surveillance of American’s phone records, President Obama also ordered a transition from bulk surveillance under Section 215 to a new policy that will eliminate unnecessary bulk collection of metadata.

As of May 7, 2015, the U.S. Court of Appeals for the Second Circuit ruled that the interpretation of Section 215 of the Patriot Act was wrong and that the NSA program that has been collecting Americans’ phone records in bulk is illegal.[313] It stated that Section 215 cannot be clearly interpreted to allow government to collect national phone data and, as a result, expired on June 1, 2015. This ruling “is the first time a higher-level court in the regular judicial system has reviewed the N.S.A. phone records program.” [314] The new bill getting passed later in May taking its place is known as the U.S.A. Freedom Act, which will enable the NSA to continue hunting for terrorists by analyzing telephone links between callers but “keep the bulk phone records in the hands of phone companies.”[314] This would give phone companies the freedom to dispose the records in an 18-month period. The White House argued that this new ruling validated President Obama’s support of the government being extracted from bulk data collection and giving power to the telecommunications companies.

Previously, the NSA paid billions of dollars to telecommunications companies in order to collect data from them.[315] While companies such as Google and Yahoo! claim that they do not provide “direct access” from their servers to the NSA unless under a court order,[316] the NSA had access to emails, phone calls and cellular data users.[317] With this new ruling, telecommunications companies would not provide the NSA with bulk information. The companies would allow the disposal of data in every 18 months,[314] which is arguably putting the telecommunications companies at a higher advantage.

This ruling made the collecting of phone records illegal, but it did not rule on Section 215’s constitutionality. Senate Majority Leader Mitch McConnell has already put forth a new bill to re-authorize the Patriot Act.[318] Defenders of this surveillance program are claiming that judges who sit on the Foreign Intelligence Surveillance Court (FISC) had ruled 37 times that this kind of collection of data is, in fact, lawful.[318] The FISC is the court specifically mandated to grant surveillance orders in the name of foreign intelligence. The new ruling made by the Second District Court of Appeals now retroactively dismisses the findings of the FISC on this program.

See also

Notes

 Story 2: Big Lie Media Crazy Credibility Crisis — Fake News is Media McCarthyism — No Tanks In Streets of D.C. Big Lie Coup Fake News — Videos

Image result for tanks in washington d.c.

Image result for cartoons obama surveillance of trump

Image result for cartoons obama surveillance of trump

Image result for cartoons obama surveillance of trump

Image result for cartoons obama surveillance of trump

Krauthammer: Comey incident has sent press over the edge

Conway: Democrats trashed Comey then made him a martyr

Ari Fleischer: Hypocrisy from Democratic Party is appalling

Michelle Malkin: Hypocrisy over Comey firing is overwhelming

Gingrich: Liberals will move on to Martian conspiracies next

Could a probe of Hillary’s email server be reopened?

Tucker to Dem: Are you saying Trump has corrupted FBI?

Rush Limbaugh rejects media’s ‘coup’ claims

Hume: Calling Comey firing a ‘coup’ is hysterical

Lionel on the Alex Jones Show: Fake News, Media Bias, McCarthyism, Redbaiting & Blatant Russophobia

The Truth About McCarthyism: Modern Parallels

Napolitano: Many FBI agents felt demeaned by Comey’s actions

Coup d’état

From Wikipedia, the free encyclopedia

A coup d’état (/ˌk dˈtɑː/ About this sound listen ; French: [ku.de.ta]), also known simply as a coup (/k/), a putsch (/pʊ/), or an overthrow, is the illegal and overt seizure of a state by the military or other elites within the state apparatus.[1]

Contents

 [show

Terminology

Etymology

The phrase coup d’état (French pronunciation:  [ku deta]) is French, literally meaning a “stroke of state” or “blow against the state.” In French the word “État” (French: [e.ta]), denoting a sovereign political entity, is capitalized.[2]

Although the concept of a coup d’état has been featured in politics since antiquity, the phrase is of relatively recent coinage;[3] the Oxford English Dictionary identifies it as a French expression meaning a “stroke of state.” The phrase did not appear within an English text before the 19th century except when used in translation of a French source, there being no simple phrase in English to convey the contextualized idea of a “knockout blow to the existing administration within a state.”

One early use within text translated from French was in 1785 in a printed translation of a letter from a French merchant, commenting on an arbitrary decree or “arrêt” issued by the French king restricting the import of British wool.[4] What may be its first published use within a text composed in English is an editor’s note in the London Morning Chronicle, 7 January 1802, reporting the arrest by Napoleon in France, of Moreau, Berthier, Masséna, and Bernadotte:

There was a report in circulation yesterday of a sort of coup d’état having taken place in France, in consequence of some formidable conspiracy against the existing government.

In post-Revolutionary France, the phrase came to be used to describe the various murders by Napoleon‘s hated secret police, the Gens d’Armes d’Elite, who murdered the Duke of Enghien:

…the actors in torture, the distributors of the poisoning draughts, and the secret executioners of those unfortunate individuals or families, whom Bonaparte’s measures of safety require to remove. In what revolutionary tyrants call grand[s] coups d’état, as butchering, or poisoning, or drowning, en masse, they are exclusively employed.[5]

Usage of the phrase

Clayton Thyne and Jonathan Powell’s dataset of coups defines attempted coups as “illegal and overt attempts by the military or other elites within the state apparatus to unseat the sitting executive.”[1] They arrive at this definition by combining common definitions in the existing literature and removing specificities and ambiguities that exist in many definitions.[1]

In looser usage, as in “intelligence coup” or “boardroom coup”, the term simply refers to gaining a sudden advantage on a rival.

Putsch

Since an unsuccessful coup d’état in 1920 (the Kapp Putsch), the Swiss-German word Putsch (pronounced [pʊtʃ], coined for the Züriputsch of September 6, 1839, in Zurich), also denotes the politico-military actions of an unsuccessful minority reactionary coup.[6][7][8]

Other recent and notable unsuccessful minority reactionary coups that are often referred to as Putsches are the 1923 Beer Hall Putsch and Küstrin Putsch, 1961 Algiers Putsch and the 1991 August Putsch. Putsch was used as disinformation by Hitler and his Nazi supporters to falsely claim that he had to suppress a reactionary coup during the Night of the Long Knives. Germans still use the term Röhm-Putsch to describe the murders, the term given to it by the Nazi regime, despite its unproven implication that the murders were necessary to prevent a coup. German authors often use quotation marks or write about the sogenannter Röhm-Putsch (“so-called Röhm Putsch”) for emphasis.[9]

Pronunciamiento

Pronunciamiento (“pronouncement”) is a term of Spanish and Latin-American origin for a special type of coup d’état. The coup d’état (called golpe de Estado in Spanish) was more common in Spain and South America, while the pronunciamiento was more common in Central America. The pronunciamiento is the formal explanation for deposing the regnant government, justifying the installation of the new government that was effected with the golpe de Estado.

In a coup, it is the military, paramilitary, or opposing political faction that deposes the current government and assumes power; whereas, in the pronunciamiento, the military deposes the existing government and installs an (ostensibly) civilian government.[10]

History

According to Clayton Thyne and Jonathan Powell’s coup dataset, there were 457 coup attempts from 1950 to 2010, of which 227 (49.7%) were successful and 230 (50.3%) were unsuccessful.[1] They find that coups have “been most common in Africa and the Americas (36.5% and 31.9%, respectively). Asia and the Middle East have experienced 13.1% and 15.8% of total global coups, respectively. Europe has experienced by far the fewest number of coup attempts: 2.6%.”[1] Most coup attempts occurred in the mid-1960s, but there were also large numbers of coup attempts in the mid-1970s and the early 1990s.[1] Successful coups have decreased over time.[1] Coups that occur in the post-Cold War period are more likely to result in democratic systems.[11][12][13] Coups that occur during civil wars shorten the war’s duration.[14] Research suggests that protests spur coups, as they help elites within the state apparatus to coordinate coups.[15]

Types

A 2016 study categorizes coups into four possible outcomes:[12]

  • Failed coup.
  • No regime change. Such as when a leader is illegally shuffled out of power without changing the identity of the group in power or the rules for governing.
  • Replacement of incumbent dictatorship with another.
  • Ouster of the dictatorship followed by democratization.

The 2016 study found that about half of all coups — both during and after the Cold War — install new autocratic regimes.[12] New dictatorships launched by coups engage in higher levels of repression in the year that follows the coup than existed in the year leading to the coup.[12] One third of coups during the Cold War and 10 percent of post-Cold War coups reshuffled the regime leadership.[12] Democracies were installed in the wake of 12 percent of Cold War coups and 40 percent of the post-Cold War coups.[12]

Samuel Huntington’s three types

Writing in 1968, political scientist Samuel P. Huntington identified three types of coup d’état, which correspond to the role the military plays in three different types of praetorian society.[16] As society changes, so does the role of the military. In the world of oligarchy, the soldier is a radical; in the middle class he is a participant and arbiter; as the “mass society looms on the horizon he becomes the conservative guardian of the existing order”.

Breakthrough coups

In breakthrough coups, the soldier plays the role of “reformer”, moving the society from “Oligarchical to Radical Praetorianism”. “In oligarchical praetorianism the dominant social forces are landowners, the leading clergy, and the wielders of the sword”. In “radical” society, the middle-class is an important social and political class. The shift toward “radical” society take the form of slow evolution, or a “breakthrough” to middle-class political participation may be led by civilian intelligentsia. A breakthrough to radical praetorianism (in which the military plays an important role among the middle class who govern) may occur when middle-class officers dislodge the civilian intelligentsia who led the breakthrough, or the military may take power directly from the absolute monarchy or the oligarchs in a military coup.

Arbiter coups

In this type of coup, society is in the stage of “radical praetorianism,” meaning that the praetorian society is in the “middle stages in the expansion of political participation,” when the middle-class (including the military) are actively involved in politics, but the masses are not regularly politically mobilized. This type of society often follows the breakthrough coup, which “clears the way for the entry of other middle-class elements into politics”. In radical praetorian society, various middle-class groups may act against one another in riots or demonstrations, and the military will step in with a military coup to re-establish order and “halt the rabid mobilization of social forces into politics and into the streets…to defuse the explosive political situation”.

Veto coup d’état

Veto coups d’état occur when the army vetoes the people’s mass participation and social mobilisation in governing themselves. “Military interventions of this “veto” variety thus directly reflect increasing lower-class political participation in politics”. In “veto coups” the soldier plays the role of “guardian of the existing order.” In such a case, the army confronts and suppresses large-scale, broad-based civil opposition.

Predictors

A 2003 review of the academic literature found that the following factors were associated with coups:

  • officers’ personal grievances
  • military organizational grievances
  • military popularity
  • military attitudinal cohesiveness
  • economic decline
  • domestic political crisis
  • contagion from other regional coups
  • external threat
  • participation in war
  • foreign veto power[clarify] and military’s national security doctrine
  • officers’ political culture
  • noninclusive institutions
  • colonial legacy
  • economic development
  • undiversified exports
  • officers’ class composition
  • military size
  • strength of civil society
  • regime legitimacy and past coups.[17]

The literature review in a 2016 study includes mentions of ethnic factionalism, supportive foreign governments, leader inexperience, slow growth, commodity price shocks, and poverty.[18]

The cumulative number of coups is a strong predictor of future coups.[17][19][20] Hybrid regimes are more vulnerable to coups than very authoritarian states or democratic states.[21] A 2015 study finds that terrorism is strongly associated with re-shuffling coups.[22] A 2016 study finds that there is an ethnic component to coups: “When leaders attempt to build ethnic armies, or dismantle those created by their predecessors, they provoke violent resistance from military officers.”[23] Another 2016 study shows that protests increase the risk of coups, presumably because they ease coordination obstacles among coup plotters and make international actors less likely to punish coup leaders.[24] A third 2016 study finds that coups become more likely in the wake of elections in autocracies when the results reveal electoral weakness for the incumbent autocrat.[25] A fourth 2016 study finds that inequality between social classes increase the likelihood of coups.[26] A 2016 study rejects the notion that participation in war makes coups more likely; to the contrary, coup risk declines in the presence of enduring interstate conflict.[27] One study found that coups are more likely to occur in states with small populations, as there are smaller coordination problems for coup-plotters.[28]

Coup-proofing

In what is referred to as “coup-proofing”, regimes create structures that make it hard for any small group to seize power. These coup-proofing strategies may include the strategic placing of family, ethnic, and religious groups in the military; creation of an armed force parallel to the regular military, and development of multiple internal security agencies with overlapping jurisdiction that constantly monitor one another.[29] Research shows that some coup-proofing strategies reduce the risk of coups occurring.[30][31] However, coup-proofing reduces military effectiveness,[32][33][34] and limits the rents that an incumbent can extract.[35]

A 2016 study shows that the implementation of succession rules reduce coup attempts.[36] Succession rules are believed to hamper coordination efforts among coup plotters by assuaging the elites who have more to gain with patience than with plotting.[36]

According to political scientists Curtis Bell and Jonathan Powell, coup attempts in neighbouring countries lead to greater coup-proofing and coup-related repression in a region.[37]

Democratization

Research suggests that coups promote democratization in staunchly authoritarian regimes, have become less likely to end democracy over time, and that the positive influence has strengthened since the end of the Cold War.[11][12][38][39][40]

A 2014 study found that “coups promote democratization, particularly among states that are least likely to democratize otherwise”.[38] The authors argue that coup attempts can have this consequence because leaders of successful coups have incentives to democratize quickly in order to establish political legitimacy and economic growth while leaders who stay in power after failed coup attempts see it as a sign that they must enact meaningful reforms to remain in power.[38] A 2014 study found that 40% of post-Cold War coups were successful. The authors argue that this may be due to the incentives created by international pressure.[11] A 2016 study found that democracies were installed in 12 percent of Cold War coups and 40 percent of the post-Cold War coups.[12]

Repression after failed coups, and counter-coups

According to Naunihal Singh, author of Seizing Power: The Strategic Logic of Military Coups (2014), it is “fairly rare” for the prevailing existing government to violently purge the army after a coup has been foiled. If it starts mass killing elements of the army, including officers who were not involved in the coup, this may trigger a “counter-coup” by soldiers who are afraid they will be next. To prevent such a desperate counter-coup that may be more successful than the initial attempt, governments usually resort to firing prominent officers and replacing them with loyalists instead.[41]

Some research suggests that increased repression and violence typically follow coup attempts (whether they’re successes or failures).[42] However, some tentative analysis by political scientist Jay Ulfelder finds no clear pattern of deterioration in human-rights practices in wake of failed coups in post-Cold War era.[43]

Notable counter-coups include the Ottoman countercoup of 1909, the 1960 Laotian counter-coup, the 1966 Nigerian counter-coup, the 1967 Greek counter-coup, and the 1971 Sudanese counter-coup.

A 2017 study finds that the use of state broadcasting by the putschist regime after Mali’s 2012 coup did not elevate explicit approval for the regime.[44]

International responses

The international community tends to react adversely to coups by reducing aid and imposing sanctions. A 2015 study finds that “coups against democracies, coups after the Cold War, and coups in states heavily integrated into the international community are all more likely to elicit global reaction.”[45] Another 2015 study shows that coups are the strongest predictor for the imposition of democratic sanctions.[46] A third 2015 study finds that Western states react strongest against coups of possible democratic and human rights abuses.[46] A 2016 study shows that the international donor community in the post-Cold War period penalizes coups by reducing foreign aid.[47] The US has been inconsistent in applying aid sanctions against coups both during the Cold War and post-Cold War periods, a likely consequence of its geopolitical interests.[47]

Organizations such as the African Union and Organization of American States have adopted anti-coup frameworks. Through the threat of sanctions, the organizations actively try to curb coups. A 2016 study finds that the African Union has played a meaningful role in reducing African coups.[48]

A forthcoming study in the Journal of Conflict Resolution finds that negative international responses to regimes created in coups have a significant influence on the sustainability of those regimes.[49] The study finds that “state reactions have the strongest effect during the Cold War, while international organizations matter the most afterward.”[49] Negative international responses from strong actors matter the most.[49]

Current leaders who assumed power via coups d’état

Position Name Assumed power as of Replaced Country Coup d’état
Sultan Qaboos bin Said al Said[50]1 23 July 1970 Said bin Taimur  Oman 1970 Omani coup d’état
President Teodoro Obiang Nguema Mbasogo 3 August 1979 Francisco Macías Nguema  Equatorial Guinea 1979 Equatoguinean coup d’état
President Yoweri Museveni 29 January 1986 Tito Okello  Uganda Ugandan Bush War
President Omar al-Bashir 30 June 1989 Sadiq al-Mahdi  Sudan 1989 Sudanese coup d’état
President Idriss Déby 2 December 1990 Hissène Habré  Chad 1990 Chadian revolution
President Isaias Afwerki 27 April 19912 Mengistu Haile Mariam
(Ethiopia)
 Eritrea Eritrean War of Independence
Prime Minister Hun Sen August 1997 Norodom Ranariddh  Cambodia 1997 Cambodian coup d’état
President Denis Sassou Nguesso 25 October 1997 Pascal Lissouba  Republic of the Congo Republic of the Congo Civil War
Prime Minister Frank Bainimarama 5 December 2006 Laisenia Qarase  Fiji 2006 Fijian coup d’état
President Mohamed Ould Abdel Aziz3 6 August 2008 Sidi Ould Cheikh Abdallahi  Mauritania 2008 Mauritanian coup d’état
President Abdel Fattah el-Sisi[51] 3 July 2013 Mohamed Morsi  Egypt 2013 Egyptian coup d’état
Prime Minister Prayuth Chan-ocha 22 May 2014 Niwatthamrong Boonsongpaisan4  Thailand 2014 Thai coup d’état
President of the Revolutionary Committee Mohammed Ali al-Houthi 6 February 2015 Abd Rabbuh Mansur Hadi5  Yemen 2014–15 Yemeni coup d’état

1Monarch who overthrew his father in a bloodless palace coup.
2As head of Provisional Government of Eritrea, which declared independence 24 May 1993.
3Subsequently, confirmed by a narrow margin in the 2009 Mauritanian presidential election, which was deemed “satisfactory” by international observers.
4Acting Prime Minister at that time.
5Hadi resigned on 22 January 2015.

See also

Story 3: President Trump Voter Fraud Commission — Videos

Image result for cartoons obama surveillance of trump

Trump Launches Commission To Investigate Voter Fraud

News Wrap: Trump signs executive orders on cybersecurity, voter fraud

Gov. Greg Abbott: Voter fraud is real, it must be stopped

Does the U.S. have a voter fraud problem?

John Fund References James O’Keefe’s Videos as Evidence of Voter Fraud

Veritas Voter Fraud Compilation – #VoterFraudIsReal

#CNNLeaks: James O’Keefe of Project Veritas Releases CNN Leaks and Offers Bounty for Its Destruction

The Pronk Pops Show Podcasts Portfolio

Listen To Pronk Pops Podcast or Download Shows 889-892

Listen To Pronk Pops Podcast or Download Shows 884-888

Listen To Pronk Pops Podcast or Download Shows 878-883

Listen To Pronk Pops Podcast or Download Shows 870-877

Listen To Pronk Pops Podcast or Download Shows 864-869

Listen To Pronk Pops Podcast or Download Shows 857-863

Listen To Pronk Pops Podcast or Download Shows 850-856

Listen To Pronk Pops Podcast or Download Shows 845-849

Listen To Pronk Pops Podcast or Download Shows 840-844

Listen To Pronk Pops Podcast or Download Shows 833-839

Listen To Pronk Pops Podcast or Download Shows 827-832

Listen To Pronk Pops Podcast or Download Shows 821-826

Listen To Pronk Pops Podcast or Download Shows 815-820

Listen To Pronk Pops Podcast or Download Shows 806-814

Listen To Pronk Pops Podcast or Download Shows 800-805

Listen To Pronk Pops Podcast or Download Shows 793-799

Listen To Pronk Pops Podcast or Download Shows 785-792

Listen To Pronk Pops Podcast or Download Shows 777-784

Listen To Pronk Pops Podcast or Download Shows 769-776

Listen To Pronk Pops Podcast or Download Shows 759-768

Listen To Pronk Pops Podcast or Download Shows 751-758

Listen To Pronk Pops Podcast or Download Shows 745-750

Listen To Pronk Pops Podcast or Download Shows 738-744

Listen To Pronk Pops Podcast or Download Shows 732-737

Listen To Pronk Pops Podcast or Download Shows 727-731

Listen To Pronk Pops Podcast or Download Shows 720-726

Listen To Pronk Pops Podcast or DownloadShows 713-719

Listen To Pronk Pops Podcast or DownloadShows 705-712

Listen To Pronk Pops Podcast or Download Shows 695-704

Listen To Pronk Pops Podcast or Download Shows 685-694

Listen To Pronk Pops Podcast or Download Shows 675-684

Listen To Pronk Pops Podcast or Download Shows 668-674

Listen To Pronk Pops Podcast or Download Shows 660-667

Listen To Pronk Pops Podcast or Download Shows 651-659

Listen To Pronk Pops Podcast or Download Shows 644-650

Listen To Pronk Pops Podcast or Download Shows 637-643

Listen To Pronk Pops Podcast or Download Shows 629-636

Listen To Pronk Pops Podcast or Download Shows 617-628

Listen To Pronk Pops Podcast or Download Shows 608-616

Listen To Pronk Pops Podcast or Download Shows 599-607

Listen To Pronk Pops Podcast or Download Shows 590-598

Listen To Pronk Pops Podcast or Download Shows 585- 589

Listen To Pronk Pops Podcast or Download Shows 575-584

Listen To Pronk Pops Podcast or Download Shows 565-574

Listen To Pronk Pops Podcast or Download Shows 556-564

Listen To Pronk Pops Podcast or Download Shows 546-555

Listen To Pronk Pops Podcast or Download Shows 538-545

Listen To Pronk Pops Podcast or Download Shows 532-537

Listen To Pronk Pops Podcast or Download Shows 526-531

Listen To Pronk Pops Podcast or Download Shows 519-525

Listen To Pronk Pops Podcast or Download Shows 510-518

Listen To Pronk Pops Podcast or Download Shows 500-509

Listen To Pronk Pops Podcast or Download Shows 490-499

Listen To Pronk Pops Podcast or Download Shows 480-489

Listen To Pronk Pops Podcast or Download Shows 473-479

Listen To Pronk Pops Podcast or Download Shows 464-472

Listen To Pronk Pops Podcast or Download Shows 455-463

Listen To Pronk Pops Podcast or Download Shows 447-454

Listen To Pronk Pops Podcast or Download Shows 439-446

Listen To Pronk Pops Podcast or Download Shows 431-438

Listen To Pronk Pops Podcast or Download Shows 422-430

Listen To Pronk Pops Podcast or Download Shows 414-421

Listen To Pronk Pops Podcast or Download Shows 408-413

Listen To Pronk Pops Podcast or Download Shows 400-407

Listen To Pronk Pops Podcast or Download Shows 391-399

Listen To Pronk Pops Podcast or Download Shows 383-390

Listen To Pronk Pops Podcast or Download Shows 376-382

Listen To Pronk Pops Podcast or Download Shows 369-375

Listen To Pronk Pops Podcast or Download Shows 360-368

Listen To Pronk Pops Podcast or Download Shows 354-359

Listen To Pronk Pops Podcast or Download Shows 346-353

Listen To Pronk Pops Podcast or Download Shows 338-345

Listen To Pronk Pops Podcast or Download Shows 328-337

Listen To Pronk Pops Podcast or Download Shows 319-327

Listen To Pronk Pops Podcast or Download Shows 307-318

Listen To Pronk Pops Podcast or Download Shows 296-306

Listen To Pronk Pops Podcast or Download Shows 287-295

Listen To Pronk Pops Podcast or Download Shows 277-286

Listen To Pronk Pops Podcast or Download Shows 264-276

Listen To Pronk Pops Podcast or Download Shows 250-263

Listen To Pronk Pops Podcast or Download Shows 236-249

Listen To Pronk Pops Podcast or Download Shows 222-235

Listen To Pronk Pops Podcast or Download Shows 211-221

Listen To Pronk Pops Podcast or Download Shows 202-210

Listen To Pronk Pops Podcast or Download Shows 194-201

Listen To Pronk Pops Podcast or Download Shows 184-193

Listen To Pronk Pops Podcast or Download Shows 174-183

Listen To Pronk Pops Podcast or Download Shows 165-173

Listen To Pronk Pops Podcast or Download Shows 158-164

Listen To Pronk Pops Podcast or Download Shows151-157

Listen To Pronk Pops Podcast or Download Shows 143-150

Listen To Pronk Pops Podcast or Download Shows 135-142

Listen To Pronk Pops Podcast or Download Shows 131-134

Listen To Pronk Pops Podcast or Download Shows 124-130

Listen To Pronk Pops Podcast or Download Shows 121-123

Listen To Pronk Pops Podcast or Download Shows 118-120

Listen To Pronk Pops Podcast or Download Shows 113 -117

Listen To Pronk Pops Podcast or Download Show 112

Listen To Pronk Pops Podcast or Download Shows 108-111

Listen To Pronk Pops Podcast or Download Shows 106-108

Listen To Pronk Pops Podcast or Download Shows 104-105

Listen To Pronk Pops Podcast or Download Shows 101-103

Listen To Pronk Pops Podcast or Download Shows 98-100

Listen To Pronk Pops Podcast or Download Shows 94-97

Listen To Pronk Pops Podcast or Download Show 93

Listen To Pronk Pops Podcast or Download Show 92

Listen To Pronk Pops Podcast or Download Show 91

Listen To Pronk Pops Podcast or Download Shows 88-90

Listen To Pronk Pops Podcast or Download Shows 84-87

Listen To Pronk Pops Podcast or Download Shows 79-83

Listen To Pronk Pops Podcast or Download Shows 74-78

Listen To Pronk Pops Podcast or Download Shows 71-73

Listen To Pronk Pops Podcast or Download Shows 68-70

Listen To Pronk Pops Podcast or Download Shows 65-67

Listen To Pronk Pops Podcast or Download Shows 62-64

Listen To Pronk Pops Podcast or Download Shows 58-61

Listen To Pronk Pops Podcast or Download Shows 55-57

Listen To Pronk Pops Podcast or Download Shows 52-54

Listen To Pronk Pops Podcast or Download Shows 49-51

Listen To Pronk Pops Podcast or Download Shows 45-48

Listen To Pronk Pops Podcast or Download Shows 41-44

Listen To Pronk Pops Podcast or Download Shows 38-40

Listen To Pronk Pops Podcast or Download Shows 34-37

Listen To Pronk Pops Podcast or Download Shows 30-33

Listen To Pronk Pops Podcast or Download Shows 27-29

Listen To Pronk Pops Podcast or Download Shows 17-26

Listen To Pronk Pops Podcast or Download Shows 16-22

Listen To Pronk Pops Podcast or Download Shows 10-15

Listen To Pronk Pops Podcast or Download Shows 1-9

Read Full Post | Make a Comment ( None so far )

The Pronk Pops Show 871, April 11, 2017, Story 1: Trump Rattling Cages (Sending Messages) in Syria and North Korea (Democratic People’s Republic of Korea (DPRK)) — Training Exercise — Trump Neoconed — Videos — Story 2: Attorney General Sessions Enforces Immigration Law — The Trump Era — Videos

Posted on April 11, 2017. Filed under: American History, Breaking News, Business, Communications, Congress, Corruption, Countries, Donald J. Trump, Donald J. Trump, Donald Trump, Donald Trump, Education, Elections, Empires, Federal Government, Government, Health, History, Human, Illegal Immigration, Illegal Immigration, Immigration, Law, Legal Immigration, Life, Media, North Korea, Obama, Philosophy, Photos, Politics, President Trump, Progressives, Rand Paul, Rand Paul, Raymond Thomas Pronk, Regulation, Rule of Law, Scandals, Success, Syria, Taxation, Taxes, Terror, Terrorism, Trump Surveillance/Spying, Unemployment, United States of America, Videos, Violence, War, Weapons, Wisdom | Tags: , , , , , , , , , , , , |

Project_1

The Pronk Pops Show Podcasts

Pronk Pops Show 871: April 11, 2017

Pronk Pops Show 870: April 10, 2017

Pronk Pops Show 869: April 7, 2017

Pronk Pops Show 868: April 6, 2017

Pronk Pops Show 867: April 5, 2017

Pronk Pops Show 866: April 3, 2017

Pronk Pops Show 865: March 31, 2017

Pronk Pops Show 864: March 30, 2017

Pronk Pops Show 863: March 29, 2017

Pronk Pops Show 862: March 28, 2017

Pronk Pops Show 861: March 27, 2017

Pronk Pops Show 860: March 24, 2017

Pronk Pops Show 859: March 23, 2017

Pronk Pops Show 858: March 22, 2017

Pronk Pops Show 857: March 21, 2017

Pronk Pops Show 856: March 20, 2017

Pronk Pops Show 855: March 10, 2017

Pronk Pops Show 854: March 9, 2017

Pronk Pops Show 853: March 8, 2017

Pronk Pops Show 852: March 6, 2017

Pronk Pops Show 851: March 3, 2017

Pronk Pops Show 850: March 2, 2017

Pronk Pops Show 849: March 1, 2017

Pronk Pops Show 848: February 28, 2017

Pronk Pops Show 847: February 27, 2017

Pronk Pops Show 846: February 24, 2017

Pronk Pops Show 845: February 23, 2017

Pronk Pops Show 844: February 22, 2017

Pronk Pops Show 843: February 21, 2017

Pronk Pops Show 842: February 20, 2017

Pronk Pops Show 841: February 17, 2017

Pronk Pops Show 840: February 16, 2017

Pronk Pops Show 839: February 15, 2017

Pronk Pops Show 838: February 14, 2017

Pronk Pops Show 837: February 13, 2017

Pronk Pops Show 836: February 10, 2017

Pronk Pops Show 835: February 9, 2017

Pronk Pops Show 834: February 8, 2017

Pronk Pops Show 833: February 7, 2017

Pronk Pops Show 832: February 6, 2017

Pronk Pops Show 831: February 3, 2017

Pronk Pops Show 830: February 2, 2017

Pronk Pops Show 829: February 1, 2017

Pronk Pops Show 828: January 31, 2017

Pronk Pops Show 827: January 30, 2017

Pronk Pops Show 826: January 27, 2017

Pronk Pops Show 825: January 26, 2017

Pronk Pops Show 824: January 25, 2017

Pronk Pops Show 823: January 24, 2017

Pronk Pops Show 822: January 23, 2017

Pronk Pops Show 821: January 20, 2017

Pronk Pops Show 820: January 19, 2017

Pronk Pops Show 819: January 18, 2017

Pronk Pops Show 818: January 17, 2017

Pronk Pops Show 817: January 13, 2017

Pronk Pops Show 816: January 12, 2017

Pronk Pops Show 815: January 11, 2017

Pronk Pops Show 814: January 10, 2017

Pronk Pops Show 813: January 9, 2017

Story 1: Trump Rattling Cages (Sending Messages) in Syria and North Korea (Democratic People’s Republic of Korea (DPRK)) —  Training Exercise — Trump Neoconed — Videos —

Image result for pipelines in middle east existing and plannedImage result for map north and south korea missilesImage result for pipelines in syria iran to europeImage result for map north and south korea japan us navy warships april 2017

Image result for map north and south korea missiles

Image result for map north and south korea missiles

Image result for map north and south korea missiles

Image result for map north and south korea missiles

General James Mattis Delivers a THREAT at Defense Briefing at Pentagon on Russia, North Korea, China

What the Media Won’t Tell You about Syria

Alex Jones : We Must Stop Donald Trump and Globalists in Syria !

Rand Paul: Syria strikes ‘not in the national interest’

Ron Paul “Nobody’s Proven Anything About Who Gassed Whom!”

Congressman Ron Paul, MD – We’ve Been NeoConned

Rand Paul Says McCain Stupidity Hinders Political Solution in Syria

LIMBAUGH: Trump Voters Feel SHOCKED And BETRAYED After Syria Missile Strike

There’s No Such Thing As the Bad Guy

Keiser Report: What is Wrong with America? (E 1056)

Syria: Why Now, What’s the Strategy, What Are Critical Issues Before Us?

Ann Coulter’s take on Syria, Trump’s foreign policy

Unintended Consequences

Donald Trump, Commander in Chief

EXCLUSIVE: Michael Savage Begs Trump To Stop WWIII

Fears mount as the USS Carl Vinson heads does an about face

North Korea warns US over aircraft carrier deployment

united states SENDS warships To KOREA! TRUMP reacts to NORTH KOREA!

NORTH KOREA READY for UNITED STATES! SOUTH KOREA wants THEM OUT! BREAKING NEWS

Is North Korea next?

The U.S. vs. North Korea: Inside a Pentagon war game

The Real Doctor Evil: Kim Jong Il’s North Korea – Full Documentary

North Korea: The Great Illusion

Special report: North Korea: Credible threat?

Jack Posobiec: Will Trump Strike North Korea?

TRUMP sends HUGE message with USS GERALD R.FORD! after NORTH KOREA WARNS UNITED STATES

Alex Jones Breaks Down War Scenarios With China/North Korea! This Doesn’t End Well

Trump: We’ll solve North Korea ourselves

HE’S UNBELIEVABLE! MATTIS JUST SCARED KIM JONG UN TO DEATH WITH THESE 5 WORDS!

THIS CHANGES EVERYTHING! JAPAN IS CONSIDERING ULTIMATE ACT OF WAR AGAINST NORTH KOREA – THIS IS IT!

The Dangerous Tone of US Media and Revisionist History Towards Korea

Why Korea Split Into North and South Korea

Arirang Special M60Ep199 The Untold Story – “The Korean Empire”

 

North Korea state media warns of nuclear strike if provoked as U.S. warships approach

* North Korea media warns of nuclear strike on U.S. if provoked

* U.S. warships head for Korean peninsula

* Trump says North Korea “looking for trouble”

* Russia “really worried” about possible U.S. attack on North (Adds Trump Tweet)

By Sue-Lin Wong

PYONGYANG, April 11 (Reuters) – North Korean state media on Tuesday warned of a nuclear attack on the United States at any sign of U.S. aggression as a U.S. Navy strike group steamed towards the western Pacific.

U.S. President Donald Trump, who has urged China to do more to rein in its impoverished neighbour, said in a Tweet North Korea was “looking for trouble” and the United States would “solve the problem” with or without China’s help.

Tension has escalated sharply on the Korean peninsula with talk of military action by the United States gaining traction following its strikes last week against Syria and amid concerns the reclusive North may soon conduct a sixth nuclear test.

For more news videos visit Yahoo View, available now on iOS and Android.

North Korea’s official Rodong Sinmun newspaper said the country was prepared to respond to any aggression by the United States.

“Our revolutionary strong army is keenly watching every move by enemy elements with our nuclear sight focused on the U.S. invasionary bases not only in South Korea and the Pacific operation theatre but also in the U.S. mainland,” it said.

South Korean acting President Hwang Kyo-ahn warned of “greater provocations” by North Korea and ordered the military to intensify monitoring and to ensure close communication with the United States.

“It is possible the North may wage greater provocations such as a nuclear test timed with various anniversaries including the Supreme People’s Assembly,” said Hwang, acting leader since former president Park Geun-hye was removed amid a graft scandal.

Trump said in a Tweet a trade deal between China and the United States would be “far better for them if they solved the North Korea problem”.

“If China decides to help, that would be great,” he said. “If not, we will solve the problem without them!”

Trump and his Chinese counterpart, Xi Jinping, met in Florida last week and Trump pressed Xi to do more to rein in North Korea.

The North convened a Supreme People’s Assembly session on Tuesday, one of its twice-yearly sessions in which major appointments are announced and national policy goals are formally approved. It did not immediately release details.

But South Korean officials took pains to quell talk in social media of an impending security crisis or outbreak of war.

“We’d like to ask precaution so as not to get blinded by exaggerated assessment about the security situation on the Korean peninsula,” Defence Ministry spokesman Moon Sang-kyun said.

Saturday is the 105th anniversary of the birth of Kim Il Sung, the country’s founding father and grandfather of current ruler, Kim Jong Un.

A military parade is expected in the North’s capital, Pyongyang, to mark the day. North Korea often also marks important anniversaries with tests of its nuclear or missile capabilities in breach of U.N. Security Council resolutions.

Men and women in colourful outfits were singing and dancing on the streets of Pyongyang, illuminated by better lighting than that seen in previous years, apparently practising for the parade planned.

Syrian President Bashar al-Assad sent a message of congratulations to mark the event, lambasting “big powers” for their “expansionist” policy.

“The friendly two countries are celebrating this anniversary and, at the same time, conducting a war against big powers’ wild ambition to subject all countries to their expansionist and dominationist policy and deprive them of their rights to self-determination,” the North’s KCNA news agency quoted the message as saying.

The North’s foreign ministry, in a statement carried by KCNA, said the U.S. navy strike group’s approach showed America’s “reckless moves for invading had reached a serious phase”.

“We never beg for peace but we will take the toughest counteraction against the provocateurs in order to defend ourselves by powerful force of arms and keep to the road chosen by ourselves,” an unidentified ministry spokesman said.

North Korea and the rich, democratic South are technically still at war because their 1950-53 conflict ended in a truce, not a peace treaty. The North regularly threatens to destroy the South and its main ally, the United States.

http://finance.yahoo.com/news/north-korea-state-media-warns-100014004.html

Coming to Terms With the American Empire

APRIL 14, 2015 | 07:54 GMT

 

By George Friedman

“Empire” is a dirty word. Considering the behavior of many empires, that is not unreasonable. But empire is also simply a description of a condition, many times unplanned and rarely intended. It is a condition that arises from a massive imbalance of power. Indeed, the empires created on purpose, such as Napoleonic France and Nazi Germany, have rarely lasted. Most empires do not plan to become one. They become one and then realize what they are. Sometimes they do not realize what they are for a long time, and that failure to see reality can have massive consequences.

World War II and the Birth of an Empire

The United States became an empire in 1945. It is true that in the Spanish-American War, the United States intentionally took control of the Philippines and Cuba. It is also true that it began thinking of itself as an empire, but it really was not. Cuba and the Philippines were the fantasy of empire, and this illusion dissolved during World War I, the subsequent period of isolationism and the Great Depression.

The genuine American empire that emerged thereafter was a byproduct of other events. There was no great conspiracy. In some ways, the circumstances of its creation made it more powerful. The dynamic of World War II led to the collapse of the European Peninsula and its occupation by the Soviets and the Americans. The same dynamic led to the occupation of Japan and its direct governance by the United States as a de facto colony, with Gen. Douglas MacArthur as viceroy.

The United States found itself with an extraordinary empire, which it also intended to abandon. This was a genuine wish and not mere propaganda. First, the United States was the first anti-imperial project in modernity. It opposed empire in principle. More important, this empire was a drain on American resources and not a source of wealth. World War II had shattered both Japan and Western Europe. The United States gained little or no economic advantage in holding on to these countries. Finally, the United States ended World War II largely untouched by war and as perhaps one of the few countries that profited from it. The money was to be made in the United States, not in the empire. The troops and the generals wanted to go home.

But unlike after World War I, the Americans couldn’t let go. That earlier war ruined nearly all of the participants. No one had the energy to attempt hegemony. The United States was content to leave Europe to its own dynamics. World War II ended differently. The Soviet Union had been wrecked but nevertheless it remained powerful. It was a hegemon in the east, and absent the United States, it conceivably could dominate all of Europe. This represented a problem for Washington, since a genuinely united Europe — whether a voluntary and effective federation or dominated by a single country — had sufficient resources to challenge U.S. power.

The United States could not leave. It did not think of itself as overseeing an empire, and it certainly permitted more internal political autonomy than the Soviets did in their region. Yet, in addition to maintaining a military presence, the United States organized the European economy and created and participated in the European defense system. If the essence of sovereignty is the ability to decide whether or not to go to war, that power was not in London, Paris or Warsaw. It was in Moscow and Washington.

The organizing principle of American strategy was the idea of containment. Unable to invade the Soviet Union, Washington’s default strategy was to check it. U.S. influence spread through Europe to Iran. The Soviet strategy was to flank the containment system by supporting insurgencies and allied movements as far to the rear of the U.S. line as possible. The European empires were collapsing and fragmenting. The Soviets sought to create an alliance structure out of the remnants, and the Americans sought to counter them.

The Economics of Empire

One of the advantages of alliance with the Soviets, particularly for insurgent groups, was a generous supply of weapons. The advantage of alignment with the United States was belonging to a dynamic trade zone and having access to investment capital and technology. Some nations, such as South Korea, benefited extraordinarily from this. Others didn’t. Leaders in countries like Nicaragua felt they had more to gain from Soviet political and military support than in trade with the United States.

The United States was by far the largest economic power, with complete control of the sea, bases around the world, and a dynamic trade and investment system that benefitted countries that were strategically critical to the United States or at least able to take advantage of it. It was at this point, early in the Cold War, that the United States began behaving as an empire, even if not consciously.

The geography of the American empire was built partly on military relations but heavily on economic relations. At first these economic relations were fairly trivial to American business. But as the system matured, the value of investments soared along with the importance of imports, exports and labor markets. As in any genuinely successful empire, it did not begin with a grand design or even a dream of one. Strategic necessity created an economic reality in country after country until certain major industries became dependent on at least some countries. The obvious examples were Saudi Arabia or Venezuela, whose oil fueled American oil companies, and which therefore — quite apart from conventional strategic importance — became economically important. This eventually made them strategically important.

As an empire matures, its economic value increases, particularly when it is not coercing others. Coercion is expensive and undermines the worth of an empire. The ideal colony is one that is not at all a colony, but a nation that benefits from economic relations with both the imperial power and the rest of the empire. The primary military relationship ought to be either mutual dependence or, barring that, dependence of the vulnerable client state on the imperial power.

This is how the United States slipped into empire. First, it was overwhelmingly wealthy and powerful. Second, it faced a potential adversary capable of challenging it globally, in a large number of countries. Third, it used its economic advantage to induce at least some of these countries into economic, and therefore political and military, relationships. Fourth, these countries became significantly important to various sectors of the American economy.

Limits of the American Empire

The problem of the American Empire is the overhang of the Cold War. During this time, the United States expected to go to war with a coalition around it, but also to carry the main burden of war. When Operation Desert Storm erupted in 1991, the basic Cold War principle prevailed. There was a coalition with the United States at the center of it. After 9/11, the decision was made to fight in Afghanistan and Iraq with the core model in place. There was a coalition, but the central military force was American, and it was assumed that the economic benefits of relations with the United States would be self-evident. In many ways, the post-9/11 wars took their basic framework from World War II. Iraq War planners explicitly discussed the occupation of Germany and Japan.

No empire can endure by direct rule. The Nazis were perhaps the best example of this. They tried to govern Poland directly, captured Soviet territory, pushed aside Vichy to govern not half but all of France, and so on. The British, on the other hand, ruled India with a thin layer of officials and officers and a larger cadre of businessmen trying to make their fortunes. The British obviously did better. The Germans exhausted themselves not only by overreaching, but also by diverting troops and administrators to directly oversee some countries. The British could turn their empire into something extraordinarily important to the global system. The Germans broke themselves not only on their enemies, but on their conquests as well.

The United States emerged after 1992 as the only global balanced power. That is, it was the only nation that could deploy economic, political and military power on a global basis. The United States was and remains enormously powerful. However, this is very different from omnipotence. In hearing politicians debate Russia, Iran or Yemen, you get the sense that they feel that U.S. power has no limits. There are always limits, and empires survive by knowing and respecting them.

The primary limit of the American empire is the same as that of the British and Roman empires: demographic. In Eurasia — Asia and Europe together — the Americans are outnumbered from the moment they set foot on the ground. The U.S. military is built around force multipliers, weapons that can destroy the enemy before the enemy destroys the relatively small force deployed. Sometimes this strategy works. Over the long run, it cannot. The enemy can absorb attrition much better than the small American force can. This lesson was learned in Vietnam and reinforced in Iraq and Afghanistan. Iraq is a country of 25 million people. The Americans sent about 130,000 troops. Inevitably, the attrition rate overwhelmed the Americans. The myth that Americans have no stomach for war forgets that the United States fought in Vietnam for seven years and in Iraq for about the same length of time. The public can be quite patient. The mathematics of war is the issue. At a certain point, the rate of attrition is simply not worth the political ends.

The deployment of a main force into Eurasia is unsupportable except in specialized cases when overwhelming force can be bought to bear in a place where it is important to win. These occasions are typically few and far between. Otherwise, the only strategy is indirect warfare: shifting the burden of war to those who want to bear it or cannot avoid doing so. For the first years of World War II, indirect warfare was used to support the United Kingdom and the Soviet Union against Germany.

There are two varieties of indirect warfare. The first is supporting native forces whose interests are parallel. This was done in the early stages of Afghanistan. The second is maintaining the balance of power among nations. We are seeing this form in the Middle East as the United States moves between the four major regional powers — Iran, Saudi Arabia, Israel and Turkey — supporting one then another in a perpetual balancing act. In Iraq, U.S. fighters carry out air strikes in parallel with Iranian ground forces. In Yemen, the United States supports Saudi air strikes against the Houthis, who have received Iranian training.

This is the essence of empire. The British saying is that it has no permanent friends or permanent enemies, only permanent interests. That old cliche is, like most cliches, true. The United States is in the process of learning that lesson. In many ways the United States was more charming when it had clearly identified friends and enemies. But that is a luxury that empires cannot afford.

Building a System of Balance

We are now seeing the United States rebalance its strategy by learning to balance. A global power cannot afford to be directly involved in the number of conflicts that it will encounter around the world. It would be exhausted rapidly. Using various tools, it must create regional and global balances without usurping internal sovereignty. The trick is to create situations where other countries want to do what is in the U.S. interest.

This endeavor is difficult. The first step is to use economic incentives to shape other countries’ behavior. It isn’t the U.S. Department of Commerce but businesses that do this. The second is to provide economic aid to wavering countries. The third is to provide military aid. The fourth is to send advisers. The fifth is to send overwhelming force. The leap from the fourth level to the fifth is the hardest to master. Overwhelming force should almost never be used. But when advisers and aid do not solve a problem that must urgently be solved, then the only type of force that can be used is overwhelming force. Roman legions were used sparingly, but when they were used, they brought overwhelming power to bear.

The Responsibilities of Empire

I have been deliberately speaking of the United States as an empire, knowing that this term is jarring. Those who call the United States an empire usually mean that it is in some sense evil. Others will call it anything else if they can. But it is helpful to face the reality the United States is in. It is always useful to be honest, particularly with yourself. But more important, if the United States thinks of itself as an empire, then it will begin to learn the lessons of imperial power. Nothing is more harmful than an empire using its power carelessly.

It is true that the United States did not genuinely intend to be an empire. It is also true that its intentions do not matter one way or another. Circumstance, history and geopolitics have created an entity that, if it isn’t an empire, certainly looks like one. Empires can be far from oppressive. The Persians were quite liberal in their outlook. The American ideology and the American reality are not inherently incompatible. But two things must be faced: First, the United States cannot give away the power it has. There is no practical way to do that. Second, given the vastness of that power, it will be involved in conflicts whether it wants to or not. Empires are frequently feared, sometimes respected, but never loved by the rest of the world. And pretending that you aren’t an empire does not fool anyone.

The current balancing act in the Middle East represents a fundamental rebalancing of American strategy. It is still clumsy and poorly thought out, but it is happening. And for the rest of the world, the idea that the Americans are coming will become more and more rare. The United States will not intervene. It will manage the situation, sometimes to the benefit of one country and sometimes to another.

https://www.stratfor.com/weekly/coming-terms-american-empire

 

History of North Korea

From Wikipedia, the free encyclopedia
For history of Korea before its division, see History of Korea.
Part of a series on the
History of North Korea
Emblem of Emblem of North Korea
Soviet Civil Administration 1945–46
Provisional People’s Committee for North Korea 1946–48
Kim Il-sung’s rule 1948–94
Korean War 1950–53
Korean DMZ Conflict 1966–69
Juche 1972
Death and state funeral of Kim Il-sung 1994
Kim Jong-il’s rule 1994–2011
North Korean famine 1994–98
Songun 1998
Sunshine Policy 1998–2010
Six-party talks 2003
ROKS Cheonan sinking 2010
Death and state funeral of Kim Jong-il 2011
Kim Jong-un’s rule 2011–present
State Affairs Commission 2016
Flag of North Korea.svgNorth Korea portal

The history of North Korea began with the partition of Korea at the end of World War II in 1945, and the creation of the Communist-aligned Democratic People’s Republic of Korea (DPRK) headed by the former guerrilla leader, Kim Il-sung. In 1950 the Korean War broke out. After much destruction, the war ended with the status quo being restored. The DPRK had failed to unify Korea under its leadership, and the US-led United Nations force had failed to conquer North Korea. The peninsula was divided by the Korean Demilitarized Zone, and a US military force remained in South Korea.

Tension between the two sides continued. Kim Il-sung remained in power until his death in 1994. He developed a pervasive personality cult and steered the country on an independent course in accordance with the principle of Juche (or self-reliance). However, with natural disasters and the collapse of the Soviet Bloc in 1991, North Korea went into a severe economic crisis. Kim Il-sung’s son, Kim Jong-il, succeeded him, and was in turn succeeded by his son, Kim Jong-un. Amid international alarm, North Korea developed nuclear missiles.

Northern Korea before the division

From 1910 to the end of World War II, Korea was under Japanese rule. Most Koreans were peasants engaged in subsistence farming.[1] In the 1930s, Japan developed mines, hydro-electric dams, steel mills, and manufacturing plants in northern Korea and neighboring Manchuria.[2] The Korean industrial working class expanded rapidly, and many Koreans went to work in Manchuria.[3] As a result, 65% of Korea’s heavy industry was located in the north, but, due to the harshness of the terrain, only 37% of its agriculture.[4]

A Korean guerrilla movement emerged in the mountainous interior and in Manchuria, harassing the Japanese imperial authorities. One of the most prominent guerrilla leaders was the Communist Kim Il-sung.[5]

Northern Korea had very little exposure to modern, Western ideas.[6] One partial exception of this was the penetration of religion. Since the arrival of missionaries in the late nineteenth century, the northwest of Korea, and Pyongyang in particular, had been a stronghold of Christianity.[7]

Division of Korea

Main article: Division of Korea

At the Tehran Conference in November 1943 and the Yalta Conference in February 1945, the Soviet Union promised to join its allies in the Pacific War within three months of victory in Europe. On August 8, 1945, after three months to the day, the Soviet Union declared war on Japan.[8] Soviet troops advanced rapidly, and the US government became anxious that they would occupy the whole of Korea. On August 10, the US government decided to propose the 38th parallel as the dividing line between a Soviet occupation zone in the north and a US occupation zone in the south. The parallel was chosen as it would place the capital Seoul under American control.[9] The division placed sixteen million Koreans in the American zone and nine million in the Soviet zone.[10] To the surprise of the Americans, the Soviet Union immediately accepted the division. The agreement was incorporated into General Order No. 1 (approved on 17 August 1945) for the surrender of Japan.[11]

Soviet forces began amphibious landings in Korea by August 14 and rapidly took over the north-east of the country, and on August 16 they landed at Wonsan.[12] On August 24, the Red Army reached Pyongyang.[13] US forces did not arrive in the south until September 8.[10]

During August, People’s Committees sprang up across Korea, affiliated with the Committee for the Preparation of Korean Independence, which in September founded the People’s Republic of Korea. When Soviet troops entered Pyongyang, they found a local People’s Committee established there, led by veteran Christian nationalist Cho Man-sik.[14] Unlike their American counterparts, the Soviet authorities recognized and worked with the People’s Committees.[15][16] By some accounts, Cho Man-sik was the Soviet government’s first choice to lead North Korea.[17][18]

On September 19, Kim Il-sung and 36 other Korean Red Army officers arrived in Wonsan. They had fought the Japanese in Manchuria in the 1930s but had lived in the USSR and trained in the Red Army since 1941.[19] On October 14, Soviet authorities introduced Kim to the North Korean public as a guerrilla hero.[19]

In December 1945, at the Moscow Conference, the Soviet Union agreed to a US proposal for a trusteeship over Korea for up to five years in the lead-up to independence. Most Koreans demanded independence immediately, but Kim and the other Communists supported the trusteeship under pressure from the Soviet government. Cho Man-sik opposed the proposal at a public meeting on January 4, 1946, and disappeared into house arrest.[20][21] On February 8, 1946, the People’s Committees were reorganized as Interim People’s Committees dominated by Communists.[22] The new regime instituted popular policies of land redistribution, industry nationalization, labor law reform, and equality for women.[23]

Meanwhile, existing Communist groups were reconstituted as a party under Kim Il-sung’s leadership. On December 18, 1945, local Communist Party committees were combined into the North Korean Communist Party.[19] In August 1946, this party merged with the New People’s Party to form the Workers’ Party of North Korea. In December, a popular front led by the Workers Party dominated elections in the North.[22] In 1949, the Workers’ Party of North Korea merged with its southern counterpart to become the Workers’ Party of Korea with Kim as party chairman.[24]

Kim established the Korean People’s Army (KPA) aligned with the Communists, formed from a cadre of guerrillas and former soldiers who had gained combat experience in battles against the Japanese and later Nationalist Chinese troops. From their ranks, using Soviet advisers and equipment, Kim constructed a large army skilled in infiltration tactics and guerrilla warfare. Before the outbreak of the Korean War, Joseph Stalin equipped the KPA with modern medium tanks, trucks, artillery, and small arms. Kim also formed an air force, equipped at first with ex-Soviet propeller-driven fighter and attack aircraft. Later, North Korean pilot candidates were sent to the Soviet Union and China to train in MiG-15 jet aircraft at secret bases.[25]

In 1946, a sweeping series of laws transformed North Korea on Stalinist lines. The “land to the tiller” reform redistributed the bulk of agricultural land to the poor and landless peasant population, effectively breaking the power of the landed class.[26] This was followed by a “Labor Law”, a “Sexual Equality Law”, and a “Nationalisation of Industry, Transport, Communications and Banks Law”.[27]

Kim Il-sung with Kim Koo in 1948

As negotiations with the Soviet Union on the future of Korea failed to make progress, the US took the issue to the United Nations in September 1947. In response, the UN established the United Nations Temporary Commission on Korea to hold elections in Korea. The Soviet Union opposed this move. In the absence of Soviet co-operation, it was decided to hold UN-supervised elections in the south only.[28] In April 1948, a conference of organizations from the North and the South met in Pyongyang, but conference produced no results. The southern politicians Kim Koo and Kim Kyu-sik attended the conference and boycotted the elections in the South.[29] Both men were posthumously awarded the National Reunification Prize by North Korea.[30] The elections were held in South Korea on May 10, 1948. On August 15, the Republic of Korea formally came into existence.[31] A parallel process occurred in North Korea. A new Supreme People’s Assembly was elected in August 1948, and on September 3 a new constitution was promulgated. The Democratic People’s Republic of Korea (DPRK) was proclaimed on September 9, with Kim as premier.[32] On October 12, the Soviet Union declared that Kim’s regime was the only lawful government on the peninsula.[citation needed] On December 12, 1948, the United Nations General Assembly accepted the report of UNTCOK and declared the Republic of Korea to be the “only lawful government in Korea”.[31]

By 1949, North Korea was a full-fledged Communist state. All parties and mass organizations joined the Democratic Front for the Reunification of the Fatherland, ostensibly a popular front but in reality dominated by the Communists. The government moved rapidly to establish a political system that was partly styled on the Soviet system, with political power monopolised by the Worker’s Party of Korea (WPK).

The Korean War (1950-1953)

Main article: Korean War

The consolidation of Syngman Rhee‘s government in the South with American military support and the suppression of the October 1948 insurrection ended North Korean hopes that a revolution in the South could reunify Korea, and from early 1949 Kim Il-sung sought Soviet and Chinese support for a military campaign to reunify the country by force. The withdrawal of most U.S. forces from South Korea in June 1949 left the southern government defended only by a weak and inexperienced South Korean army. The southern régime also had to deal with a citizenry of uncertain loyalty. The North Korean army, by contrast, had benefited from the Soviet Union‘s WWII-era equipment, and had a core of hardened veterans who had fought either as anti-Japanese guerrillas or alongside the Chinese Communists.[33] In 1949 and 1950 Kim traveled to Moscow with the South Korean Communist leader Pak Hon-yong to raise support for a war of reunification.[34]

InitiallyJoseph Stalin rejected Kim Il-sung’s requests for permission to invade the South, but in late 1949 the Communist victory in China and the development of Soviet nuclear weapons made him re-consider Kim’s proposal. In January 1950, after China’s Mao Zedong indicated that the People’s Republic of China would send troops and other support to Kim, Stalin approved an invasion.[35] The Soviets provided limited support in the form of advisers who helped the North Koreans as they planned the operation, and Soviet military instructors to train some of the Korean units. However, from the very beginning Stalin made it clear that the Soviet Union would avoid a direct confrontation with the U.S. over Korea and would not commit ground forces even in case of major military crisis.[36] The stage was set for a civil war between the two rival régimes on the Korean peninsula.

For over a year before the outbreak of war, the two sides had engaged in a series of bloody clashes along the 38th parallel, especially in the Ongjin area on the west coast.[37] On June 25, 1950, claiming to be responding to a South Korean assault on Ongjin, the Northern forces launched an amphibious offensive all along the parallel.[38] Due to a combination of surprise and military superiority, the Northern forces quickly captured the capital Seoul, forcing Syngman Rhee and his government to flee. By mid-July North Korean troops had overwhelmed the South Korean and allied American units and forced them back to a defensive line in south-east South Korea known as the Pusan Perimeter. During its brief occupation of southern Korea, the DPRK regime initiated radical social change, which included the nationalisation of industry, land reform, and the restoration of the People’s Committees.[39]According to the captured US General William F. Dean, “the civilian attitude seemed to vary between enthusiasm and passive acceptance”.[40][41]

The United Nations condemned North Korea’s actions and approved an American-led intervention force to defend South Korea. In September, UN forces landed at Inchon and retook Seoul. Under the leadership of US General Douglas Macarthur, UN forces pushed north, reaching the Chinese border. According to Bruce Cumings, the North Korean forces were not routed, but managed a strategic retreat into the mountainous interior and into neighboring Manchuria.[42] Kim Il-sung’s government re-established itself in a stronghold in Chagang Province.[43] In late November, Chinese forces entered the war and pushed the UN forces back, retaking Pyongyang in December 1950 and Seoul in January 1951. According to Bruce Cumings, the Korean People’s Army played an equal part in this counterattack.[44] UN forces managed to retake Seoul for South Korea. The war essentially became a bloody stalemate for the next two years.

2012 rehearsal in Pyongyang for Victory Day, marking the end of the war

American bombing included the use of napalm against populated areas and the destruction of dams and dykes, which caused devastating floods.[45][46] China and North Korea also alleged the US was deploying biological weapons.[47] As a result of the bombing, almost every substantial building and much of the infrastructure in North Korea was destroyed.[48][49] The North Koreans responded by building homes, schools, hospitals, and factories underground.[50] Economic output in 1953 had fallen by 75-90% compared with 1949.[51]

While the bombing continued, armistice negotiations, that had commenced in July 1951, wore on. North Korea’s lead negotiator was General Nam Il. The Korean Armistice Agreement was signed on July 27, 1953. A ceasefire followed, but there was no peace treaty, and hostilities continued at a lower intensity.[52]

Postwar developments

Internal politics

Despite the failure of his attempt at unifying the nation under his rule, Kim Il-sung considered the war a victory in the sense that he remained in power. As a result, the North Korean media made the most of it by focusing entirely on the defeats suffered by the US and UN forces during the failed invasion of North Korea in late 1950. The armistice was celebrated in Pyongyang with a military parade in which Kim declared: “Despite their best efforts, the imperialist invaders were defeated with great loss in men and material.”[citation needed]

Kim began gradually consolidating his power. Up to this time, North Korean politics were represented by four factions: the Yan’an faction, made up of returnees from China; the “Soviet Koreans” who were ethnic Koreans from the USSR; native Korean communists led by Pak Hon-yong; and Kim’s Kapsan group who had fought guerrilla actions against Japan in the 1930s.[53][54]

When the Worker’s Party Central Committee plenum opened on 30 August 1953 Choe Chang-ik made a speech attacking Kim for concentrating the power of the party and the state in his own hands as well as criticising the party line on industrialisation which ignored widespread starvation among the North Korean people. However, Kim neutralised the attack on him by promising to moderate the regime, promises which were never kept. The majority in the Central Committee voted to support Kim and also voted in favour of expelling Choe and Pak Hon-yong from the Central Committee. Eleven of Kim’s opponents were convicted in a show trial. It is believed that all were executed. A major purge of the KWP followed, with members originating from South Korea being expelled.[55]

Pak Hon-yong, party vice chairman and Foreign Minister of the DPRK, was blamed for the failure of the southern population to support North Korea during the war, was dismissed from his positions in 1953, and was executed after a show-trial in 1955.[56][57] Most of the South Korean leftists and communist sympathizers who defected to the North in 1945–1953 were also accused of espionage and other crimes, and subsequently killed, imprisoned, or exiled to remote agricultural and mining villages. Potential rivals from other groups such as Kim Tu-bong were also purged.[citation needed]

The Party Congress in 1956 indicated the transformation that the party had undergone. Most members of other factions had lost their positions of influence. More than half the delegates had joined after 1950, most were under 40 years old, and most had limited formal education.[58]

In February 1956, Soviet leader Nikita Khrushchev made a sweeping denunciation of Stalin, which sent shock waves throughout the Communist world. Encouraged by this, members of the party leadership in North Korea began to criticize Kim’s dictatorial leadership, personality cult, and Stalinist economic policies. They were defeated by Kim at the August Plenum of the party.[59][60] By 1960, 70 per cent of the members of the 1956 Central Committee were no longer in politics.[61]

Kim Il-sung had initially been criticized by the Soviets during a previous 1955 visit to Moscow for practicing Stalinism and a cult of personality, which was already growing enormous. The Korean ambassador to the USSR, Li Sangjo, a member of the Yan’an faction, reported that it had become a criminal offense to so much as write on Kim’s picture in a newspaper and that he had been elevated to the status of Marx, Lenin, Mao, and Stalin in the communist pantheon. He also charged Kim with rewriting history to appear as if his guerrilla faction had single-handedly liberated Korea from the Japanese, completely ignoring the assistance of the Chinese Communist Party. In addition, Li stated that in the process of agricultural collectivization, grain was being forcibly confiscated from the peasants, leading to “at least 300 suicides” and that Kim made nearly all major policy decisions and appointments himself. Li reported that over 30,000 people were in prison for completely unjust and arbitrary reasons as trivial as not printing Kim Il-sung’s portrait on sufficient quality paper or using newspapers with his picture to wrap parcels. Grain confiscation and tax collection were also conducted forcibly with violence, beatings, and imprisonment.[62] During Kim Il-sung’s Moscow visit, the Soviets recommended that he discard the personality cult, adhere to the ideas of collective leadership, remove falsified history accounts from textbooks, and work towards improving the living standards of the Korean people, which remained poor and below prewar standards. Foodstuffs during the initial postwar period were rationed and extremely expensive, as were consumer items. By comparison, South Korea, which had less of an industrial base than the DPRK, had a better food supply and was also flooded with American goods although it should be noted that the overall destruction there during the war was smaller.[citation needed]

In late 1968, known military opponents of North Korea’s Juche ideology such as Kim Chang-bong (minister of National Security), Huh Bong-hak (chief of the Division for Southern Intelligence) and Lee Young-ho(commander in chief of the DPRK Navy) were purged as anti-party/counter-revolutionary elements, despite their credentials as anti-Japanese guerrilla fighters in the past.[55]

Kim’s personality cult was modeled on Stalinism and his regime originally acknowledged Stalin as the supreme leader. After Stalin’s death in 1953, however, Kim was described as the “Great Leader” or “Suryong”. As his personality cult grew, the doctrine of Juche (or self-reliance) began to displace Marxism–Leninism. At the same time the cult extended beyond Kim himself to include his family in a revolutionary blood line.[63] In 1972, to celebrate Kim Il-sung’s birthday, the Mansu Hill Grand Monument was unveiled, including a 22-meter bronze statue of him.[64]

International relations

Like Mao in China, Kim Il-sung refused to accept Nikita Khrushchev‘s denunciation of Stalin and continued to model his regime on Stalinist norms.[65][66] At the same time, he increasingly stressed Korean independence, as embodied in the concept of Juche.[67] Kim told Alexei Kosygin in 1965 that he was not anyone’s puppet and “We…implement the purest Marxism and condemn as false both the Chinese admixtures and the errors of the CPSU”.[68]

Relations with China had worsened during the war. Mao Zedong criticized Kim for having started the whole “idiotic war” and for being an incompetent military commander who should have been removed from power. PLA commander Peng Dehuai was equally contemptuous of Kim’s skills at waging war.[69]

By some analysis, Kim Il-sung remained in power partially because the Soviets turned their attention to the Hungarian Revolution of 1956 that fall.[70] The Soviets and Chinese were unable to stop the inevitable purge of Kim’s domestic opponents or his move towards a one-man Stalinist autocracy and relations with both countries deteriorated in the former’s case because of the elimination of the pro-Soviet Koreans and the latter because of the regime’s refusal to acknowledge Chinese assistance in either liberation from the Japanese or the war in 1950-53.[71]

Stalin continued to be honored in North Korea long after his death in 1953, and a street in Pyongyang bore his name until 1980. By contrast, neighboring Chinese leader Mao Zedong was mostly ignored and Kim Il-sung rejected most of his policies such as the Hundred Flowers Campaign and (later) the Cultural Revolution.[citation needed]

The captured USS Pueblo being visited by tourists in Pyongyang

Tensions between North and South escalated in the late 1960s with a series of low-level armed clashes known as the Korean DMZ Conflict. In 1966, Kim declared “liberation of the south” to be a “national duty”.[72] In 1968, North Korean commandos launched the Blue House Raid, an unsuccessful attempt to assassinate the South Korean President Park Chung-hee. Shortly after, the US spy ship Pueblo was captured by the North Korean navy.[73] The crew were held captive throughout the year despite American protests that the vessel was in international waters and finally released in December after a formal US apology was issued.[74] In April 1969 North Korea shot down an EC-121 aircraft, killing everyone on board. The Nixon administration found itself unable to react at all, since the US was heavily committed in Vietnam and had no troops to spare if the situation in Korea escalated. However, the Pueblo capture and EC-121 shootdown did not find approval in Moscow, as the Soviet Union did not want a second major war to erupt in Asia. China’s response to the USS Pueblo crisis is less clear.[75]

After Khrushchev was replaced by Leonid Brezhnev as Soviet Leader in 1964, and with the incentive of Soviet aid, North Korea strengthened its ties with the USSR. Kim condemned China’s Cultural Revolution as “unbelievable idiocy”. In turn, China’s Red Guards labelled him a “fat revisionist”.[76][77] But by 1970, most of the storm clouds of the Cultural Revolution had blown away and relations with China quickly returned to normal. Chinese premier Zhou Enlai visited Pyongyang that year and apologized for the attacks made on Kim by the Red Guards. At the same time, the Soviets were again criticized by both Chinese and North Korean officials for being too soft on the United States. The Cultural Revolution was now viewed in North Korea as an excellent idea and “completely correct”.

In 1972, the first formal summit meeting between Pyongyang and Seoul was held, but the cautious talks did not lead to a lasting change in the relationship.[78]

With the fall of South Vietnam to the North Vietnamese on April 30, 1975, Kim Il-sung began to feel that the US had shown its weakness and that reunification of Korea under his regime was finally possible. Kim visited Beijing in May 1975 in the hope of gaining political and military support for this plan to invade South Korea again, but Mao Zedong refused.[79] Despite public proclamations of support, Mao privately told Kim that China would be unable to assist North Korea this time because of the lingering after-effects of the Cultural Revolution throughout China, and also because Mao had recently decided to restore diplomatic relations with the US. Afterwards, Kim went home empty-handed.[80]

Meanwhile, North Korea emphasized its independent orientation by joining the Non-Aligned Movement in 1975.[81] It promoted Juche as a model for developing countries to follow.[82] It developed strong ties with the regimes of Bokassa in the Central African Republic, Macias Nguema in Equatorial Guinea, Idi Amin in Uganda, Pol Pot in Cambodia, Gaddafi in Libya, and Ceausescu in Romania.[83]

Economic development

Reconstruction of the country after the war proceeded with extensive Chinese and Soviet assistance.[84][85] Koreans with experience in Japanese industries also played a significant part.[86]Land was collectivized between 1953 and 1958. Resistance appears to have been minimal as landlords had been eliminated by the earlier reforms or during the war.[87]

Although developmental debates took place within the Workers’ Party of Korea in the 1950s, North Korea, like all the postwar communist states, undertook massive state investment in heavy industry, state infrastructure and military strength, neglecting the production of consumer goods.[71]

The first Three Year Plan (1954–1956) introduced the concept of Juche or self-reliance.[88] The first Five Year Plan (1957-1961) consolidated the collectivization of agriculture and initiated mass mobilizations campaigns: the Chollima Movement, the Chongsan-ni system in agriculture and the Taean Work System in industry.[88][89] The Chollima Movement was influenced by China’s Great Leap Forward, but did not have its disastrous results.[88]Industry was fully nationalized by 1959.[90] Taxation on agricultural income was abolished in 1966.[91]

North Korea was placed on a semi-war footing, with equal emphasis being given to the civilian and military economies. This was expressed in the 1962 Party Plenum by the slogan, “Arms in one hand and a hammer and sickle in the other!”[92] At a special party conference in 1966, members of the leadership who opposed the military build-up were removed.[93]

On the ruins left by the war, North Korea had built an industrialized command economy. Che Guevara, then a Cuban government minister, visited North Korea in 1960, and proclaimed it a model for Cuba to follow. In 1965, the British economist Joan Robinson described North Korea’s economic development as a “miracle”.[94][95] As late as the 1970s, its GDP per capita was estimated to be equivalent to South Korea’s.[96][97][98][99] By 1968, all homes had electricity, though the supply was unreliable.[100] By 1972, all children from age 5 to 16 were enrolled in school, and over 200 universities and specialized colleges had been established.[101][102] By the early 1980s, 60–70% of the population was urbanized.[103]

Decline and crisis

North Korean village in the Yalu River delta

In the 1970s, expansion of North Korea’s economy, with the accompanying rise in living standards, came to an end.[104] Compounding this was a decision to borrow foreign capital and invest heavily in military industries. North Korea’s desire to lessen its dependence on aid from China and the Soviet Union prompted the expansion of its military power, which had begun in the second half of the 1960s. The government believed such expenditures could be covered by foreign borrowing and increased sales of its mineral wealth in the international market. North Korea invested heavily in its mining industries and purchased a large quantity of mineral extraction infrastructure from abroad. It also purchased entire petrochemical, textile, concrete, steel, pulp and paper manufacturing plants from the developed capitalist world.[105] This included a Japanese-Danish venture that provided North Korea with the largest cement factory in the world.[106] However, following the world 1973 oil crisis, international prices for many of North Korea’s native minerals fell, leaving the country with large debts and an inability to pay them off and still provide a high level of social welfare to its people. North Korea began to default in 1974 and halted almost all repayments in 1985. As a result, it was unable to pay for Western technology.[107]

Worsening this already poor situation, the centrally planned economy, which emphasized heavy industry had reached the limits of its productive potential in North Korea. Juche’s repeated demands that North Koreans learn to build and innovate domestically had run its course as had the ability of North Koreans to keep technological pace with other industrialized nations. By the mid to late-1970s some parts of the capitalist world, including South Korea, were creating new industries based around computers, electronics, and other advanced technology in contrast to North Korea’s Stalinist economy of mining and steel production.[108] Migration to urban areas stalled.[109]

Despite the emerging economic problems, the regime invested heavily on prestigious projects, such as the Juche Tower, the Nampo Dam, and the Ryugyong Hotel. In 1989, as a response to the 1988 Seoul Olympics it held the 13th World Festival of Youth and Students in Pyongyang.[110][111] In fact, the grandiosity associated with the regime and its personality cult, as expressed in monuments, museums, and events, has been identified as a factor in the economic decline.[112]

In 1984 Kim visited Moscow during a grand tour of the USSR where he met Soviet leader Konstantin Chernenko. Kim also made public visits to East Germany, Czechoslovakia, Poland, Hungary, Romania, Bulgaria and Yugoslavia. Soviet involvement in the North Korean economy increased, until 1988 when bilateral trade peaked at US$2.8 billion.[113] In 1986, Kim met the incoming Soviet leader Mikhail Gorbachev and received a pledge of support.[114]

However, Gorbachev’s reforms and diplomatic initiatives, the Chinese economic reforms starting in 1979, and the collapse of the Eastern Bloc from 1989 to 1991 increased North Korea’s isolation.[115] The leadership in Pyongyang responded by proclaiming that the collapse of the Eastern Bloc demonstrated the correctness of the policy of Juche.[116]

The collapse of the Soviet Union in 1991 deprived North Korea of its main source of economic aid, leaving China as the isolated regime’s only major ally. Without Soviet aid, North Korea’s economy went into a free-fall. By this time in the early 1990s, Kim Jong-il was already conducting most of the day-to-day activities of running of the state. Meanwhile, international tensions were rising over North Korean’s quest for nuclear weapons. Former US president Jimmy Carter made a visit to Pyongyang in June 1994 in which he met with Kim and returned proclaiming that he had resolved the crisis.[117]

Succession by Kim Jong-il

Portraits of Kim Il-sung and his son and successor Kim Jong-il

Kim Il-sung died from a sudden heart attack on July 8, 1994, three weeks after the Carter visit. His son, Kim Jong-il, who had already assumed key positions in the government, succeeded as General-Secretary of the Korean Workers’ Party. At that time, North Korea had no secretary-general in the party nor a president. Minimal legal procedure that had been established was summarily ignored. Although a new constitution appeared to end the war-time political system, it did not completely terminate the transitional military rule. Rather it legitimized and institutionalized military rule by making the National Defense Commission (NDC) the most important state organization and its chairman the highest authority. After three years of consolidating his power, Kim Jong-il became Chairman of the NDC on October 8, 1997, a position described by the NDC as the nation’s “highest administrative authority,” and thus North Korea’s de facto head of state. His succession had been foreshadowed in 1980, when he was introduced to the public at the Sixth Party Congress.[118] In 1982, Kim Jong-il had established himself as a leading theoretician with the publication of On the Juche Idea.[119] In 1984, he had been officially confirmed as his father’s successor.[120]

Meanwhile, the economy was in steep decline. In 1990-1995, foreign trade was cut in half, with the loss of subsidized Soviet oil being particularly keenly felt. The crisis came to a head in 1995 with widespread flooding that destroyed crops and infrastructure, leading to a famine that lasted till 1998.[121] At the same time, there appeared to be little significant internal opposition to the regime. Indeed, a great many of the North Koreans fleeing to China because of famine still showed significant support for the government as well as pride in their homeland. Many of these people reportedly returned to North Korea after earning sufficient money.[122]

In 1998 the government announced a new policy called “Songun“, or “Military First”. This suggested that the Korean People’s Army was now more powerful than the Korean Workers’ Party.[123]

President Kim Dae-jung of South Korea actively attempted to reduce tensions between the two Koreas under the Sunshine Policy, but this produced few immediate results. Since the election of George W. Bush as the President of the United States in 2000, North Korea has faced renewed external pressure over its nuclear program, reducing the prospect of international economic assistance.

In 2002, Kim Jong-il declared that “money should be capable of measuring the worth of all commodities”, followed by some small market-oriented measures, and the creation of the Kaesong Industrial Region with transport links to South Korea was announced.[citation needed] Experiments are under way to allow factory managers to fire underperforming workers and give bonuses. China’s investments increased to $200 million in 2004.[citation needed]

On October 9, 2006, North Korea has announced that it had successfully detonated a nuclear device underground at 10:36 am local time without any radiation leak. An official at South Korea’s seismic monitoring center confirmed a magnitude-3.6 tremor felt at the time North Korea said it conducted the test was not a natural occurrence.[124]

Additionally, North Korea was running a missile development program. In 1998, North Korea tested a Taepondong-1 Space Launch Vehicle, which successfully launched but failed to reach orbit. On July 5, 2006, they tested a Taepodong-2 ICBM that reportedly could reach the west coast of the U.S. in the 2-stage version, or the entire U.S. with a third stage. However, the missile failed shortly after launch, so it is unknown what its exact capabilities are or how close North Korea is to perfecting the technology.

North Korea’s advancements in weapons technology appear to give them leverage in ongoing negotiations with the United Nations and other countries. On February 13, 2007, North Korea signed an agreement with South Korea, the United States, Russia, China, and Japan, which stipulated North Korea would shut down itsYongbyon nuclear reactor in exchange for economic and energy assistance. However, in 2009 the North continued its nuclear test program.

In 2010, the sinking of a South Korean naval ship, the Cheonan, reportedly by a North Korean torpedo, escalated tensions between North and South.

Current situation

A computer lab classroom in the Grand People’s Study House, Pyongyang, 2012

Kim Jong-Il died on December 17, 2011[125] and was quickly succeeded by his son, Kim Jong-un. Tensions between North Korea and other countries increased due to its rocket launches and nuclear bomb testing, and UN sanctions have been tightened.

In 2014, the United Nations Commission of Inquiry accused the government of crimes against humanity.[126]

In 2015, North Korea adopted Pyongyang Standard Time (UTC+08.30), reversing the change to Japan Standard Time (UTC+9.00) which had been imposed by the Japanese Empire. As a result, North Korea was in a different time zone from South Korea.[127]

The 7th Congress of the Workers’ Party of Korea was held in 2016, where Kim Jong-Un further consolidated his control and power within the Workers’ Party of Korea and country.

See also

https://en.wikipedia.org/wiki/History_of_North_Korea

 Story 2: Attorney General Sessions Enforces Immigration Law — Videos

Sessions Outlines Border Enforcement Plan

Arizona sheriff reacts to the illegal immigration crackdown

Watch: Attorney General Jeff Sessions speaks at U.S.-Mexico Border

The Pronk Pops Show Podcasts Portfolio

Listen To Pronk Pops Podcast or Download Shows 870-871

Listen To Pronk Pops Podcast or Download Shows 864-869

Listen To Pronk Pops Podcast or Download Shows 857-863

Listen To Pronk Pops Podcast or Download Shows 850-856

Listen To Pronk Pops Podcast or Download Shows 845-849

Listen To Pronk Pops Podcast or Download Shows 840-844

Listen To Pronk Pops Podcast or Download Shows 833-839

Listen To Pronk Pops Podcast or Download Shows 827-832

Listen To Pronk Pops Podcast or Download Shows 821-826

Listen To Pronk Pops Podcast or Download Shows 815-820

Listen To Pronk Pops Podcast or Download Shows 806-814

Listen To Pronk Pops Podcast or Download Shows 800-805

Listen To Pronk Pops Podcast or Download Shows 793-799

Listen To Pronk Pops Podcast or Download Shows 785-792

Listen To Pronk Pops Podcast or Download Shows 777-784

Listen To Pronk Pops Podcast or Download Shows 769-776

Listen To Pronk Pops Podcast or Download Shows 759-768

Listen To Pronk Pops Podcast or Download Shows 751-758

Listen To Pronk Pops Podcast or Download Shows 745-750

Listen To Pronk Pops Podcast or Download Shows 738-744

Listen To Pronk Pops Podcast or Download Shows 732-737

Listen To Pronk Pops Podcast or Download Shows 727-731

Listen To Pronk Pops Podcast or Download Shows 720-726

Listen To Pronk Pops Podcast or DownloadShows 713-719

Listen To Pronk Pops Podcast or DownloadShows 705-712

Listen To Pronk Pops Podcast or Download Shows 695-704

Listen To Pronk Pops Podcast or Download Shows 685-694

Listen To Pronk Pops Podcast or Download Shows 675-684

Listen To Pronk Pops Podcast or Download Shows 668-674

Listen To Pronk Pops Podcast or Download Shows 660-667

Listen To Pronk Pops Podcast or Download Shows 651-659

Listen To Pronk Pops Podcast or Download Shows 644-650

Listen To Pronk Pops Podcast or Download Shows 637-643

Listen To Pronk Pops Podcast or Download Shows 629-636

Listen To Pronk Pops Podcast or Download Shows 617-628

Listen To Pronk Pops Podcast or Download Shows 608-616

Listen To Pronk Pops Podcast or Download Shows 599-607

Listen To Pronk Pops Podcast or Download Shows 590-598

Listen To Pronk Pops Podcast or Download Shows 585- 589

Listen To Pronk Pops Podcast or Download Shows 575-584

Listen To Pronk Pops Podcast or Download Shows 565-574

Listen To Pronk Pops Podcast or Download Shows 556-564

Listen To Pronk Pops Podcast or Download Shows 546-555

Listen To Pronk Pops Podcast or Download Shows 538-545

Listen To Pronk Pops Podcast or Download Shows 532-537

Listen To Pronk Pops Podcast or Download Shows 526-531

Listen To Pronk Pops Podcast or Download Shows 519-525

Listen To Pronk Pops Podcast or Download Shows 510-518

Listen To Pronk Pops Podcast or Download Shows 500-509

Listen To Pronk Pops Podcast or Download Shows 490-499

Listen To Pronk Pops Podcast or Download Shows 480-489

Listen To Pronk Pops Podcast or Download Shows 473-479

Listen To Pronk Pops Podcast or Download Shows 464-472

Listen To Pronk Pops Podcast or Download Shows 455-463

Listen To Pronk Pops Podcast or Download Shows 447-454

Listen To Pronk Pops Podcast or Download Shows 439-446

Listen To Pronk Pops Podcast or Download Shows 431-438

Listen To Pronk Pops Podcast or Download Shows 422-430

Listen To Pronk Pops Podcast or Download Shows 414-421

Listen To Pronk Pops Podcast or Download Shows 408-413

Listen To Pronk Pops Podcast or Download Shows 400-407

Listen To Pronk Pops Podcast or Download Shows 391-399

Listen To Pronk Pops Podcast or Download Shows 383-390

Listen To Pronk Pops Podcast or Download Shows 376-382

Listen To Pronk Pops Podcast or Download Shows 369-375

Listen To Pronk Pops Podcast or Download Shows 360-368

Listen To Pronk Pops Podcast or Download Shows 354-359

Listen To Pronk Pops Podcast or Download Shows 346-353

Listen To Pronk Pops Podcast or Download Shows 338-345

Listen To Pronk Pops Podcast or Download Shows 328-337

Listen To Pronk Pops Podcast or Download Shows 319-327

Listen To Pronk Pops Podcast or Download Shows 307-318

Listen To Pronk Pops Podcast or Download Shows 296-306

Listen To Pronk Pops Podcast or Download Shows 287-295

Listen To Pronk Pops Podcast or Download Shows 277-286

Listen To Pronk Pops Podcast or Download Shows 264-276

Listen To Pronk Pops Podcast or Download Shows 250-263

Listen To Pronk Pops Podcast or Download Shows 236-249

Listen To Pronk Pops Podcast or Download Shows 222-235

Listen To Pronk Pops Podcast or Download Shows 211-221

Listen To Pronk Pops Podcast or Download Shows 202-210

Listen To Pronk Pops Podcast or Download Shows 194-201

Listen To Pronk Pops Podcast or Download Shows 184-193

Listen To Pronk Pops Podcast or Download Shows 174-183

Listen To Pronk Pops Podcast or Download Shows 165-173

Listen To Pronk Pops Podcast or Download Shows 158-164

Listen To Pronk Pops Podcast or Download Shows151-157

Listen To Pronk Pops Podcast or Download Shows 143-150

Listen To Pronk Pops Podcast or Download Shows 135-142

Listen To Pronk Pops Podcast or Download Shows 131-134

Listen To Pronk Pops Podcast or Download Shows 124-130

Listen To Pronk Pops Podcast or Download Shows 121-123

Listen To Pronk Pops Podcast or Download Shows 118-120

Listen To Pronk Pops Podcast or Download Shows 113 -117

Listen To Pronk Pops Podcast or Download Show 112

Listen To Pronk Pops Podcast or Download Shows 108-111

Listen To Pronk Pops Podcast or Download Shows 106-108

Listen To Pronk Pops Podcast or Download Shows 104-105

Listen To Pronk Pops Podcast or Download Shows 101-103

Listen To Pronk Pops Podcast or Download Shows 98-100

Listen To Pronk Pops Podcast or Download Shows 94-97

Listen To Pronk Pops Podcast or Download Show 93

Listen To Pronk Pops Podcast or Download Show 92

Listen To Pronk Pops Podcast or Download Show 91

Listen To Pronk Pops Podcast or Download Shows 88-90

Listen To Pronk Pops Podcast or Download Shows 84-87

Listen To Pronk Pops Podcast or Download Shows 79-83

Listen To Pronk Pops Podcast or Download Shows 74-78

Listen To Pronk Pops Podcast or Download Shows 71-73

Listen To Pronk Pops Podcast or Download Shows 68-70

Listen To Pronk Pops Podcast or Download Shows 65-67

Listen To Pronk Pops Podcast or Download Shows 62-64

Listen To Pronk Pops Podcast or Download Shows 58-61

Listen To Pronk Pops Podcast or Download Shows 55-57

Listen To Pronk Pops Podcast or Download Shows 52-54

Listen To Pronk Pops Podcast or Download Shows 49-51

Listen To Pronk Pops Podcast or Download Shows 45-48

Listen To Pronk Pops Podcast or Download Shows 41-44

Listen To Pronk Pops Podcast or Download Shows 38-40

Listen To Pronk Pops Podcast or Download Shows 34-37

Listen To Pronk Pops Podcast or Download Shows 30-33

Listen To Pronk Pops Podcast or Download Shows 27-29

Listen To Pronk Pops Podcast or Download Shows 17-26

Listen To Pronk Pops Podcast or Download Shows 16-22

Listen To Pronk Pops Podcast or Download Shows 10-15

Listen To Pronk Pops Podcast or Download Shows 1-9

 

Read Full Post | Make a Comment ( None so far )

The Pronk Pops Show 868, April 6, 2017, Story 1: Neoconservatives and Progressive Global Interventionists Elite Banging The War Drums For American Empire Warfare and Welfare State vs. We The People America First Non-interventionists For American Republic Peace and Prosperity Economy — American People Not Readily Accepting Big Lie Media Propaganda on Syria Chemical Gas Air Attack — Another False Flag — Sunni and Shia Have Being Killing Each Other For Hundreds of Years — Stop Being Imperial Umpire For A Religious Sectarian Civil War and Proxy War — National Interest — Oil and Gas — Videos

Posted on April 6, 2017. Filed under: American History, Benghazi, Bernie Sanders, Blogroll, Bombs, Breaking News, Business, College, Communications, Computers, Congress, Corruption, Countries, Cruise Missiles, Defense Spending, Donald J. Trump, Donald J. Trump, Donald Trump, Donald Trump, Egypt, Elections, Empires, European History, European Union, Federal Government, Foreign Policy, Fourth Amendment, Free Trade, Freedom of Speech, Genocide, Government, Government Dependency, Government Spending, Great Britain, Hate Speech, History, House of Representatives, Human, Human Behavior, Iran Nuclear Weapons Deal, Iraq, Islam, Islamic Republic of Iran, Islamic State, Israel, Jordan, Law, Libya, Life, Lying, Marco Rubio, Media, Medicare, Middle East, MIssiles, National Security Agency, Nerve Gas, News, Nuclear Weapons, Obama, Philosophy, Photos, Pistols, Politics, Polls, President Barack Obama, President Trump, Progressives, Qatar, Radio, Rand Paul, Rand Paul, Raymond Thomas Pronk, Regulation, Religion, Rifles, Rule of Law, Russia, Scandals, Second Amendment, Security, Senate, Social Security, Spying, Surveillance and Spying On American People, Surveillance/Spying, Syria, Taxation, Taxes, Technology, Terror, Terrorism, U.S. Negotiations with Islamic Republic of Iran, United Kingdom, United States Constitution, United States of America, Videos, Violence, War, Wealth, Weapons, Weather, Welfare Spending, Wisdom | Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , |

Project_1

The Pronk Pops Show Podcasts

Pronk Pops Show 868: April 6, 2017

Pronk Pops Show 867: April 5, 2017

Pronk Pops Show 866: April 3, 2017

Pronk Pops Show 865: March 31, 2017

Pronk Pops Show 864: March 30, 2017

Pronk Pops Show 863: March 29, 2017

Pronk Pops Show 862: March 28, 2017

Pronk Pops Show 861: March 27, 2017

Pronk Pops Show 860: March 24, 2017

Pronk Pops Show 859: March 23, 2017

Pronk Pops Show 858: March 22, 2017

Pronk Pops Show 857: March 21, 2017

Pronk Pops Show 856: March 20, 2017

Pronk Pops Show 855: March 10, 2017

Pronk Pops Show 854: March 9, 2017

Pronk Pops Show 853: March 8, 2017

Pronk Pops Show 852: March 6, 2017

Pronk Pops Show 851: March 3, 2017

Pronk Pops Show 850: March 2, 2017

Pronk Pops Show 849: March 1, 2017

Pronk Pops Show 848: February 28, 2017

Pronk Pops Show 847: February 27, 2017

Pronk Pops Show 846: February 24, 2017

Pronk Pops Show 845: February 23, 2017

Pronk Pops Show 844: February 22, 2017

Pronk Pops Show 843: February 21, 2017

Pronk Pops Show 842: February 20, 2017

Pronk Pops Show 841: February 17, 2017

Pronk Pops Show 840: February 16, 2017

Pronk Pops Show 839: February 15, 2017

Pronk Pops Show 838: February 14, 2017

Pronk Pops Show 837: February 13, 2017

Pronk Pops Show 836: February 10, 2017

Pronk Pops Show 835: February 9, 2017

Pronk Pops Show 834: February 8, 2017

Pronk Pops Show 833: February 7, 2017

Pronk Pops Show 832: February 6, 2017

Pronk Pops Show 831: February 3, 2017

Pronk Pops Show 830: February 2, 2017

Pronk Pops Show 829: February 1, 2017

Pronk Pops Show 828: January 31, 2017

Pronk Pops Show 827: January 30, 2017

Pronk Pops Show 826: January 27, 2017

Pronk Pops Show 825: January 26, 2017

Pronk Pops Show 824: January 25, 2017

Pronk Pops Show 823: January 24, 2017

Pronk Pops Show 822: January 23, 2017

Pronk Pops Show 821: January 20, 2017

Pronk Pops Show 820: January 19, 2017

Pronk Pops Show 819: January 18, 2017

Pronk Pops Show 818: January 17, 2017

Pronk Pops Show 817: January 13, 2017

Pronk Pops Show 816: January 12, 2017

Pronk Pops Show 815: January 11, 2017

Pronk Pops Show 814: January 10, 2017

Pronk Pops Show 813: January 9, 2017

Updated

Breaking News

Undeclared War!

President Trump Launches 59 Cruise Missile Attack From Two U.S. Destroyers Against Syrian Air Base 

President Trump Neoconned!

Trump Orders ATTACK on Syria – April 6, 2017 – FULL Press Conference

RAW USA launches cruise missile strike on Syria Regime Breaking News April 6 2017 

RAW USA launches cruise missiles strike on Syria RUSSIA IRAN backed ASSAD Regime after chemical Warfare weapons attack Breaking News April 6 2017

Neo-CONNED speech by Ron Paul

U.S. Launches Missiles at Syrian Base After Chemical Weapons Attack

The United States launched dozens of cruise missiles Thursday night at a Syrian airfield in response to what it believes was Syria’s use of banned chemical weapons that killed at least 100 people, U.S. military officials told NBC News.

Two U.S. warships in the Mediterranean Sea fired 59 Tomahawk missiles intended for a single target — Ash Sha’irat in Homs province in western Syria, the officials said. That’s the airfield from which the United States believes the government of Syrian President Bashar al-Assad fired the banned weapons.

There was no immediate word on casualties. U.S. officials told NBC News that people were not targeted and that aircraft and infrastructure at the site were hit, including the runway and gas fuel pumps.y

Trump Speaks on Missile Strike in Syria 2:48

“Assad choked out the lives of helpless men, women and children,” President Donald Trump said in remarks from Mar-a-Lago, his family compound in Palm Beach, Florida.

“It is in this vital national security interest of the United States to prevent and deter the spread and use of deadly chemical weapons,” said Trump, who called on other countries to end the bloodshed in Syria.

Related: Trump: Why I Launched a Missile Attack on Syria

Trump is in Florida for a meeting with Chinese President Xi Jinpeng. Defense Secretary James Mattis, Secretary of State Rex Tillerson and national security adviser H.R. McMaster traveled to Florida with him.

Defense Secretary James Mattis, Secretary of State Rex Tillerson and national security adviser H.R. McMaster traveled to Florida with Trump. In Washington, Vice President Mike Pence returned to the White House after having gone home for dinner Thursday evening.

Syrian television characterized the missile strike “as American aggression” Friday morning. But Ahrar Al Sham, the largest Syrian armed rebel group, told NBC News it “welcomes any U.S. intervention through surgical strikes that would deter the Assad regime capabilities to kill civilians and shorten the suffering of our people.”

Syria Crisis: Trump Given Military Options After Chemical Attack 2:25

Tillerson and Nikki Haley, the U.S. ambassador to the United Nations, have bluntly blamed Syria for the chemical weapons attack, whose victims included at least 25 children.

Tillerson told reporters on Thursday that “there is no doubt in our minds” that the Syrian regime was responsible for the attack. And in a combative speech at the U.N. Security Council on Wednesday, Haley warned: “When the United Nations consistently fails in its duty to act collectively, there are times in the life of states that we are compelled to take our own action.”y

Tillerson on Assad Regime: He Has ‘No Role’ to Govern Syria0:58

NBC News reported Thursday that Defense Secretary James Mattis briefed President Donald Trump on U.S. military options, which included carrying out targeted strikes against those responsible for Tuesday’s attack.

There was no immediate reaction from Russia, which Tillerson and Haley have accused of turning a blind eye to Syria’s transgressions.

“Russia cannot escape responsibility for this,” Haley said at the United Nations. “They chose to close their eyes to the barbarity. They defied the conscience of the world.”

Thursday, Tillerson urged Russia to “consider carefully their continued support of the Assad regime.”

Story 1: Progressive Global Interventionists Elite Banging The War Drums For American Empire Warfare and Welfare State vs. We The People America First Non-interventionists For American Republic Peace and Prosperity Economy — American People Not Readily Accepting Big Lie Media Propaganda on Syria Chemical Gas Air Attack — Another False Flag — Sunni and Shia Have Being Killing Each Other For Hundreds of Years — Stop Being Imperial Umpire For A Religious Sectarian Civil War — National Interest — Oil and Gas — Videos

Image result for false flagImage result for false flagImage result for false flagImage result for map syria united states attack on syria air base april 2017Image result for map syria united states attack on syria air base april 2017Image result for cartoons syria sarin false flagImage result for cartoons syria sarin false flagImage result for cartoons syria sarin false flagImage result for number killed in syrian civil war through 2016Image result for syrian gas attack april 5, 2017 map idlib syriaImage result for syrian gas attack april 2017  Image result for syrian gas attack april 2017Image result for syrian gas attack april 5, 2017 map

Image result for cartoons syria sarin false flagImage result for cartoons syria sarin false flagImage result for syria sarin false flag

Image result for cartoons on syria

Image result for cartoons on syria

Image result for cartoons on syriaImage result for cartoons on syria

Image result for map syria turkey jordan air base attacked by united statesImage result for map syria turkey jordan air base attacked by united states

Image result for map syria turkey jordan air base attacked by united states

Image result for map syria turkey jordan air base attacked by united states

President Trump may be considering military action in Syria

Gen. Keane on the possibility of US military action in Syria

Trump Orders Attack On Syria! Will Russia Respond? Is Trump Wrong?

Syria Gas Attack: Assad’s Doing…Or False Flag?

Streamed live on Apr 5, 2017

Just days after the US Administration changed course on Syrian President Assad, saying he could stay, an alleged chemical weapon attack that killed dozens of civilians has been blamed on the Syrian government. Did Assad sign his own death warrant with such an attack…or does some other entity benefit?

[youytube=https://www.youtube.com/watch?v=LULzvg1gA5U]

Ron Paul: The Word That Best Defines Libertarianism Is Non-Intervention

Sen. John Barrasso Speaking on Trump Considering Military Action in Syria & North Korea

Cotton: President Trump struck the ‘right tone’ on Syria

Corker Comments on Suspected Chemical Weapons Attack in Syria

Rubio, Cardin call for Assad, Putin to be held accountable for Syria chemical weapons attack

Will the U.S. take military action in Syria?

Do powerful people in Washington want to know the truth?

Syrian Chemical False Flag Exposed

Laura Ingraham Show PODCAST April 6, 2017 – Bob Costa: ‘Trump Has Always Used His Family In Business

Unconfirmed Syria Chemical Weapons Attack is Iraq Weapons of Mass Destruction REDUX

What we know about the chemical attack in Syria

Syria Gas Attack: Assad’s Doing…Or False Flag?

Syria’s war: Who is fighting and why?

Was Syrian Chemical Attack A False Flag?

Understanding the Refugee Crisis in Europe, Syria, and around the World

Aftermath of Syrian chemical attack sparks outrage

World leaders condemn the Syrian chemical attack

Syria nerve gas attack: Chemical weapons expert debunks Assad’s defense

War in Syria: Russia and West clash over Idlib gas attack (part 1)

Published on Apr 5, 2017

Subscribe to France 24 now:
http://f24.my/youtubeEN

FRANCE 24 live news stream: all the latest news 24/7
http://f24.my/YTliveEN

On Tuesday in Idlib, a province in the Northwest of Syria, at least seventy people were killed, 20 of them children, in what appears to have been a chemical weapon attack in the rebel-held town of Khan Sheikhoun. Initial reports point to the nerve agent Sarin gas. Our panel of experts asks who was behind this attack. What explanations are being given, and do they stack up?
Click here for PART TWO.

Another suspected chemical weapons attack is latest chapter in brutal Syrian conflict

‘Assad Has Unleashed Horror in Syria’: World Reacts to Alleged Chemical Attack

Syria Gas Attack: Russia says chemical depot held by rebels bombed

Turkish President Erdogan calls chemical attack in Syria “inhuman and unacceptable”

“The Desperate BBC Propaganda Machine Blames Assad For Chemical Attack Before Any Investigation.”

Russia denies involvement in reported Syrian chemical attack

Children caught in Syria ‘chemical attack’- BBC News

Published on Apr 5, 2017

The UN Security Council has held an emergency session to discuss the suspected gas attack on a rebel-held town in Syria. The attack is believed to have killed more than 70 people, including children. The Syrian government has denied responsibility, while its ally Russia says the gas came from rebel weapons on the ground. But those claims have been widely rejected by western governments, as our Chief International Correspondent Lyse Doucet reports.

Syria conflict: ‘Chemical attack’ in Idlib kills 58 – BBC News

Published on Apr 4, 2017

At least 58 people have been killed and dozens wounded in a suspected chemical attack on a rebel-held town in north-western Syria, a monitoring group says. The Syrian Observatory for Human Rights reported that strikes on Khan Sheikhoun by Syrian government or Russian jets had caused many people to choke. Later, aircraft fired rockets at local clinics treating some of the survivors, medics and opposition activists said. The Syrian government has repeatedly denied using chemical weapons.

UN Ambassador Nikki Haley Condemns Russia, Iran After Chemical Attack In Syria | NBC News

UK: Chemical Attack Bears All Hallmarks of Assad

UNSC holds emergency meeting on Syria chemical attack

WATCH LIVE: U.N. Security Council Holds Emergency Meeting On Syria Chemical Attack | TIME

The TRUTH About the Syria Gas Attack

Hillary in Rat Line for Syria False Flag Sarin Gas Attack says Pulitzer Prize Winning Journalist

Sy Hersh Reveals Potential Turkish Role in Syria Chemical Strike That Almost Sparked U.S. Bombing

Global Empire – The World According to Seymour Hersh [Part Two]

Published on Aug 10, 2016

Tariq Ali talks to investigative journalist, Seymour Hersh, about his revelations concerning the chemical attack at Ghouta, Syria in August 2013.

Seymour Hersh Exposes Erdogan’s Chemical Adventure in Syria

Published on Apr 8, 2014

The US author reveals secret US reports warning that Al-Nusrah terrorist group affiliated with Qatar and Turkey, posses a chemical weapons cell. Worst threat since 9/11.

Global Empire – The World According to Seymour Hersh [Part One]

Published on Aug 10, 2016

Tariq Ali talks to investigative journalist, Seymour Hersh, about the assassination of Osama bin Laden in Pakistan in 2011 and describes what the Americans and Pakistanis knew about his whereabouts.

Global Empire – Syria After Trump

Seymour Hersh: Obama “Cherry-Picked” Intelligence on Syrian Chemical Attack to Justify U.S. Strike

Published on Dec 9, 2013

Writing in the London Review of Books, Hersh argues that the Obama administration “cherry-picked intelligence to justify a strike against Assad.” The administration failed to disclose it knew Syrian rebels in the al-Nusra Front had the ability to produce chemical weapons. Evidence obtained in the days after the attack was also allegedly distorted to make it appear it was gathered in real time.

Whose sarin? Seymour M. Hersh
Barack Obama did not tell the whole story this autumn when he tried to make the case that Bashar al-Assad was responsible for the chemical weapons attack near Damascus on 21 August. In some instances, he omitted important intelligence, and in others he presented assumptions as facts. Most significant, he failed to acknowledge something known to the US intelligence community: that the Syrian army is not the only party in the country’s civil war with access to sarin, the nerve agent that a UN study concluded — without assessing responsibility — had been used in the rocket attack. In the months before the attack, the American intelligence agencies produced a series of highly classified reports, culminating in a formal Operations Order — a planning document that precedes a ground invasion — citing evidence that the al-Nusra Front, a jihadi group affiliated with al-Qaida, had mastered the mechanics of creating sarin and was capable of manufacturing it in quantity. When the attack occurred al-Nusra should have been a suspect, but the administration cherry-picked intelligence to justify a strike against Assad.

In his nationally televised speech about Syria on 10 September, Obama laid the blame for the nerve gas attack on the rebel-held suburb of Eastern Ghouta firmly on Assad’s government, and made it clear he was prepared to back up his earlier public warnings that any use of chemical weapons would cross a ‘red line’: ‘Assad’s government gassed to death over a thousand people,’ he said. ‘We know the Assad regime was responsible … And that is why, after careful deliberation, I determined that it is in the national security interests of the United States to respond to the Assad regime’s use of chemical weapons through a targeted military strike.’ Obama was going to war to back up a public threat, but he was doing so without knowing for sure who did what in the early morning of 21 August.

He cited a list of what appeared to be hard-won evidence of Assad’s culpability: ‘In the days leading up to August 21st, we know that Assad’s chemical weapons personnel prepared for an attack near an area where they mix sarin gas. They distributed gas masks to their troops. Then they fired rockets from a regime-controlled area into 11 neighbourhoods that the regime has been trying to wipe clear of opposition forces.’ Obama’s certainty was echoed at the time by Denis McDonough, his chief of staff, who told the New York Times: ‘No one with whom I’ve spoken doubts the intelligence’ directly linking Assad and his regime to the sarin attacks.

But in recent interviews with intelligence and military officers and consultants past and present, I found intense concern, and on occasion anger, over what was repeatedly seen as the deliberate manipulation of intelligence. One high-level intelligence officer, in an email to a colleague, called the administration’s assurances of Assad’s responsibility a ‘ruse’. The attack ‘was not the result of the current regime’, he wrote. A former senior intelligence official told me that the Obama administration had altered the available information — in terms of its timing and sequence — to enable the president and his advisers to make intelligence retrieved days after the attack look as if it had been picked up and analyzed in real time, as the attack was happening. The distortion, he said, reminded him of the 1964 Gulf of Tonkin incident, when the Johnson administration reversed the sequence of National Security Agency intercepts to justify one of the early bombings of North Vietnam. The same official said there was immense frustration inside the military and intelligence bureaucracy: ‘The guys are throwing their hands in the air and saying, “How can we help this guy” — Obama — “when he and his cronies in the White House make up the intelligence as they go along?”‘…()

Obama Was Lying!

President Obama’s Syria Address [FULL SPEECH]

Seymour Hersh’s Latest Bombshell: U.S. Military Undermined Obama on Syria with Tacit Help to Assad

Published on Dec 22, 2015

A new report by the Pulitzer-winning veteran journalist Seymour Hersh says the Joints Chiefs of Staff has indirectly supported Bashar al-Assad in an effort to help him defeat jihadist groups. Hersh reports the Joint Chiefs sent intelligence via Russia, Germany and Israel on the understanding it would be transmitted to help Assad push back Jabhat al-Nusra and the Islamic State. Hersh also claims the military even undermined a U.S. effort to arm Syrian rebels in a bid to prove it was serious about helping Assad fight their common enemies. Hersh says the Joints Chiefs’ maneuvering was rooted in several concerns, including the U.S. arming of unvetted Syrian rebels with jihadist ties, a belief the administration was overly focused on confronting Assad’s ally in Moscow, and anger the White House was unwilling to challenge Turkey and Saudi Arabia over their support of extremist groups in Syria. Hersh joins us to detail his claims and respond to his critics.

US, Russia Announce Syria Chemical Weapons Deal

U.S. Ship Begins Neutralizing Syrian Chemical Weapons

MV Cape Ray Storage Area Tour

MV Cape Ray Disposal Practice

MV Cape Ray FDHS

Published on Jul 2, 2014

As part of the U.N. Organization for the Prohibition of Chemical Weapons (OPCW) Joint Mission to eliminate chemical materials from the Syrian Arab Republic, the U.S. will destroy approximately 700 metric tons of chemicals aboard the MV Cape Ray. Danish and Norwegian vessels will transport the chemicals to a yet-unnamed Italian port for transfer to the MV Cape Ray. The MV Cape Ray, part of the U.S. Maritime Administration’s Ready Reserve Fleet, has been retrofitted with two field-deployable hydrolysis systems designed to neutralize the dangerous chemicals before disposal at a commercial facility.

MV Cape Ray’s Bridge

MV Cape Ray Command Post Tour

MV Cape Ray Laboratory Tour

False flag

From Wikipedia, the free encyclopedia
“False colors” redirects here. For the imaging technique, see False-color.

This US Douglas A-26 C Invader was painted in fake Cuban Air Force colors for the military invasion of Cuba undertaken by the CIA-sponsored paramilitary group Brigade 2506 in April 1961.

The contemporary term false flag describes covert operations that are designed to deceive in such a way that activities appear as though they are being carried out by entities, groups, or nations other than those who actually planned and executed them.[1]

Historically, the term “false flag” has its origins in naval warfare where the use of a flag other than the belligerent’s true battle flag before (but not while) engaging the enemy has long been accepted as a permissible ruse de guerre; by contrast, flying a false flag while engaging the enemy constitutes perfidy.[1]

Operations carried out during peace-time by civilian organizations, as well as covert government agencies, can (by extension) also be called false flag operations if they seek to hide the real organization behind an operation.[citation needed]

Use in warfare

In land warfare such operations are generally deemed acceptable in certain circumstances, such as to deceive enemies providing that the deception is not perfidious and all such deceptions are discarded before opening fire upon the enemy. Similarly in naval warfare such a deception is considered permissible provided the false flag is lowered and the true flag raised before engaging in battle:[2]auxiliary cruisers operated in such a fashion in both World Wars, as did Q-ships, while merchant vessels were encouraged to use false flags for protection.

Such masquerades promoted confusion not just of the enemy but of historical accounts: in 1914 the Battle of Trindade was fought between the British auxiliary cruiser RMS Carmania and the German auxiliary cruiser SMS Cap Trafalgar which had been altered to look like Carmania. (Contrary to some possibly mendacious accounts, the RMS Carmania had not been altered to resemble the Cap Trafalgar.)

Another notable example was the World War II German commerce raider Kormoran which surprised and sank the Australian light cruiser HMAS Sydney in 1941 while disguised as a Dutch merchant ship, causing the greatest recorded loss of life on an Australian warship. While Kormoran was fatally damaged in the engagement and its crew captured the outcome represented a considerable psychological victory for the Germans.[3]

Other examples from WWII included a Kriegsmarineensign in the St Nazaire Raid and captured a German code book: the old destroyer Campbeltown, which the British planned to sacrifice in the operation, was provided with cosmetic modifications that involved cutting the ship’s funnels and chamfering the edges to resemble a German Type 23torpedo boat.

By this ruse the British were able to get within two miles (3 km) of the harbour before the defences responded, where the explosive-rigged Campbeltown and commandos successfully disabled or destroyed the key dock structures of the port.[4][5]

Air warfare

In December 1922–February 1923, Rules concerning the Control of Wireless Telegraphy in Time of War and Air Warfare, drafted by a commission of jurists at the Hague regulates:[6]

Art. 3. A military aircraft must carry an exterior mark indicating its nationality and its military character.
Art. 19. The use of false exterior marks is forbidden.

This draft was never adopted as a legally binding treaty, but the ICRC states in its introduction on the draft that ‘To a great extent, [the draft rules] correspond to the customary rules and general principles underlying treaties on the law of war on land and at sea’,[7] and as such these two non–controversial articles were already part of customary law.[8]

Land warfare

In land warfare, the use of a false flag is similar to that of naval warfare: the trial of Otto Skorzeny, who planned and commanded Operation Greif, by a U.S. military tribunal at the Dachau Trials included a finding that Skorzeny was not guilty of a crime by ordering his men into action in American uniforms. He had relayed to his men the warning of German legal experts: that if they fought in American uniforms, they would be breaking the laws of war; however, they probably were not doing so simply by wearing the American uniforms. During the trial, a number of arguments were advanced to substantiate this position and the German and U.S. military seem to have been in agreement.

In the transcript of the trial,[9] it is mentioned that Paragraph 43 of the Field Manual published by the War Department, United States Army, on 1 October 1940, under the entry Rules of Land Warfare states “National flags, insignias and uniforms as a ruse – in practice it has been authorized to make use of these as a ruse. The foregoing rule (Article 23 of the Annex of the IVth Hague Convention), does not prohibit such use, but does prohibit their improper use. It is certainly forbidden to make use of them during a combat. Before opening fire upon the enemy, they must be discarded’.”

The American Soldiers’ Handbook was also quoted by Defense Counsel: “The use of the enemy flag, insignia, and uniform is permitted under some circumstances. They are not to be used during actual fighting, and if used in order to approach the enemy without drawing fire, should be thrown away or removed as soon as fighting begins.” Subsequently, the outcome of the trial has been codified in the 1977 Protocol Additional to the Geneva Conventions of 12 August 1949 (Protocol I):

Article 37. – Prohibition of perfidy

1. It is prohibited to kill, injure, or capture an adversary by resort to perfidy. Acts inviting the confidence of an adversary to lead him to believe that he is entitled to, or is obliged to accord, protection under the rules of international law applicable in armed conflict, with intent to betray that confidence, shall constitute perfidy. The following acts are examples of perfidy:
(a) The feigning of an intent to negotiate under a flag of truce or of a surrender;
(b) The feigning of an incapacitation by wounds or sickness;
(c) The feigning of civilian, non-combatant status; and
(d) The feigning of protected status by the use of signs, emblems or uniforms of the United Nations or of neutral or other States not Parties to the conflict.
2. Ruses of war are not prohibited. Such ruses are acts which are intended to mislead an adversary or to induce him to act recklessly but which infringe no rule of international law applicable in armed conflict and which are not perfidious because they do not invite the confidence of an adversary with respect to protection under that law. The following are examples of such ruses: the use of camouflage, decoys, mock operations and disinformation.

Article 38. – Recognized emblems

1. It is prohibited to make improper use of the distinctive emblem of the Red Cross, Red Crescent or Red Lion and Sun or of other emblems, signs or signals provided for by the Conventions or by this Protocol. It is also prohibited to misuse deliberately in an armed conflict other internationally recognized protective emblems, signs or signals, including the flag of truce, and the protective emblem of cultural property.
2. It is prohibited to make use of the distinctive emblem of the United Nations, except as authorized by that Organization.

Article 39. – Emblems of nationality

1. It is prohibited to make use in an armed conflict of the flags or military emblems, insignia or uniforms of neutral or other States not Parties to the conflict.
2. It is prohibited to make use of the flags or military emblems, insignia or uniforms of adverse Parties while engaging in attacks or in order to shield, favour, protect or impede military operations.
3. Nothing in this Article or in Article 37, paragraph 1 ( d ), shall affect the existing generally recognized rules of international law applicable to espionage or to the use of flags in the conduct of armed conflict at sea.

Cyber warfare

A false flag in the cyber domain is slightly different and easier to perpetrate than in other physical theaters of war. Cyber false flags refer to tactics used in covert cyber attacks by a perpetrator to deceive or misguide attribution attempts including the attacker’s origin, identity, movement, and/or code/exploitation. This misdirection tactic can cause misattribution (permitting response and/or counterattack as a condiciosine qua non under international law) or misperception which can lead to retaliation against the wrong adversary.

Cyber false flags can exist in the cyber domain when:

  1. Weaponized cyber exploits use recycled code/variants from previous attacks;
  2. Exploits are developed to mimic the scope and complexity of other malware;
  3. Exploits are procured rather than developed;
  4. Exploits are executed from new/unknown operator command servers;
  5. Malware calls out to or connects to known operator command servers;
  6. The action or attack is outsourced;
  7. The compromise is socially engineered to misguide investigations towards other operators;
  8. The audit trail or lack thereof conceals actual intent or actions with other exploits designed to mislead investigators.

As pretexts for war

Russo-Swedish War

In 1788, the head tailor at the Royal Swedish Opera received an order to sew a number of Russian military uniforms. These were then used by the Swedes to stage an attack on Puumala, a Swedish outpost on the Russo-Swedish border, on 27 June 1788. This caused an outrage in Stockholm and impressed the Riksdag of the Estates, the Swedish national assembly, who until then had refused to agree to an offensive war against Russia. The Puumala incident allowed King Gustav III of Sweden, who lacked the constitutional authority to initiate unprovoked hostilities without the Estates’ consent, to launch the Russo-Swedish War (1788–1790).[10]

Second Sino-Japanese War

Japanese experts inspect the scene of the ‘railway sabotage’ on South Manchurian Railway

In September 1931, Japanese officers fabricated a pretext for invading Manchuria by blowing up a section of railway. Though the explosion was too weak to disrupt operations on the rail line, the Japanese nevertheless used this Mukden incident to seize Manchuria and create a puppet government for what they termed the “independent” state of Manchukuo.[11]

World War II

Gleiwitz incident

Alfred Naujocks

The Gleiwitz incident in 1939 involved Reinhard Heydrich fabricating evidence of a Polish attack against Germany to mobilize German public opinion for war and to justify the war with Poland. Alfred Naujocks was a key organiser of the operation under orders from Heydrich. It led to the deaths of Nazi concentration camp victims who were dressed as German soldiers and then shot by the Gestapo to make it seem that they had been shot by Polish soldiers. This, along with other false flag operations in Operation Himmler, would be used to mobilize support from the German population for the start of World War II in Europe.[12]

The operation failed to convince international public opinion of the German claims, and both Britain and France—Poland’s allies—declared war two days after Germany invaded Poland.[13]

Winter War

On November 26, 1939, the Soviet armyshelled Mainila, a Russian village near the Finnish border. Soviet authorities blamed Finland for the attack and used the incident as a pretext to invade Finland, starting the Winter War, four days later.[14]

Cuban Revolution

Operation Northwoods

Operation Northwoods memorandum (13 March 1962)[15]

The proposed, but never executed, 1962 Operation Northwoods plot by the U.S. Department of Defense for a war with Cuba involved scenarios such as fabricating the hijacking or shooting down of passenger and military planes, sinking a U.S. ship in the vicinity of Cuba, burning crops, sinking a boat filled with Cuban refugees, attacks by alleged Cuban infiltrators inside the United States, and harassment of U.S. aircraft and shipping and the destruction of aerial drones by aircraft disguised as Cuban MiGs.[16] These actions would be blamed on Cuba, and would be a pretext for an invasion of Cuba and the overthrow of Fidel Castro‘s communist government. It was authored by the Joint Chiefs of Staff, but then rejected by President John F. Kennedy. The surprise discovery of the documents relating to Operation Northwoods was a result of the comprehensive search for records related to the assassination of President John F. Kennedy by the Assassination Records Review Board in the mid-1990s.[17] Information about Operation Northwoods was later publicized by James Bamford.[18]

As a tactic to undermine political opponents

Reichstag fire

Main article: Reichstag fire

The Reichstag fire was an arson attack on the Reichstag building in Berlin on 27 February 1933. The fire started in the Session Chamber,[19] and, by the time the police and firemen arrived, the main Chamber of Deputies was engulfed in flames. Police searched the building and found Marinus van der Lubbe, a young Dutchcouncil communist and unemployed bricklayer, who had recently arrived in Germany to carry out political activities.[citation needed]

The fire was used as evidence by the Nazis that the Communists were beginning a plot against the German government. Van der Lubbe and four Communist leaders were subsequently arrested. Adolf Hitler, who was sworn in as Chancellor of Germany four weeks before, on 30 January, urged President Paul von Hindenburg to pass an emergency decree to counter the “ruthless confrontation of the Communist Party of Germany“.[20] With civil liberties suspended, the government instituted mass arrests of Communists, including all of the Communist parliamentary delegates. With their bitter rival Communists gone and their seats empty, the National Socialist German Workers Party went from being a plurality party to the majority; subsequent elections confirmed this position and thus allowed Hitler to consolidate his power.[citation needed]

Historians disagree as to whether Van der Lubbe acted alone, as he said, to protest the condition of the German working class, or whether the arson was planned and ordered by the Nazis, then dominant in the government themselves, as a false flag operation.[21][22]

Project TP-Ajax

On 4 April 1953, the CIA was ordered to undermine the government of Iran over a four-month period, as a precursor to overthrowing Prime Minister Mohammad Mosaddegh.[23] One tactic used to undermine Mosaddegh was to carry out false flag attacks “on mosques and key public figures”, to be blamed on Iranian communists loyal to the government.[23]

The CIA project was code-named TP-Ajax, and the tactic of a “directed campaign of bombings by Iranians posing as members of the Communist party”,[24] involved the bombing of “at least” one well known Muslim’s house by CIA agents posing as Communists.[24] The CIA determined that the tactic of false flag attacks added to the “positive outcome” of Project TPAJAX.[23]

However, as “the C.I.A. burned nearly all of its files on its role in the 1953 coup in Iran”, the true extent of the tactic has been difficult for historians to discern.[25]

Pseudo-operations

Pseudo-operations are those in which forces of one power disguise themselves as enemy forces. For example, a state power may disguise teams of operatives as insurgents and, with the aid of defectors, infiltrate insurgent areas.[26] The aim of such pseudo-operations may be to gather short or long-term intelligence or to engage in active operations, in particularassassinations of important enemies. However, they usually involve both, as the risks of exposure rapidly increase with time and intelligence gathering eventually leads to violent confrontation. Pseudo-operations may be directed by military or police forces, or both. Police forces are usually best suited to intelligence tasks; however, military provide the structure needed to back up such pseudo-ops with military response forces. According to US military expert Lawrence Cline (2005), “the teams typically have been controlled by police services, but this largely was due to the weaknesses in the respective military intelligence systems.”[citation needed]

Charlemagne Péralte of Haiti was assassinated in 1919, after checkpoints were passed by military disguised as guerrilla fighters.

The State Political Directorate (OGPU) of the Soviet Union set up such an operation from 1921 to 1926. During Operation Trust, they used loose networks of White Army supporters and extended them, creating the pseudo-“Monarchist Union of Central Russia” (MUCR) in order to help the OGPU identify real monarchists and anti-Bolsheviks.[citation needed]

An example of a successful assassination was United States MarineSergeantHerman H. Hanneken leading a patrol of his HaitianGendarmerie disguised as enemy guerrillas in 1919. The Patrol successfully passed several enemy checkpoints in order to assassinate the guerilla leader Charlemagne Péralte near Grande-Rivière-du-Nord. Hanneken was awarded the Medal of Honor and was commissioned a Second Lieutenant for his deed.[citation needed]

During the Mau Mau uprising in the 1950s, captured Mau Mau members who switched sides and specially trained British troops initiated the pseudo-gang concept to successfully counter Mau Mau. In 1960 Frank Kitson, (who was later involved in the Northern Irish conflict and is now a retired British General), published Gangs and Counter-gangs, an account of his experiences with the technique in Kenya; information included how to counter gangs and measures of deception, including the use of defectors, which brought the issue a wider audience.[citation needed]

Another example of combined police and military oversight of pseudo-operations include the Selous Scouts in the former country Rhodesia (now Zimbabwe), governed by white minority rule until 1980. The Selous Scouts were formed at the beginning of Operation Hurricane, in November 1973, by Major (later Lieutenant Colonel) Ronald Reid-Daly. As with all Special Forces in Rhodesia, by 1977 they were controlled by COMOPS (Commander, Combined Operations) Commander Lieutenant General Peter Walls. The Selous Scouts were originally composed of 120 members, with all officers being white and the highest rank initially available for black soldiers being colour sergeant. They succeeded in turning approximately 800 insurgents who were then paid by Special Branch, ultimately reaching the number of 1,500 members. Engaging mainly in long-range reconnaissance and surveillance missions, they increasingly turned to offensive actions, including the attempted assassination of Zimbabwe People’s Revolutionary Army leader Joshua Nkomo in Zambia. This mission was finally aborted by the Selous Scouts, and attempted again, unsuccessfully, by the Rhodesian Special Air Service.[27]

Some offensive operations attracted international condemnation, in particular the Selous Scouts’ raid on a Zimbabwe African National Liberation Army (ZANLA) camp at Nyadzonya Pungwe, Mozambique in August 1976. ZANLA was then led by Josiah Tongogara. Using Rhodesian trucks and armored cars disguised as Mozambique military vehicles, 84 scouts killed 1,284 people in the camp-the camp was registered as a refugee camp by the United Nations (UN). Even according to Reid-Daly, most of those killed were unarmed guerrillas standing in formation for a parade. The camp hospital was also set ablaze by the rounds fired by the Scouts, killing all patients.[28] According to David Martin and Phyllis Johnson, who visited the camp shortly before the raid, it was only a refugee camp that did not host any guerrillas. It was staged for UN approval.[29]

According to a 1978 study by the Directorate of Military Intelligence, 68% of all insurgent deaths inside Rhodesia could be attributed to the Selous Scouts, who were disbanded in 1980.[30]

If the action is a police action, then these tactics would fall within the laws of the state initiating the pseudo, but if such actions are taken in a civil war or during a belligerent military occupation then those who participate in such actions would not be privileged belligerents. The principle of plausible deniability is usually applied for pseudo-teams. (See the above section Laws of war). Some false flag operations have been described by Lawrence E. Cline, a retired US Army intelligence officer, as pseudo-operations, or “the use of organized teams which are disguised as guerrilla groups for long- or short-term penetration of insurgent-controlled areas.”[citation needed]

Pseudo Operations should be distinguished, notes Cline, from the more common police or intelligence infiltration of guerrilla or criminal organizations. In the latter case, infiltration is normally done by individuals. Pseudo teams, on the other hand, are formed as needed from organized units, usually military or paramilitary. The use of pseudo teams has been a hallmark of a number of foreign counterinsurgency campaigns.”[26]

Similar false flag tactics were also employed during the Algerian civil war, starting in the middle of 1994. Death squads composed of Département du Renseignement et de la Sécurité (DRS) security forces disguised themselves as Islamist terrorists and committed false flag terror attacks. Such groups included the Organisation of Young Free Algerians (OJAL) or the Secret Organisation for the Safeguard of the Algerian Republic (OSSRA)[31] According to Roger Faligot and Pascal Kropp (1999), the OJAL was reminiscent of “the Organization of the French Algerian Resistance (ORAF), a group of counter-terrorists created in December 1956 by the Direction de la surveillance du territoire (Territorial Surveillance Directorate, or DST) whose mission was to carry out terrorist attacks with the aim of quashing any hopes of political compromise”.[32]

Espionage

Main article: False flag penetrator

In espionage the term “false flag” describes the recruiting of agents by operatives posing as representatives of a cause the prospective agents are sympathetic to, or even the agents’ own government. For example, during the Cold War, several female West German civil servants were tricked into stealing classified documents by agents of the East GermanStasi intelligence service, pretending to be members of West German peace advocacy groups (the Stasi agents were also described as “Romeos,” indicating that they also used their sex appeal to manipulate their targets, making this operation a combination of the false flag and “honey trap” techniques).[33]

The technique can also be used to expose enemy agents in one’s own service, by having someone approach the suspect and pose as an agent of the enemy. Earl Edwin Pitts, a 13-year veteran of the U.S. Federal Bureau of Investigation and an attorney, was caught when he was approached by FBI agents posing as Russian agents.[citation needed]

British intelligence officials in World War II allowed double agents to fire-bomb a power station and a food dump in the UK to protect their cover, according to declassified documents. The documents stated the agents took precautions to ensure they did not cause serious damage. One of the documents released also stated: “It should be recognised that friends as well as enemies must be completely deceived.”[34]

Civilian usage

While false flag operations originate in warfare and government, they also can occur in civilian settings among certain factions, such as businesses, special interest groups, religions, political ideologies and campaigns for office.[citation needed]

Businesses

In business and marketing, similar operations are being employed in some public relations campaigns (see Astroturfing). Telemarketing firms practice false flag type behavior when they pretend to be a market research firm (referred to as “sugging“). In some rare cases, members of an unsuccessful business will destroy some of their own property to conceal an unrelated crime (e.g., safety violations, embezzlement) but make it appear as though the destruction was done by a rival company.[citation needed]

Political campaigning

Political campaigning has a long history of this tactic in various forms, including in person, print media and electronically in recent years. This can involve when supporters of one candidate pose as supporters of another, or act as “straw men” for their preferred candidate to debate against. This can happen with or without the candidate’s knowledge. The Canuck letter is an example of one candidate creating a false document and attributing it as coming from another candidate in order to discredit that candidate.[citation needed]

In the final days of Florida’s 1994 gubernatorial campaign, Democratic Governor Lawton Chiles ran a false flag operation that paid for tens of thousands of calls to elderly voters using false organization names. The calls purported to be from Republican groups and told voters that Jeb Bush was against Social Security and seniors. Chiles denied his campaign was behind the calls. After winning re-election and facing an investigation, Chiles admitted the truth in November 1995.[35]

In 2006, individuals practicing false flag behavior were discovered and “outed” in New Hampshire[36][37] and New Jersey[38] after blog comments claiming to be from supporters of a political candidate were traced to the IP address of paid staffers for that candidate’s opponent.

On 19 February 2011, Indiana Deputy Prosecutor Carlos Lam sent a private email to Wisconsin Governor Scott Walker suggesting that he run a “‘false flag’ operation” to counter the protests against Walker’s proposed restrictions on public employees’ collective bargaining rights:

If you could employ an associate who pretends to be sympathetic to the unions’ cause to physically attack you (or even use a firearm against you), you could discredit the unions … Employing a false flag operation would assist in undercutting any support that the media may be creating in favor of the unions.[39][40]

The press had acquired a court order to access all of Walker’s emails and Lam’s email was exposed. At first, Lam vehemently denied it, but eventually admitted it and resigned.[40]

Ideological

A bomb threat forged by Scientology operatives.

Proponents of political or religious ideologies will sometimes use false flag tactics. This can be done to discredit or implicate rival groups, create the appearance of enemies when none exist, or create the illusion of organized and directed persecution. This can be used to gain attention and sympathy from outsiders, in particular the media, or to convince others within the group that their beliefs are under attack and in need of protection.

In retaliation for writing The Scandal of Scientology, some members of the Church of Scientology stole stationery from author Paulette Cooper‘s home and then used that stationery to forge bomb threats and have them mailed to a Scientology office. The Guardian’s Office also had a plan for further operations to discredit Cooper known as Operation Freakout, but several Scientology operatives were arrested in a separate investigation and the plan was exposed.[41]

See also

Concepts

Examples

https://en.wikipedia.org/wiki/False_flag

42 FALSE-FLAG ATTACKS OFFICIALY ADMITTED TO

Mirrored from Washington’s Blog (due to their server being swamped)

Presidents, Prime Ministers, Congressmen, Generals, Spooks, Soldiers and Police ADMIT to False Flag Terror

In the following instances, officials in the government which carried out the attack (or seriously proposed an attack) admit to it, either orally, in writing, or through photographs or videos:

(1) Japanese troops set off a small explosion on a train track in 1931, and falsely blamed it on China in order to justify an invasion of Manchuria. This is known as the “Mukden Incident” or the “Manchurian Incident”. The Tokyo International Military Tribunal found: “Several of the participators in the plan, including Hashimoto [a high-ranking Japanese army officer], have on various occasions admitted their part in the plot and have stated that the object of the ‘Incident’ was to afford an excuse for the occupation of Manchuria by the Kwantung Army ….” And see this.

(2) A major with the Nazi SS admitted at the Nuremberg trials that – under orders from the chief of the Gestapo – he and some other Nazi operatives faked attacks on their own people and resources which they blamed on the Poles, to justify the invasion of Poland.

(3) Nazi general Franz Halder also testified at the Nuremberg trials that Nazi leader Hermann Goering admitted to setting fire to the German parliament building in 1933, and then falsely blaming the communists for the arson.

(4) Soviet leader Nikita Khrushchev admitted in writing that the Soviet Union’s Red Army shelled the Russian village of Mainila in 1939 – while blaming the attack on Finland – as a basis for launching the “Winter War” against Finland. Russian president Boris Yeltsin agreed that Russia had been the aggressor in the Winter War.

(5) The Russian Parliament, current Russian president Putin and former Soviet leader Gorbachev all admit that Soviet leader Joseph Stalin ordered his secret police to execute 22,000 Polish army officers and civilians in 1940, and then falsely blamed it on the Nazis.

(6) The British government admits that – between 1946 and 1948 – it bombed 5 ships carrying Jews attempting to flee the Holocaust to seek safety in Palestine, set up a fake group called “Defenders of Arab Palestine”, and then had the psuedo-group falsely claim responsibility for the bombings (and see this, this and this).

(7) Israel admits that in 1954, an Israeli terrorist cell operating in Egypt planted bombs in several buildings, including U.S. diplomatic facilities, then left behind “evidence” implicating the Arabs as the culprits (one of the bombs detonated prematurely, allowing the Egyptians to identify the bombers, and several of the Israelis later confessed) (and see this and this).

(8) The CIA admits that it hired Iranians in the 1950’s to pose as Communists and stage bombings in Iran in order to turn the country against its democratically-elected prime minister.

(9) The Turkish Prime Minister admitted that the Turkish government carried out the 1955 bombing on a Turkish consulate in Greece – also damaging the nearby birthplace of the founder of modern Turkey – and blamed it on Greece, for the purpose of inciting and justifying anti-Greek violence.

(10) The British Prime Minister admitted to his defense secretary that he and American president Dwight Eisenhower approved a plan in 1957 to carry out attacks in Syria and blame it on the Syrian government as a way to effect regime change.

(11) The former Italian Prime Minister, an Italian judge, and the former head of Italian counterintelligence admit that NATO, with the help of the Pentagon and CIA, carried out terror bombings in Italy and other European countries in the 1950s and blamed the communists, in order to rally people’s support for their governments in Europe in their fight against communism. As one participant in this formerly-secret program stated: “You had to attack civilians, people, women, children, innocent people, unknown people far removed from any political game. The reason was quite simple. They were supposed to force these people, the Italian public, to turn to the state to ask for greater security” (and see this) (Italy and other European countries subject to the terror campaign had joined NATO before the bombings occurred). And watch this BBC special. They also allegedly carried out terror attacks in France, Belgium, Denmark, Germany, Greece, the Netherlands, Norway, Portugal, the UK, and other countries.

False flag attacks carried out pursuant to this program include – by way of example only:

(12) In 1960, American Senator George Smathers suggested that the U.S. launch “a false attack made on Guantanamo Bay which would give us the excuse of actually fomenting a fight which would then give us the excuse to go in and [overthrow Castro]”.

(13) Official State Department documents show that, in 1961, the head of the Joint Chiefs and other high-level officials discussed blowing up a consulate in the Dominican Republic in order to justify an invasion of that country. The plans were not carried out, but they were all discussed as serious proposals.

(14) As admitted by the U.S. government, recently declassified documents show that in 1962, the American Joint Chiefs of Staff signed off on a plan to blow up AMERICAN airplanes (using an elaborate plan involving the switching of airplanes), and also to commit terrorist acts on American soil, and then to blame it on the Cubans in order to justify an invasion of Cuba. See the following ABC news report; the official documents; and watch this interview with the former Washington Investigative Producer for ABC’s World News Tonight with Peter Jennings.

(15) In 1963, the U.S. Department of Defense wrote a paper promoting attacks on nations within the Organization of American States – such as Trinidad-Tobago or Jamaica – and then falsely blaming them on Cuba.

(16) The U.S. Department of Defense even suggested covertly paying a person in the Castro government to attack the United States: “The only area remaining for consideration then would be to bribe one of Castro’s subordinate commanders to initiate an attack on Guantanamo.”

(17) The NSA admits that it lied about what really happened in the Gulf of Tonkin incident in 1964 … manipulating data to make it look like North Vietnamese boats fired on a U.S. ship so as to create a false justification for the Vietnam war.

(18) A U.S. Congressional committee admitted that – as part of its “Cointelpro” campaign – the FBI had used many provocateurs in the 1950s through 1970s to carry out violent acts and falsely blame them on political activists.

(19) A top Turkish general admitted that Turkish forces burned down a mosque on Cyprus in the 1970s and blamed it on their enemy. He explained: “In Special War, certain acts of sabotage are staged and blamed on the enemy to increase public resistance. We did this on Cyprus; we even burnt down a mosque.” In response to the surprised correspondent’s incredulous look the general said, “I am giving an example”.

(20) A declassified 1973 CIA document reveals a program to train foreign police and troops on how to make booby traps, pretending that they were training them on how to investigate terrorist acts:

The Agency maintains liaison in varying degrees with foreign police/security organizations through its field stations ….

[CIA provides training sessions as follows:]

a. Providing trainees with basic knowledge in the uses of commercial and military demolitions and incendiaries as they may be applied in terrorism and industrial sabotage operations.

b. Introducing the trainees to commercially available materials and home laboratory techniques, likely to he used in the manufacture of explosives and incendiaries by terrorists or saboteurs.

c. Familiarizing the trainees with the concept of target analysis and operational planning that a saboteur or terrorist must employ.

d. Introducing the trainees to booby trapping devices and techniques giving practical experience with both manufactured and improvised devices through actual fabrication.

***

The program provides the trainees with ample opportunity to develop basic familiarity and use proficiently through handling, preparing and applying the various explosive charges, incendiary agents, terrorist devices and sabotage techniques.

(21) The German government admitted (and see this) that, in 1978, the German secret service detonated a bomb in the outer wall of a prison and planted “escape tools” on a prisoner – a member of the Red Army Faction – which the secret service wished to frame the bombing on.

(22) A Mossad agent admits that, in 1984, Mossad planted a radio transmitter in Gaddaffi’s compound in Tripoli, Libya which broadcast fake terrorist trasmissions recorded by Mossad, in order to frame Gaddaffi as a terrorist supporter. Ronald Reagan bombed Libya immediately thereafter.

(23) The South African Truth and Reconciliation Council found that, in 1989, the Civil Cooperation Bureau (a covert branch of the South African Defense Force) approached an explosives expert and asked him “to participate in an operation aimed at discrediting the ANC [the African National Congress] by bombing the police vehicle of the investigating officer into the murder incident”, thus framing the ANC for the bombing.

(24) An Algerian diplomat and several officers in the Algerian army admit that, in the 1990s, the Algerian army frequently massacred Algerian civilians and then blamed Islamic militants for the killings (and see this video; and Agence France-Presse, 9/27/2002, French Court Dismisses Algerian Defamation Suit Against Author).

(25) The United States Army’s 1994 publication Special Forces Foreign Internal Defense Tactics Techniques and Procedures for Special Forces – updated in 2004 – recommends employing terrorists and using false flag operations to destabilize leftist regimes in Latin America. False flag terrorist attacks were carried out in Latin America and other regions as part of the CIA’s “Dirty Wars“. And see this.

(26) Similarly, a CIA “psychological operations” manual prepared by a CIA contractor for the Nicaraguan Contra rebels noted the value of assassinating someone on your own side to create a “martyr” for the cause. The manual was authenticated by the U.S. government. The manual received so much publicity from Associated Press, Washington Post and other news coverage that – during the 1984 presidential debate – President Reagan was confronted with the following question on national television:

At this moment, we are confronted with the extraordinary story of a CIA guerrilla manual for the anti-Sandinista contras whom we are backing, which advocates not only assassinations of Sandinistas but the hiring of criminals to assassinate the guerrillas we are supporting in order to create martyrs.

(27) An Indonesian fact-finding team investigated violent riots which occurred in 1998, and determined that “elements of the military had been involved in the riots, some of which were deliberately provoked“.

(28) Senior Russian Senior military and intelligence officers admit that the KGB blew up Russian apartment buildings in 1999 and falsely blamed it on Chechens, in order to justify an invasion of Chechnya (and see this report and this discussion).

(29) As reported by BBC, the New York Times, and Associated Press, Macedonian officials admit that the government murdered 7 innocent immigrants in cold blood and pretended that they were Al Qaeda soldiers attempting to assassinate Macedonian police, in order to join the “war on terror”.

(30)  At the July 2001 G8 Summit in Genoa, Italy, black-clad thugs were videotaped getting out of police cars, and were seen by an Italian MP carrying “iron bars inside the police station”.  Subsequently, senior police officials in Genoa subsequently  admitted that police planted two Molotov cocktails and faked the stabbing of a police officer at the G8 Summit, in order to justify a violent crackdown against protesters.

(31) The U.S. falsely blamed Iraq for playing a role in the 9/11 attacks – as shown by a memo from the defense secretary – as one of the main justifications for launching the Iraq war. Even after the 9/11 Commission admitted that there was no connection, Dick Cheney said that the evidence is “overwhelming” that al Qaeda had a relationship with Saddam Hussein’s regime, that Cheney “probably” had information unavailable to the Commission, and that the media was not ‘doing their homework’ in reporting such ties. Top U.S. government officials now admit that the Iraq war was really launched for oil … not 9/11 or weapons of mass destruction. Despite previous “lone wolf” claims, many U.S. government officials now say that 9/11 was state-sponsored terror; but Iraq was not the state which backed the hijackers. (Many U.S. officials have alleged that 9/11 was a false flag operation by rogue elements of the U.S. government; but such a claim is beyond the scope of this discussion. The key point is that the U.S. falsely blamed it on Iraq, when it knew Iraq had nothing to do with it.).

(32) Although the FBI now admits that the 2001 anthrax attacks were carried out by one or more U.S. government scientists, a senior FBI official says that the FBI was actually told to blame the Anthrax attacks on Al Qaeda by White House officials (remember what the anthrax letters looked like). Government officials also confirm that the white House tried to link the anthrax to Iraq as a justification for regime change in that country.

(33) According to the Washington Post, Indonesian police admit that the Indonesian military killed American teachers in Papua in 2002 and blamed the murders on a Papuan separatist group in order to get that group listed as a terrorist organization.

(34) The well-respected former Indonesian president also admits that the government probably had a role in the Bali bombings.

(35) Police outside of a 2003 European Union summit in Greece were filmed planting Molotov cocktails on a peaceful protester

(36) Former Department of Justice lawyer John Yoo suggested in 2005 that the US should go on the offensive against al-Qaeda, having “our intelligence agencies create a false terrorist organization. It could have its own websites, recruitment centers, training camps, and fundraising operations. It could launchfake terrorist operations and claim credit for real terrorist strikes, helping to sow confusion within al-Qaeda’s ranks, causing operatives to doubt others’ identities and to question the validity of communications.”

(37) Similarly, in 2005, Professor John Arquilla of the Naval Postgraduate School – a renowned US defense analyst credited with developing the concept of ‘netwar’ – called for western intelligence services to create new “pseudo gang” terrorist groups, as a way of undermining “real” terror networks. According to Pulitzer-Prize winning journalist Seymour Hersh, Arquilla’s ‘pseudo-gang’ strategy was, Hersh reported, already being implemented by the Pentagon:

“Under Rumsfeld’s new approach, I was told, US military operatives would be permitted to pose abroad as corrupt foreign businessmen seeking to buy contraband items that could be used in nuclear-weapons systems. In some cases, according to the Pentagon advisers, local citizens could be recruited and asked to join up with guerrillas or terrorists

The new rules will enable the Special Forces community to set up what it calls ‘action teams’ in the target countries overseas which can be used to find and eliminate terrorist organizations. ‘Do you remember the right-wing execution squads in El Salvador?’ the former high-level intelligence official asked me, referring to the military-led gangs that committed atrocities in the early nineteen-eighties. ‘We founded them and we financed them,’ he said. ‘The objective now is to recruit locals in any area we want. And we aren’t going to tell Congress about it.’ A former military officer, who has knowledge of the Pentagon’s commando capabilities, said, ‘We’re going to be riding with the bad boys.'”

(38) United Press International reported in June 2005:

U.S. intelligence officers are reporting that some of the insurgents in Iraq are using recent-model Beretta 92 pistols, but the pistols seem to have had their serial numbers erased. The numbers do not appear to have been physically removed; the pistols seem to have come off a production line without any serial numbers. Analysts suggest the lack of serial numbers indicates that the weapons were intended for intelligence operations or terrorist cells with substantial government backing. Analysts speculate that these guns are probably from either Mossad or the CIA. Analysts speculate that agent provocateurs may be using the untraceable weapons even as U.S. authorities use insurgent attacks against civilians as evidence of the illegitimacy of the resistance.

(39) Undercover Israeli soldiers admitted in 2005 to throwing stones at other Israeli soldiers so they could blame it on Palestinians, as an excuse to crack down on peaceful protests by the Palestinians.

(40) Quebec police admitted that, in 2007, thugs carrying rocks to a peaceful protest were actually undercover Quebec police officers (and see this).

(41) A 2008 US Army special operations field manual recommends that the U.S. military use surrogate non-state groups such as “paramilitary forces, individuals, businesses, foreign political organizations, resistant or insurgent organizations, expatriates, transnational terrorism adversaries, disillusioned transnational terrorism members, black marketers, and other social or political ‘undesirables.'” The manual specifically acknowledged that U.S. special operations can involve both counterterrorism and “Terrorism” (as well as “transnational criminal activities, including narco-trafficking, illicit arms-dealing, and illegal financial transactions.”)

(42)  The former head of Secret Services and Head of State of Italy (Francesco Cossiga) advised the 2008 minister in charge of the police, on how to deal with protests from teachers and students:

He should do what I did when I was Minister of the Interior … infiltrate the movement with agents provocateurs inclined to do anything …. And after that, with the strength of the gained population consent,  … beat them for blood and beat for blood also those teachers that incite them. Especially the teachers. Not the elderly, of course, but the girl teachers yes.

(43) At the G20 protests in London in 2009, a British member of parliament saw plain clothes police officers attempting to incite the crowd to violence.

(44) Egyptian politicians admitted (and see this) that government employees looted priceless museum artifacts in 2011 to try to discredit the protesters.

(45) Rioters who discredited the peaceful protests against the swearing in of the Mexican president in 2012 admitted that they were paid 300 pesos each to destroy everything in their path. According to Wikipedia, photos also show the vandals waiting in groups behind police lines prior to the violence.

(46) A Colombian army colonel has admitted that his unit murdered 57 civilians, then dressed them in uniforms and claimed they were rebels killed in combat.

(47) On November 20, 2014, Mexican agent provocateurs were transported by army vehicles to participate in the 2014 Iguala mass kidnapping protests, as was shown by videos and pictures distributed via social networks.

(48) The highly-respected writer for the Telegraph Ambrose Evans-Pritchard says that the head of Saudi intelligence – Prince Bandar – recently admitted that the Saudi government controls “Chechen” terrorists.

(49) High-level American sources admitted that the Turkish government – a fellow NATO country – carried out the chemical weapons attacks blamed on the Syrian government; and high-ranking Turkish government admitted on tape plans to carry out attacks and blame it on the Syrian government.

(50) The Ukrainian security chief admits that the sniper attacks which started the Ukrainian coup were carried out in order to frame others. Ukrainian officials admit that the Ukrainian snipers fired on both sides, to create maximum chaos.

(51) Britain’s spy agency has admitted (and see this) that it carries out “digital false flag” attacks on targets, framing people by writing offensive or unlawful material … and blaming it on the target.

(52) U.S. soldiers have admitted that if they kill innocent Iraqis and Afghanis, they then “drop” automatic weapons near their body so they can pretend they were militants

(53) Similarly, police frame innocent people for crimes they didn’t commit. The practice is so well-known that the New York Times noted in 1981:

In police jargon, a throwdown is a weapon planted on a victim.

Newsweek reported in 1999:

Perez, himself a former [Los Angeles Police Department] cop, was caught stealing eight pounds of cocaine from police evidence lockers. After pleading guilty in September, he bargained for a lighter sentence by telling an appalling story of attempted murder and a “throwdown”-police slang for a weapon planted by cops to make a shooting legally justifiable. Perez said he and his partner, Officer Nino Durden, shot an unarmed 18th Street Gang member named Javier Ovando, then planted a semiautomatic rifle on the unconscious suspect and claimed that Ovando had tried to shoot them during a stakeout.

Wikipedia notes:

As part of his plea bargain, Perez implicated scores of officers from the Rampart Division’s anti-gang unit, describing routinely beating gang members, planting evidence on suspects, falsifying reports and covering up unprovoked shootings.

(As a side note – and while not technically false flag attacks – police have been busted framing innocent people in many other ways, as well.)

(54) A former U.S. intelligence officer recently alleged:

Most terrorists are false flag terrorists or are created by our own security services.

(55) The head and special agent in charge of the FBI’s Los Angeles office said that most terror attacks are committed by the CIA and FBI as false flags.  Similarly, the director of the National Security Agency under Ronald Reagan – Lt. General William Odom said:

By any measure the US has long used terrorism. In ’78-79 the Senate was trying to pass a law against international terrorism – in every version they produced, the lawyers said the US would be in violation.

(audio here).

(56) Leaders throughout history have acknowledged the “benefits” of of false flags to justify their political agenda:

Terrorism is the best political weapon for nothing drives people harder than a fear of sudden death”.
– Adolph Hitler

“Why of course the people don’t want war … But after all it is the leaders of the country who determine the policy, and it is always a simple matter to drag the people along, whether it is a democracy, or a fascist dictatorship, or a parliament, or a communist dictatorship … Voice or no voice, the people can always be brought to the bidding of the leaders. That is easy. All you have to do is to tell them they are being attacked, and denounce the pacifists for lack of patriotism and exposing the country to danger. It works the same in any country.”
– Hermann Goering, Nazi leader.

“The easiest way to gain control of a population is to carry out acts of terror. [The public] will clamor for such laws if their personal security is threatened”.
– Josef Stalin

Postscript: Private parties – such as NBC News, as well as Muslims, Jews, Scientologists, African-Americans and Neo-Nazis – play this game as well.

www.whatreallyhappened.comhttp://www.whatreallyhappened.com/WRHARTICLES/42falseflags.php#ixzz4dVI2Q7La

The Red Line and the Rat Line

Seymour M. Hersh on Obama, Erdoğan and the Syrian rebels

In 2011 Barack Obama led an allied military intervention in Libya without consulting the US Congress. Last August, after the sarin attack on the Damascus suburb of Ghouta, he was ready to launch an allied air strike, this time to punish the Syrian government for allegedly crossing the ‘red line’ he had set in 2012 on the use of chemical weapons.Then with less than two days to go before the planned strike, he announced that he would seek congressional approval for the intervention. The strike was postponed as Congress prepared for hearings, and subsequently cancelled when Obama accepted Assad’s offer to relinquish his chemical arsenal in a deal brokered by Russia. Why did Obama delay and then relent on Syria when he was not shy about rushing into Libya? The answer lies in a clash between those in the administration who were committed to enforcing the red line, and military leaders who thought that going to war was both unjustified and potentially disastrous.

Obama’s change of mind had its origins at Porton Down, the defence laboratory in Wiltshire. British intelligence had obtained a sample of the sarin used in the 21 August attack and analysis demonstrated that the gas used didn’t match the batches known to exist in the Syrian army’s chemical weapons arsenal. The message that the case against Syria wouldn’t hold up was quickly relayed to the US joint chiefs of staff. The British report heightened doubts inside the Pentagon; the joint chiefs were already preparing to warn Obama that his plans for a far-reaching bomb and missile attack on Syria’s infrastructure could lead to a wider war in the Middle East. As a consequence the American officers delivered a last-minute caution to the president, which, in their view, eventually led to his cancelling the attack.

For months there had been acute concern among senior military leaders and the intelligence community about the role in the war of Syria’s neighbours, especially Turkey. Prime Minister Recep Erdoğan was known to be supporting the al-Nusra Front, a jihadist faction among the rebel opposition, as well as other Islamist rebel groups. ‘We knew there were some in the Turkish government,’ a former senior US intelligence official, who has access to current intelligence, told me, ‘who believed they could get Assad’s nuts in a vice by dabbling with a sarin attack inside Syria – and forcing Obama to make good on his red line threat.’

The joint chiefs also knew that the Obama administration’s public claims that only the Syrian army had access to sarin were wrong. The American and British intelligence communities had been aware since the spring of 2013 that some rebel units in Syria were developing chemical weapons. On 20 June analysts for the US Defense Intelligence Agency issued a highly classified five-page ‘talking points’ briefing for the DIA’s deputy director, David Shedd, which stated that al-Nusra maintained a sarin production cell: its programme, the paper said, was ‘the most advanced sarin plot since al-Qaida’s pre-9/11 effort’. (According to a Defense Department consultant, US intelligence has long known that al-Qaida experimented with chemical weapons, and has a video of one of its gas experiments with dogs.) The DIA paper went on: ‘Previous IC [intelligence community] focus had been almost entirely on Syrian CW [chemical weapons] stockpiles; now we see ANF attempting to make its own CW … Al-Nusrah Front’s relative freedom of operation within Syria leads us to assess the group’s CW aspirations will be difficult to disrupt in the future.’ The paper drew on classified intelligence from numerous agencies: ‘Turkey and Saudi-based chemical facilitators,’ it said, ‘were attempting to obtain sarin precursors in bulk, tens of kilograms, likely for the anticipated large scale production effort in Syria.’ (Asked about the DIA paper, a spokesperson for the director of national intelligence said: ‘No such paper was ever requested or produced by intelligence community analysts.’)

Last May, more than ten members of the al-Nusra Front were arrested in southern Turkey with what local police told the press were two kilograms of sarin. In a 130-page indictment the group was accused of attempting to purchase fuses, piping for the construction of mortars, and chemical precursors for sarin. Five of those arrested were freed after a brief detention. The others, including the ringleader, Haytham Qassab, for whom the prosecutor requested a prison sentence of 25 years, were released pending trial. In the meantime the Turkish press has been rife with speculation that the Erdoğan administration has been covering up the extent of its involvement with the rebels. In a news conference last summer, Aydin Sezgin, Turkey’s ambassador to Moscow, dismissed the arrests and claimed to reporters that the recovered ‘sarin’ was merely ‘anti-freeze’.

The DIA paper took the arrests as evidence that al-Nusra was expanding its access to chemical weapons. It said Qassab had ‘self-identified’ as a member of al-Nusra, and that he was directly connected to Abd-al-Ghani, the ‘ANF emir for military manufacturing’. Qassab and his associate Khalid Ousta worked with Halit Unalkaya, an employee of a Turkish firm called Zirve Export, who provided ‘price quotes for bulk quantities of sarin precursors’. Abd-al-Ghani’s plan was for two associates to ‘perfect a process for making sarin, then go to Syria to train others to begin large scale production at an unidentified lab in Syria’. The DIA paper said that one of his operatives had purchased a precursor on the ‘Baghdad chemical market’, which ‘has supported at least seven CW efforts since 2004’.

A series of chemical weapon attacks in March and April 2013 was investigated over the next few months by a special UN mission to Syria. A person with close knowledge of the UN’s activity in Syria told me that there was evidence linking the Syrian opposition to the first gas attack, on 19 March in Khan Al-Assal, a village near Aleppo. In its final report in December, the mission said that at least 19 civilians and one Syrian soldier were among the fatalities, along with scores of injured. It had no mandate to assign responsibility for the attack, but the person with knowledge of the UN’s activities said: ‘Investigators interviewed the people who were there, including the doctors who treated the victims. It was clear that the rebels used the gas. It did not come out in public because no one wanted to know.’

In the months before the attacks began, a former senior Defense Department official told me, the DIA was circulating a daily classified report known as SYRUP on all intelligence related to the Syrian conflict, including material on chemical weapons. But in the spring, distribution of the part of the report concerning chemical weapons was severely curtailed on the orders of Denis McDonough, the White House chief of staff. ‘Something was in there that triggered a shit fit by McDonough,’ the former Defense Department official said. ‘One day it was a huge deal, and then, after the March and April sarin attacks’ – he snapped his fingers – ‘it’s no longer there.’ The decision to restrict distribution was made as the joint chiefs ordered intensive contingency planning for a possible ground invasion of Syria whose primary objective would be the elimination of chemical weapons.

In the aftermath of the 21 August attack Obama ordered the Pentagon to draw up targets for bombing. Early in the process, the former intelligence official said, ‘the White House rejected 35 target sets provided by the joint chiefs of staff as being insufficiently “painful” to the Assad regime.’ The original targets included only military sites and nothing by way of civilian infrastructure. Under White House pressure, the US attack plan evolved into ‘a monster strike’: two wings of B-52 bombers were shifted to airbases close to Syria, and navy submarines and ships equipped with Tomahawk missiles were deployed. ‘Every day the target list was getting longer,’ the former intelligence official told me. ‘The Pentagon planners said we can’t use only Tomahawks to strike at Syria’s missile sites because their warheads are buried too far below ground, so the two B-52 air wings with two-thousand pound bombs were assigned to the mission. Then we’ll need standby search-and-rescue teams to recover downed pilots and drones for target selection. It became huge.’ The new target list was meant to ‘completely eradicate any military capabilities Assad had’, the former intelligence official said. The core targets included electric power grids, oil and gas depots, all known logistic and weapons depots, all known command and control facilities, and all known military and intelligence buildings.

Britain and France were both to play a part. On 29 August, the day Parliament voted against Cameron’s bid to join the intervention, the Guardian reported that he had already ordered six RAF Typhoon fighter jets to be deployed to Cyprus, and had volunteered a submarine capable of launching Tomahawk missiles. The French air force – a crucial player in the 2011 strikes on Libya – was deeply committed, according to an account in Le Nouvel Observateur; François Hollande had ordered several Rafale fighter-bombers to join the American assault. Their targets were reported to be in western Syria.

By the last days of August the president had given the Joint Chiefs a fixed deadline for the launch. ‘H hour was to begin no later than Monday morning [2 September], a massive assault to neutralise Assad,’ the former intelligence official said. So it was a surprise to many when during a speech in the White House Rose Garden on 31 August Obama said that the attack would be put on hold, and he would turn to Congress and put it to a vote.

At this stage, Obama’s premise – that only the Syrian army was capable of deploying sarin – was unravelling. Within a few days of the 21 August attack, the former intelligence official told me, Russian military intelligence operatives had recovered samples of the chemical agent from Ghouta. They analysed it and passed it on to British military intelligence; this was the material sent to Porton Down. (A spokesperson for Porton Down said: ‘Many of the samples analysed in the UK tested positive for the nerve agent sarin.’ MI6 said that it doesn’t comment on intelligence matters.)

The former intelligence official said the Russian who delivered the sample to the UK was ‘a good source – someone with access, knowledge and a record of being trustworthy’. After the first reported uses of chemical weapons in Syria last year, American and allied intelligence agencies ‘made an effort to find the answer as to what if anything, was used – and its source’, the former intelligence official said. ‘We use data exchanged as part of the Chemical Weapons Convention. The DIA’s baseline consisted of knowing the composition of each batch of Soviet-manufactured chemical weapons. But we didn’t know which batches the Assad government currently had in its arsenal. Within days of the Damascus incident we asked a source in the Syrian government to give us a list of the batches the government currently had. This is why we could confirm the difference so quickly.’

The process hadn’t worked as smoothly in the spring, the former intelligence official said, because the studies done by Western intelligence ‘were inconclusive as to the type of gas it was. The word “sarin” didn’t come up. There was a great deal of discussion about this, but since no one could conclude what gas it was, you could not say that Assad had crossed the president’s red line.’ By 21 August, the former intelligence official went on, ‘the Syrian opposition clearly had learned from this and announced that “sarin” from the Syrian army had been used, before any analysis could be made, and the press and White House jumped at it. Since it now was sarin, “It had to be Assad.”’

The UK defence staff who relayed the Porton Down findings to the joint chiefs were sending the Americans a message, the former intelligence official said: ‘We’re being set up here.’ (This account made sense of a terse message a senior official in the CIA sent in late August: ‘It was not the result of the current regime. UK & US know this.’) By then the attack was a few days away and American, British and French planes, ships and submarines were at the ready.

The officer ultimately responsible for the planning and execution of the attack was General Martin Dempsey, chairman of the joint chiefs. From the beginning of the crisis, the former intelligence official said, the joint chiefs had been sceptical of the administration’s argument that it had the facts to back up its belief in Assad’s guilt. They pressed the DIA and other agencies for more substantial evidence. ‘There was no way they thought Syria would use nerve gas at that stage, because Assad was winning the war,’ the former intelligence official said. Dempsey had irritated many in the Obama administration by repeatedly warning Congress over the summer of the danger of American military involvement in Syria. Last April, after an optimistic assessment of rebel progress by the secretary of state, John Kerry, in front of the House Foreign Affairs Committee, Dempsey told the Senate Armed Services Committee that ‘there’s a risk that this conflict has become stalemated.’

Dempsey’s initial view after 21 August was that a US strike on Syria – under the assumption that the Assad government was responsible for the sarin attack – would be a military blunder, the former intelligence official said. The Porton Down report caused the joint chiefs to go to the president with a more serious worry: that the attack sought by the White House would be an unjustified act of aggression. It was the joint chiefs who led Obama to change course. The official White House explanation for the turnabout – the story the press corps told – was that the president, during a walk in the Rose Garden with Denis McDonough, his chief of staff, suddenly decided to seek approval for the strike from a bitterly divided Congress with which he’d been in conflict for years. The former Defense Department official told me that the White House provided a different explanation to members of the civilian leadership of the Pentagon: the bombing had been called off because there was intelligence ‘that the Middle East would go up in smoke’ if it was carried out.

The president’s decision to go to Congress was initially seen by senior aides in the White House, the former intelligence official said, as a replay of George W. Bush’s gambit in the autumn of 2002 before the invasion of Iraq: ‘When it became clear that there were no WMD in Iraq, Congress, which had endorsed the Iraqi war, and the White House both shared the blame and repeatedly cited faulty intelligence. If the current Congress were to vote to endorse the strike, the White House could again have it both ways – wallop Syria with a massive attack and validate the president’s red line commitment, while also being able to share the blame with Congress if it came out that the Syrian military wasn’t behind the attack.’ The turnabout came as a surprise even to the Democratic leadership in Congress. In September the Wall Street Journal reported that three days before his Rose Garden speech Obama had telephoned Nancy Pelosi, leader of the House Democrats, ‘to talk through the options’. She later told colleagues, according to the Journal, that she hadn’t asked the president to put the bombing to a congressional vote.

bama’s move for congressional approval quickly became a dead end. ‘Congress was not going to let this go by,’ the former intelligence official said. ‘Congress made it known that, unlike the authorisation for the Iraq war, there would be substantive hearings.’ At this point, there was a sense of desperation in the White House, the former intelligence official said. ‘And so out comes Plan B. Call off the bombing strike and Assad would agree to unilaterally sign the chemical warfare treaty and agree to the destruction of all of chemical weapons under UN supervision.’ At a press conference in London on 9 September, Kerry was still talking about intervention: ‘The risk of not acting is greater than the risk of acting.’ But when a reporter asked if there was anything Assad could do to stop the bombing, Kerry said: ‘Sure. He could turn over every single bit of his chemical weapons to the international community in the next week … But he isn’t about to do it, and it can’t be done, obviously.’ As the New York Times reported the next day, the Russian-brokered deal that emerged shortly afterwards had first been discussed by Obama and Putin in the summer of 2012. Although the strike plans were shelved, the administration didn’t change its public assessment of the justification for going to war. ‘There is zero tolerance at that level for the existence of error,’ the former intelligence official said of the senior officials in the White House. ‘They could not afford to say: “We were wrong.”’ (The DNI spokesperson said: ‘The Assad regime, and only the Assad regime, could have been responsible for the chemical weapons attack that took place on 21 August.’)

*The full extent of US co-operation with Turkey, Saudi Arabia and Qatar in assisting the rebel opposition in Syria has yet to come to light. The Obama administration has never publicly admitted to its role in creating what the CIA calls a ‘rat line’, a back channel highway into Syria. The rat line, authorised in early 2012, was used to funnel weapons and ammunition from Libya via southern Turkey and across the Syrian border to the opposition. Many of those in Syria who ultimately received the weapons were jihadists, some of them affiliated with al-Qaida. (The DNI spokesperson said: ‘The idea that the United States was providing weapons from Libya to anyone is false.’)

In January, the Senate Intelligence Committee released a report on the assault by a local militia in September 2012 on the American consulate and a nearby undercover CIA facility in Benghazi, which resulted in the death of the US ambassador, Christopher Stevens, and three others. The report’s criticism of the State Department for not providing adequate security at the consulate, and of the intelligence community for not alerting the US military to the presence of a CIA outpost in the area, received front-page coverage and revived animosities in Washington, with Republicans accusing Obama and Hillary Clinton of a cover-up. A highly classified annex to the report, not made public, described a secret agreement reached in early 2012 between the Obama and Erdoğan administrations. It pertained to the rat line. By the terms of the agreement, funding came from Turkey, as well as Saudi Arabia and Qatar; the CIA, with the support of MI6, was responsible for getting arms from Gaddafi’s arsenals into Syria. A number of front companies were set up in Libya, some under the cover of Australian entities. Retired American soldiers, who didn’t always know who was really employing them, were hired to manage procurement and shipping. The operation was run by David Petraeus, the CIA director who would soon resign when it became known he was having an affair with his biographer. (A spokesperson for Petraeus denied the operation ever took place.)

The operation had not been disclosed at the time it was set up to the congressional intelligence committees and the congressional leadership, as required by law since the 1970s. The involvement of MI6 enabled the CIA to evade the law by classifying the mission as a liaison operation. The former intelligence official explained that for years there has been a recognised exception in the law that permits the CIA not to report liaison activity to Congress, which would otherwise be owed a finding. (All proposed CIA covert operations must be described in a written document, known as a ‘finding’, submitted to the senior leadership of Congress for approval.) Distribution of the annex was limited to the staff aides who wrote the report and to the eight ranking members of Congress – the Democratic and Republican leaders of the House and Senate, and the Democratic and Republicans leaders on the House and Senate intelligence committees. This hardly constituted a genuine attempt at oversight: the eight leaders are not known to gather together to raise questions or discuss the secret information they receive.

The annex didn’t tell the whole story of what happened in Benghazi before the attack, nor did it explain why the American consulate was attacked. ‘The consulate’s only mission was to provide cover for the moving of arms,’ the former intelligence official, who has read the annex, said. ‘It had no real political role.’

Washington abruptly ended the CIA’s role in the transfer of arms from Libya after the attack on the consulate, but the rat line kept going. ‘The United States was no longer in control of what the Turks were relaying to the jihadists,’ the former intelligence official said. Within weeks, as many as forty portable surface-to-air missile launchers, commonly known as manpads, were in the hands of Syrian rebels. On 28 November 2012, Joby Warrick of the Washington Post reported that the previous day rebels near Aleppo had used what was almost certainly a manpad to shoot down a Syrian transport helicopter. ‘The Obama administration,’ Warrick wrote, ‘has steadfastly opposed arming Syrian opposition forces with such missiles, warning that the weapons could fall into the hands of terrorists and be used to shoot down commercial aircraft.’ Two Middle Eastern intelligence officials fingered Qatar as the source, and a former US intelligence analyst speculated that the manpads could have been obtained from Syrian military outposts overrun by the rebels. There was no indication that the rebels’ possession of manpads was likely the unintended consequence of a covert US programme that was no longer under US control.

By the end of 2012, it was believed throughout the American intelligence community that the rebels were losing the war. ‘Erdoğan was pissed,’ the former intelligence official said, ‘and felt he was left hanging on the vine. It was his money and the cut-off was seen as a betrayal.’ In spring 2013 US intelligence learned that the Turkish government – through elements of the MIT, its national intelligence agency, and the Gendarmerie, a militarised law-enforcement organisation – was working directly with al-Nusra and its allies to develop a chemical warfare capability. ‘The MIT was running the political liaison with the rebels, and the Gendarmerie handled military logistics, on-the-scene advice and training – including training in chemical warfare,’ the former intelligence official said. ‘Stepping up Turkey’s role in spring 2013 was seen as the key to its problems there. Erdoğan knew that if he stopped his support of the jihadists it would be all over. The Saudis could not support the war because of logistics – the distances involved and the difficulty of moving weapons and supplies. Erdoğan’s hope was to instigate an event that would force the US to cross the red line. But Obama didn’t respond in March and April.’

There was no public sign of discord when Erdoğan and Obama met on 16 May 2013 at the White House. At a later press conference Obama said that they had agreed that Assad ‘needs to go’. Asked whether he thought Syria had crossed the red line, Obama acknowledged that there was evidence such weapons had been used, but added, ‘it is important for us to make sure that we’re able to get more specific information about what exactly is happening there.’ The red line was still intact.

The foreign policy expert told me that the account he heard originated with Donilon. (It was later corroborated by a former US official, who learned of it from a senior Turkish diplomat.) According to the expert, Erdoğan had sought the meeting to demonstrate to Obama that the red line had been crossed, and had brought Fidan along to state the case. When Erdoğan tried to draw Fidan into the conversation, and Fidan began speaking, Obama cut him off and said: ‘We know.’ Erdoğan tried to bring Fidan in a second time, and Obama again cut him off and said: ‘We know.’ At that point, an exasperated Erdoğan said, ‘But your red line has been crossed!’ and, the expert told me, ‘Donilon said Erdoğan “fucking waved his finger at the president inside the White House”.’ Obama then pointed at Fidan and said: ‘We know what you’re doing with the radicals in Syria.’ (Donilon, who joined the Council on Foreign Relations last July, didn’t respond to questions about this story. The Turkish Foreign Ministry didn’t respond to questions about the dinner. A spokesperson for the National Security Council confirmed that the dinner took place and provided a photograph showing Obama, Kerry, Donilon, Erdoğan, Fidan and Davutoğlu sitting at a table. ‘Beyond that,’ she said, ‘I’m not going to read out the details of their discussions.’)

But Erdoğan did not leave empty handed. Obama was still permitting Turkey to continue to exploit a loophole in a presidential executive order prohibiting the export of gold to Iran, part of the US sanctions regime against the country. In March 2012, responding to sanctions of Iranian banks by the EU, the SWIFT electronic payment system, which facilitates cross-border payments, expelled dozens of Iranian financial institutions, severely restricting the country’s ability to conduct international trade. The US followed with the executive order in July, but left what came to be known as a ‘golden loophole’: gold shipments to private Iranian entities could continue. Turkey is a major purchaser of Iranian oil and gas, and it took advantage of the loophole by depositing its energy payments in Turkish lira in an Iranian account in Turkey; these funds were then used to purchase Turkish gold for export to confederates in Iran. Gold to the value of $13 billion reportedly entered Iran in this way between March 2012 and July 2013.

The programme quickly became a cash cow for corrupt politicians and traders in Turkey, Iran and the United Arab Emirates. ‘The middlemen did what they always do,’ the former intelligence official said. ‘Take 15 per cent. The CIA had estimated that there was as much as two billion dollars in skim. Gold and Turkish lira were sticking to fingers.’ The illicit skimming flared into a public ‘gas for gold’ scandal in Turkey in December, and resulted in charges against two dozen people, including prominent businessmen and relatives of government officials, as well as the resignations of three ministers, one of whom called for Erdoğan to resign. The chief executive of a Turkish state-controlled bank that was in the middle of the scandal insisted that more than $4.5 million in cash found by police in shoeboxes during a search of his home was for charitable donations.

Late last year Jonathan Schanzer and Mark Dubowitz reported in Foreign Policy that the Obama administration closed the golden loophole in January 2013, but ‘lobbied to make sure the legislation … did not take effect for six months’. They speculated that the administration wanted to use the delay as an incentive to bring Iran to the bargaining table over its nuclear programme, or to placate its Turkish ally in the Syrian civil war. The delay permitted Iran to ‘accrue billions of dollars more in gold, further undermining the sanctions regime’.*

The American decision to end CIA support of the weapons shipments into Syria left Erdoğan exposed politically and militarily. ‘One of the issues at that May summit was the fact that Turkey is the only avenue to supply the rebels in Syria,’ the former intelligence official said. ‘It can’t come through Jordan because the terrain in the south is wide open and the Syrians are all over it. And it can’t come through the valleys and hills of Lebanon – you can’t be sure who you’d meet on the other side.’ Without US military support for the rebels, the former intelligence official said, ‘Erdoğan’s dream of having a client state in Syria is evaporating and he thinks we’re the reason why. When Syria wins the war, he knows the rebels are just as likely to turn on him – where else can they go? So now he will have thousands of radicals in his backyard.’

A US intelligence consultant told me that a few weeks before 21 August he saw a highly classified briefing prepared for Dempsey and the defense secretary, Chuck Hagel, which described ‘the acute anxiety’ of the Erdoğan administration about the rebels’ dwindling prospects. The analysis warned that the Turkish leadership had expressed ‘the need to do something that would precipitate a US military response’. By late summer, the Syrian army still had the advantage over the rebels, the former intelligence official said, and only American air power could turn the tide. In the autumn, the former intelligence official went on, the US intelligence analysts who kept working on the events of 21 August ‘sensed that Syria had not done the gas attack. But the 500 pound gorilla was, how did it happen? The immediate suspect was the Turks, because they had all the pieces to make it happen.’

As intercepts and other data related to the 21 August attacks were gathered, the intelligence community saw evidence to support its suspicions. ‘We now know it was a covert action planned by Erdoğan’s people to push Obama over the red line,’ the former intelligence official said. ‘They had to escalate to a gas attack in or near Damascus when the UN inspectors’ – who arrived in Damascus on 18 August to investigate the earlier use of gas – ‘were there. The deal was to do something spectacular. Our senior military officers have been told by the DIA and other intelligence assets that the sarin was supplied through Turkey – that it could only have gotten there with Turkish support. The Turks also provided the training in producing the sarin and handling it.’ Much of the support for that assessment came from the Turks themselves, via intercepted conversations in the immediate aftermath of the attack. ‘Principal evidence came from the Turkish post-attack joy and back-slapping in numerous intercepts. Operations are always so super-secret in the planning but that all flies out the window when it comes to crowing afterwards. There is no greater vulnerability than in the perpetrators claiming credit for success.’ Erdoğan’s problems in Syria would soon be over: ‘Off goes the gas and Obama will say red line and America is going to attack Syria, or at least that was the idea. But it did not work out that way.’

The post-attack intelligence on Turkey did not make its way to the White House. ‘Nobody wants to talk about all this,’ the former intelligence official told me. ‘There is great reluctance to contradict the president, although no all-source intelligence community analysis supported his leap to convict. There has not been one single piece of additional evidence of Syrian involvement in the sarin attack produced by the White House since the bombing raid was called off. My government can’t say anything because we have acted so irresponsibly. And since we blamed Assad, we can’t go back and blame Erdoğan.’

Barring a major change in policy by Obama, Turkey’s meddling in the Syrian civil war is likely to go on. ‘I asked my colleagues if there was any way to stop Erdoğan’s continued support for the rebels, especially now that it’s going so wrong,’ the former intelligence official told me. ‘The answer was: “We’re screwed.” We could go public if it was somebody other than Erdoğan, but Turkey is a special case. They’re a Nato ally. The Turks don’t trust the West. They can’t live with us if we take any active role against Turkish interests. If we went public with what we know about Erdoğan’s role with the gas, it’d be disastrous. The Turks would say: “We hate you for telling us what we can and can’t do.”’

4 April

https://www.lrb.co.uk/v36/n08/seymour-m-hersh/the-red-line-and-the-rat-line

Ghouta chemical attack

From Wikipedia, the free encyclopedia
Ghouta chemical attack
Part of the Syrian Civil War
Ghouta massacre1.JPG

Some of the victims of the Ghouta chemical attack
Location Ghouta, Syria
Coordinates Eastern Ghouta: within 750 meters (2,460 ft) from[1]
33.5238301°N 36.3566995°E
Western Ghouta: within 500 meters (1,600 ft) from[1]
33.4602966°N 36.1972287°E
Date 21 August 2013[2]
Attack type
Chemical attack
Deaths Various estimates:
at least 281 (French intelligence)[3]
at least 350 (UK intelligence)[4]
355 (MSF)[5]
494 (Damascus Media Office)[6]
502 (SOHR)[7]
635 (SRGC)[8]
923 (VDC)[9]
1,300 (SNC)[10]
1,338 (LCC)[11]
1,429 (United States)[12][13]
1,729 (FSA)[14]
Non-fatal injuries
3,600 patients displaying neurotoxic symptoms in 3 hospitals supported by MSF[5]
Perpetrators Unknown

The Ghouta chemical attack occurred in Ghouta, Syria, during the Syrian Civil War in the early hours of 21 August 2013. Two opposition-controlled areas in the suburbs around Damascus, Syria were struck by rockets containing the chemical agent sarin. Estimates of the death toll range from at least 281 people[3] to 1,729.[14] The attack was the deadliest use of chemical weapons since the Iran–Iraq War.[15][16][17]

Inspectors from the United Nations Mission already in Syria to investigate an earlier alleged chemical weapons attack,[18](p6)[19] requested access to sites in Ghouta the day after the attack,[20][21][22][22][23][24] and called for a ceasefire to allow inspectors to visit the Ghouta sites.[20] The Syrian government granted the UN’s request on 25 August,[25][26][27] and inspectors visited and investigated Moadamiyah in Western Ghouta the next day, and Zamalka and Ein Tarma in Eastern Ghouta on 28 and 29 August.[18](p6)[28][29]

The UN investigation team confirmed “clear and convincing evidence” of the use of sarin delivered by surface-to-surface rockets,[18][30] and a 2014 report by the UN Human Rights Council found that “significant quantities of sarin were used in a well-planned indiscriminate attack targeting civilian-inhabited areas, causing mass casualties. The evidence available concerning the nature, quality and quantity of the agents used on 21 August indicated that the perpetrators likely had access to the chemical weapons stockpile of the Syrian military, as well as the expertise and equipment necessary to manipulate safely large amount of chemical agents.”[31] It also stated that the chemical agents used in the Khan al-Assal chemical attack “bore the same unique hallmarks as those used in Al-Ghouta.”[32][31][33]

The Syrian opposition,[34] as well as many governments, the Arab League and the European Union[35][36][37] stated the attack was carried out by forces of Syrian President Bashar al-Assad.[38] The Syrian and Russian governments blamed the opposition for the attack,[34] the Russian government calling the attack a false flag operation by the opposition to draw foreign powers into the civil war on the rebels’ side.[39]Åke Sellström, the leader of the UN Mission, characterized government explanations of rebel chemical weapons acquisition as unconvincing, resting in part upon “poor theories.”[40]

Several countries including France, the United Kingdom, and the United States debated whether to intervene militarily against Syrian government forces.[41][42][43][44] On 6 September 2013, the United States Senate filed a resolution to authorize use of military force against the Syrian military in response to the Ghouta attack.[45] On 10 September 2013, the military intervention was averted when the Syrian government accepted a US–Russian negotiated deal to turn over “every single bit” of its chemical weapons stockpiles for destruction and declared its intention to join the Chemical Weapons Convention.[46][47]

Background

The Ghouta area is composed of densely populated suburbs to the east and south of Damascus, part of the province of Rif Dimashq.[48] Ghouta is a primarily conservative Sunni region.[49] Since early in the civil war, civilians in rebel-held Eastern Ghouta have almost entirely sided with the opposition to Syria’s government.[50][51] The opposition has controlled much of Eastern Ghouta since 2012, partly cutting off Damascus from the countryside.[48]Muadamiyat al-Sham in Western Ghouta had been under government siege since April 2013.[52] Ghouta had been the scene of continuing clashes for more than a year before the chemical attack, with government forces launching repeated missile assaults trying to dislodge the rebels. The week of the attack, the Syrian government launched an offensive to capture opposition-held Damascus suburbs.[51]

The attack came one year and one day after US President Barack Obama‘s 20 August 2012 “red line” remarks, in which he warned: “We have been very clear to the Assad regime, but also to other players on the ground, that a red line for us is we start seeing a whole bunch of chemical weapons moving around or being utilized. That would change my calculus. That would change my equation.”[53][54][55] Syria was one of five non-signatories to the 1997 Chemical Weapons Convention at the time. After the “red line” remarks, and before the chemical attack in Ghouta, chemical weapons were suspected to have been used in four attacks in the country.[56]

Khan al-Assal chemical attack

The Khan al-Assal chemical attack occurred on 19 March 2013, when a government-controlled area of Khan al-Asal, a district of Aleppo in northern Syria, was struck by a rocket containing the nerve agent sarin. According to the Syrian Observatory for Human Rights the attack resulted in at least 26 fatalities, including 16 government soldiers and 10 civilians.[57] The Syrian government later reported to the United Nations that one soldier and 19 civilians died and that 17 soldiers and 107 civilians were injured.[2](p32) A medic at the local civilian hospital said he personally had witnessed Syrian army soldiers helping the wounded and dealing with fatalities at the scene.[58]

The sarin used in the Khan al-Assal attack “bore the same unique hallmarks” as the sarin used in the Ghouta attack.[32][31](p19)

Independent International Commission of Inquiry

The United Nations Human Rights Council established the Independent International Commission of Inquiry on the Syrian Arab Republic on 22 August 2011 to investigate human rights violations during the Syrian civil war. One of the topics the commission investigated was possible use of chemical weapons. In early June 2013, the Fifth Report of the Commission of Inquiry stated that there were reasonable grounds to believe that limited amounts of toxic chemicals were used in four attacks, but more evidence was needed “to determine the precise chemical agents used, their delivery systems or the perpetrator.”[59](p21)[60][61] On 22 June, the head of the Commission of Inquiry, Paulo Pinheiro, said the UN could not determine who used chemical weapons in Syria based on evidence sent by the United States, Britain and France.[62]

Assessments prior to the attack

US assessment

US Secretary of Defense Chuck Hagel stated on 25 April that US intelligence showed the Assad government had likely used sarin on a small scale.[63] However, the White House announced that “much more” work had to be done to verify the intelligence assessments.[64]

On 13 June 2013, the United States government publicly announced it had concluded that the Assad government had used limited amounts of chemical weapons on multiple occasions against rebel forces, killing 100 to 150 people. US officials stated that sarin was the agent used.[65] Deputy National Security Advisor Ben Rhodes did not say whether this showed that Syria had crossed the “red line” established by President Obama in August 2012. Rhodes stated: “The president has said that the use of chemical weapons would change his calculus, and it has.”[66] The French government announced that its own tests confirmed US assertions.[67]

Russian assessment

Russian Foreign Minister Sergei Lavrov said “the accusations of Damascus using chemical weapons put forth by the USA are not backed by credible facts.”[68] Lavrov further stated that the Syrian government had no motive to use chemical weapons since the government already maintained a military advantage over the rebel fighters.[69]

Attacks

The attacks affected two separate opposition-controlled districts in the Damascus suburbs, located 16 kilometres apart.[1](p1)

Eastern Ghouta attack

The first attack took place around 2:30 a.m. on 21 August 2013[70][71] in Eastern Ghouta, a rebel-held suburb to the east of Damascus.[72] The area was on a rebel weapons supply route from Jordan and had been under siege by the Syrian military and Hezbollah for months.[73][74]

At least 8, and possibly 12, rockets struck within a 1500 by 500 meter area in the Zamalka and nearby Ein Tarma neighborhoods.[note 1] The rockets were all of the same improvised type, each with an estimated capacity to carry 50–60 liters (11–13 imp gal; 13–16 U.S. gal) of sarin.[1](p9)[18](p24) The rocket engine was similar in type and parameters to a 122 mm GRAD unguided surface-to-surface rocket, while the chemical warhead and the stabilization fin was of an artisan-type.[1][75] One (or both) of the labs examining the environmental samples taken from Zamalka (and Ein Tarma[18](pp28–29)) found at least traces of sarin in 14 of the 17 cases.[2](pp45–49) One of the labs described the sarin level as a “high level concentration” in 4 of the 17 samples.[2](pp45–49)

Western Ghouta attack

The second attack took place in the Western Ghouta area around 5:00 in the morning on 21 August. On 22 August, a witness who works for Moadamiya media center said he had counted seven rockets that fell in two areas of Moadamiya during the early morning of 21 August. He said four rockets hit next to the Rawda Mosque and another three in the area between Qahweh Street and Zeytouneh Street, which he said was approximately 500 meters to the east of the Rawda Mosque. He said all the rockets were of the same type.[1]

While no chemical warhead was ever found in the Western Ghouta area, one rocket engine has been identified as a 140mm M-14 unguided surface-to-surface rocket. This type of rocket can be fitted with three types of warheads: high explosive-fragmentation, white phosphorus smoke, or a chemical warhead containing 2 liters (0.44 imp gal; 0.53 U.S. gal) of sarin.[1](p5) None of the 13 environmental samples taken from Western Ghouta tested positive for sarin, although three had “degradation and/or by-products.”[2](pp43–45)

Chemical weapons capability

At the time of the attack, Syria was not a party to the Chemical Weapons Convention,[76] which prohibits the development, production, stockpiling, transfer and use of chemical weapons, although in 1968 it acceded to the 1925 Geneva Protocol for the Prohibition of the Use in War of Asphyxiating, Poisonous or Other Gases. In 2012 Syria publicly stated it possessed chemical and biological weapons and would use them if it faced a foreign attack.[77]

According to French intelligence, the Syrian Scientific Studies and Research Center (SSRC) is responsible for producing toxic agents for use in war. A group named “Branch 450” is allegedly responsible for filling munitions with chemicals and maintaining security of the chemical agent stockpiles.[78] As of September 2013, French intelligence estimated the Syrian stockpile at 1,000 tonnes, including Yperite, VX and “several hundred tonnes of sarin.”[78]

The UK’s Joint Intelligence Committee publicly dismissed the possibility of rebel responsibility for the attack in Ghouta, stating that rebels are incapable of an attack of its scale.[79] The Committee stated that “there is no credible intelligence or evidence to substantiate the claims or the possession of CW by the opposition.”[80]

Åke Sellström, a Swedish scientist who led the UN mission to investigate the attacks, said it was difficult to see how rebels could have weaponized the toxins,[81] but admitted that he didn’t know who the perpetrator was.[40]According to the Associated Press, “chemical and biological weapons experts have been relatively consistent in their analysis, saying only a military force with access to and knowledge of missile delivery systems and the sarin gas suspected in Ghouta could have carried out an attack capable of killing hundreds of people.”[82]

Initial claims

Both the opposition and the Syrian government said a chemical attack was carried out in the suburbs around Damascus on 21 August 2013. Anti-government activists said the Syrian government was to blame for the attack, while the Syrian government said foreign fighters and their international backers were to blame.[71][83]

Opposition claims

On the day of the attack, George Sabra, the head of the Syrian National Council, said 1,300 people had been killed as shells loaded with poisonous gas rained down on the capital’s eastern suburbs of Douma, Jobar, Zamalka, Arbeen and Ein Tarma.[84] A spokesman for the Free Syrian Army’s Supreme Military Council, Qassim Saadeddine, said, “people are growing desperate as they watch another round of political statements and UN meetings without any hope of action.”[72]Ahmad Jarba, who was the president of the Syrian National Coalition at the time of the attack, called on the UN investigators to travel to “the site of the massacre” and for an urgent United Nations Security Council meeting on the subject.[10] The Syrian Observatory for Human Rights said the attack was committed by the Syrian regime and called on Ban Ki-moon, Secretary-General of the United Nations, “to apply all pressure within his powers to pressure the Syrian regime.”[85][86]

The next day, a spokesman for the Syrian National Coalition, Khaled al-Saleh, said at least six doctors died after treating victims, and that they didn’t yet have the number of dead first responders.[87]

Government claims

Syria’s Deputy Prime Minister for Economic Affairs, Qadri Jamil, said foreign fighters and their international backers were to blame for the attack.[83] Syrian state television, SANA, said the accusations were fabricated to distract a team of UN chemical weapons experts which had arrived three days before the attacks.[6] Syrian President Bashar al-Assad said the claims that his government had used chemical weapons would go against elementary logic and that “accusations of this kind are entirely political.”[88][89]

UN investigation

On 19 March 2013, the Syrian government reported to the UN Security Council that the rebels had fired a rocket containing chemical materials into a government controlled part of Khan al-Asal, a district of Aleppo in northern Syria,[90] and requested a UN mission to investigate it.[91][92] As a response, the UN Secretary-General Ban Ki-moon created the “United Nations Mission to Investigate Alleged Uses of Chemical Weapons in the Syrian Arab Republic.”[92][93] The Syrian government first refused to allow the UN mission to be expanded to places outside Khan al-Assal,[94] but agreed in July 2013 to also allow investigation of the alleged attack in Sheikh Maqsood on 13 April 2013 and the alleged attack in Saraqib on 29 April 2013.[95][2](p7)

On 23 April 2013, the New York Times reported that the British and French governments had sent a confidential letter to the UN Secretary-General, stating there was evidence that the Syrian government had used chemical weapons in Aleppo, Homs and perhaps Damascus. Israel also claimed that the Syrian government had used chemical weapons on 19 March near Aleppo and Damascus.[96] On 24 April, Syria blocked UN investigators from entering Syria, while UN Under-Secretary for Political Affairs Jeffrey Feltman said this would not prevent an inquiry from being carried out.[97]

On 18 August 2013, three days before the Ghouta attack, a UN mission headed by Åke Sellström[18] arrived in Damascus with permission from the Syrian government to investigate earlier alleged chemical weapons use.[98] On the day of the attack, UN Secretary-General Ban Ki-moon expressed “the need to investigate [the Ghouta incident as] soon as possible,” hoping for consent from the Syrian government.[98] The next day, UN High Commissioner for Human Rights Navi Pillay urged government and opposition forces to allow an investigation[99] and Ban requested the government provide immediate access.[25][100] On 23 August, clashes between rebel and government forces continued in and around Ghouta, government shelling continued and UN inspectors were denied access for a second day.[22][24]White House officials were convinced that the Syrian government was trying to hide the evidence of chemical weapons use by shelling the sites and delaying their inspection.[25] Ban called for a ceasefire to allow the inspectors to visit the attack sites.[20] On 25 August the government and various rebel factions agreed to a ceasefire for five hours each day from 26 to 29 August.[101][102]

Early in the morning of 26 August several mortars hit central Damascus, including one that fell near the Four Seasons Hotel where the UN inspectors were staying.[103] Later in the day the UN team came under sniper fire en route to Moadamiyah in western Ghouta (to the southwest of central Damascus), forcing them to return to their hotel and replace one of their vehicles before continuing their investigation four hours later.[104][105] The attack prompted a rebuke from Ban toward the fighters.[106][107] After returning to Moadamiyah the UN team visited clinics and makeshift field hospitals, collected samples and conducted interviews with witnesses, survivors and doctors.[104] The inspectors spoke with 20 victims of the attacks and took blood and hair samples, soil samples, and samples from domestic animals.[107] As a result of the delay caused by the sniper attack, the team’s time in Moadamiyah was substantially shortened, with the scheduled expiry of the daily cease-fire leaving them around 90 minutes on the ground.[102][107][108]

On 28 and 29 August the UN team visited Zamalka and Ein Tarma in Eastern Ghouta, east of central Damascus, for a total time of five-and-a-half hours.[18](p6) On 30 August the team visited a Syrian government military hospital in Mazzeh and collected samples.[109] The mission left Syria early on August 31,[110] promising to return to complete the original objective to investigate the previously alleged attack sites. The Syrian government wanted the mission to stay and investigate them at that time.[111]

UN Ghouta Area report

The UN report on the investigation into the Ghouta chemical attacks was published on 16 September 2013. The report stated: “the environmental, chemical and medical samples we have collected provide clear and convincing evidence that surface-to-surface rockets containing the nerve agent sarin were used in Ein Tarma, Moadamiyah and Zamalka in the Ghouta area of Damascus.”[18](p8)[30] UN Secretary-General Ban Ki-moon called the findings “beyond doubt and beyond the pale,” and clear evidence of a war crime. “The results are overwhelming and indisputable,” he said. Ban stated a majority of the blood samples, environmental samples and rockets or rocket fragments recovered tested positive for sarin.[112] The report, which was “careful not to blame either side,” said that during the mission’s work in areas under rebel control, “individuals arrived carrying other suspected munitions indicating that such potential evidence is being moved and possibly manipulated.”[113] The UN investigators were accompanied by a rebel leader:

A leader of the local opposition forces … was identified and requested to take ‘custody’ of the Mission … to ensure the security and movement of the Mission, to facilitate the access to the most critical cases/witnesses to be interviewed and sampled by the Mission and to control patients and crowd in order for the Mission to focus on its main activities.[18](p13)

The British UN Ambassador stated that the report’s lead author, Åke Sellström, said the quality of the sarin used in the attack was higher than that used by Iraq in the Iran-Iraq war,[114] implying a purity higher than the Iraqi chemical weapons program‘s low purity of 45–60%.[115] (By comparison, Aum Shinrikyo used nearly pure sarin in the 1994 Matsumoto incident.[116])

Responses

According to Human Rights Watch, hundreds of kilograms of sarin were used in the attack, which it said suggested government responsibility, as opposition forces were not known to possess significant amounts of sarin.[117]

The Russian government dismissed the initial UN report after it was released, calling it “one-sided” and “distorted.”[118] On 17 September, Russian Foreign Minister Sergei Lavrov reiterated his government’s belief that the opposition carried out the attacks as a “provocation.”[119] The United Nations High Representative for Disarmament Affairs Angela Kane said the inspection team would review Russia’s objections.[111]

An August 2013 Scientific American article described difficulties that could arise when attempting to identify the manufacturer of sarin from soil or tissue samples.[120]

An Iranian chemical weapons expert, Abbas Foroutan, said in October 2013 that the UN should publish more details about the investigation than were provided in the report, including victims’ pulse rates and blood pressure and their response to the atropine treatment, the victims’ levels of acetylcholinesterase (sarin is an acetylcholinesterase inhibitor) and more technical details on the lab testing process.[121][122]

Final UN Mission report

The UN inspection team returned to Syria to continue investigations into other alleged chemical attacks in late September 2013. A final report on Ghouta and six other alleged attacks (including three alleged to have occurred after the Ghouta attack) was released in December 2013.[111] The inspectors wrote that they “collected clear and convincing evidence that chemical weapons were used also against civilians, including children, on a relatively large scale in the Ghouta area of Damascus on 21 August 2013.” The conclusion was based on:

  • Impacted and exploded surface-to-surface rockets, capable to carry a chemical payload, were found to contain sarin;
  • Close to the rocket impact sites, in the area where patients were affected, the environment was found to be contaminated by sarin;
  • The epidemiology of over fifty interviews given by survivors and health care workers provided ample corroboration of the medical and scientific results;
  • A number of patients/survivors were clearly diagnosed as intoxicated by an organophosphorous compound;
  • Blood and urine samples from the same patients were found positive for sarin and sarin signatures.[2](p19)

UN Human Rights Council report

The 7th Report of the Independent International Commission of Inquiry on the Syrian Arab Republic, a different group than the UN fact-finding mission, stated the sarin used in the Ghouta attack bore the “same unique hallmarks” as the sarin used in the Khan al-Assal attack. The report, dated 12 February 2014, also indicated that the perpetrators likely had access to the chemical weapons stockpile of the Syrian military. These conclusions were based on the fact-finding mission’s evidence, as the Commission of Inquiry did not conduct its own investigation of either chemical attack.[31]

Aftermath

The continuous fighting has severely limited the quality of medical care for injured survivors of the attack. A month after the attack, approximately 450 survivors still required medical attention for lingering symptoms such as respiratory and vision problems.[123] By early October 2013, the 13,000 residents of Moadhamiya, one of the places targeted in the August attack, had been surrounded by pro-government forces and under siege for five months. Severe malnourishment and medical emergencies become pressing as all supply lines had stopped.[124] Care for chronic symptoms of sarin exposure had become “just one among a sea of concerns.”[123]

As countries such as the United States and the United Kingdom debated their response to the attacks, they encountered significant popular and legislative resistance to military intervention. In particular, British Prime Minister David Cameron’s request to the House of Commons to use military force was declined by a 285–272 margin.[125][126] UK government policy subsequently focused on providing humanitarian assistance inside Syria and to refugees in neighboring countries.[127]

Within a month of the attacks, Syria agreed to join the Chemical Weapons Convention and allow all its stockpiles to be destroyed.[128]The destruction began under OPCW supervision on 6 October 2013.[129] On 23 June 2014, the last shipment of Syria’s declared chemical weapons was shipped out of the country for destruction.[130] By 18 August 2014, all toxic chemicals were destroyed aboard the US naval vessel MV Cape Ray.[131]

Nine months after the attack, there is evidence that mothers from the affected areas are giving birth to children with defects and as stillborn.[132][133]

Evidence

Witness statements and victim symptoms

Syrian human rights lawyer Razan Zaitouneh, who was present in Eastern Ghouta, stated, “Hours [after the shelling], we started to visit the medical points in Ghouta to where injured were removed, and we couldn’t believe our eyes. I haven’t seen such death in my whole life. People were lying on the ground in hallways, on roadsides, in hundreds.”[134] Several medics working in Ghouta reported the administration of large quantities of atropine, a common antidote for nerve agent toxicity, to treat victims.[135][136]

Doctors Without Borders said the three hospitals it supports in Eastern Ghouta reported receiving roughly 3,600 patients with “neurotoxic symptoms” over less than three hours during the early morning of 21 August. Of those, 355 died.[137] The Local Coordination Committees of Syria claimed that of the 1,338 victims, 1,000 were in Zamalka, of which 600 bodies were transferred to medical points in other towns and 400 remained at a Zamalka medical center.[11] Some of the fatalities were rebel fighters.[138] The deadliness of the attack is believed to have been increased due to civilians reacting to the chemical attack as if it was typical government bombardment. For conventional artillery and rocket attacks, residents usually went to the basements of buildings, where in this case the heavier-than-air sarin sank into these below-ground, poorly ventilated areas.[139] Some of the victims died while sleeping.[72]

Abu Omar of the Free Syrian Army told The Guardian that the rockets involved in the attack were unusual because “you could hear the sound of the rocket in the air but you could not hear any sound of explosion” and no obvious damage to buildings occurred.[140] Human Rights Watch’s witnesses reported “symptoms and delivery methods consistent with the use of chemical nerve agents.”[19] Activists and local residents contacted by The Guardian said that “the remains of 20 rockets [thought to have been carrying neurotoxic gas] were found in the affected areas. Many [remained] mostly intact, suggesting that they did not detonate on impact and potentially dispersed gas before hitting the ground.”[141]

Child frothing at the mouth.

A child in Ghouta froths from the mouth, a medical condition “associated with exposure to nerve agents such as Sarin.”[142][143]

Doctors Without Borders also reported seeing a “large number of victims arriving with symptoms including convulsions, excessive saliva, pinpoint pupils, blurred vision and respiratory distress.”[144] Symptoms reported by Ghouta residents and doctors to Human Rights Watch included “suffocation, muscle spasms and frothing at the mouth.”[19]

Witness statements to The Guardian about symptoms included “people who were sleeping in their homes [who] died in their beds,” headaches and nausea, “foam coming out of [victims’] mouths and noses,” a “smell something like vinegar and rotten eggs,” suffocation, “bodies [that] were turning blue,” a “smell like cooking gas” and redness and itching of the eyes.[140]Richard Spencer of The Telegraph summarised witness statements, stating, “The poison … may have killed hundreds, but it has left twitching, fainting, confused but compelling survivors.”[145]

On 22 August, the Center for Documentation of Violations in Syria published numerous testimonies. It summarised doctors’ and paramedics’ descriptions of the symptoms as “vomiting, foamy salivation, severe agitation, [pinpoint] pupils, redness of the eyes, dyspnea, neurological convulsions, respiratory and heart failure, blood out of the nose and mouth and, in some cases, hallucinations and memory loss”.[146]

Analysis of symptoms

Dr. Amesh Adalja, a senior associate for the Center for Biosecurity at the University of Pittsburgh Medical Center, said the reported symptoms are a textbook case of nerve-agent poisoning.[144]

Médecins Sans Frontières Director of Operations Bart Janssens stated that MSF “can neither scientifically confirm the cause of these symptoms nor establish who is responsible for the attack. However, the reported symptoms of the patients, in addition to the epidemiological pattern of the events – characterised by the massive influx of patients in a short period of time, the origin of the patients, and the contamination of medical and first aid workers – strongly indicate mass exposure to a neurotoxic agent.”[5]

Gwyn Winfield, Editorial Director at CBRNe World, analysed some videos from the day of the attack and wrote on the magazine’s website: “It is difficult to define [an] agent by the signs and symptoms. Clearly respiratory distress, some nerve spasms and a half hearted washdown (involving water and bare hands?!), but it could equally be a riot control agent as a [chemical warfare agent].”[147]

Rockets

A RPU-14 multiple rocket launcher, of a type that may have launched M-14 munitions found by UN inspectors on 26 August at a site in Moadamiyah.[148]

Human Rights Watch reported that two types of rockets were used: in Western Ghouta, a 140mm rocket made in the Soviet Union in 1967 and exported to Syria;[1](p5) and in Eastern Ghouta, a 330mm rocket of unknown origin.[1](p9) HRW also reported that at the time of the attack, Syrian rebels were not known to be in possession of the rockets used.[1](p20)[149]

Seymour Hersh has suggested that the 330mm rockets may have been produced locally, and with a limited range.[150] Blogger Eliot Higgins has looked at the munitions linked to the attack and analysed footage of the putative launchers inside government territory.[151]

According to a study published in January 2014 by Theodore Postol and Richard Lloyd, of the Massachusetts Institute of Technology, the rockets used in the attack had a range of about two kilometers, indicating the munitions could not have been fired from the ‘heart’ or from the Eastern edge of the Syrian Government Controlled Area shown in the Intelligence Map published by the White House on 30 August 2013.[75][152][153] A response from Higgins and Kaszeta included an observation that the Russian-language news site ANNA News had posted videos showing a Syrian government military operation running from June to August 2013 to clear positions between Jobar and Qaboun, a strip of land about 2 km away from the 21 August impact sites.[154] MIT Professor Theodore Postol contacted Dan Kaszeta and asked him how he came to the conclusion that Hexamine was the “smoking gun” regarding the alleged culpability of the Syrian Government. Åke Sellström told Postol that indeed “the presence of hexamine may mean that this substance was used as scavenger for protons when producing sarin” but that it was a common substance and not conclusive evidence implicating the Syrian government.[155]

Many of the munitions and their fragments had been moved; however, in two cases, the UN could identify the likely launch azimuths.[156] Triangulating rocket trajectories suggests that the origin of the attack may have been within government or rebel-held territory. Consideration of missile ranges influences calculations as to whether rockets originated from the government or rebel-held regions.[150][157]

Communications

Two purported intercepts of communications that appeared to implicate the Syrian government received prominent media coverage. One was a phone call allegedly between Syrian officials which Israel’s Unit 8200 was said to have intercepted and passed to the US.[158] The other was a phone call which the German Bundesnachrichtendienst said it had intercepted, between a high-ranking representative of Hezbollah and the Iranian embassy, in which the purported Hezbollah official said that poison gas had been used and that Assad’s order to attack with chemical weapons had been a strategic error.[159][160]

On 29 August the Associated Press reported that, according to two U.S. intelligence officials and two other U.S. officials, the U.S. intercept was a conversation between “low-level” Syrian officials with no direct link to the upper echelons of the government or military.[161]

The Bild am Sonntag newspaper subsequently reported that German intelligence indicated that Assad had likely not ordered the attacks.[162] According to Bild, “intelligence interception specialists” relying on communications intercepted by the German vessel Oker said that Syrian military commanders had repeatedly been asking permission to launch chemical attacks for around four months, with permission always being denied from the presidential palace. The sources concluded that 21 August attack had probably not been approved by Bashar al-Assad.[162][163][164]

Video

Murad Abu Bilal, Khaled Naddaf and other Center for Documentation of Violations in Syria and Local Coordination Committees of Syria (LCC) media staff went to Zamalka soon after the attacks to film and obtain other documentary evidence. Almost all the journalists died from inhalation of the neurotoxins, except Murad Abu Bilal, who was the only Zamalka LCC media member to survive.[165][166] The videos were published on YouTube, attracting worldwide media attention.[167]

Experts who have analysed the first video said it shows the strongest evidence yet consistent with the use of a lethal toxic agent. Visible symptoms reportedly included rolling eyes, foaming at the mouth, and tremors. There was at least one image of a child suffering miosis, the pin-point pupil effect associated with the nerve agent Sarin, a powerful neurotoxin reportedly used before in Syria. Ralph Trapp, a former scientist at the Organisation for the Prohibition of Chemical Weapons, said the footage showed what a chemical weapons attack on a civilian area would look like, and went on to note “This is one of the first videos I’ve seen from Syria where the numbers start to make sense. If you have a gas attack you would expect large numbers of people, children and adults, to be affected, particularly if it’s in a built-up area.”[167]

Some experts, among them Jean Pascal Zanders, initially stated that evidence that sarin was used, as claimed by pro-rebel sources, was still lacking and highlighted the lack of second-hand contaminations typically associated with use of weapons-grade nerve agents: “I remain sceptical that it was a nerve agent like sarin. I would have expected to see more convulsions,” he said. “The other thing that seems inconsistent with sarin is that, given the footage of first responders treating victims without proper protective equipment, you would expect to see considerable secondary casualties from contamination – which does not appear to be evident.” However, after Zanders saw footage imminently after the attack, he changed his mind, saying: “The video footage and pictures this time are of a far better quality. You can clearly see the typical signs of asphyxiation, including a pinkish blueish tinge to the skin colour. There is one image of an adult woman where you can see the tell-tale blackish mark around her mouth, all of which suggests death from asphyxiation.”[167] Zanders however cautioned that these symptoms covered a range of neurotoxicants, including some available for civilian use as pest control agents, and said that until the UN reported its analysis of samples, “I can’t make a judgement. I have to keep an open mind.”[168]

According to a report by The Daily Telegraph, “videos uploaded to YouTube by activists showed rows of motionless bodies and medics attending to patients apparently in the grip of seizures. In one piece of footage, a young boy appeared to be foaming at the mouth while convulsing.”[84]

Hamish de Bretton-Gordon, a former commander of British Chemical and Biological counterterrorism forces,[169] told BBC that the images were very similar to previous incidents he had witnessed, although he could not verify the footage.[170]

Foreign government assessments

According to public statements, intelligence agencies in Israel,[171] the United Kingdom,[172] the United States,[12] France,[173]Turkey,[174] and Germany[175] concluded that the Syrian government was most likely responsible for the attacks. Western intelligence agencies agreed that video evidence is consistent with the use of a nerve agent, such as sarin. Laboratory tests showed traces of sarin, in blood and hair samples collected from emergency workers who responded to the attacks.[176]

Russia said there was no evidence tying the Syrian government to the attack and that it was likely carried out by an opposition group.[177]

France

On 2 September, the French government published a nine-page intelligence report blaming the Syrian government for the Ghouta attacks.[3][78][178] An unnamed French government official said that the analysis was carried out by the Directorate-General for External Security (DGSE) and Direction du renseignement militaire (DRM) based on satellite and video images, on-the-ground sources, and samples collected from two April attacks.[179] The report said analysis of samples collected from attacks in Saraqeb and Jobar in April 2013 had confirmed the use of sarin.[78]

The Guardian reported that French intelligence had images that showed rocket attacks on opposition neighborhoods from government-controlled areas to the east and west of Damascus. The report said that the government later launched conventional bombing of those neighborhoods in order to destroy evidence of a chemical attack.[180] Based on analysis of 47 videos, the report said at least 281 fatalities occurred. Using other sources and extrapolation a chemical attack model estimated the total number of death at approximately 1,500.[3]

Germany

The Bundesnachrichtendienst said it intercepted a phone call between a Hezbollah official and the Iranian Embassy in which the Hezbollah representative criticised Assad’s decision to attack with poison gas, apparently confirming its use by the Syrian government.[159][160] German newspaper Der Spiegel reported on 3 September that BND President Gerhard Schindler told them that based on the agency’s evidence, Germany now shared the United Kingdom, United States, and France’s view that the attacks were carried out by the Syrian government. However, they also said the attack may have been much more potent than intended, speculating that there may have been an error in mixing the chemical weapons used.[181][182]

Israel

Without going into detail, Israeli Intelligence Minister Yuval Steinitz said on 22 August 2013 that Israel’s intelligence assessment was that the Syrian government used chemical weapons in the Damascus area.[171] Defense Minister Moshe Ya’alon said the Syrian government had already used chemical weapons against the rebels on a smaller scale multiple times prior to the Ghouta attacks.[183]Fox News reported that Unit 8200 helped provide intelligence to the United States, Israel’s closest international ally, implicating the Syrian government in the attacks.[184] Prime Minister Benjamin Netanyahu said at the General debate of the sixty-eighth session of the United Nations General Assembly that Syrian government used the chemical weapons against its own people.[185]

Russia

Russian officials said that there was no proof that the government of Syria had a hand in the chemical attacks. Russian Foreign Minister Sergei Lavrov described the American, British and French intelligence reports as “unconvincing”[186] and said at a joint news conference with his French counterpart Laurent Fabius after the release of the United Nations report in mid-September that he continued to believe the rebels carried out the attack.[177]Russian President Vladimir Putin said he wanted to see evidence that would make it “obvious” who used chemical weapons in Ghouta.[187]

In a commentary published in The New York Times on 11 September 2013, Putin wrote that “there is every reason to believe [poison gas] was used not by the Syrian Army, but by opposition forces, to provoke intervention by their powerful foreign patrons,”.[39] Lavrov said on 18 September that “new evidence” given to Russia by the Syrian government would be forthcoming.[188]

Turkey

The Turkish government-run Anadolu Agency published an unconfirmed report on 30 August 2013, pointing to the Syrian 155th Missile Brigade and the 4th Armored Division as the perpetrators of the two attacks. It said the attack had involved 15 to 20 missiles with chemical warheads at around 02:45 on 21 August, targeting residential areas between Douma and Zamalka in Eastern Ghouta. It claimed that the 155th Missile Brigade had used 9K52 Luna-M missiles, M600 missiles, or both, fired from Kufeyte, while other rockets with a 15- to 70-kilometer range were fired by the 4th Armored Division from Mount Qasioun. The agency did not explain its source.[189]

United Kingdom

A report on the attacks by the United Kingdom’s Joint Intelligence Committee (JIC) was published on 29 August 2013 prior to a vote on intervention by the House of Commons of the United Kingdom. The report said at least 350 people were killed and that it was “highly likely” that the attacks had been carried out by the Syrian government, resting in part on the firm view that the Syrian opposition was not capable of carrying out a chemical weapons attack on this scale, and on the JIC view that the Syrian government had used chemical weapons in the Syrian civil war on a small scale on 14 previous occasions.[4] Analysis of the Ghouta attacks themselves was based largely on reviewing video footage and publicly available witness evidence. The report conceded problems with motivation for the attacks, saying there was “no obvious political or military trigger for regime use of CW on an apparently larger scale now.”[79][190][191][192] British officials said they believe the Syrian military used chemical weapons, including the nerve agent sarin, on a small scale against the opposition on at least 14 times prior to the Ghouta attacks and described “a clear pattern of regime use” of the nerve agent since 2012.[193]

The report was met with substantial scepticism in the British media, with the Daily Mail explicitly comparing it with the “dodgy dossier” the UK government had published in 2003 prior to the Iraq War.[194] A vote in the House of Commons to approve UK participation in military action against Syria was narrowly rejected, with some MPs arguing that the case for Syrian government culpability was not sufficiently strong to justify approving action.[195][196]Prime Minister David Cameron himself had been forced to concede that “in the end there is no 100 percent certainty about who is responsible.”[197][198]

United States

The map of “Areas of Influence” and “Areas Reportedly affected by the 21 August Chemical Attack” that was published by the White House on 30 August 2013.[12]

A controversial “US government assessment of the Ghouta attacks” was published by the White House on 30 August 2013, with a longer classified version made available to members of Congress. The report blamed the chemical attacks on the Syrian government, saying rockets containing a nerve agent were fired from government-held territory into neighborhoods in the early morning, impacting at least 12 locations. It stated 1,429 people were killed, including at least 426 children. It dismissed the possibility that evidence supporting the US government’s conclusion could have been manufactured by the opposition, stating it “does not have the capability” to fabricate videos, eyewitness accounts, and other information. The report also said that the US believed Syrian officials directed the attacks, based on “intercepted communications.”[12] A major element, as reported by news media, was an intercepted telephone call between a Syrian Ministry of Defense official and a Syrian 155th Brigade chemical weapons unit commander in which the former demanded answers for the attacks.[199] According to some reports, this phone intercept was provided to the U.S. by Israeli Intelligence CorpsUnit 8200.[158]

The U.S. government assessment suggested a motive for the attack, describing it as “a desperate effort to push back rebels from several areas in the capital’s densely packed eastern suburbs.” The report then states that evidence suggests “the high civilian death toll surprised and panicked senior Syrian officials, who called off the attack and then tried to cover it up.”[200] Secretary of State John Kerry later announced that hair, blood, soil, and cloth samples collected from the attack sites had tested positive for sarin or its immediate breakdown products.[201][202]

At least three members of Congress, including at least one member of President Barack Obama‘s Democratic Party, expressed skepticism about the US intelligence report, calling the evidence circumstantial and thin.[203][204][205][206] Obama’s request that Congress authorize military force was not put to a vote of either the House of Representatives or the Senate, and the president ultimately admitted that “I wouldn’t say I’m confident” that he could convince Congress to support strikes against Syria.[207]

Democratic Party Representative Alan Grayson offered some details regarding the classified report, which he described as 12 pages long, and criticized both the four-page public summary and the classified report. Grayson said the unclassified summary relied on “intercepted telephone calls, ‘social media’ postings and the like, but not one of these is actually quoted or attached … (As to whether the classified summary is the same, I couldn’t possibly comment, but again, draw your own conclusion.)” Grayson cited as a problematic example the intercepted phone call between a Syrian Ministry of Defense official and the Syrian 155th Brigade, the transcript of which was not provided in the classified report, leaving Grayson unable to judge the accuracy of a report in The Daily Caller that the call’s implications had been misrepresented in the report.[205][206]

The AP quoted anonymous US intelligence officials as saying that the evidence presented in the report linking Assad to the attack was “not a slam dunk.”[161]Jeffrey Goldberg also reported that James Clapper, the Director of National Intelligence, personally told President Obama that the case for the Syrian government’s responsibility was strong but not a “slam dunk.”[208] The AP later characterized the evidence released by the administration as circumstantial and said the government had denied its requests for more direct evidence, including satellite imagery and communications intercepts cited in the government assessment.[209]

IPS news analyst Gareth Porter questioned why the report was released by the White House as a “government assessment” as opposed being released by the Office of the Director of National Intelligence as an “intelligence community assessment.” Porter quoted former intelligence officials who said the report was “evidently an administration document” and who also suggested evidence was “cherry-picked” to support the conclusion that the Syrian government carried out the attacks.[210]

On 8 September 2013, the then White House Chief-of-Staff, Denis McDonough said the administration lacks the “irrefutable, beyond-a-reasonable-doubt evidence”, but that a “common-sense test” implicates Assad.[211] The U.S. publicly stated there was no “reliable” evidence that the opposition had access to chemical weapons, although Seymour Hersh reported that U.S. intelligence agencies privately assessed some rebel factions to be capable of sarin production.[150]

Legal status

Attack

At the time of the attack, Syria was not a member of the Chemical Weapons Convention. However, Human Rights Watch argues that the Ghouta chemical attack was illegal under a different international agreement:

Syria is a party to the 1925 Geneva Gas protocol, which bans the use in war of asphyxiating, poisonous or other gases, and of all analogous liquids, materials or devices. The use of chemical weapons is also prohibited as a matter of customary international humanitarian law, or the laws of war. The prohibition on the use of chemical weapons applies to all armed conflicts, including so-called non-international armed conflicts such as the current fighting in Syria. The International Criminal Tribunal for the former Yugoslavia, in the Tadic case, stated “there undisputedly emerged a general consensus in the international community on the principle that the use of [chemical] weapons is also prohibited in internal armed conflicts.”[1](p21)

International Criminal Court referral

Human Rights Watch stated that the UN Security Council should refer the Syria situation to the International Criminal Court (ICC) “to ensure accountability for all war crimes and crimes against humanity.”[136]Amnesty International also said that the Syria situation should be referred to the ICC because “the best way for the United States to signal its abhorrence for war crimes and crimes against humanity and to promote justice in Syria, would be to reaffirm its support for the Rome Statute establishing the International Criminal Court.”[212] However, as the amendment to the Rome Statute of the International Criminal Court explicitly making it a war crime to use chemical weapons in an internal conflict has not been ratified by any major state nor Syria, the legal situation is complex and reliant on the attack being a part of a wider war crime.[213]

Reactions

Domestic

Information Minister Omran al-Zoubi was quoted by the official state news agency, Syrian Arab News Agency (SANA), as saying that the government did not and would not use such weapons, if in fact they even existed. Al-Zoubi said, “everything that has been said is absurd, primitive, illogical and fabricated. What we say is what we mean: there is no use of such things (chemical weapons) at all, at least not by the Syrian army or the Syrian state, and it’s easy to prove and it is not that complicated.”[214] SANA called the reports of chemical attacks as “untrue and designed to derail the ongoing UN inquiry.” A Syrian military official appeared on state television denouncing the reports as “a desperate opposition attempt to make up for rebel defeats on the ground.”[71] Deputy Foreign Minister Faisal Mekdad declared it a tactic by the rebels to turn around the civil war which he said “they were losing” and that, though the government had admitted to having stocks of chemical weapons, stated they would never be used “inside Syria”.[215]Democratic Union Party leader Salih Muslim said he doubted that the Syrian government carried out the chemical attack.[216]

The National Coalition called the attack a “coup de grace that kills all hopes for a political solution in Syria.”[217] In a statement on Facebook, the Coventry-based Syrian Observatory for Human Rights, an anti-government activist network, blamed the attack on the Syrian military and said of the incident that “we assure the world that silence and inaction in the face of such gross and large-scale war crimes, committed in this instance by the Syrian regime, will only embolden the criminals to continue in this path. The international community is thus complicit in these crimes because of its [polarisation], silence and inability to work on a settlement that would lead to the end of the daily bloodshed in Syria.”[218]

International

The international community condemned the attacks. United States President Barack Obama said the US military should strike targets in Syria to retaliate for the government’s purported use of chemical weapons, a proposal publicly supported by French President François Hollande, but condemned by Russia and Iran.[219][220] The Arab League stated it would support military action against Syria in the event of UN support, though member states Algeria, Egypt, Iraq, Lebanon, and Tunisia opposed it.[221]

At the end of August, the House of Commons of the United Kingdom voted against military intervention in Syria.[222] In early September, the United States Congress began debating a proposed authorisation to use military force, although votes on the resolution were indefinitely postponed amid opposition from many legislators[223] and tentative agreement between Obama and Russian President Vladimir Putin on an alternative proposal, under which Syria would declare and surrender its chemical weapons to be destroyed under international supervision.[224]

In contrast to the positions of their governments, polls in early September indicated that most people in the US, UK, Germany and France opposed military intervention in Syria.[225][226][227][228][229] One poll indicated that 50% of Americans could support military intervention with cruise missiles only, “meant to destroy military units and infrastructure that have been used to carry out chemical attacks.”[230] In a survey of American military personnel, around 75% said they opposed air strikes on Syria, with 80% saying an attack would not be “in the U.S. national interest”.[231] Meanwhile, a Russian poll suggested that most Russians supported neither side in the conflict, with less than 10% saying they supported Assad.[232]

Allegations of false flag attack

The attacks prompted some U.S. intelligence officials to speculate they were meant to draw the West into the war,[161] a concept dismissed by others.[233][234] In December 2013 Seymour Hersh wrote that in the days before and after the attack, sensors notifying U.S. intelligence agencies of Syrian chemical weapons deployment did not activate, and intelligence briefings shown to the U.S. president contained no information about an impending government chemical weapons attack.[150] Publicly, the U.S. government cited classified intercepts of communications it said were between Syrian officials, unavailable to the public, which they state prove Syrian government forces carried out the chemical attack.[12] Criticizing what they called a misleading presentation of intelligence, a former senior U.S. intelligence official quoted by Seymour Hersh said the transcript actually included intercepts from many months prior to the attack, collated to make them appear related to the Ghouta attacks.[150]

In April 2014 Hersh wrote an article proposing the attacks were committed by Al-Qaeda affiliate Al-Nusra Front, whom Hersh writes were supplied with sarin by Turkey.[235][236] Hersh’s argument received some support,[237][238]but was dismissed by other commentators.[239][240] The US and Turkish governments denied the accuracy of Hersh’s article.[241] On October 20, 2015, Republican People’s Party deputy Eren Erdem stated that documents from a Turkish government investigation showed that ISIL and affiliated groups received help from Turkish intelligence to carry out the Ghouta chemical attack.[242][243]

See also

https://en.wikipedia.org/wiki/Ghouta_chemical_attack

The victims of a bombing in northern Syria this week were exposed to sarin, a banned but easily manufactured poison that has been widely used in chemical weapons, Turkish officials who conducted autopsies on the victims said on Thursday.

What is sarin?

Sarin is a nerve agent, one of a class of chemical weapons that affect the brain’s ability to communicate with the body’s organs through the nervous system. It is a colorless, tasteless, odorless liquid that was first synthesized in Germany in 1938 as a potential pesticide.

Sarin is considered “the most volatile of the nerve agents,” according to the Centers for Disease Control and Prevention. “This means it can easily and quickly evaporate from a liquid into a vapor and spread into the environment.”

Sarin vapor does not last long, but it can be deadly if inhaled. Contact with sarin liquid on exposed surfaces, in food, or in water can also be fatal. Its effects may strike quickly or be delayed after exposure.

How does it work?

All nerve agents belong to a class of organic compounds that contain phosphorous, and work in essentially the same way, by inhibiting the action of a crucial enzyme in the body that allows muscles and organs to contract. Without the enzyme’s action, the muscles and organs are constantly stimulated and stop working properly; asphyxiation soon follows.

How is it weaponized?

Sarin is dangerous to handle and has a short shelf life, so it is usually stored in the form of two separate precursor compounds that will produce sarin when mixed together.

On the battlefield, sarin and other nerve agents can be used against targets by spraying them as a liquid or an aerosol. Chemical bombs are designed to spray out the liquid on detonation. The Syrian government is believed to have used such a bomb this week in Idlib Province.

The United Nations Chemical Convention, which bans the use of sarin in war, went into effect in 1997. The Syrian government agreed in 2013 to destroy its chemical weapons stockpile, including sarin.

How toxic is it?

According to the United States military, sarin is 81 times as toxic as cyanide and 543 times as toxic as chlorine, which has been used in Syria as a chemical weapon. Chlorine has legitimate commercial uses and is not banned.

What are the symptoms of exposure?

Symptoms of exposure may include the pupils of the eyes shrinking to pinpoints, rapid breathing, vomiting, convulsions, paralysis and respiratory failure. Swift medical attention can reverse the effects of low levels of exposure.

https://www.nytimes.com/2017/04/06/world/middleeast/sarin-nerve-agent.html?&moduleDetail=section-news-1&action=click&contentCollection=Middle%20East&region=Footer&module=MoreInSection&version=WhatsNext&contentID=WhatsNext&pgtype=article

Sarin

From Wikipedia, the free encyclopedia
For other uses, see Sarin (disambiguation).
Not to be confused with Serine, Sarrin, or Saran (disambiguation).
Sarin[1]
Sarin-2D-by-AHRLS-2011.png
Sarin-3D-balls-by-AHRLS-2012.png
Names
Preferred IUPAC name

(RS)-Propan-2-yl methylphosphonofluoridate
Other names

(RS)-O-Isopropyl methylphosphonofluoridate; IMPF;
GB;[2]
2-(Fluoro-methylphosphoryl)oxypropane;
Phosphonofluoridic acid, P-methyl-, 1-methylethyl ester
Identifiers
3D model (Jmol)
ChEBI
ChemSpider
UNII
Properties
C4H10FO2P
Molar mass 140.09 g·mol−1
Appearance Clear colorless liquid
Odor Odorless in pure form. Impure sarin can smell like mustard or burned rubber.
Density 1.0887 g/cm3 (25 °C)
1.102 g/cm3 (20 °C)
Melting point −56 °C (−69 °F; 217 K)
Boiling point 158 °C (316 °F; 431 K)
Miscible
log P 0.30
Hazards
Main hazards It is a lethal cholinergic agent.
Safety data sheet Lethal Nerve Agent Sarin (GB)
Extremely Toxic (T+)[3]
NFPA 704
Flammability code 1: Must be pre-heated before ignition can occur. Flash point over 93 °C (200 °F). E.g., canola oil Health code 4: Very short exposure could cause death or major residual injury. E.g., VX gas Reactivity code 0: Normally stable, even under fire exposure conditions, and is not reactive with water. E.g., liquid nitrogen Special hazards (white): no code

NFPA 704 four-colored diamond

Lethal dose or concentration (LD, LC):
550 ug/kg (rat, oral) [4]
Except where otherwise noted, data are given for materials in their standard state (at 25 °C [77 °F], 100 kPa).
 verify (what is Yes ?)
Infobox references

Sarin, or GB (G-series, ‘B’), is a colorless, odorless liquid,[5] used as a chemical weapon due to its extreme potency as a nerve agent. It is generally considered a weapon of mass destruction. Production and stockpiling of sarin was outlawed as of April 1997 by the Chemical Weapons Convention of 1993, and it is classified as a Schedule 1 substance. In June 1994, the UN Special Commission on Iraqi disarmament destroyed the nerve agent sarin under Security Council resolution 687 (1991) concerning the disposal of Iraq’s weapons of mass destruction.[6]

Sarin is an organophosphorus compound with the formula [(CH3)2CHO]CH3P(O)F. It can be lethal even at very low concentrations, where death can occur within one[7][8] to ten minutes after direct inhalation of a lethal dose, due to suffocation from lung muscle paralysis, unless some antidotes, typically atropine and an oxime, such as pralidoxime, are quickly administered.[5] People who absorb a non-lethal dose, but do not receive immediate medical treatment, may suffer permanent neurological damage.

Production and structure

Sarin is a chiral molecule because it has four chemically distinct substituents attached to the tetrahedral phosphorus center.[9] The SP form (the (–) optical isomer) is the more active enantiomer due to its greater binding affinity to acetylcholinesterase.[10][11] The P-F bond is easily broken by nucleophilic agents, such as water and hydroxide. At high pH, sarin decomposes rapidly to nontoxic phosphonic acid derivatives.

It is usually manufactured and weaponized as a racemic mixture—an equal mixture of both enantiomeric forms, as this is a simpler process and provides an adequate weapon.

A number of production pathways can be used to create sarin. The final reaction typically involves attachment of the isopropoxy group to the phosphorus with an alcoholysis with isopropyl alcohol. Two variants of this process are common. One is the reaction of methylphosphonyl difluoride with isopropyl alcohol, which produces hydrofluoric acid as a byproduct:

Sarin synth with racemic stereochemistry.png

The second process, uses equal quantities of methylphosphonyl difluoride and methylphosphonic dichloride, a mixture “Di-Di” in this process, rather than just the difluoride. This reaction also gives sarin, but hydrochloric acid as a byproduct instead. The Di-Di process was used by the United States for the production of its unitary sarin stockpile.[12]

The scheme below describes an example of Di-Di process. The selection of reagents is arbitrary and reaction conditions and product yield depend on the selected reagents. Inert atmosphere and anhydrous conditions are used for synthesis of sarin and other organophosphates.

An example of

As both reactions leave considerable acid in the product, bulk sarin produced without further treatment has a very poor shelf life and would be rather destructive to containers or weapon systems. Various methods have been tried to resolve these problems. In addition to industrial refining techniques to purify the chemical itself, various additives have been tried to combat the effects of the acid, such as:

Another byproduct of these two chemical processes is diisopropyl methylphosphonate, formed when a second isopropyl alcohol reacts with the sarin itself. This chemical degrades into isopropyl methylphosphonic acid.[19]

Biological effects

Sarin (red), acetylcholinesterase (yellow), acetylcholine (blue)

Like all other nerve agents, sarin attacks the nervous system by interfering with the degradation of the neurotransmitter acetylcholine at neuromuscular junctions. Death will usually occur as a result of asphyxia due to the inability to control the muscles involved in breathing function.

Specifically, sarin is a potent inhibitor of acetylcholinesterase,[20] an enzyme that degrades the neurotransmitter acetylcholine after it is released into the synaptic cleft. In vertebrates, acetylcholine is the neurotransmitter used at the neuromuscular junction, where signals are transmitted between neurons from the central nervous systems to muscle fibres. Normally, acetylcholine is released from the neuron to stimulate the muscle, after which it is degraded by acetylcholinesterase, allowing the muscle to relax. A build-up of acetylcholine in the synaptic cleft, due to the inhibition of cholinesterase, means the neurotransmitter continues to act on the muscle fibre, so that any nerve impulses are effectively continually transmitted.

Sarin acts on cholinesterase by forming a covalent bond with the particular serine residue at the active site. Fluoride is the leaving group, and the resulting phosphoester is robust and biologically inactive.[21][22]

Its mechanism of action resembles that of some commonly used insecticides, such as malathion. In terms of biological activity, it resembles carbamate insecticides, such as Sevin, and the medicines pyridostigmine, neostigmine, and physostigmine.

Degradation and shelf life

Rabbit used to check for leaks at former sarin production plant (Rocky Mountain Arsenal), 1970

The most important chemical reactions of phosphoryl halides is the hydrolysis of the bond between phosphorus and the fluoride. This P-F bond is easily broken by nucleophilic agents, such as water and hydroxide. At high pH, sarin decomposes rapidly to nontoxic phosphonic acid derivatives.[23][24] The initial breakdown of sarin is into isopropyl methylphosphonic acid (IMPA), a chemical that is not commonly found in nature except as a breakdown product of sarin (this is useful for detecting the recent deployment of sarin as a weapon). IMPA then degrades into methylphosphonic acid (MPA), which can also be produced by other organophosphates.[25]

Sarin without the residual acid removed degrades after a period of several weeks to several months. The shelf life can be shortened by impurities in precursor materials. According to the CIA, some Iraqi sarin had a shelf life of only a few weeks, owing mostly to impure precursors.[26]

Along with nerve agents such as tabun and VX, sarin can have a maximum shelf-life of five years.[27] Sarin’s otherwise-short shelf life can be extended by increasing the purity of the precursor and intermediates and incorporating stabilizers such as tributylamine. In some formulations, tributylamine is replaced by diisopropylcarbodiimide (DIC), allowing sarin to be stored in aluminium casings. In binary chemical weapons, the two precursors are stored separately in the same shell and mixed to form the agent immediately before or when the shell is in flight. This approach has the dual benefit of solving the stability issue and increasing the safety of sarin munitions.

Effects and treatment]

Sarin has a high volatility (ease with which a liquid can turn into a gas) relative to similar nerve agents, therefore inhalation can be very dangerous and even vapor concentrations may immediately penetrate the skin. A person’s clothing can release sarin for about 30 minutes after it has come in contact with sarin gas, which can lead to exposure of other people.[28]

Even at very low concentrations, sarin can be fatal. Death may follow in 1 to 10 minutes after direct inhalation of a lethal dose unless antidotes, typically atropine and pralidoxime, are quickly administered.[5] Atropine, an antagonist to muscarinic acetylcholine receptors, is given to treat the physiological symptoms of poisoning. Since muscular response to acetylcholine is mediated through nicotinic acetylcholine receptors, atropine does not counteract the muscular symptoms. Pralidoxime can regenerate cholinesterases if administered within approximately five hours. Biperiden, a synthetic acetylcholine antagonist, has been suggested as an alternative to atropine due to its better blood–brain barrier penetration and higher efficacy.[29]

As a nerve gas, sarin in its purest form is estimated to be 26 times more deadly than cyanide.[30] The LD50 of subcutaneously injected sarin in mice is 172 μg/kg.[31] Treatment measures have been described.[32]

Initial symptoms following exposure to sarin are a runny nose, tightness in the chest and constriction of the pupils. Soon after, the victim has difficulty breathing and experiences nausea and drooling. As the victim continues to lose control of bodily functions, the victim vomits, defecates and urinates. This phase is followed by twitching and jerking. Ultimately, the victim becomes comatose and suffocates in a series of convulsive spasms. Moreover, common mnemonics for the symptomatology of organophosphate poisoning, including sarin gas, are the “killer B’s” of bronchorrhea and bronchospasm because they are the leading cause of death,[33] and SLUDGE – Salivation, Lacrimation, Urination, Defecation, Gastrointestinal distress, and Emesis.

Diagnostic tests

Controlled studies in healthy men have shown that a nontoxic 0.43 mg oral dose administered in several portions over a 3-day interval caused average maximum depressions of 22 and 30%, respectively, in plasma and erythrocyte cholinesterase levels. A single acute 0.5 mg dose caused mild symptoms of intoxication and an average reduction of 38% in both measures of cholinesterase activity. Sarin in blood is rapidly degraded either in vivo or in vitro. Its primary inactive metabolites have in vivo serum half-lives of approximately 24 hours. The serum level of unbound isopropylmethylphosphonic acid (IMPA), a sarin hydrolysis product, ranged from 2-135 µg/L in survivors of a terrorist attack during the first 4 hours post-exposure. Sarin or its metabolites may be determined in blood or urine by gas or liquid chromatography, while cholinesterase activity is usually measured by enzymatic methods.[34]

A newer method called “Fluoride Regeneration” or “Fluoride Reactivation” detects the presence of nerve agents for a longer period after exposure than the methods described above. Fluoride reactivation is a technique has been explored since at least the early 2000s. This technique obviates some of the deficiencies of older procedures. Sarin not only reacts with the water in the blood plasma through hydrolysis (forming so-called ‘free metabolites’), but also reacts with various proteins to form ‘protein adducts’. These protein adducts are not so easily removed from the body, and remain for a longer period of time than the free metabolites. One clear advantage of this process is that the period, post-exposure, for determination of Sarin exposure is much longer, possibly 5 to 8 weeks according to at least one study.[35][36]

Toxicity

Sarin is highly toxic, whether by respiratory or dermal exposure. The toxicity of sarin in humans is largely based on calculations from studies with animals. The general consensus is that the lethal concentration of sarin in air is approximately 35 mg per cubic meter per minute for a two-minute exposure time by a healthy adult breathing normally (exchanging 15 liters of air per minute). This number represents the estimated lethal concentration for 50% of exposed victims, the LCt50 value. There are many ways to make relative comparisons between toxic substances. The list below compares some current and historic chemical warfare agents with sarin, with a direct comparison to the respiratory Lct50:

History

Sarin was discovered in 1938 in Wuppertal-Elberfeld in Germany by scientists at IG Farben who were attempting to create stronger pesticides; it is the most toxic of the four G-Series nerve agents made by Germany. The compound, which followed the discovery of the nerve agent tabun, was named in honor of its discoverers: Schrader, Ambros, Gerhard Ritter, and von der Linde.[39]

Use as a weapon

In mid-1939, the formula for the agent was passed to the chemical warfare section of the German Army Weapons Office, which ordered that it be brought into mass production for wartime use. Pilot plants were built, and a high-production facility was under construction (but was not finished) by the end of World War II. Estimates for total sarin production by Nazi Germany range from 500 kg to 10 tons.[40] Though sarin, tabun and soman were incorporated into artillery shells, Germany did not use nerve agents against Allied targets.

U.S. Honest John missile warhead cutaway, showing M134 sarin bomblets (c. 1960)

  • 1950s (early): NATO adopted sarin as a standard chemical weapon, and both the USSR and the United States produced sarin for military purposes.
  • 1953: 20-year-old Ronald Maddison, a Royal Air Force engineer from Consett, County Durham, died in human testing of sarin at the Porton Down chemical warfare testing facility in Wiltshire, England. Ten days after his death an inquest was held in secret which returned a verdict of “misadventure”. In 2004, the inquest was reopened and, after a 64-day inquest hearing, the jury ruled that Maddison had been unlawfully killed by the “application of a nerve agent in a non-therapeutic experiment”.[41]
  • 1957: Regular production of sarin chemical weapons ceased in the United States, though existing stocks of bulk sarin were re-distilled until 1970.[42]
  • 1976: Chile’s intelligence service, DINA, assigns biochemist Eugenio Berríos to develop sarin gas within its program Proyecto Andrea, to be used as a weapon against its opponents.[43]One of DINA’s goals was to package it in spray cans for easy use, which, according to testimony by former DINA agent Michael Townley, was one of the planned procedures in the 1976 assassination of Letelier.[43] Berríos later testified that it was used in a number of assassinations.[44][45]
  • March 1988: Over two days in March, the ethnic Kurd city of Halabja in northern Iraq (population 70,000) was bombarded with chemical bombs, which included sarin, in the Halabja poison gas attack. An estimated 5,000 people died.[46]
  • April 1988: Sarin was used four times against Iranian soldiers at the end of the Iran–Iraq War, helping Iraqi forces to retake control of the al-Faw Peninsula during the Second Battle of al-Faw.
  • 1993: The United Nations Chemical Weapons Convention was signed by 162 member countries, banning the production and stockpiling of many chemical weapons, including sarin. It went into effect on April 29, 1997, and called for the complete destruction of all specified stockpiles of chemical weapons by April 2007.[47] When the convention entered force, the parties declared worldwide stockpiles of 15,047 tonnes of sarin. As of December 2015, 89% of the stockpiles had been destroyed.[48]
  • 1994: Matsumoto incident; the Japanese religious sect Aum Shinrikyo released an impure form of sarin in Matsumoto, Nagano, killing eight people and harming over 200. The Australian sheep station Banjawarn was a testing ground.
  • 1995: Tokyo subway sarin attack; the Aum Shinrikyo sect released an impure form of sarin in the Tokyo Metro. Twelve people died.[49]
  • 2004: Iraqi insurgents detonated a 155 mm shell containing binary precursors for sarin near a U.S. convoy in Iraq. The shell was designed to mix the chemicals as it spun during flight. The detonated shell released only a small amount of sarin gas, either because the explosion failed to mix the binary agents properly or because the chemicals inside the shell had degraded with age. Two United States soldiers were treated after displaying the early symptoms of exposure to sarin.[50]
  • 2013: Ghouta chemical attack; sarin was used in an attack in the Ghouta region of the Rif Dimashq Governorate of Syria during the Syrian civil war.[51] Varying[52] sources gave a death toll of 322[53] to 1,729.[54]
  • 2017: Khan Shaykhun chemical attack; sarin gas was allegedly used on the rebel-held Idlib Province in Syria. Civilian death toll of ~100 reported, over 300 more injured.[55][56]

https://en.wikipedia.org/wiki/Sarin

The Pronk Pops Show Podcasts Portfolio

Listen To Pronk Pops Podcast or Download Shows 864-868

Listen To Pronk Pops Podcast or Download Shows 857-863

Listen To Pronk Pops Podcast or Download Shows 850-856

Listen To Pronk Pops Podcast or Download Shows 845-849

Listen To Pronk Pops Podcast or Download Shows 840-844

Listen To Pronk Pops Podcast or Download Shows 833-839

Listen To Pronk Pops Podcast or Download Shows 827-832

Listen To Pronk Pops Podcast or Download Shows 821-826

Listen To Pronk Pops Podcast or Download Shows 815-820

Listen To Pronk Pops Podcast or Download Shows 806-814

Listen To Pronk Pops Podcast or Download Shows 800-805

Listen To Pronk Pops Podcast or Download Shows 793-799

Listen To Pronk Pops Podcast or Download Shows 785-792

Listen To Pronk Pops Podcast or Download Shows 777-784

Listen To Pronk Pops Podcast or Download Shows 769-776

Listen To Pronk Pops Podcast or Download Shows 759-768

Listen To Pronk Pops Podcast or Download Shows 751-758

Listen To Pronk Pops Podcast or Download Shows 745-750

Listen To Pronk Pops Podcast or Download Shows 738-744

Listen To Pronk Pops Podcast or Download Shows 732-737

Listen To Pronk Pops Podcast or Download Shows 727-731

Listen To Pronk Pops Podcast or Download Shows 720-726

Listen To Pronk Pops Podcast or DownloadShows 713-719

Listen To Pronk Pops Podcast or DownloadShows 705-712

Listen To Pronk Pops Podcast or Download Shows 695-704

Listen To Pronk Pops Podcast or Download Shows 685-694

Listen To Pronk Pops Podcast or Download Shows 675-684

Listen To Pronk Pops Podcast or Download Shows 668-674

Listen To Pronk Pops Podcast or Download Shows 660-667

Listen To Pronk Pops Podcast or Download Shows 651-659

Listen To Pronk Pops Podcast or Download Shows 644-650

Listen To Pronk Pops Podcast or Download Shows 637-643

Listen To Pronk Pops Podcast or Download Shows 629-636

Listen To Pronk Pops Podcast or Download Shows 617-628

Listen To Pronk Pops Podcast or Download Shows 608-616

Listen To Pronk Pops Podcast or Download Shows 599-607

Listen To Pronk Pops Podcast or Download Shows 590-598

Listen To Pronk Pops Podcast or Download Shows 585- 589

Listen To Pronk Pops Podcast or Download Shows 575-584

Listen To Pronk Pops Podcast or Download Shows 565-574

Listen To Pronk Pops Podcast or Download Shows 556-564

Listen To Pronk Pops Podcast or Download Shows 546-555

Listen To Pronk Pops Podcast or Download Shows 538-545

Listen To Pronk Pops Podcast or Download Shows 532-537

Listen To Pronk Pops Podcast or Download Shows 526-531

Listen To Pronk Pops Podcast or Download Shows 519-525

Listen To Pronk Pops Podcast or Download Shows 510-518

Listen To Pronk Pops Podcast or Download Shows 500-509

Listen To Pronk Pops Podcast or Download Shows 490-499

Listen To Pronk Pops Podcast or Download Shows 480-489

Listen To Pronk Pops Podcast or Download Shows 473-479

Listen To Pronk Pops Podcast or Download Shows 464-472

Listen To Pronk Pops Podcast or Download Shows 455-463

Listen To Pronk Pops Podcast or Download Shows 447-454

Listen To Pronk Pops Podcast or Download Shows 439-446

Listen To Pronk Pops Podcast or Download Shows 431-438

Listen To Pronk Pops Podcast or Download Shows 422-430

Listen To Pronk Pops Podcast or Download Shows 414-421

Listen To Pronk Pops Podcast or Download Shows 408-413

Listen To Pronk Pops Podcast or Download Shows 400-407

Listen To Pronk Pops Podcast or Download Shows 391-399

Listen To Pronk Pops Podcast or Download Shows 383-390

Listen To Pronk Pops Podcast or Download Shows 376-382

Listen To Pronk Pops Podcast or Download Shows 369-375

Listen To Pronk Pops Podcast or Download Shows 360-368

Listen To Pronk Pops Podcast or Download Shows 354-359

Listen To Pronk Pops Podcast or Download Shows 346-353

Listen To Pronk Pops Podcast or Download Shows 338-345

Listen To Pronk Pops Podcast or Download Shows 328-337

Listen To Pronk Pops Podcast or Download Shows 319-327

Listen To Pronk Pops Podcast or Download Shows 307-318

Listen To Pronk Pops Podcast or Download Shows 296-306

Listen To Pronk Pops Podcast or Download Shows 287-295

Listen To Pronk Pops Podcast or Download Shows 277-286

Listen To Pronk Pops Podcast or Download Shows 264-276

Listen To Pronk Pops Podcast or Download Shows 250-263

Listen To Pronk Pops Podcast or Download Shows 236-249

Listen To Pronk Pops Podcast or Download Shows 222-235

Listen To Pronk Pops Podcast or Download Shows 211-221

Listen To Pronk Pops Podcast or Download Shows 202-210

Listen To Pronk Pops Podcast or Download Shows 194-201

Listen To Pronk Pops Podcast or Download Shows 184-193

Listen To Pronk Pops Podcast or Download Shows 174-183

Listen To Pronk Pops Podcast or Download Shows 165-173

Listen To Pronk Pops Podcast or Download Shows 158-164

Listen To Pronk Pops Podcast or Download Shows151-157

Listen To Pronk Pops Podcast or Download Shows 143-150

Listen To Pronk Pops Podcast or Download Shows 135-142

Listen To Pronk Pops Podcast or Download Shows 131-134

Listen To Pronk Pops Podcast or Download Shows 124-130

Listen To Pronk Pops Podcast or Download Shows 121-123

Listen To Pronk Pops Podcast or Download Shows 118-120

Listen To Pronk Pops Podcast or Download Shows 113 -117

Listen To Pronk Pops Podcast or Download Show 112

Listen To Pronk Pops Podcast or Download Shows 108-111

Listen To Pronk Pops Podcast or Download Shows 106-108

Listen To Pronk Pops Podcast or Download Shows 104-105

Listen To Pronk Pops Podcast or Download Shows 101-103

Listen To Pronk Pops Podcast or Download Shows 98-100

Listen To Pronk Pops Podcast or Download Shows 94-97

Listen To Pronk Pops Podcast or Download Show 93

Listen To Pronk Pops Podcast or Download Show 92

Listen To Pronk Pops Podcast or Download Show 91

Listen To Pronk Pops Podcast or Download Shows 88-90

Listen To Pronk Pops Podcast or Download Shows 84-87

Listen To Pronk Pops Podcast or Download Shows 79-83

Listen To Pronk Pops Podcast or Download Shows 74-78

Listen To Pronk Pops Podcast or Download Shows 71-73

Listen To Pronk Pops Podcast or Download Shows 68-70

Listen To Pronk Pops Podcast or Download Shows 65-67

Listen To Pronk Pops Podcast or Download Shows 62-64

Listen To Pronk Pops Podcast or Download Shows 58-61

Listen To Pronk Pops Podcast or Download Shows 55-57

Listen To Pronk Pops Podcast or Download Shows 52-54

Listen To Pronk Pops Podcast or Download Shows 49-51

Listen To Pronk Pops Podcast or Download Shows 45-48

Listen To Pronk Pops Podcast or Download Shows 41-44

Listen To Pronk Pops Podcast or Download Shows 38-40

Listen To Pronk Pops Podcast or Download Shows 34-37

Listen To Pronk Pops Podcast or Download Shows 30-33

Listen To Pronk Pops Podcast or Download Shows 27-29

Listen To Pronk Pops Podcast or Download Shows 17-26

Listen To Pronk Pops Podcast or Download Shows 16-22

Listen To Pronk Pops Podcast or Download Shows 10-15

Listen To Pronk Pops Podcast or Download Shows 1-9

Read Full Post | Make a Comment ( None so far )

The Pronk, 2017, March 30, 2017, Breaking News — Story 1: Trump White House To Provide Documents of Unmasking of Americans Citizens (Trump and Trump Team) By Obama Administration National Security Agency Foreign Intelligence Surveillance — The Smoking Gun — NSA Documents with Dr. Evelyn Farkas Lets The Cat Out of The Bag — Exploding Obamagate Scandal — Videos — Story 2: Real Republicans Support Real Repeal & Replacement of Obamacare vs. Fake Republicans Support Fake Repeal & Replacement — Republican Voters Expect And Vote For Real Republicans Not Fake Republicans In Name Only (RINOs) or Liberal/Progressive Democrats — Videos — Story 3: Independence Party Coming Soon — Videos —

Posted on March 30, 2017. Filed under: American History, Blogroll, Breaking News, Communications, Congress, Countries, Donald J. Trump, Donald Trump, Donald Trump, Economics, Education, Federal Bureau of Investigation (FBI), Federal Government, Foreign Policy, Fourth Amendment, Free Trade, Freedom of Speech, Government, Government Dependency, Government Spending, Health Care, Health Care Insurance, Hillary Clinton, History, House of Representatives, Law, Media, Mike Pence, National Security Agency, News, Obama, Philosophy, Photos, Politics, Polls, President Barack Obama, President Trump, Radio, Rand Paul, Rand Paul, Raymond Thomas Pronk, Regulation, Rule of Law, Scandals, Senate, Spying, Taxation, Taxes, Ted Cruz, United States Constitution, United States of America, Videos, Wealth, Weather, Wisdom | Tags: , , , , , , , , , , |

 

Project_1

The Pronk Pops Show Podcasts

Pronk Pops Show 864: March 30, 2017

Pronk Pops Show 863: March 29, 2017

Pronk Pops Show 862: March 28, 2017

Pronk Pops Show 861: March 27, 2017

Pronk Pops Show 860: March 24, 2017

Pronk Pops Show 859: March 23, 2017

Pronk Pops Show 858: March 22, 2017

Pronk Pops Show 857: March 21, 2017

Pronk Pops Show 856: March 20, 2017

Pronk Pops Show 855: March 10, 2017

Pronk Pops Show 854: March 9, 2017

Pronk Pops Show 853: March 8, 2017

Pronk Pops Show 852: March 6, 2017

Pronk Pops Show 851: March 3, 2017

Pronk Pops Show 850: March 2, 2017

Pronk Pops Show 849: March 1, 2017

Pronk Pops Show 848: February 28, 2017

Pronk Pops Show 847: February 27, 2017

Pronk Pops Show 846: February 24, 2017

Pronk Pops Show 845: February 23, 2017

Pronk Pops Show 844: February 22, 2017

Pronk Pops Show 843: February 21, 2017

Pronk Pops Show 842: February 20, 2017

Pronk Pops Show 841: February 17, 2017

Pronk Pops Show 840: February 16, 2017

Pronk Pops Show 839: February 15, 2017

Pronk Pops Show 838: February 14, 2017

Pronk Pops Show 837: February 13, 2017

Pronk Pops Show 836: February 10, 2017

Pronk Pops Show 835: February 9, 2017

Pronk Pops Show 834: February 8, 2017

Pronk Pops Show 833: February 7, 2017

Pronk Pops Show 832: February 6, 2017

Pronk Pops Show 831: February 3, 2017

Pronk Pops Show 830: February 2, 2017

Pronk Pops Show 829: February 1, 2017

Pronk Pops Show 828: January 31, 2017

Pronk Pops Show 827: January 30, 2017

Pronk Pops Show 826: January 27, 2017

Pronk Pops Show 825: January 26, 2017

Pronk Pops Show 824: January 25, 2017

Pronk Pops Show 823: January 24, 2017

Pronk Pops Show 822: January 23, 2017

Pronk Pops Show 821: January 20, 2017

Pronk Pops Show 820: January 19, 2017

Pronk Pops Show 819: January 18, 2017

Pronk Pops Show 818: January 17, 2017

Pronk Pops Show 817: January 13, 2017

Pronk Pops Show 816: January 12, 2017

Pronk Pops Show 815: January 11, 2017

Pronk Pops Show 814: January 10, 2017

Pronk Pops Show 813: January 9, 2017

Pronk Pops Show 812: December 12, 2016

Pronk Pops Show 811: December 9, 2016

Pronk Pops Show 810: December 8, 2016

Pronk Pops Show 809: December 7, 2016

Pronk Pops Show 808: December 6, 2016

Pronk Pops Show 807: December 5, 2016

Pronk Pops Show 806: December 2, 2016

Pronk Pops Show 805: December 1, 2016

 

Breaking News — Story 1: Trump White House To Provide Documents of Unmasking of Americans Citizens (Trump and Trump Team) By Obama Administration National Security Agency Foreign  Intelligence Surveillance — The Smoking Gun — NSA Documents with Dr. Evelyn Farkas Lets The Cat Out of The Bag — Exploding Obamagate Scandal  —  Videos — 

Image result for obama warrantless searches poster spying on trumpImage result for Evelyn FarkasImage result for trump tweet house freedom caucus

Who Is Evelyn Farkas? – Worked In Obama Admin; Was Advisor To Hillary R. Clinton – Fox & Friends

Evelyn Farkas on MSNBC, 3/2/17

MARK LEVIN: Interview Between Mika And Evelyn Farkas On Trump Spying Is A SMOKING GUN

LIMBAUGH: ‘Tunnel Visioned Ideologue’ Evelyn Farkas May Have Outed Herself As Source Of Leaks

Obama Aide Evelyn Farkas Confessed “Barack Ordered Us To SPY On Trump For Political Purposes(VIDEO)!

Smoking Gun That Obama Administration Wiretapped On Trump?

Yes, Obama was spying on Trump. 2nd Intelligence Committee member comes forward. “shameful”

Tucker Carlson Tonight || Devin Nunes RESPONDS & EXPOSED Democrats – James Comey Wiretapping RUSSIA

Rep. Devin Nunes explains White House visit (Entire CNN interview)

Rep. Peter King On Trump Team Swept Up In Surveillance Of Foreigners

White House invites Congress investigation leaders to view documents March, 30,2017

Priebus: WH Will Look Into Evelyn Farkas Story; Almost Too Incredible To Be True

White House chief of staff Reince Priebus joins Hugh Hewitt for a Thursday morning interview.

One of the subjects touched on is the story of Evelyn Farkas, formerly the Defense Department’s top Russia expert under President Obama who is now calling for an independent investigation of the president’s ties to Moscow.

This week, conservative media has noticed an interview she did on MSNBC’s ‘Morning Joe’ on March 2nd, 2017 where Farkas appears to happily admit that she was repsonsible for leaking sensitive information about what parts of the government might have spied on President-elect Trump and his Trump Tower. Fox News ran a story on this titled: Former Obama official discloses rush to get intelligence on Trump team

The Farkas statement in question: “I had a fear that somehow that information would disappear with the senior [Obama] people who left, so it would be hidden away in the bureaucracy … that the Trump folks – if they found out how we knew what we knew about their … the Trump staff dealing with Russians – that they would try to compromise those sources and methods, meaning we no longer have access to that intelligence.”

Note: The Farkas clip originally aired on March 2. President Trump’s infamous ‘wiretap’ tweet came two days later:

Terrible! Just found out that Obama had my “wires tapped” in Trump Tower just before the victory. Nothing found. This is McCarthyism!

White House chief of staff Reince Priebus responded Thursday morning: “That’s incredible.”

“It certainly is an incredible comment, although I don’t want to add too much into it right now until I have an opportunity to sort of dig into it and figure out the scope of such a statement… It’s just an incredible statement, you know, and how, what it means and what she meant by that, and whether that has anything to do with the issues in regard to surveillance of Trump transition team members is something that we need to figure out this morning and throughout the day.”

“I hope that the intelligence committees and agencies are interested,” he also said.

Radio hosts Sean Hannity…

…and Mark Levin both mentioned the story Wednesday afternoon…

The original clip from MSNBC’s ‘Morning Joe’:

“That’s why you have the leaking!” Farkas says in the clip.

“A personal reaction is it’s, it’s almost, it’s so cavalier and unbelievable that I just wonder whether this person knows what the heck she’s talking about. I mean, you know what I’m saying?” Priebus added.

Transcript of the Priebus interview, courtesy of the Hugh Hewitt Show:

HUGH HEWITT: A news story came up last night, Mr. Priebus. Evelyn Farkas, former assistant deputy secretary of Defense a few days ago was on with Morning Joe, and talking to Mika about the end game during the Obama years. She said this, the 30 second clip:

EVELYN FARKAS: …that the Trump folks, if they found out how we knew what we knew about their, the staff, the Trump staff’s dealing with Russians, that they would try to compromise those sources and methods, meaning we would no longer have access to that intelligence. So I became very worried, because not enough was coming out into the open, and I knew that there was more. We have very good intelligence on Russia. So then I had talked to some of my former colleagues, and I knew that they were trying to also help get information to the Hill.

HH: So Mr. Priebus, I put two clips together.

REINCE PRIEBUS, TRUMP ADMIN: That’s incredible.

HH: React to that for me, would you?

RP: Well, I mean, I heard it late last night, so I mean I honestly, I talked to Sean a little bit about it late last night, Spicer, and then we’re going to be meeting on it this morning. It’s just an incredible statement, you know, and how, what it means and what she meant by that, and whether that has anything to do with the issues in regard to surveillance of Trump transition team members is something that we need to figure out this morning and throughout the day. But it certainly is an incredible comment, although I don’t want to add too much into it right now until I have an opportunity to sort of dig into it and figure out the scope of such a statement.

HH: Now I want to ask you about a personal reaction to it, though. It suggests that incidental collection of American conversation in intelligence, perhaps even in Russian to Russian conversation, was pushed out by Team Obama for the purposes of cornering you guys? I don’t know what, but…

RP: Yeah, I mean, a personal reaction is it’s, it’s almost, it’s so cavalier and unbelievable that I just wonder whether this person knows what the heck she’s talking about. I mean, you know what I’m saying?

HH: Yeah.

RP: It’s sort of like one of these things it’s so much in your face that it makes you wonder what she means.

HH: Now do you think Director Comey will be interested in that statement?

RP: (laughing) Well, I hope that the intelligence committees and agencies are interested in all of these things. And the one thing I will tell you is that we want, we want this thing done thoroughly, and I will tell you that because we have got nothing to hide. I mean, there’s just nothing there. I’ve said it many times on television and elsewhere. There is no collusion. The issues in regard to contacts with Russia as outlined in the New York Times article about a month ago is total garbage, and we just, we would rather this move forward and be thorough and get on with it, because we’ve got nothing to hide. It’s ridiculous.

HH: Okay, to a substantive question.

http://www.realclearpolitics.com/video/2017/03/30/priebus_wh_will_respond_to_evelyn_farkas_story_incredible_raises_many_questions.html

White House Invites Lawmakers to View Surveillance Documents

March 30, 2017, 2:23 PM CDT March 30, 2017, 3:34 PM CD
President Donald Trump walks with Vice President Mike Pence, left, and Sean Spicer, White House press secretary, right, in the East Room of the White House in Washington on Jan. 22, 2017.Photographer: Andrew Harrer/Bloomberg

The Trump administration invited leaders of congressional intelligence panels to review documents it said raise questions about whether government spy agencies improperly identified President Donald Trump’s campaign officials and associates in the course of routine foreign surveillance.

In a letter signed by White House Counsel Donald McGahn, the administration said Thursday it was responding to a March 15 request from intelligence committees for “documents necessary to determine whether information collected on U.S. persons was mishandled and leaked.” It asks the committees to probe whether the intelligence was properly gathered, whether names were improperly revealed and “to the extent that U.S. citizens were subject to such surveillance, were civil liberties violated?”

White House press secretary Sean Spicer announced the invitation during a briefing with reporters in Washington Thursday, shortly after the New York Times reported that two White House officials had provided House Intelligence Chairman Devin Nunes with reports showing that Trump and his associates were named incidentally by U.S. spy agencies monitoring foreign officials.

Schiff during a news conference on Capitol Hill, on March 30.

Photographer: Andrew Harrer/Bloomberg

The top Democrat on the House Intelligence Committee, Representative Adam Schiff, said he’s willing to review the material but questioned the administration’s motives, saying officials may be trying to disseminate information that helps Trump’s case. “I hope they’ll have some kind of explanation for why they chose this path,” Schiff told reporters at the Capitol.

Deflecting Questions

The administration has been deflecting questions about Russian meddling in the presidential election by focusing on leaks of classified materials and, more recently, Trump’s allegations that his predecessor may have spied on him and his aides before and after the election. The spying claims and the leaks have become prominent sidelights to a broader investigation by the FBI and congressional intelligence committees into Russia’s campaign to disrupt U.S. politics and whether anyone close to Trump colluded with Russia.

At a Senate Intelligence Committee hearing Thursday, several experts testified that Russia’s efforts began as early as 2008 and peaked during last year’s election. The moves included propagation of false news stories and the hacking of Democratic Party computer systems followed by the release of emails. Clint Watts, former FBI agent who is now a national security expert at the Foreign Policy Research Institute, said other targets were prominent Republicans, including House Speaker Paul Ryan and Senator Marco Rubio, a member of the intelligence panel.

Rubio of Florida said Thursday that staff members on his presidential campaign were unsuccessfully targeted in July 2016 by hackers using an address in Russia and that former campaign aides were again targeted on Wednesday.

Inquiry in Turmoil

The House Intelligence Committee’s inquiry was thrown into turmoil when Nunes, a California Republican, last week held a news conference to outline material he said suggested some names of Trump associates were incidentally revealed during legal surveillance of foreign sources. He then went to the White House to brief Trump while refusing to share the information with other members of the committee. After repeated questions about how he got the material, Nunes said on March 27 that he met a source on the White House grounds.

Democrat Schiff, also of California, has called for Nunes to step aside from the investigation and accused him of doing the president’s bidding. Schiff said Thursday he is “more than willing” to go to the White House to review the material being offered but that the committee’s broader investigation must continue.

“This is not going to distract us from doing our Russia investigation,” Schiff said, adding that the White House action “raises profound questions.”

He said he didn’t know whether the material being offered is the same as the documents that were viewed by Nunes.

Nunes has refused to say who showed him the material, and Spicer has said he didn’t know the identity of Nunes’ source. The New York Times, citing unnamed U.S. officials, reported Thursday that Nunes was shown the material by Ezra Cohen-Watnick, the senior director for intelligence at the National Security Council, and Michael Ellis, who works at the White House Counsel’s Office and previously worked on the House Intelligence Committee staff.

Cohen-Watnick was an aide brought into the White House by Michael Flynn, who was fired as national security adviser in February after Trump concluded Flynn had given misleading information about contacts with Russian officials.

‘Smart Move’

“Our view was that the smart move was to make all the materials available to the chairman and the ranking member of the relevant committees,” Spicer said Thursday. “We want them to look into this, as we have maintained all along — that I think there’s a belief that the president has maintained — that there was surveillance that occurred during the 2016 election that was improper.”

Nunes has said, and the Times said it confirmed, that the material isn’t related to the investigation into Russian attempts to influence the election, nor did it necessarily show any illegal surveillance of U.S. citizens.

While the House investigation has been stymied by the dispute over the material shown to Nunes, the Senate Intelligence Committee is proceeding with its own investigation. Panel Chairman Richard Burr, a North Carolina Republican, vowed that the probe won’t be politicized.

“The public deserves to hear the truth about possible Russian involvement in our elections,” Burr said.

Virginia Senator Mark Warner, the committee’s top Democrat, echoed that sentiment, but also expressed concern about what he called Trump’s “wild and uncorroborated accusations” that then-President Barack Obama ordered Trump Tower wiretapped and about Trumps intermittent attacks on intelligence agencies.

https://www.bloomberg.com/politics/articles/2017-03-30/white-house-says-intelligence-panels-can-see-surveillance-data

Foreign Intelligence Surveillance Act

From Wikipedia, the free encyclopedia
“FISA” redirects here. For other uses, see FISA (disambiguation).
Foreign Intelligence Surveillance Act of 1978
Great Seal of the United States
Long title An Act to authorize electronic surveillance to obtain foreign intelligence information.
Acronyms(colloquial) FISA
Enacted by the 95th United States Congress
Effective October 25, 1978
Citations
Public law 95-511
Statutes at Large 92 Stat. 1783
Codification
Titles amended 50 U.S.C.: War and National Defense
U.S.C. sections created 50 U.S.C. ch. 36 § 1801 et seq.
Legislative history
Major amendments

The Foreign Intelligence Surveillance Act of 1978 (“FISAPub.L. 95–511, 92 Stat. 1783, 50 U.S.C. ch. 36) is a United States federal law which prescribes procedures for the physical and electronic surveillance and collection of “foreign intelligence information” between “foreign powers” and “agents of foreign powers” suspected of espionage or terrorism).[1] The Act created the Foreign Intelligence Surveillance Court (FISC) to oversee requests for surveillance warrants by federal law enforcement and intelligence agencies. It has been repeatedly amended since the September 11 attacks.

Contents

 [show] 

History

The Foreign Intelligence Surveillance Act (FISA) was introduced on May 18, 1977, by Senator Ted Kennedy and was signed into law by President Carter in 1978. The bill was cosponsored by nine Senators: Birch Bayh, James O. Eastland, Jake Garn, Walter Huddleston, Daniel Inouye, Charles Mathias, John L. McClellan, Gaylord Nelson, and Strom Thurmond.

The FISA resulted from extensive investigations by Senate Committees into the legality of domestic intelligence activities. These investigations were led separately by Sam Ervin and Frank Church in 1978 as a response to President Richard Nixon’s usage of federal resources to spy on political and activist groups.[2] The act was created to provide judicial and congressional oversight of the government’s covert surveillance activities of foreign entities and individuals in the United States, while maintaining the secrecy needed to protect national security.

Warrantless domestic wiretapping program

The Act came into public prominence in December 2005 following publication by the New York Times of an article[3] that described a program of warrantless domestic wiretapping ordered by the Bush administration and carried out by the National Security Agency since 2002; a subsequent Bloomberg article[4] suggested that this may have already begun by June 2000.

Provisions

The subchapters of FISA provide for:

Electronic surveillance

Generally, the statute permits electronic surveillance in two different scenarios.

Without a court order

The President may authorize, through the Attorney General, electronic surveillance without a court order for the period of one year, provided that it is only to acquire foreign intelligence information,[5] that it is solely directed at communications or property controlled exclusively by foreign powers,[6] that there is no substantial likelihood that it will acquire the contents of any communication to which a United States person is a party, and that it be conducted only in accordance with defined minimization procedures.[7]

The code defines “foreign intelligence information” to mean information necessary to protect the United States against actual or potential grave attack, sabotage or international terrorism.[5]

“Foreign powers” means a foreign government, any faction of a foreign nation not substantially composed of U.S. persons, and any entity directed or controlled by a foreign government.[8]The definition also includes groups engaged in international terrorism and foreign political organizations.[9] The sections of FISA authorizing electronic surveillance and physical searches without a court order specifically exclude their application to groups engaged in international terrorism.[10]

A “U.S. person” includes citizens, lawfully admitted permanent resident aliens, and corporations incorporated in the United States.

“Minimization procedures” is defined to mean procedures that minimize the acquisition of information concerning United States persons, allow the retention of information that is evidence of a crime, and require a court order be obtained in order to retain communication involving a United States person for longer than 72 hours.

The Attorney General is required to make a certification of these conditions under seal to the Foreign Intelligence Surveillance Court,[11] and report on their compliance to the House Permanent Select Committee on Intelligence and the Senate Select Committee on Intelligence.[12]

Since 50 U.S.C. § 1802(a)(1)(A) of this Act specifically limits warrantless surveillance to foreign powers as defined by 50 U.S.C. §1801(a) (1),(2), (3) and omits the definitions contained in 50 U.S.C. §1801(a) (4),(5),(6) the act does not authorize the use of warrantless surveillance on: groups engaged in international terrorism or activities in preparation therefore; foreign-based political organizations, not substantially composed of United States persons; or entities that are directed and controlled by a foreign government or governments.[13] Under the FISA act, anyone who engages in electronic surveillance except as authorized by statute is subject to both criminal penalties[14] and civil liabilities.[15]

Under 50 U.S.C. § 1811, the President may also authorize warrantless surveillance at the beginning of a war. Specifically, he may authorize such surveillance “for a period not to exceed fifteen calendar days following a declaration of war by the Congress”.[16]

With a court order

Alternatively, the government may seek a court order permitting the surveillance using the FISA court.[17] Approval of a FISA application requires the court find probable cause that the target of the surveillance be a “foreign power” or an “agent of a foreign power”, and that the places at which surveillance is requested is used or will be used by that foreign power or its agent.[2][18] In addition, the court must find that the proposed surveillance meet certain “minimization requirements” for information pertaining to U.S. persons.[19] Depending on the type of surveillance, approved orders or extensions of orders may be active for 90 days, 120 days, or a year.[20]

FISA court

The Act created the Foreign Intelligence Surveillance Court (FISC) and enabled it to oversee requests for surveillance warrants by federal law enforcement and intelligence agencies (primarily the Federal Bureau of Investigation and the National Security Agency) against suspected foreign intelligence agents inside the U.S. The court is located within the E. Barrett Prettyman United States Courthouse in Washington, D.C. The court is staffed by eleven judges appointed by the Chief Justice of the United States to serve seven-year terms.

Proceedings before the FISA court are ex parte and non-adversarial. The court hears evidence presented solely by the Department of Justice. There is no provision for a release of information regarding such hearings, or for the record of information actually collected.

Denials of FISA applications by the FISC may be appealed to the Foreign Intelligence Surveillance Court of Review. The Court of Review is a three judge panel. Since its creation, the court has come into session twice: in 2002 and 2008.

FISC meets in secret, and approves or denies requests for search warrants. Only the number of warrants applied for, issued and denied, is reported. In 1980 (the first full year after its inception), it approved 322 warrants.[21]This number has steadily grown to 2,224 warrants in 2006.[22] In the period 1979–2006, a total of 22,990 applications for warrants were made to the Court of which 22,985 were approved (sometimes with modifications; or with the splitting up, or combining together, of warrants for legal purposes), and only 5 were definitively rejected.[23]

Physical searches

In addition to electronic surveillance, FISA permits the “physical search” of the “premises, information, material, or property used exclusively by” a foreign power. The requirements and procedures are nearly identical to those for electronic surveillance.

Remedies for violations

Both the subchapters covering physical searches and electronic surveillance provide for criminal and civil liability for violations of FISA.

Criminal sanctions follows violations of electronic surveillance by intentionally engaging in electronic surveillance under the color of law or through disclosing information known to have been obtained through unauthorized surveillance. The penalties for either act are fines up to US$10,000, up to five years in jail, or both.[14]

In addition, the statute creates a cause of action for private individuals whose communications were unlawfully monitored. The statute permits actual damages of not less than $1,000 or $100 per day. In addition, that statute authorizes punitive damages and an award of attorney’s fees.[15] Similar liability is found under the subchapter pertaining to physical searches. In both cases, the statute creates an affirmative defense for law enforcement personnel acting within their official duties and pursuant to a valid court order. Presumably, such a defense is not available to those operating exclusively under presidential authorization.

Lone wolf amendment

In 2004, FISA was amended to include a “lone wolf” provision. 50 U.S.C. § 1801(b)(1)(C). A “lone wolf” is a non-U.S. person who engages in or prepares for international terrorism. The provision amended the definition of “foreign power” to permit the FISA courts to issue surveillance and physical search orders without having to find a connection between the “lone wolf” and a foreign government or terrorist group. However, “if the court authorizes such a surveillance or physical search using this new definition of ‘agent of a foreign power’, the FISC judge has to find, in pertinent part, that, based upon the information provided by the applicant for the order, the target had engaged in or was engaging in international terrorism or activities in preparation therefor”.[24]

Constitutionality

Before FISA

In 1967, the Supreme Court of the United States held that the requirements of the Fourth Amendment applied equally to electronic surveillance and to physical searches. Katz v. United States, 389 U.S. 347 (1967). The Court did not address whether such requirements apply to issues of national security. Shortly after, in 1972, the Court took up the issue again in United States v. United States District Court, Plamondon, where the court held that court approval was required in order for the domestic surveillance to satisfy the Fourth Amendment. 407 U.S. 297 (1972). Justice Powell wrote that the decision did not address this issue that “may be involved with respect to activities of foreign powers or their agents”.

In the time immediately preceding FISA, a number of courts squarely addressed the issue of “warrantless wiretaps”. In both United States v. Brown, 484 F.2d 418 (5th Cir. 1973), and United States v. Butenko, 494 F.2d 593 (3rd Cir. 1974), the courts upheld warrantless wiretaps. In Brown, a U.S. citizen’s conversation was captured by a wiretap authorized by the Attorney General for foreign intelligence purposes. In Butenko, the court held a wiretap valid if the primary purpose was for gathering foreign intelligence information.

A plurality opinion in Zweibon v. Mitchell, 516 F.2d 594 (D.C. Cir. 1975), held that a warrant was required for the domestic surveillance of a domestic organization. In this case, the court found that the domestic organization was not a “foreign power or their agent”, and “absent exigent circumstances, all warrantless electronic surveillance is unreasonable and therefore unconstitutional.”

Post-FISA

There have been very few cases involving the constitutionality of FISA. Two lower court decisions found FISA constitutional. In United States v. Duggan, the defendants were members of the Irish Republican Army. 743 F.2d 59 (2nd Cir., 1984). They were convicted for various violations regarding the shipment of explosives and firearms. The court held that there were compelling considerations of national security in the distinction between the treatment of U.S. citizens and non-resident aliens.

In the United States v. Nicholson, the defendant moved to suppress all evidence gathered under a FISA order. 955 F.Supp. 588 (Va. 1997). The court affirmed the denial of the motion. There the court flatly rejected claims that FISA violated Due process clause of the Fifth Amendment, Equal protection, Separation of powers, nor the Right to counsel provided by the Sixth Amendment.

However, in a third case, the special review court for FISA, the equivalent of a Circuit Court of Appeals, opined differently should FISA limit the President’s inherent authority for warrantless searches in the foreign intelligence area. In In re Sealed Case, 310 F.3d 717, 742 (Foreign Intel. Surv. Ct. of Rev. 2002) the special court stated “[A]ll the other courts to have decided the issue [have] held that the President did have inherent authority to conduct warrantless searches to obtain foreign intelligence information . … We take for granted that the President does have that authority and, assuming that is so, FISA could not encroach on the President’s constitutional power.”

Criticism

K. A. Taipale of the World Policy Institute, James Jay Carafano of the Heritage Foundation,[25] and Philip Bobbitt of Columbia Law School,[26] among others,[27] have argued that FISA may need to be amended to include, among other things, procedures for programmatic approvals, as it may no longer be adequate to address certain foreign intelligence needs and technology developments, including: the transition from circuit-based communications to packet-based communications; the globalization of telecommunication infrastructure; and the development of automated monitoring techniques, including data mining and traffic analysis.[28]

John R. Schmidt, associate attorney general (1994–1997) in the Justice Department under President Bill Clinton, expressed a need for programmatic approval of technology-enabled surveillance programs.[29] He recalled early arguments made by then-Attorney General Edward Levi to the Church Committee that foreign intelligence surveillance legislation should include provisions for programmatically authorizing surveillance programs because of the particular needs of foreign intelligence where “virtually continuous surveillance, which by its nature does not have specifically predetermined targets” may be required. In these situations, “the efficiency of a warrant requirement would be minimal.”

In a 2006 opinion, Judge Richard Posner wrote that FISA “retains value as a framework for monitoring the communications of known terrorists, but it is hopeless as a framework for detecting terrorists. [FISA] requires that surveillance be conducted pursuant to warrants based on probable cause to believe that the target of surveillance is a terrorist, when the desperate need is to find out who is a terrorist.”[30]

Subsequent amendments

The Act was amended in 2001 by the USA PATRIOT Act, primarily to include terrorism on behalf of groups that are not specifically backed by a foreign government.

An overhaul of the bill, the Protect America Act of 2007 was signed into law on August 5, 2007.[31] It expired on February 17, 2008.

The FISA Amendments Act of 2008 passed by the United States Congress on July 9, 2008.[32]

Amendments

Terrorist Surveillance Act of 2006

On March 16, 2006, Senators Mike DeWine (R-OH), Lindsey Graham (R-SC), Chuck Hagel (R-NE), and Olympia Snowe (R-ME) introduced the Terrorist Surveillance Act of 2006 (S.2455),[33][34] under which the President would be given certain additional limited statutory authority to conduct electronic surveillance of suspected terrorists in the United States subject to enhanced Congressional oversight. Also on March 16, 2006, Senator Arlen Specter (R-PA) introduced the National Security Surveillance Act of 2006 (S. 2453),[35][36] which would amend FISA to grant retroactive amnesty[37] for warrantless surveillance conducted under presidential authority and provide FISA court (FISC) jurisdiction to review, authorize, and oversight “electronic surveillance programs”. On May 24, 2006, Senator Specter and Senator Dianne Feinstein (D-CA) introduced the Foreign Intelligence Surveillance Improvement and Enhancement Act of 2006 (S. 3001) asserting FISA as the exclusive means to conduct foreign intelligence surveillance.

All three competing bills were the subject of Judiciary Committee hearings throughout the summer.[38] On September 13, 2006, the Senate Judiciary Committee voted to approve all three mutually exclusive bills, thus, leaving it to the full Senate to resolve.[39]

On July 18, 2006, U.S. Representative Heather Wilson (R-NM) introduced the Electronic Surveillance Modernization Act (H.R. 5825). Wilson’s bill would give the President the authority to authorize electronic surveillance of international phone calls and e-mail linked specifically to identified terrorist groups immediately following or in anticipation of an armed or terrorist attack on the United States. Surveillance beyond the initial authorized period would require a FISA warrant or a presidential certification to Congress. On September 28, 2006, the House of Representatives passed Wilson’s bill and it was referred to the Senate.[40]

Protect America Act of 2007

Main article: Protect America Act

On July 28, 2007, President Bush called on Congress to pass legislation to reform the FISA in order to ease restrictions on surveillance of terrorist suspects where one party (or both parties) to the communication are located overseas. He asked that Congress pass the legislation before its August 2007 recess. On August 3, 2007, the Senate passed a Republican-sponsored version of FISA (S. 1927) in a vote of 60 to 28. The House followed by passing the bill, 227–183. The Protect America Act of 2007 (Pub.L. 110–55, S. 1927) was then signed into law by George W. Bush on 2007-08-05.[41]

Under the Protect America Act of 2007, communications that begin or end in a foreign country may be wiretapped by the U.S. government without supervision by the FISA Court. The Act removes from the definition of “electronic surveillance” in FISA any surveillance directed at a person reasonably believed to be located outside the United States. As such, surveillance of these communications no longer requires a government application to, and order issuing from, the FISA Court.

The Act provides procedures for the government to “certify” the legality of an acquisition program, for the government to issue directives to providers to provide data or assistance under a particular program, and for the government and recipient of a directive to seek from the FISA Court, respectively, an order to compel provider compliance or relief from an unlawful directive. Providers receive costs and full immunity from civil suits for compliance with any directives issued pursuant to the Act.

A summary of key provisions follows. The Act empowers the Attorney General or Director of National Intelligence (“DNI”) to authorize, for up to one year, the acquisition of communications concerning “persons reasonably believed to be outside the United States” if the Attorney General and DNI determine that each of five criteria has been met:

  • There are reasonable procedures in place for determining that the acquisition concerns persons reasonably believed to be located outside the United States;
  • The acquisition does not constitute electronic surveillance (meaning it does not involve solely domestic communications);
  • The acquisition involves obtaining the communications data from or with the assistance of a communications service provider who has access to communications;
  • A significant purpose of the acquisition is to obtain foreign intelligence information; and
  • Minimization procedures outlined in the FISA will be used.

This determination by the Attorney General and DNI must be certified in writing, under oath, and supported by appropriate affidavit(s). If immediate action by the government is required and time does not permit the preparation of a certification, the Attorney General or DNI can direct the acquisition orally, with a certification to follow within 72 hours. The certification is then filed with the FISA Court.

Once the certification is filed with the FISA Court, the Attorney General or DNI can direct a provider to undertake or assist in the undertaking of the acquisition.

If a provider fails to comply with a directive issued by the Attorney General or DNI, the Attorney General may seek an order from the FISA Court compelling compliance with the directive. Failure to obey an order of the FISA Court may be punished as a contempt of court.

Likewise, a person receiving a directive may challenge the legality of that directive by filing a petition with the FISA Court. An initial review must be conducted within 48 hours of the filing to determine whether the petition is frivolous, and a final determination concerning any non-frivolous petitions must be made – in writing – within 72 hours of receipt of the petition.

Determinations of the FISA Court may be appealed to the Foreign Intelligence Court of Appeals, and a petition for a writ of certiorari of a decision from the FICA can be made to the U.S. Supreme Court.

All petitions must be filed under seal.

The Act allows providers to be compensated, at the prevailing rate, for providing assistance as directed by the Attorney General or DNI.

The Act provides explicit immunity from civil suit in any federal or state court for providing any information, facilities, or assistance in accordance with a directive under the Act.

Within 120 days, the Attorney General must submit to the FISA Court for its approval the procedures by which the government will determine that acquisitions authorized by the Act conform with the Act and do not involve purely domestic communications. The FISA Court then will determine whether the procedures comply with the Act. The FISA Court thereafter will enter an order either approving the procedures or directing the government to submit new procedures within 30 days or cease any acquisitions under the government procedures. The government may appeal a ruling of the FISA Court to the FICA and ultimately the Supreme Court.

On a semiannual basis, the Attorney General shall inform the Intelligence and Judiciary Committees of the House and Senate of incidents of noncompliance with a directive issued by the Attorney General or the DNI, incidents of noncompliance with FISA Court-approved procedures by the Intelligence Community, and the number of certifications and directives issued during the reporting period.

The amendments to FISA made by the Act expire 180 days after enactment, except that any order in effect on the date of enactment remains in effect until the date of expiration of such order and such orders can be reauthorized by the FISA Court.[42] The Act expired on February 17, 2008.

Subsequent developments

Legal experts experienced in national security issues are divided on how broadly the new law could be interpreted or applied. Some believe that due to subtle changes in the definitions of terms such as “electronic surveillance”, it could empower the government to conduct warrantless physical searches and even seizures of communications and computer devices and their data which belong to U.S. citizens while they are in the United States, if the government contended that those searches and potential seizures were related to its surveillance of parties outside the United States. Intelligence officials, while declining to comment directly on such possibilities, respond that such interpretations are overly broad readings of the act, and unlikely to actually occur.

In a September 10, 2007 address at a symposium on modernizing FISA held at Georgetown University Law Center‘s National Security Center, Kenneth L. Wainstein, Assistant Attorney General for National Security, argued against the current six-month sunset provision in the Protect America Act of 2007, saying that the broadened surveillance powers the act provides for should be made permanent. Wainstein proposed that internal audits by the Office of the Director of National Intelligence and the National Security Division of the Justice Department, with reporting to select groups of Congressmen, would ensure that the expanded capability would not be abused.[43]

Also on September 10, DNI Mike McConnell testified before the Senate Committee on Homeland Security and Governmental Affairs that the Protect America Act had helped foil a major terror plot in Germany. U.S. intelligence-community officials questioned the accuracy of McConnell’s testimony and urged his office to correct it, which he did in a statement issued September 12, 2007. Critics cited the incident as an example of the Bush administration’s exaggerated claims and contradictory statements about surveillance activities. Counterterrorism officials familiar with the background of McConnell’s testimony said they did not believe he made inaccurate statements intentionally as part of any strategy by the administration to persuade Congress to make the new eavesdropping law permanent. Those officials said they believed McConnell gave the wrong answer because he was overwhelmed with information and merely mixed up his facts.[44]

Speaking at National Security Agency headquarters in Fort Meade, Maryland on September 19, 2007, President George W. Bush urged Congress to make the provisions of the Protect America Act permanent. Bush also called for retroactive immunity for telecommunications companies who had cooperated with government surveillance efforts, saying, “It’s particularly important for Congress to provide meaningful liability protection to those companies now facing multibillion-dollar lawsuits only because they are believed to have assisted in efforts to defend our nation, following the 9/11 attacks”.[45]

On October 4, 2007, the bipartisan Liberty and Security Committee of the Constitution Project, co-chaired by David Keene and David D. Cole, issued its “Statement on the Protect America Act”.[46] The Statement urged Congress not to reauthorize the PAA, saying the language of the bill “runs contrary to the tripartite balance of power the Framers envisioned for our constitutional democracy, and poses a serious threat to the very notion of government of the people, by the people and for the people”. Some in the legal community have questioned the constitutionality of any legislation that would retroactively immunize telecommunications firms alleged to have cooperated with the government from civil liability for having potentially violated their customers’ privacy rights.[47]

In an article appearing in the January/February 2008 issue of the Institute of Electrical and Electronics Engineers journal of Security and Privacy, noted technology experts from academia and the computing industry found significant flaws in the technical implementation of the Protect America Act which they said created serious security risks, including the danger that such a surveillance system could be exploited by unauthorized users, criminally misused by trusted insiders, or abused by the government.[48]

On October 7, 2007, the Washington Post reported that House Democrats planned to introduce alternative legislation which would provide for one-year “umbrella” warrants, and would require the Justice Department inspector general to audit the use of those warrants and issue quarterly reports to a special FISA court and to Congress. The proposed bill would not include immunity for telecommunications firms facing lawsuits in connection with the administration’s NSA warrantless surveillance program. House Democrats said that as long as the administration withholds requested documents explaining the basis for the program that they cannot consider immunity for firms alleged to have facilitated it.[49] On October 10, 2007 comments on the White House South Lawn, President Bush said he would not sign any bill that did not provide retroactive immunity for telecommunications corporations.[50]

On October 18, 2007, the House Democratic leadership put off a vote on the proposed legislation by the full chamber to avoid consideration of a Republican measure that made specific references to Osama bin Laden. At the same time, the Senate Intelligence Committee reportedly reached a compromise with the White House on a different proposal that would give telephone carriers legal immunity for any role they played in the National Security Agency’s domestic eavesdropping program approved by President Bush after the Sept. 11 terrorist attacks.[51]

On November 15, 2007, the Senate Judiciary Committee voted 10–9 along party lines to send an alternative measure to the full Senate other than the one the intelligence committee had crafted with the White House. The proposal would leave to the full Senate whether or not to provide retroactive immunity to telecommunications firms that cooperated with the NSA. Judiciary Committee chairman Patrick Leahy said that granting such immunity would give the Bush administration a “blank check” to do what it wants without regard to the law. Arlen Specter of Pennsylvania, the top Republican on the committee, said that court cases may be the only way Congress can learn exactly how far outside the law the administration has gone in eavesdropping in the United States. When the full Senate takes up the bill, Specter is expected to offer a compromise that would shield the companies from financial ruin but allow lawsuits to go forward by having the federal government stand in for the companies at trial.[52][needs update]

On the same day, the House of Representatives voted 227–189 to approve a Democratic bill that would expand court oversight of government surveillance inside the United States while denying immunity to telecom companies. House Judiciary Committee chairman John Conyers left the door open to an immunity deal in the future, but said that the White House must first give Congress access to classified documents specifying what the companies did that requires legal immunity.[53]

In February 2008, the Senate passed the version of the new FISA that would allow telecom companies immunity. On March 13, 2008, the U.S. House of Representatives held a secret session to discuss related information. On March 14, the House voted 213–197 to approve a bill that would not grant telecom immunity – far short of the 2/3 majority required to override a Presidential veto.[54] The Senate and House bills are compared and contrasted in a June 12, 2008 report from the Congressional Research Service.[55]

On March 13, 2008, the House of Representatives held a secret, closed door meeting to debate changes to the FISA bill.[56]

Foreign Intelligence Surveillance Act of 1978 Amendments Act of 2008

The 2008 amendment of FISA gave telecoms immunity, increased the time allotted for warrantless surveillance, and adds provisions for emergency eavesdropping. On June 20, 2008, the House of Representatives passed the amendment with a vote of 293 to 129.[57][58] It passed in the Senate 69 to 28 on July 9, 2008[59] after a failed attempt to strike Title II from the bill by Senator Dodd.[60] On July 10, 2008, President Bush signed it into law.

2015 USA Freedom Act

On June 2, 2015, many provisions of the 1978 with the passage of the USA Freedom Act.[61] The 2015 law overhauled the powerful United States National Security Agency and required the US government to undergo standard court procedures in order to gather data regarding suspicious activities.[61] However, the law did not completely repeal the controversial Patriot Act and allowed some provisions to expire in later time.[61]

See also

https://en.wikipedia.org/wiki/Foreign_Intelligence_Surveillance_Act

Story 2: Real Republican Support Real Repeal & Replacement of Obamacare vs. Fake Republicans Support Fake Repeal & Replacement — Republican Voters Expect Real Repeal and Replacement of Obamacare And Vote For Real Republican Not Republicans In Name Only (RINOs) and Liberal/Progressive Democrats — Videos

“Effective as of Dec. 31, 2017, the Patient Protection and Affordable Care Act is repealed, and the provisions of law amended or repealed by such Act are restored or revived as if such Act had not been enacted,”

Image result for trump tweet house freedom caucus

Image result for house freedom caucus

 

Image result for independence party

 

 

Freedom Caucus’ Justin Amash FIRES BACK After Trump’s Twitter Attack

Sen. Rand Paul Used Tips From ‘the Art of the Deal’ to Defeat Replacement Bill

Sen. Rand Paul on Fox News’ “Your World w/ Neil Cavuto” – March 28, 2017

Trump declares war on Republican conservatives ‘We must fight them’

Rep. Brooks: We need a bill that repeals Obamacare

Rep. Mo Brooks: ‘Deceptive’ to call GOP’s plan a repeal of Obamacare

Top Republican Just Defeated Obamacare With One Single Sentence!

How much do conservatives dislike Trump? We put them to the test.

Victor Davis Hanson – The Mythologies of the 2016 Election

Donald Trump and Conservative Intellectuals

‘We share a strong mutual admiration’: Rand Paul praises Matt Drudge after meeting in Washington

matt drudge

Matt Drudge. http://www.drudgereport.com

The conservative internet-news mogul Matt Drudge met with Republican Sen. Rand Paul in Washington, DC, earlier this week and praised him as “bold” and “brave.”

“Intriguing lunch in hill office of America’s best senator, Rand Paul,” Drudge tweeted on Thursday. “He’s bold, brave and has somehow kept his heart in such a corrupt city.”

Paul’s spokesman returned the compliment.

“Matt Drudge has a phenomenal take on the news and is a leader who others in the business can only hope to emulate,” Sergio Gor told Business Insider in a statement. “We enjoyed visiting with him, and we share a strong mutual admiration!”

Drudge has been taking what some have interpreted as subtle shots at President Donald Trump’s administration recently through his website and Twitter account.

Drudge is the founder and editor of the Drudge Report, a popular and influential conservative news-aggregation website visited by millions of readers each month.

He has also ripped the Republican establishment as of late, true to what was his form during the presidential election.

In a recent tweet, Drudge contended the GOP “lied about wanting tax cuts.”

“Can we get our votes back?” he asked.

http://www.businessinsider.com/rand-paul-matt-drudge-meeting-2017-3

Gohmert suspects Priebus authored Trump anti-Freedom Caucus tweet

President Trump Threatens War on House Freedom Caucus

House Freedom Caucus member Louie Gohmert said he suspects White House Chief of Staff Reince Priebus authored President Trump’s Thursday tweet threatening the HFC with 2018 political repercussions, and he warned that wiping out the faction could hurt Trump eventually.

Gohmert, R-Texas, said Trump may regret the tweet, since many of the same lawmakers came to his defense when others attacked him.

“I hope the president will realize the friends his tweet condemns are actually the ones that stood by him and were very vociferous in defending him in October when all of the Republican elected leaders in the House were abandoning him,” Gohmert said.

“So, I hope he’ll remember and realize if he weakens and hurts those who stood with him when our leadership was coming after him, we may not be around to help him during future assaults, which I think could be at the bottom of some of the demonizing of conservatives in the House.”

Trump on Thursday tweeted “we must fight,” the Freedom Caucus in the 2018 elections, “if they don’t get on the team & fast.”

The HFC comprised the majority of “no” votes that last week sunk a bill to repeal and replace Obamacare, a major campaign promise made by Republicans and Trump.

http://www.washingtonexaminer.com/gohmert-suspects-priebus-authored-trump-anti-freedom-caucus-tweet/article/2618890

Trump: We ‘must fight’ Freedom Caucus in 2018 midterm elections

President Trump is taking a stunningly harsh tone with the conservative House Freedom Caucus, calling Thursday for their defeat in the 2018 midterm election if they don’t get on board with the Republican agenda.

“The Freedom Caucus will hurt the entire Republican agenda if they don’t get on the team, & fast. We must fight them, & Dems, in 2018!” Trump tweeted Thursday morning.

It’s the third time in less than a week that Trump has attacked the group on Twitter, creating the extraordinary spectacle of a sitting president eviscerating members of his own party and even suggesting they should be removed from office.

Trump, who is popular in Freedom Caucus districts, may have some ability to generate messy primary challenges against caucus members.

But some caucus members say that Trump is going back on his campaign promises to “drain the swamp,” implying he is part of the GOP establishment the caucus has fought.

“It didn’t take long for the swamp to drain @realDonaldTrump,” tweeted Rep. Justin Amash, R-Mich. “No shame, Mr. President. Almost everyone succumbs to the D.C. Establishment.”

Rep. Jim Jordan, R-Ohio, one of the caucus’ founders, that the caucus is “trying to change Washington. The [American Health Care Act] doesn’t change D.C. and doesn’t do what we told voters we’d do.”

http://www.washingtonexaminer.com/trump-we-must-fight-freedom-caucus-in-2018-midterm-elections/article/2618850

If Republicans are going to try to repeal Obamacare, they should go all the way. Otherwise, don’t even start.

Poet and novelist Charles Bukowski once said, “If you’re going to try, go all the way. Otherwise, don’t even start.”

Speaker of the House Paul Ryan, R-Wis., and House Republican leaders could have learned from this pearl of wisdom. Unfortunately, they are trying to ram through the House a bill — the so-called American Health Care Act that falls far short of their frequent and many campaign promises to repeal Obamacare and create free-market reforms that would lead to greater competition and choice, with lower costs. Those were campaign promises that, by the way, helped Republicans win the House in 2010, the Senate in 2014, and the White House in 2016.

In January 2016, after President Obama vetoed an Obamacare repeal bill that had overwhelming Republican support, Ryan made it clear that the baseline for repeal had been drawn. “We have shown now that there is a clear path to repealing Obamacare without 60 votes in the Senate,” he declared. “So, next year, if we’re sending this bill to a Republican president, it will get signed into law.”

Conservative activists — who have been fighting for years to repeal Obamacare and supporting conservative candidates who got elected on pledges to scrap the 2010 law — will accept nothing less than a bill that follows through on these promises. Just as important are Americans who have seen their premiums skyrocket because of Obamacare. They are looking for relief.

House Republicans now have that opportunity to produce a strong repeal of Obamacare and its onerous regulations, and institute free-market reforms. They shouldn’t let themselves be bound by narrow interpretations of Senate rules.

Unfortunately, the American Health Care Act fails to follow through on Republican promises. The bill effectively preserves Obamacare, leaving the cost-driving provisions in place. As one conservative member of the House put it, the American Health Care Act “is an amendment — and not a clean repeal — to Obamacare.”

While the American Health Care Act includes various reforms, including the per capita funding of Medicaid funds, the repeal of Obamacare taxes, and the expansion of Health Savings Accounts, the bill replaces Obamacare’s market-distorting subsidies with a Republican version, all while leaving the law’s costly, market-destroying regulatory architecture in place. The bill also creates a “doc fix”-style scenario in which repeal of Obamacare’s Medicaid expansion will never actually happen.

Conservatives inside and outside of Congress are told that Obamacare’s regulations and the establishment of free-market healthcare policies will be addressed in a second and third “phase,” but history tells us otherwise.

Obamacare may have given the Department of Health and Human Services tremendous regulatory power, but HHS Secretary Tom Price, who now serves in this crucial role and is tasked with carrying out the elimination of Obamacare’s regulations, will almost certainly face legal challenges. That means any break in the burden of skyrocketing health insurance costs will be delayed even further. Another obvious concern is that any administrative actions can be undone by the next administration, making the relief only temporary if Congress doesn’t eliminate the federal government’s power over these aspects of our healthcare system.

http://www.washingtonexaminer.com/if-republicans-are-going-to-try-to-repeal-obamacare-they-should-go-all-the-way.-otherwise-dont-even-start./article/2618151

 

Real Republicans

Member Name Party State Liberty Score Years in DC Next Election

.Gary Palmer

Rep.

Gary Palmer R AL-6 A 100% 2 2018

David Brat

Rep.

Dave Brat R VA-7 A 100% 2 2018

Sen.

Mike Lee R UT A 100% 6 2022

Rep.

Louie Gohmert R TX-1 A 98% 12 2018

Sen.

Ted Cruz R TX A 97% 4 2018

Rep.

Jim Bridenstine R OK-1 A 97% 4 2018

Rep.

Jeff Duncan R SC-3 A 96% 6 2018

Rep.

Jim Jordan R OH-4 A 96% 10 2018

Justin Amash

Rep.

Justin Amash R MI-3 A 96% 6 2018

Rep.

Thomas Massie R KY-4 A 94% 4 2018

Benjamin Sasse

Sen.

Benjamin Sasse R NE A 94% 2 2020

Rep.

Mark Meadows R NC-11 A 94% 4 2018

Ken Buck

Rep.

Ken Buck R CO-4 A 94% 2 2018

Rep.

Raul Labrador R ID-1 A 93% 6 2018

Sen.

Rand Paul R KY A 92% 6 2022

Trent Franks

Rep.

Trent Franks R AZ-8 A 90% 14 2018

Rep.

David Schweikert R AZ-6 A 90% 6 2018

Rep.

Mark Sanford R SC-1 A 90% 3 2018

Sen.

Tim Scott R SC B 89% 4 2022

Rep.

Ron DeSantis R FL-6 B 87% 4 2018

Rep.

Tom McClintock R CA-4 B 86% 8 2018

Rep.

Scott DesJarlais R TN-4 B 85% 6 2018

Rep.

Trey Gowdy R SC-4 B 85% 6 2018

Rep.

Doug Lamborn R CO-5 B 85% 10 2018

Rep.

Randy Weber R TX-14 B 84% 4 2018

Rep.

Paul Gosar R AZ-4 B 84% 6 2018

Rep.

Mo Brooks R AL-5 B 84% 6 2018

Rep.

Kenny Marchant R TX-24 B 84% 12 2018

Rep.

Sam Johnson R TX-3 B 82% 25 2018

Rep.

Steve King R IA-4 B 81% 14 2018

John Ratcliffe

Rep.

John Ratcliffe R TX-4 B 81% 2 2018

Jody Hice

Rep.

Jody Hice R GA-10 B 81% 2 2018

Rep.

Dana Rohrabacher R CA-48 B 80% 28 2018

Rep.

Andy Harris R MD-1 B 80% 6 2018

Rep.

Bill Posey R FL-8 B 80% 8 2018

Rep.

John J. Duncan Jr. R TN-2 B 80% 28 2018

https://www.conservativereview.com/scorecard

Fake Republicans

Rep.

Richard Hudson R NC-8 F 59% 4 2018

Sen.

Pat J. Toomey R PA F 59% 6 2022

Joni Ernst

Sen.

Joni Ernst R IA F 59% 2 2020

Rep.

Todd Rokita R IN-4 F 58% 6 2018

Rep.

Tom Rice R SC-7 F 58% 4 2018

Rep.

Pete Olson R TX-22 F 58% 8 2018

Rep.

Virginia Foxx R NC-5 F 58% 12 2018

Sen.

Dean Heller R NV F 58% 5 2018

Rep.

Chris Stewart R UT-2 F 58% 4 2018

Rep.

Lamar Smith R TX-21 F 58% 30 2018

Sen.

Michael B. Enzi R WY F 58% 20 2020

Rep.

Pete Sessions R TX-32 F 57% 20 2018

Steve Russell

Rep.

Steve Russell R OK-5 F 56% 2 2018

Rep.

Scott Tipton R CO-3 F 56% 6 2018

Sen.

Ron Johnson R WI F 56% 6 2022

Ralph Abraham

Rep.

Ralph Abraham R LA-5 F 56% 2 2018

Rick Allen

Rep.

Rick Allen R GA-12 F 56% 2 2018

Rep.

Phil Roe R TN-1 F 56% 8 2018

David Rouzer

Rep.

David Rouzer R NC-7 F 56% 2 2018

Barry Loudermilk

Rep.

Barry Loudermilk R GA-11 F 56% 2 2018

Rep.

Mike Coffman R CO-6 F 56% 8 2018

Rep.

Michael McCaul R TX-10 F 56% 12 2018

Sen.

John Boozman R AR F 56% 6 2022

Rep.

Rob Woodall R GA-7 F 55% 6 2018

Sen.

Deb Fischer R NE F 55% 4 2018

Rep.

Doug Collins R GA-9 F 55% 4 2018

Rep.

Darrell Issa R CA-49 F 55% 16 2018

Rep.

Jim Renacci R OH-16 F 55% 6 2018

Rep.

Peter Roskam R IL-6 F 54% 10 2018

Rep.

Lynn Jenkins R KS-2 F 54% 8 2018

Rep.

Mike D. Rogers R AL-3 F 54% 14 2018

Rep.

Robert B. Aderholt R AL-4 F 53% 20 2018

Rep.

Patrick T. McHenry R NC-10 F 53% 12 2018

Rep.

Vicky Hartzler R MO-4 F 53% 6 2018

Dan Sullivan

Sen.

Dan Sullivan R AK F 53% 2 2020

Rep.

John Culberson R TX-7 F 53% 16 2018

Rep.

Rick Crawford R AR-1 F 52% 6 2018

Rep.

Ed Royce R CA-39 F 52% 24 2018

Rep.

Gus Bilirakis R FL-12 F 52% 10 2018

Rep.

Adrian Smith R NE-3 F 52% 10 2018

Rep.

Steven Palazzo R MS-4 F 51% 6 2018

Rep.

Tom Marino R PA-10 F 51% 6 2018

Sen.

Pat Roberts R KS F 51% 20 2020

Rep.

Paul D. Ryan R WI-1 F 51% 18 2018

Rep.

Kevin Brady R TX-8 F 51% 20 2018

Tom Emmer

Rep.

Tom Emmer R MN-6 F 50% 2 2018

Sen.

Todd Young R IN-9 F 50% 6 2022

Rep.

Bob Gibbs R OH-7 F 50% 6 2018

Bruce Westerman

Rep.

Bruce Westerman R AR-4 F 50% 2 2018

missing-bio

Rep.

Lee Zeldin R NY-1 F 50% 2 2018

Rep.

Martha Roby R AL-2 F 50% 6 2018

Sen.

Jeff Flake R AZ F 50% 4 2018

Sen.

John Barrasso R WY F 50% 9 2018

Rep.

Sam Graves R MO-6 F 49% 16 2018

 

Member Name Party State Liberty Score Years in DC Next Election Track
Rep.

Sean Duffy

R WI-7 F 49% 6 2018
Rep.

Mike Kelly

R PA-3 F 49% 6 2018
Rep.

Mac M. Thornberry

R TX-13 F 48% 22 2018
Rep.

Tim Murphy

R PA-18 F 47% 14 2018
Sen.

Rob Portman

R OH F 47% 6 2022
Rep.

Bill Shuster

R PA-9 F 47% 15 2018
Rep.

Bill Johnson

R OH-6 F 47% 6 2018
Sen.

Bill Cassidy

R LA F 47% 8 2020
Rep.

Larry Bucshon

R IN-8 F 47% 6 2018
Rep.

John Carter

R TX-31 F 46% 14 2018
Rep.

Ann Wagner

R MO-2 F 45% 4 2018
Rep.

Brett Guthrie

R KY-2 F 45% 8 2018
Sen.

Bob Corker

R TN F 45% 10 2018
Rep.

Vern Buchanan

R FL-16 F 44% 10 2018
Rep.

Erik Paulsen

R MN-3 F 44% 8 2018
missing-bio
Rep.

Evan Jenkins

R WV-3 F 44% 2 2018
Glenn Grothman
Rep.

Glenn Grothman

R WI-6 F 44% 2 2018
Rep.

Gregg Harper

R MS-3 F 44% 8 2018
Mia Love
Rep.

Mia Love

R UT-4 F 44% 2 2018
Sen.

John Thune

R SD F 44% 12 2022
Rep.

Tom Reed

R NY-23 F 43% 6 2018
Rep.

Robert Pittenger

R NC-9 F 43% 4 2018
Rep.

David McKinley

R WV-1 F 43% 6 2018
Rep.

Blaine Luetkemeyer

R MO-3 F 43% 8 2018
Rep.

Kristi Noem

R SD-0 F 43% 6 2018
Rep.

Paul Cook

R CA-8 F 42% 4 2018
Rep.

Luke Messer

R IN-6 F 42% 4 2018
Rep.

Leonard Lance

R NJ-7 F 42% 8 2018
Rep.

Michael R. Turner

R OH-10 F 42% 14 2018
Sen.

John Cornyn

R TX F 42% 14 2020
Rep.

Jackie Walorski

R IN-2 F 42% 4 2018
Rep.

Christopher H. Smith

R NJ-4 F 41% 36 2018
Sen.

Cory Gardner

R CO F 41% 6 2020
Rep.

Cathy McMorris Rodgers

R WA-5 F 41% 12 2018
Rep.

Mark Amodei

R NV-2 F 41% 5 2018
Rep.

Jeff Fortenberry

R NE-1 F 41% 12 2018
Rep.

Pat Tiberi

R OH-12 F 40% 16 2018
Sen.

Mitch McConnell

R KY F 40% 32 2020
Rep.

Kay Granger

R TX-12 F 40% 20 2018
Rep.

Jaime Herrera Beutler

R WA-3 F 40% 6 2018
Sen.

Roy Blunt

R MO F 39% 6 2022
Sen.

Richard M. Burr

R NC F 39% 12 2022
Rep.

Devin Nunes

R CA-22 F 39% 14 2018
Rep.

Andy Barr

R KY-6 F 39% 4 2018
missing-bio
Rep.

French Hill

R AR-2 F 38% 2 2018
missing-bio
Rep.

David Young

R IA-3 F 38% 2 2018
missing-bio
Rep.

Dan Newhouse

R WA-4 F 38% 2 2018
missing-bio
Rep.

Buddy Carter

R GA-1 F 38% 2 2018
Rep.

Lou Barletta

R PA-11 F 38% 6 2018
missing-bio
Rep.

John Moolenaar

R MI-4 F 38% 2 2018
Member Name Party State Liberty Score Years in DC Next Election Track
Rep.

Frank D. Lucas

R OK-3 F 36% 22 2018
Rep.

Glenn Thompson

R PA-5 F 36% 8 2018
Rep.

Greg Walden

R OR-2 F 36% 18 2018
Thom Tillis
Sen.

Thom Tillis

R NC F 35% 2 2020
Rep.

Dave Joyce

R OH-14 F 35% 4 2018
Rep.

Mike Michael Conaway

R TX-11 F 35% 12 2018
Rep.

Kevin McCarthy

R CA-23 F 35% 10 2018
Rep.

Tom Cole

R OK-4 F 34% 14 2018
Rep.

Fred Upton

R MI-6 F 34% 30 2018
Rep.

Steve Womack

R AR-3 F 33% 6 2018
missing-bio
Rep.

Ryan Zinke

R MT-0 F 33% 2 2018
Sen.

Orrin G. Hatch

R UT F 33% 40 2018
Rep.

Adam Kinzinger

R IL-16 F 33% 6 2018
Rep.

Mike Simpson

R ID-2 F 33% 18 2018
Rep.

John Shimkus

R IL-15 F 33% 20 2018
Rep.

Jeffrey Denham

R CA-10 F 33% 6 2018
Rep.

Frank A. LoBiondo

R NJ-2 F 32% 22 2018
Rep.

Don Young

R AK-0 F 32% 43 2018
Sen.

John McCain

R AZ F 32% 30 2022
Rep.

Jim Cooper

D TN-5 F 32% 14 2018
missing-bio
Rep.

Steve Knight

R CA-25 F 31% 2 2018
Rep.

Steve Stivers

R OH-15 F 31% 6 2018
Rep.

Pat Meehan

R PA-7 F 31% 6 2018
missing-bio
Rep.

Dave Trott

R MI-11 F 31% 2 2018
Rep.

Collin C. Peterson

D MN-7 F 31% 26 2018
missing-bio
Rep.

Mike Bishop

R MI-8 F 31% 2 2018
Rep.

Rodney Davis

R IL-13 F 30% 4 2018
Sen.

Lindsey Graham

R SC F 30% 14 2020
Rep.

Harold Rogers

R KY-5 F 30% 36 2018
Sen.

Johnny Isakson

R GA F 30% 12 2022
Sen.

Shelley Moore Capito

R WV F 29% 16 2020
Rep.

Rodney Frelinghuysen

R NJ-11 F 29% 22 2018
Rep.

Peter A. DeFazio

D OR-4 F 29% 30 2018
Rep. Darin LaHood
Rep.

Darin LaHood

R IL-18 F 29% 1 2018
Rep.

Dave Reichert

R WA-8 F 29% 12 2018
Mike Rounds
Sen.

Mike Rounds

R SD F 29% 2 2020
Rep.

Ken Calvert

R CA-42 F 29% 24 2018
Sen.

Roger Wicker

R MS F 28% 9 2018
Rep.

Raúl M. Grijalva

D AZ-3 F 28% 14 2018
Rep.

Charlie Dent

R PA-15 F 28% 12 2018
Rep.

Maxine Waters

D CA-43 F 28% 26 2018
Rep.

Peter T. King

R NY-2 F 27% 24 2018
Rep.

Kevin Cramer

R ND-0 F 27% 4 2018
Rep.

Susan Brooks

R IN-5 F 26% 4 2018
Rep.

Mark Pocan

D WI-2 F 26% 4 2018
Rep.

Mario Diaz-Balart

R FL-25 F 26% 14 2018
Rep.

Keith Ellison

D MN-5 F 26% 10 2018
missing-bio
Rep.

Tom MacArthur

R NJ-3 F 25% 2 2018
missing-bio
Rep.

Will Hurd

R TX-23 F 25% 2 2018
missing-bio
Rep.

Bruce Poliquin

R ME-2 F 25% 2 2018

https://www.conservativereview.com/scorecard

 

Story 3: Independence Party Coming Soon — Videos

 

Image result for trends in party affiliation in usa

The Meaning of Independence Day

Ayn Rand – Liberty vs Socialism

Why Can’t Third Parties Take Off?

How Did The U.S. End Up With A Two-Party System?

Third parties are the underpants gnomes of American politics

Ron Paul on voting Libertarian if Trump is GOP Nominee: Certainly!

The Libertarian Chick on Government Gone Wild!

Yaron Brook: Ayn Rand vs. Big Government

Trump and the Decline of America, a talk by Yaron Brook

Trump’s Comments on Ayn Rand

John Stossel – A Libertarian for Trump

Stossel – Ann Coulter Threatens Libertarians and John Stossel with Drowning Them – 10-23-2014

Libertarians for Trump? A Debate

Donald Trump on Libertarianism: ‘I like it. A lot of good things.’

Why I Was Wrong About Libertarians

Lew Rockwell: The Truth About Trump

Lew Rockwell Why Libertarians Are Wrong About Open Borders

Ron Paul and the six kinds of libertarianism

 

 

 

In politics, as of today, do you consider yourself a Republican, a Democrat or an independent?
Trend since 2004

 

Republicans Independents Democrats
% % %
2017 Mar 1-5 26 42 30
2017 Feb 1-5 31 37 31
2017 Jan 4-8 28 44 25
2016 Dec 7-11 28 39 29
2016 Nov 9-13 27 40 30
2016 Nov 1-6 27 36 31
2016 Oct 5-9 27 36 32
2016 Sep 14-18 27 40 32
2016 Sep 7-11 29 38 31
2016 Aug 3-7 27 38 31
2016 Jul 13-17 28 42 28
2016 Jun 14-23 28 39 31
2016 Jun 1-5 27 41 30
2016 May 18-22 27 45 28
2016 May 4-8 31 37 30
2016 Apr 6-10 25 44 31
2016 Mar 2-6 26 38 32
2016 Feb 3-7 30 37 30
2016 Jan 21-25 29 39 31
2016 Jan 6-10 26 44 29
2015 Dec 2-6 27 40 30
2015 Nov 4-8 28 39 30
2015 Oct 7-11 25 42 29
2015 Sep 9-13 27 43 27
2015 Aug 5-9 27 41 31
2015 Jul 8-12 23 46 28
2015 Jun 2-7 25 41 31
2015 May 6-10 26 41 30
2015 Apr 9-12 24 42 31
2015 Mar 6-9 27 44 28
2015 Feb 8-11 25 43 29
2015 Jan 5-8 29 42 28
2014 Dec 8-11 27 40 31
2014 Nov 6-9 28 41 28
2014 Oct 29-Nov 2 26 39 32
2014 Oct 12-15 33 35 29
2014 Sep 25-30 26 42 30
2014 Sep 4-7 25 47 26
2014 Aug 7-10 26 40 31
2014 Jul 7-10 23 45 29
2014 Jun 5-8 24 46 28
2014 May 8-11 24 43 31
2014 Apr 24-30 23 43 32
2014 Apr 3-6 25 42 29
2014 Mar 6-9 25 42 30
2014 Feb 6-9 23 45 30
2014 Jan 5-8 24 45 29
2013 Dec 5-8 24 44 30
2013 Nov 7-10 23 46 28
2013 Oct 3-6 20 47 30
2013 Sep 5-8 22 45 31
2013 Aug 7-11 24 43 31
2013 Jul 10-14 25 42 31
2013 Jun 20-24 26 41 31
2013 Jun 1-4 26 41 31
2013 May 2-7 28 39 32
2013 Apr 4-14 26 40 33
2013 Mar 7-10 27 36 35
2013 Feb 7-10 28 38 32
2013 Jan 7-10 27 38 33
2012 Dec 27-30 27 36 34
2012 Dec 19-22 25 35 38
2012 Dec 14-17 25 39 34
2012 Nov 26-29 29 37 31
2012 Nov 15-18 27 38 32
2012 Nov 9-12 28 38 33
2012 Nov 1-4 30 33 35
2012 Sep 24-27 28 38 32
2012 Sep 6-9 27 36 35
2012 Aug 20-22 28 41 31
2012 Aug 9-12 26 42 29
2012 Jul 19-22 28 41 30
2012 Jul 9-12 27 41 30
2012 Jun 7-10 30 39 30
2012 May 10-13 27 44 29
2012 May 3-5 28 38 32
2012 Apr 9-12 29 41 29
2012 Mar 8-11 27 42 30
2012 Feb 16-19 27 43 29
2012 Feb 2-5 27 43 29
2012 Jan 5-8 27 42 30
2011 Dec 15-18 30 42 27
2011 Nov 28-Dec 1 25 45 28
2011 Nov 3-6 27 35 36
2011 Oct 6-9 26 41 31
2011 Sep 15-18 21 46 32
2011 Sep 8-11 25 44 30
2011 Aug 11-14 28 44 26
2011 Aug 4-7 24 42 34
2011 Jul 12-15 25 42 30
2011 Jul 7-10 29 39 30
2011 Jun 9-12 30 38 29
2011 May 5-8 29 37 32
2011 Apr 20-23 31 36 32
2011 Apr 7-11 26 42 30
2011 Mar 25-27 25 40 32
2011 Mar 3-6 29 39 29
2011 Feb 2-5 28 40 31
2011 Jan 14-16 28 42 28
2011 Jan 7-9 29 37 31
2010 Dec 10-12 33 34 32
2010 Nov 19-21 29 40 29
2010 Nov 4-7 26 41 31
2010 Oct 28-31 29 36 32
2010 Oct 21-24 29 34 33
2010 Oct 14-17 30 36 30
2010 Oct 7-10 30 34 33
2010 Sep 30-Oct 3 29 37 30
2010 Sep 23-26 30 34 32
2010 Sep 13-16 30 41 28
2010 Aug 27-30 28 41 30
2010 Aug 5-8 29 40 30
2010 Jul 27-Aug 1 30 37 31
2010 Jul 8-11 26 40 30
2010 Jun 11-13 28 33 36
2010 May 24-25 28 40 30
2010 May 3-6 30 36 32
2010 Apr 8-11 26 42 29
2010 Mar 26-28 28 40 31
2010 Mar 4-7 29 39 30
2010 Feb 1-3 27 40 33
2010 Jan 8-10 28 36 34
2009 Dec 11-13 29 36 33
2009 Oct 16-19 25 41 32
2009 Oct 1-4 27 38 33
2009 Sep 11-13 26 40 33
2009 Aug 31-Sep 2 28 36 35
2009 Aug 6-9 28 35 35
2009 Jul 17-19 26 39 33
2009 Jul 10-12 29 33 37
2009 Jun 14-17 29 37 32
2009 May 29-31 26 37 35
2009 May 7-10 32 34 32
2009 Apr 20-21 27 36 36
2009 Apr 6-9 24 40 35
2009 Mar 27-29 28 35 35
2009 Mar 5-8 25 35 38
2009 Feb 20-22 27 36 34
2009 Feb 9-12 29 36 33
2009 Jan 30-Feb 1 27 35 36
2009 Jan 9-11 30 33 36
2008 Dec 12-14 26 35 37
2008 Dec 4-7 27 33 37
2008 Nov 13-16 26 35 39
2008 Nov 7-9 28 37 33
2008 Oct 23-26 33 32 34
2008 Oct 10-12 30 33 35
2008 Oct 3-5 27 38 33
2008 Sep 26-27 28 35 35
2008 Sep 8-11 32 31 35
2008 Sep 5-7 30 34 35
2008 Aug 21-23 27 37 36
2008 Aug 7-10 31 32 35
2008 Jul 25-27 29 33 36
2008 Jul 10-13 27 35 35
2008 Jun 15-19 30 35 34
2008 Jun 9-12 29 36 33
2008 May 30-Jun1 26 36 37
2008 May 8-11 27 35 37
2008 May 1-3 27 37 36
2008 Apr 18-20 25 38 36
2008 Apr 6-9 26 35 37
2008 Mar 14-16 29 33 38
2008 Mar 6-9 28 37 34
2008 Feb 21-24 29 34 36
2008 Feb 11-14 26 34 40
2008 Feb 8-10 28 34 37
2008 Jan 30-Feb 2 29 36 35
2008 Jan 10-13 28 38 34
2008 Jan 4-6 30 35 34
2007 Dec 14-16 27 39 33
2007 Dec 6-9 30 36 32
2007 Nov 30-Dec 2 28 41 31
2007 Nov 11-14 27 38 33
2007 Nov 2-4 25 41 34
2007 Oct 12-14 24 43 31
2007 Oct 4-7 28 38 32
2007 Sep 14-16 28 38 33
2007 Sep 7-8 26 41 32
2007 Aug 13-16 28 40 30
2007 Aug 3-5 27 43 30
2007 Jul 12-15 29 37 32
2007 Jul 6-8 25 43 31
2007 Jun 11-14 27 38 34
2007 Jun 1-3 31 36 31
2007 May 10-13 27 38 34
2007 May 4-6 27 40 33
2007 Apr 13-15 29 36 34
2007 Apr 2-5 30 36 34
2007 Mar 23-25 29 36 33
2007 Mar 11-14 31 35 32
2007 Mar 2-4 27 37 35
2007 Feb 9-11 26 41 32
2007 Feb 1-4 26 37 35
2007 Jan 15-18 30 32 36
2007 Jan 12-14 28 40 32
2007 Jan 5-7 27 42 31
2006 Dec 11-14 30 34 35
2006 Dec 8-10 29 36 34
2006 Nov 9-12 24 40 35
2006 Nov 2-5 31 32 34
2006 Oct 20-22 29 34 35
2006 Oct 9-12 28 35 34
2006 Oct 6-8 29 31 38
2006 Sep 15-17 31 34 34
2006 Sep 7-10 30 33 35
2006 Aug 18-20 33 32 34
2006 Aug 7-10 31 31 36
2006 Jul 28-30 32 29 38
2006 Jul 21-23 29 37 33
2006 Jul 6-9 31 33 34
2006 Jun 23-26 26 36 37
2006 Jun 9-11 35 27 37
2006 Jun 1-4 30 35 34
2006 May 12-13 30 36 34
2006 May 8-11 29 35 34
2006 May 5-7 29 37 32
2006 Apr 28-30 30 35 34
2006 Apr 10-13 31 33 35
2006 Apr 7-9 31 33 35
2006 Mar 13-16 28 36 33
2006 Mar 10-12 32 33 34
2006 Feb 28-Mar 1 32 31 35
2006 Feb 9-12 30 39 31
2006 Feb 6-9 33 34 30
2006 Jan 20-22 32 32 34
2006 Jan 9-12 34 34 31
2006 Jan 6-8 34 33 32
2005 Dec 19-22 29 36 32
2005 Dec 16-18 31 36 32
2005 Dec 9-11 30 38 31
2005 Dec 5-8 36 31 31
2005 Nov 17-20 33 30 34
2005 Nov 11-13 31 34 34
2005 Nov 7-10 32 33 33
2005 Oct 28-30 32 37 30
2005 Oct 24-26 33 30 35
2005 Oct 21-23 34 33 33
2005 Oct 13-16 30 33 36
2005 Sep 26-28 32 34 33
2005 Sep 16-18 30 33 36
2005 Sep 12-15 30 37 31
2005 Sep 8-11 33 34 32
2005 Aug 28-30 32 32 35
2005 Aug 22-25 29 34 35
2005 Aug 8-11 33 30 35
2005 Aug 5-7 33 35 31
2005 Jul 25-28 28 37 33
2005 Jul 22-24 32 31 36
2005 Jul 7-10 30 33 35
2005 Jun 29-30 29 31 38
2005 Jun 24-26 33 32 34
2005 Jun 16-19 33 31 34
2005 Jun 6-8 33 34 31
2005 May 23-26 33 34 31
2005 May 20-22 29 33 36
2005 May 2-5 35 30 34
2005 Apr 29-May 1 34 34 31
2005 Apr 18-21 35 29 35
2005 Apr 1-2 35 33 31
2005 Mar 21-23 32 29 37
2005 Mar 18-20 35 31 32
2005 Mar 7-10 35 31 32
2005 Feb 25-27 38 27 34
2005 Feb 21-24 37 31 29
2005 Feb 7-10 34 30 35
2005 Feb 4-6 37 35 28
2005 Jan 14-16 33 36 30
2005 Jan 7-9 35 29 36
2005 Jan 3-5 37 27 35
2004 Dec 17-19 33 30 35
2004 Dec 5-8 37 29 32
2004 Nov 19-21 38 31 30
2004 Nov 7-10 38 27 35
2004 Oct 29-31 34 27 37
2004 Oct 22-24 35 29 36
2004 Oct 14-16 38 29 33
2004 Oct 11-14 33 32 35
2004 Oct 9-10 35 30 34
2004 Oct 1-3 36 27 37
2004 Sep 24-26 39 28 31
2004 Sep 13-15 37 29 33
2004 Sep 3-5 37 29 34
2004 Aug 23-25 35 32 32
2004 Aug 9-11 36 29 34
2004 Jul 30-Aug 1 35 28 36
2004 Jul 19-21 37 28 34
2004 Jul 8-11 35 27 36
2004 Jun 21-23 32 33 34
2004 Jun 3-6 33 31 35
2004 May 21-23 33 31 34
2004 May 7-9 32 32 33
2004 May 2-4 32 31 36
2004 Apr 16-18 32 32 34
2004 Apr 5-8 34 30 34
2004 Mar 26-28 36 30 32
2004 Mar 8-11 31 35 33
2004 Mar 5-7 33 31 35
2004 Feb 16-17 30 39 31
2004 Feb 9-12 32 35 32
2004 Feb 6-8 33 36 30
2004 Jan 29-Feb 1 31 35 33
2004 Jan 12-15 32 33 34
2004 Jan 9-11 33 35 31
2004 Jan 2-5 32 40 28
GALLUP

 

The Pronk Pops Show Podcasts Portfolio

Listen To Pronk Pops Podcast or Download Shows 864

Listen To Pronk Pops Podcast or Download Shows 857-863

Listen To Pronk Pops Podcast or Download Shows 850-856

Listen To Pronk Pops Podcast or Download Shows 845-849

Listen To Pronk Pops Podcast or Download Shows 840-844

Listen To Pronk Pops Podcast or Download Shows 833-839

Listen To Pronk Pops Podcast or Download Shows 827-832

Listen To Pronk Pops Podcast or Download Shows 821-826

Listen To Pronk Pops Podcast or Download Shows 815-820

Listen To Pronk Pops Podcast or Download Shows 806-814

Listen To Pronk Pops Podcast or Download Shows 800-805

Listen To Pronk Pops Podcast or Download Shows 793-799

Listen To Pronk Pops Podcast or Download Shows 785-792

Listen To Pronk Pops Podcast or Download Shows 777-784

Listen To Pronk Pops Podcast or Download Shows 769-776

Listen To Pronk Pops Podcast or Download Shows 759-768

Listen To Pronk Pops Podcast or Download Shows 751-758

Listen To Pronk Pops Podcast or Download Shows 745-750

Listen To Pronk Pops Podcast or Download Shows 738-744

Listen To Pronk Pops Podcast or Download Shows 732-737

Listen To Pronk Pops Podcast or Download Shows 727-731

Listen To Pronk Pops Podcast or Download Shows 720-726

Listen To Pronk Pops Podcast or DownloadShows 713-719

Listen To Pronk Pops Podcast or DownloadShows 705-712

Listen To Pronk Pops Podcast or Download Shows 695-704

Listen To Pronk Pops Podcast or Download Shows 685-694

Listen To Pronk Pops Podcast or Download Shows 675-684

Listen To Pronk Pops Podcast or Download Shows 668-674

Listen To Pronk Pops Podcast or Download Shows 660-667

Listen To Pronk Pops Podcast or Download Shows 651-659

Listen To Pronk Pops Podcast or Download Shows 644-650

Listen To Pronk Pops Podcast or Download Shows 637-643

Listen To Pronk Pops Podcast or Download Shows 629-636

Listen To Pronk Pops Podcast or Download Shows 617-628

Listen To Pronk Pops Podcast or Download Shows 608-616

Listen To Pronk Pops Podcast or Download Shows 599-607

Listen To Pronk Pops Podcast or Download Shows 590-598

Listen To Pronk Pops Podcast or Download Shows 585- 589

Listen To Pronk Pops Podcast or Download Shows 575-584

Listen To Pronk Pops Podcast or Download Shows 565-574

Listen To Pronk Pops Podcast or Download Shows 556-564

Listen To Pronk Pops Podcast or Download Shows 546-555

Listen To Pronk Pops Podcast or Download Shows 538-545

Listen To Pronk Pops Podcast or Download Shows 532-537

Listen To Pronk Pops Podcast or Download Shows 526-531

Listen To Pronk Pops Podcast or Download Shows 519-525

Listen To Pronk Pops Podcast or Download Shows 510-518

Listen To Pronk Pops Podcast or Download Shows 500-509

Listen To Pronk Pops Podcast or Download Shows 490-499

Listen To Pronk Pops Podcast or Download Shows 480-489

Listen To Pronk Pops Podcast or Download Shows 473-479

Listen To Pronk Pops Podcast or Download Shows 464-472

Listen To Pronk Pops Podcast or Download Shows 455-463

Listen To Pronk Pops Podcast or Download Shows 447-454

Listen To Pronk Pops Podcast or Download Shows 439-446

Listen To Pronk Pops Podcast or Download Shows 431-438

Listen To Pronk Pops Podcast or Download Shows 422-430

Listen To Pronk Pops Podcast or Download Shows 414-421

Listen To Pronk Pops Podcast or Download Shows 408-413

Listen To Pronk Pops Podcast or Download Shows 400-407

Listen To Pronk Pops Podcast or Download Shows 391-399

Listen To Pronk Pops Podcast or Download Shows 383-390

Listen To Pronk Pops Podcast or Download Shows 376-382

Listen To Pronk Pops Podcast or Download Shows 369-375

Listen To Pronk Pops Podcast or Download Shows 360-368

Listen To Pronk Pops Podcast or Download Shows 354-359

Listen To Pronk Pops Podcast or Download Shows 346-353

Listen To Pronk Pops Podcast or Download Shows 338-345

Listen To Pronk Pops Podcast or Download Shows 328-337

Listen To Pronk Pops Podcast or Download Shows 319-327

Listen To Pronk Pops Podcast or Download Shows 307-318

Listen To Pronk Pops Podcast or Download Shows 296-306

Listen To Pronk Pops Podcast or Download Shows 287-295

Listen To Pronk Pops Podcast or Download Shows 277-286

Listen To Pronk Pops Podcast or Download Shows 264-276

Listen To Pronk Pops Podcast or Download Shows 250-263

Listen To Pronk Pops Podcast or Download Shows 236-249

Listen To Pronk Pops Podcast or Download Shows 222-235

Listen To Pronk Pops Podcast or Download Shows 211-221

Listen To Pronk Pops Podcast or Download Shows 202-210

Listen To Pronk Pops Podcast or Download Shows 194-201

Listen To Pronk Pops Podcast or Download Shows 184-193

Listen To Pronk Pops Podcast or Download Shows 174-183

Listen To Pronk Pops Podcast or Download Shows 165-173

Listen To Pronk Pops Podcast or Download Shows 158-164

Listen To Pronk Pops Podcast or Download Shows151-157

Listen To Pronk Pops Podcast or Download Shows 143-150

Listen To Pronk Pops Podcast or Download Shows 135-142

Listen To Pronk Pops Podcast or Download Shows 131-134

Listen To Pronk Pops Podcast or Download Shows 124-130

Listen To Pronk Pops Podcast or Download Shows 121-123

Listen To Pronk Pops Podcast or Download Shows 118-120

Listen To Pronk Pops Podcast or Download Shows 113 -117

Listen To Pronk Pops Podcast or Download Show 112

Listen To Pronk Pops Podcast or Download Shows 108-111

Listen To Pronk Pops Podcast or Download Shows 106-108

Listen To Pronk Pops Podcast or Download Shows 104-105

Listen To Pronk Pops Podcast or Download Shows 101-103

Listen To Pronk Pops Podcast or Download Shows 98-100

Listen To Pronk Pops Podcast or Download Shows 94-97

Listen To Pronk Pops Podcast or Download Show 93

Listen To Pronk Pops Podcast or Download Show 92

Listen To Pronk Pops Podcast or Download Show 91

Listen To Pronk Pops Podcast or Download Shows 88-90

Listen To Pronk Pops Podcast or Download Shows 84-87

Listen To Pronk Pops Podcast or Download Shows 79-83

Listen To Pronk Pops Podcast or Download Shows 74-78

Listen To Pronk Pops Podcast or Download Shows 71-73

Listen To Pronk Pops Podcast or Download Shows 68-70

Listen To Pronk Pops Podcast or Download Shows 65-67

Listen To Pronk Pops Podcast or Download Shows 62-64

Listen To Pronk Pops Podcast or Download Shows 58-61

Listen To Pronk Pops Podcast or Download Shows 55-57

Listen To Pronk Pops Podcast or Download Shows 52-54

Listen To Pronk Pops Podcast or Download Shows 49-51

Listen To Pronk Pops Podcast or Download Shows 45-48

Listen To Pronk Pops Podcast or Download Shows 41-44

Listen To Pronk Pops Podcast or Download Shows 38-40

Listen To Pronk Pops Podcast or Download Shows 34-37

Listen To Pronk Pops Podcast or Download Shows 30-33

Listen To Pronk Pops Podcast or Download Shows 27-29

Listen To Pronk Pops Podcast or Download Shows 17-26

Listen To Pronk Pops Podcast or Download Shows 16-22

Listen To Pronk Pops Podcast or Download Shows 10-15

Listen To Pronk Pops Podcast or Download Shows 1-9

Read Full Post | Make a Comment ( None so far )

The Pronk Pops Show 860, March 24, 2017, Story 1: Two Party Interference In Health Care Insurance Industry With Federal Regulation and Taxation Is A Big Government Failure — Time for New Independent Constitutional Limited Government Party — Bring Back Free Market Competition For Health Care and Insurance — Leave The American People and Business Alone! — Videos — Story 2: Obama Administration Criminal Activity in Misusing Intelligence Agencies and Mishandling National Security Documents — Who Authorized The Targeting of President-Elect Trump and Trump’s Transition Team for National Security Surveillance and The Unmasking of Their Names? — Watergate Redux — National Security Agency Surveillance of American People Using Stellar Wind — Videos

Posted on March 24, 2017. Filed under: American History, Blogroll, Breaking News, College, Communications, Congress, Constitutional Law, Corruption, Countries, Crime, Culture, Donald J. Trump, Donald J. Trump, Donald Trump, Donald Trump, Economics, Elections, Employment, Federal Government, Freedom of Speech, Government, Government Spending, History, House of Representatives, Human, Human Behavior, Illegal Immigration, Immigration, Insurance, Law, Legal Immigration, Life, Lying, Medicare, Mike Pence, News, Philosophy, Photos, Politics, Radio, Rand Paul, Rand Paul, Raymond Thomas Pronk, Regulation, Rule of Law, Scandals, Security, Senate, Social Security, Taxation, Taxes, Technology, Ted Cruz, Ted Cruz, Terror, Terrorism, United States of America, Welfare Spending | Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , |

Project_1

The Pronk Pops Show Podcasts

Pronk Pops Show 860: March 24, 2017

Pronk Pops Show 859: March 23, 2017

Pronk Pops Show 858: March 22, 2017

Pronk Pops Show 857: March 21, 2017

Pronk Pops Show 856: March 20, 2017

Pronk Pops Show 855: March 10, 2017

Pronk Pops Show 854: March 9, 2017

Pronk Pops Show 853: March 8, 2017

Pronk Pops Show 852: March 6, 2017

Pronk Pops Show 851: March 3, 2017

Pronk Pops Show 850: March 2, 2017

Pronk Pops Show 849: March 1, 2017

Pronk Pops Show 848: February 28, 2017

Pronk Pops Show 847: February 27, 2017

Pronk Pops Show 846: February 24, 2017

Pronk Pops Show 845: February 23, 2017

Pronk Pops Show 844: February 22, 2017

Pronk Pops Show 843: February 21, 2017

Pronk Pops Show 842: February 20, 2017

Pronk Pops Show 841: February 17, 2017

Pronk Pops Show 840: February 16, 2017

Pronk Pops Show 839: February 15, 2017

Pronk Pops Show 838: February 14, 2017

Pronk Pops Show 837: February 13, 2017

Pronk Pops Show 836: February 10, 2017

Pronk Pops Show 835: February 9, 2017

Pronk Pops Show 834: February 8, 2017

Pronk Pops Show 833: February 7, 2017

Pronk Pops Show 832: February 6, 2017

Pronk Pops Show 831: February 3, 2017

Pronk Pops Show 830: February 2, 2017

Pronk Pops Show 829: February 1, 2017

Pronk Pops Show 828: January 31, 2017

Pronk Pops Show 827: January 30, 2017

Pronk Pops Show 826: January 27, 2017

Pronk Pops Show 825: January 26, 2017

Pronk Pops Show 824: January 25, 2017

Pronk Pops Show 823: January 24, 2017

Pronk Pops Show 822: January 23, 2017

Pronk Pops Show 821: January 20, 2017

Pronk Pops Show 820: January 19, 2017

Pronk Pops Show 819: January 18, 2017

Pronk Pops Show 818: January 17, 2017

Pronk Pops Show 817: January 13, 2017

Pronk Pops Show 816: January 12, 2017

Pronk Pops Show 815: January 11, 2017

Pronk Pops Show 814: January 10, 2017

Pronk Pops Show 813: January 9, 2017

Pronk Pops Show 812: December 12, 2016

Pronk Pops Show 811: December 9, 2016

Pronk Pops Show 810: December 8, 2016

Pronk Pops Show 809: December 7, 2016

Pronk Pops Show 808: December 6, 2016

Pronk Pops Show 807: December 5, 2016

Pronk Pops Show 806: December 2, 2016

Pronk Pops Show 805: December 1, 2016

Story 1: Two Party  Interference In Health Care Insurance Industry With Federal Regulation and Taxation Is A Big Government Failure — Time for New Independent Constitutional  Limited Government Party — Bring Back Free Market Competition For Health Care  Insurance — Lower Premiums and Deductibles and More Choice of Plans With National Competition — Leave The American People and Business Alone! — Videos — 
Image result for cartoons trump obamacare repeal failure

Image result for cartoons trump obamacare repeal failure

Image result for cartoons wiretapping of trump

Image result for cartoons trump obamacare repeal failure

Image result for cartoons trump obamacare repeal failure

Image result for cartoons paul ryan repealed failed

Image result for cartoons trump obamacare repeal failure

Image result for cartoons trump obamacare repeal failure

Image result for cartoons trump obamacare repeal failure

Image result for quotes from trump art of deal

Gohmert: ObamaCare Replacement Bill Was ‘Based on a Lie’

WATCH LIVE Speaker Paul Ryan speaks after House pulls ‘Obamacare’ repeal bill before Friday’s planning

President Trump Speaks After Pulling Healthcare Bill plan 3/24/17 3/24/2017 video

Mark Levin interviews Sen. Mike Lee about the upcoming vote on Obamacare replacement (March 22 2017)

RAND PAUL REACTS TO THE GOP HEALTHCARE BILL GETTING PULLED

Mike Lee Says GOP Healthcare Bill will Fail. Rebuts Paul Ryan, Bigtime

Trump tastes failure as U.S. House healthcare bill collapses

By David Lawder and Steve Holland
ReutersMarch 25, 2017
Trump tastes failure as U.S. House healthcare bill collapses

By David Lawder and Steve Holland

WASHINGTON (Reuters) – President Donald Trump suffered a stunning political setback on Friday in a Congress controlled by his own party when Republican leaders pulled legislation to overhaul the U.S. healthcare system, a major 2016 election campaign promise of the president and his allies.

House of Representatives leaders yanked the bill after a rebellion by Republican moderates and the party’s most conservative lawmakers left them short of votes, ensuring that Trump’s first major legislative initiative since taking office on Jan. 20 ended in failure. Democrats were unified against it.

House Republicans had planned a vote on the measure after Trump late on Thursday cut off negotiations with Republicans who had balked at the plan and issued an ultimatum to vote on Friday, win or lose. But desperate lobbying by the White House and Republican House Speaker Paul Ryan was unable to round up the 216 votes needed for passage.

“We learned a lot about loyalty. We learned a lot about the vote-getting process,” Trump told reporters at the White House, although he sought to shift the blame to the Democrats even though his party controls the White House, the House and the Senate.

With Friday’s legislative collapse, Democratic former President Barack Obama’s signature domestic policy achievement, the 2010 Affordable Care Act – known as Obamacare – remains in place despite seven years of Republican promises to dismantle it.

The healthcare failure called into question not only Trump’s ability to get other key parts of his agenda, including tax cuts and a boost in infrastructure spending, through Congress, but the Republican Party’s capacity to govern effectively.

Neither Trump nor Ryan indicated any plans to try to tackle healthcare legislation again anytime soon. Trump said he would turn his attention to getting “big tax cuts” through Congress, another tricky proposition.

Republican supporters said the legislation would achieve their goal of rolling back the government’s “nanny state” role in healthcare. The White House made undoing Obamacare its top priority when Trump took office two months ago.

But the White House and House leaders were unable to come up with a plan that satisfied the clashing interests of moderates and conservatives, despite Trump’s vaunted image as a deal maker.

Amid a chaotic scramble for votes, Ryan, who championed the bill, met with Trump at the White House. Ryan said he recommended that it be withdrawn from the House floor because he did not have the votes to pass it, and Trump agreed.

“We were just probably anywhere from 10 to 15 votes short,” Trump said. “With no Democrat support we couldn’t quite get there.”

Senate Democratic leader Chuck Schumer said the bill failed “because of two traits that have plagued the Trump presidency since he took office: incompetence and broken promises.”

Democrats said the bill would take away medical insurance from millions of Americans and leave the more-than-$3 trillion U.S. healthcare system in disarray.

And some moderate Republicans opposed the bill because of worries that millions of America would be hurt.

“There were things in this bill that I didn’t particularly like,” Trump added, without specifying what those were, but expressed confidence in Ryan’s leadership.

“Perhaps the best thing that could happen is exactly what happened today, because we’ll end up with a truly great healthcare bill in the future after this mess known as Obamacare explodes,” said Trump, who had posted multiple tweets throughout March proclaiming that “Obamacare is imploding” and repeatedly saying that Republicans were coming together to pass the bill.

Friday’s events cast doubt on whether Ryan can get major legislation approved by fractious Republican lawmakers.

“I will not sugarcoat this. This is a disappointing day for us. Doing big things is hard,” Ryan said at a news conference, adding that his fellow Republicans are experiencing what he called “growing pains” transitioning from an opposition party to a governing party.

“Obamacare’s the law of the land,” Ryan added. “We’re going to be living with Obamacare for the foreseeable future.”

Members of the Freedom Caucus, the House’s most conservative members, were instrumental in the bill’s failure, opposing it among other reasons because they considered parts too similar to Obamacare.

Trump said he was disappointed and “a little surprised” with the Freedom Caucus opposition.

The nonpartisan Congressional Budget Office said under the Republican legislation 14 million people would lose medical coverage by next year and more than 24 million would be uninsured in 2026.

News that the bill had been pulled before a final vote was greeted initially with a small sigh of relief by U.S. equity investors, who earlier in the week had been fretful that an outright defeat would damage Trump’s other priorities, such as tax cuts and infrastructure spending.

Benchmark U.S. stock market indexes ended the session mixed after rallying back from session lows following the news. The S&P 500 Index ended fractionally lower, the blue chip Dow Jones Industrial Average slipped about 0.3 percent and the Nasdaq Composite Index rose about 0.2 percent.

Shares of hospital operators finished sharply higher, with the S&P healthcare facilities index up 2.7 percent, while the S&P 500 healthcare sector edged down 0.03 percent. The dollar strengthened modestly on the news, and U.S. Treasury bond yields edged up from session lows.

Trump said he would be “totally open” to working with Democrats on healthcare “when they all become civilized.” House Democratic leader Nancy Pelosi said working to lower prescription drug prices was one area of possible cooperation with Republicans.

Republican Representative Dana Rohrabacher said before the bill was pulled that voting it down would be “neutering Trump” while empowering his opponents.

“You don’t cut the balls off a bull and then expect that he can go out and get the job done,” Rohrabacher told Reuters. “This will emasculate Trump and we can’t do that. … If we bring this down now, Trump will have lost all of his leverage to pass whatever bill it is, whether it’s the tax bill or whatever reforms that he wants.”

Representative Joe Barton of Texas, when asked why his fellow Republicans were so united over the past seven years to dump Obamacare only to fall apart when they actually do something about it, said, “Sometimes you’re playing fantasy football and sometimes you’re in the real game.”

Obamacare boosted the number of Americans with health insurance through mandates on individuals and employers, and income-based subsidies. About 20 million Americans gained insurance coverage through the law.

The House plan would have rescinded a range of taxes created by Obamacare, ended a penalty on people who refuse to obtain health insurance, and ended Obamacare’s income-based subsidies to help people buy insurance while creating less-generous age-based tax credits

It also would have ended Obamacare’s expansion of the Medicaid state-federal insurance program for the poor, cut future federal Medicaid funding and let states impose work requirements on some Medicaid recipients.

House leaders agreed to a series of last-minute changes to try to win over disgruntled conservatives, including ending the Obamacare requirement that insurers cover certain “essential benefits” such as maternity care, mental health services and prescription drug coverage.

https://www.yahoo.com/news/trump-tastes-failure-u-house-healthcare-bill-collapses-150843163–business.html

Failure on health bill also hurts prospects for tax overhaul

FILE – In this Feb. 22, 2017, file photo photo, Treasury Secretary Steven Mnuchin listens at right… Read more

WASHINGTON (AP) — House Republicans’ failure to repeal Barack Obama’s health care law deals a serious blow to another big part of President Donald Trump’s agenda: tax reform.

Trump and House Speaker Paul Ryan, R-Wis., say they will soon turn their attention to the first major re-write of the tax code in more than 30 years. But they will have to do it without the momentum of victory on health care.

Just as important, the loss on health care will deprive Republicans of $1 trillion in tax cuts.

The GOP health plan would have repealed nearly $1 trillion in taxes enacted under Obama’s Affordable Care Act. The bill coupled the tax cuts with spending cuts for Medicaid, so it wouldn’t add to the budget deficit.

Without the spending cuts, it will be much harder for Republicans to cut taxes without adding to the federal government’s red ink.

“Yes this does make tax reform more difficult,” said Ryan. “But it does not in any way make it impossible.”

“That just means the Obamacare taxes stay with Obamacare. We’re going to go fix the rest of the tax code,” he added.

House Republicans couldn’t round up enough votes Friday to repeal and replace a law they despise, raising questions about their ability to tackle other tough issues.

“Doing big things is hard,” Ryan conceded as he vowed to press on.

Rep. Jodey Arrington, R-Texas, acknowledged that Friday’s turn of events made him doubtful about the Republicans’ ability to tackle major legislation.

“This was my first big vote and our first big initiative in the line of things to come like tax reform,” said the freshman. “I think this would have given us tremendous momentum and I think this hurts that momentum.”

Rep. Mike Kelly, R-Pa., said, “You always build on your last accomplishment.”

Nevertheless, Treasury Secretary Steven Mnuchin said Friday the administration plans to turn quickly to tax reform with the goal of getting an overhaul approved by Congress by August.

“Health care is a very complicated issue,” Mnuchin said. “In a way, tax reform is a lot simpler.”

Don’t tell that to House Republicans who have been struggling with the issue for years.

The general goal for Republicans is to lower income tax rates for individuals and corporations, and make up the lost revenue by reducing exemptions, deductions and credits.

Overhauling the tax code is hard because every tax break has a constituency. And the biggest tax breaks are among the most popular.

For example, nearly 34 million families claimed the mortgage interest deduction in 2016, reducing their tax bills by $65 billion.

Also, more than 43 million families deducted their state and local income, sales and personal property taxes from their federal taxable income last year. The deduction reduced their federal tax bills by nearly $70 billion.

Mnuchin said he had been overseeing work on the administration’s tax bill for the past two months. He said it would be introduced soon.

Mnuchin said the White House plan would cut individual and corporate tax rates, though he didn’t offer specifics.

House Republicans have released a blueprint that outlines their goals for a tax overhaul. It would lower the top individual income tax rate from 39.6 percent to 33 percent, and reduce the number of tax brackets from seven to three.

The House plan retains the mortgage interest deduction but repeals the deduction for state and local taxes.

On the corporate side, the plan would repeal the 35 percent corporate income tax and replace it with a 20 percent tax on profits from selling imports and domestically produced goods and services consumed in the U.S.

Exports would be exempt from the new tax, called a border adjustment tax.

The new tax has drawn opposition from Republicans in the Senate. Mnuchin would not reveal whether the administration will include the border adjustment tax in the White House proposal. He was speaking at a public interview event with the news site Axios.

Republicans often complained that they couldn’t do a tax overhaul when Obama was president. Now, Republicans control the House, the Senate and the White House, and they see a great opportunity.

They plan to use a complicated Senate rule that would prevent Democrats from blocking the bill. But there’s a catch: Under the rule, the package cannot add to long-term budget deficits.

That means every tax cut has to be offset by a similar tax increase or a spending cut. That’s why the loss on health care was so damaging to the effort to overhaul taxes.

Ryan made this case to fellow House Republicans in his failed effort to gain support for the health plan.

“That was part of the calculation of why we had to take care of health care first,” said Rep. Tom Reed, R-N.Y.

___

Associated Press writers Kevin Freking and Martin Crutsinger contributed to this report.

___

http://bigstory.ap.org/article/d6b3f963391a4b9486bc847a7f286a55/failure-health-bill-hurts-prospects-tax-overhaul

Mike Lee: Senate parliamentarian told me it’s possible to push harder on repealing Obamacare regulations

Sen. Mike Lee, R-Utah, said on Wednesday that the Senate parliamentarian has told him that it may be possible for Republicans to push harder on repealing Obamacare’s regulations than the current House bill, which contradicts the assertion by House leadership that the legislation goes after Obamacare as aggressively as possible under Senate rules.

“What I understood her to be saying is that there’s no reason why an Obamacare repeal bill necessarily could not have provisions repealing the health insurance regulations,” Lee said in an interview with the Washington Examiner, relating a conversation with parliamentarian Elizabeth MacDonough about reconciliation he had on Tuesday.

Lee also said that the parliamentarian told him it wasn’t until very recently, after the unveiling of the House bill, that any Republican even asked her about the possibility of repealing regulations with a simple majority.

With a House vote currently expected on Thursday, Republican leadership is scrambling for votes, trying to stave off a backlash from conservatives that could sink the bill. One of the issues conservatives have raised is that the House bill leaves most of the regulations in place, thus not combatting one of the main complaints about Obamacare – its skyrocketing premiums and limited choice.

Because Republicans don’t have 60 Senate seats to kill a filibuster, they have to pass a healthcare bill through a procedure known as reconciliation, which allows the majority party to pass legislation with a simple majority, assuming it meets a certain set of requirements, including that all provisions be primarily budgetary in nature.

Conservatives such as Lee have argued that Republicans should fight harder to argue that the regulations, which have a clear budgetary impact, can be passed through reconciliation. But House leadership and supporters of the bill have countered that the legislation already goes as far as possible. House Speaker Paul Ryan spokeswoman AshLee Strong, when asked about this by the Washington Examiner last week, said “We’ve worked closely with the Senate to carefully craft the bill to repeal and replace the law to the full extent allowed under the rules.”

But having met with the parliamentarian, who plays a key role in advising the presiding officer of the Senate over what’s in bounds during reconciliation, Lee is more convinced than ever that this is not true.

“One of the things we’ve been told over and over again is the bill was no more aggressive than it has been… in part because of Senate rules,” Lee said. “And the Senate rules are something those defending the bill have repeatedly pointed to in defense of why they wrote it the way they wrote it. The parliamentarian said, there’s not necessarily any reason that would categorically preclude you from doing more, both on the repeal front and the replacement front, all sorts of things are possible.”

He continued, “What matters is how it’s done, how it’s written up. There are ways it’s written up that perhaps make it not subject to passage through reconciliation, but there are other ways you could write it that might make it work.”

http://www.washingtonexaminer.com/article/2618154

On his radio show Wednesday evening, Conservative Review Editor-in-Chief Mark Levin interviewed Senator Mike Lee, R-Utah, about a recent conversation the lawmaker had with the Senate parliamentarian. The discussion: whether or not Obamacare’s regulations could be repealed via reconciliation, which only needs a simply majority to pass.

As previously reported by the Washington Examiner, Lee says that he was told by the parliamentarian (who interprets the rules of the Senate) that, despite claims from House leadership, the current “repeal and replace” legislation could do much more to undo Obamacare’s harmful mandates — if so desired.

 

“I honestly believe that the Republican establishment does not want to repeal the entirety of Obamacare,” Levin said. “I think you have Republican governors … who like the expanded Medicaid, so they’ve already sold out. There’s a lot of that going on.”

As it stands now, the current RINOcare version would repeal several taxes and mandates, but it leaves in place the major regulations that are the primary drivers of America’s skyrocketing health insurance premiums. One of the major reasons that these have been left in place, GOP leaders have said, is that the Byrd Rule in the Senate would prohibit them from repealing them in a budget bill.

But this doesn’t appear to be the case, Sen. Mike Lee says, who says he found out in his meeting with the parliamentarian that nobody from leadership so much as asked how much of Obamacare could be gutted in the budget process.

“She pointed out that it’s not necessarily true what we’ve been told [by leadership],” Lee said.

“I think this is very distressing,” Sen. Lee concluded. “Because a whole lot of congressmen have been told a whole lot of times that this is the best we can do under the Senate’s reconciliation rules. And it’s not true.”

https://www.conservativereview.com/commentary/2017/03/sen-mike-lee-puts-the-establishments-rinocare-lies-on-full-display#sthash.CjPMfFOw.dpuf

Story 2: Obama Administration Criminal Activity in Misusing Intelligence Agencies and Mishandling National Security Documents — Who Authorized The Targeting of President-Elect Trump and Trump’s Transition Team for National Security Surveillance and The Unmasking of Their Names? — Watergate Redux — National Security Agency Surveillance of American People Using Stellar Wind —  Videos

House Intelligence Chair News Conference – House Intelligence Committee Chair Devin Nunes (R-CA)

NSA Whistleblower: Trump Was Right On Wiretap Bill Binney – Tucker Carlson Tonight Fox News 3/24/17

NSA Whistleblower William Binney: The Future of FREEDOM

Nunes: Surveillance reports I’ve seen are ‘concerning’

Joe: Devin Nunes Blew Up Hopes Of Independent Russia Investigation | Morning Joe | MSNBC

Newt Gingrich on Nunes’ surveillance revelations

‘This Is All Political’ David Nunes Responds to Tapper- JAKE TAPPER 3/22/17

Breaking/ House intelligence committee chairman say’s Trump was wiretapped. 

Rep. Adam Schiff slams Rep. Devin Nunes’ comments on Trump intel

Nunes says information from Trump surveillance ‘concerned me’

The Pronk Pops Show Podcasts Portfolio

Listen To Pronk Pops Podcast or Download Shows 857-860

Listen To Pronk Pops Podcast or Download Shows 850-856

Listen To Pronk Pops Podcast or Download Shows 845-849

Listen To Pronk Pops Podcast or Download Shows 840-844

Listen To Pronk Pops Podcast or Download Shows 833-839

Listen To Pronk Pops Podcast or Download Shows 827-832

Listen To Pronk Pops Podcast or Download Shows 821-826

Listen To Pronk Pops Podcast or Download Shows 815-820

Listen To Pronk Pops Podcast or Download Shows 806-814

Listen To Pronk Pops Podcast or Download Shows 800-805

Listen To Pronk Pops Podcast or Download Shows 793-799

Listen To Pronk Pops Podcast or Download Shows 785-792

Listen To Pronk Pops Podcast or Download Shows 777-784

Listen To Pronk Pops Podcast or Download Shows 769-776

Listen To Pronk Pops Podcast or Download Shows 759-768

Listen To Pronk Pops Podcast or Download Shows 751-758

Listen To Pronk Pops Podcast or Download Shows 745-750

Listen To Pronk Pops Podcast or Download Shows 738-744

Listen To Pronk Pops Podcast or Download Shows 732-737

Listen To Pronk Pops Podcast or Download Shows 727-731

Listen To Pronk Pops Podcast or Download Shows 720-726

Listen To Pronk Pops Podcast or DownloadShows 713-719

Listen To Pronk Pops Podcast or DownloadShows 705-712

Listen To Pronk Pops Podcast or Download Shows 695-704

Listen To Pronk Pops Podcast or Download Shows 685-694

Listen To Pronk Pops Podcast or Download Shows 675-684

Listen To Pronk Pops Podcast or Download Shows 668-674

Listen To Pronk Pops Podcast or Download Shows 660-667

Listen To Pronk Pops Podcast or Download Shows 651-659

Listen To Pronk Pops Podcast or Download Shows 644-650

Listen To Pronk Pops Podcast or Download Shows 637-643

Listen To Pronk Pops Podcast or Download Shows 629-636

Listen To Pronk Pops Podcast or Download Shows 617-628

Listen To Pronk Pops Podcast or Download Shows 608-616

Listen To Pronk Pops Podcast or Download Shows 599-607

Listen To Pronk Pops Podcast or Download Shows 590-598

Listen To Pronk Pops Podcast or Download Shows 585- 589

Listen To Pronk Pops Podcast or Download Shows 575-584

Listen To Pronk Pops Podcast or Download Shows 565-574

Listen To Pronk Pops Podcast or Download Shows 556-564

Listen To Pronk Pops Podcast or Download Shows 546-555

Listen To Pronk Pops Podcast or Download Shows 538-545

Listen To Pronk Pops Podcast or Download Shows 532-537

Listen To Pronk Pops Podcast or Download Shows 526-531

Listen To Pronk Pops Podcast or Download Shows 519-525

Listen To Pronk Pops Podcast or Download Shows 510-518

Listen To Pronk Pops Podcast or Download Shows 500-509

Listen To Pronk Pops Podcast or Download Shows 490-499

Listen To Pronk Pops Podcast or Download Shows 480-489

Listen To Pronk Pops Podcast or Download Shows 473-479

Listen To Pronk Pops Podcast or Download Shows 464-472

Listen To Pronk Pops Podcast or Download Shows 455-463

Listen To Pronk Pops Podcast or Download Shows 447-454

Listen To Pronk Pops Podcast or Download Shows 439-446

Listen To Pronk Pops Podcast or Download Shows 431-438

Listen To Pronk Pops Podcast or Download Shows 422-430

Listen To Pronk Pops Podcast or Download Shows 414-421

Listen To Pronk Pops Podcast or Download Shows 408-413

Listen To Pronk Pops Podcast or Download Shows 400-407

Listen To Pronk Pops Podcast or Download Shows 391-399

Listen To Pronk Pops Podcast or Download Shows 383-390

Listen To Pronk Pops Podcast or Download Shows 376-382

Listen To Pronk Pops Podcast or Download Shows 369-375

Listen To Pronk Pops Podcast or Download Shows 360-368

Listen To Pronk Pops Podcast or Download Shows 354-359

Listen To Pronk Pops Podcast or Download Shows 346-353

Listen To Pronk Pops Podcast or Download Shows 338-345

Listen To Pronk Pops Podcast or Download Shows 328-337

Listen To Pronk Pops Podcast or Download Shows 319-327

Listen To Pronk Pops Podcast or Download Shows 307-318

Listen To Pronk Pops Podcast or Download Shows 296-306

Listen To Pronk Pops Podcast or Download Shows 287-295

Listen To Pronk Pops Podcast or Download Shows 277-286

Listen To Pronk Pops Podcast or Download Shows 264-276

Listen To Pronk Pops Podcast or Download Shows 250-263

Listen To Pronk Pops Podcast or Download Shows 236-249

Listen To Pronk Pops Podcast or Download Shows 222-235

Listen To Pronk Pops Podcast or Download Shows 211-221

Listen To Pronk Pops Podcast or Download Shows 202-210

Listen To Pronk Pops Podcast or Download Shows 194-201

Listen To Pronk Pops Podcast or Download Shows 184-193

Listen To Pronk Pops Podcast or Download Shows 174-183

Listen To Pronk Pops Podcast or Download Shows 165-173

Listen To Pronk Pops Podcast or Download Shows 158-164

Listen To Pronk Pops Podcast or Download Shows151-157

Listen To Pronk Pops Podcast or Download Shows 143-150

Listen To Pronk Pops Podcast or Download Shows 135-142

Listen To Pronk Pops Podcast or Download Shows 131-134

Listen To Pronk Pops Podcast or Download Shows 124-130

Listen To Pronk Pops Podcast or Download Shows 121-123

Listen To Pronk Pops Podcast or Download Shows 118-120

Listen To Pronk Pops Podcast or Download Shows 113 -117

Listen To Pronk Pops Podcast or Download Show 112

Listen To Pronk Pops Podcast or Download Shows 108-111

Listen To Pronk Pops Podcast or Download Shows 106-108

Listen To Pronk Pops Podcast or Download Shows 104-105

Listen To Pronk Pops Podcast or Download Shows 101-103

Listen To Pronk Pops Podcast or Download Shows 98-100

Listen To Pronk Pops Podcast or Download Shows 94-97

Listen To Pronk Pops Podcast or Download Show 93

Listen To Pronk Pops Podcast or Download Show 92

Listen To Pronk Pops Podcast or Download Show 91

Listen To Pronk Pops Podcast or Download Shows 88-90

Listen To Pronk Pops Podcast or Download Shows 84-87

Listen To Pronk Pops Podcast or Download Shows 79-83

Listen To Pronk Pops Podcast or Download Shows 74-78

Listen To Pronk Pops Podcast or Download Shows 71-73

Listen To Pronk Pops Podcast or Download Shows 68-70

Listen To Pronk Pops Podcast or Download Shows 65-67

Listen To Pronk Pops Podcast or Download Shows 62-64

Listen To Pronk Pops Podcast or Download Shows 58-61

Listen To Pronk Pops Podcast or Download Shows 55-57

Listen To Pronk Pops Podcast or Download Shows 52-54

Listen To Pronk Pops Podcast or Download Shows 49-51

Listen To Pronk Pops Podcast or Download Shows 45-48

Listen To Pronk Pops Podcast or Download Shows 41-44

Listen To Pronk Pops Podcast or Download Shows 38-40

Listen To Pronk Pops Podcast or Download Shows 34-37

Listen To Pronk Pops Podcast or Download Shows 30-33

Listen To Pronk Pops Podcast or Download Shows 27-29

Listen To Pronk Pops Podcast or Download Shows 17-26

Listen To Pronk Pops Podcast or Download Shows 16-22

Listen To Pronk Pops Podcast or Download Shows 10-15

Listen To Pronk Pops Podcast or Download Shows 1-9

Read Full Post | Make a Comment ( None so far )

The Pronk Pops Show 858, Part 2 — Story 1: House Freedom Caucus Is Right: First Complete Clean Repeal and Then Replace Obamacare — No Three Phases/Prongs Bull — Change Your Rules or American People Will Replace You — Restore Free Market Competition In Health Insurance Sector So That Companies and Consumers Are Free of Government Mandates and Dictates Thereby Lowering Premiums and Deductibles — Freedom Works — Repeal and Replace Obamacare Now! — Videos

Posted on March 22, 2017. Filed under: American History, Blogroll, Breaking News, Budgetary Policy, Cartoons, College, Communications, Congress, Constitutional Law, Corruption, Countries, Culture, Diet, Donald J. Trump, Donald J. Trump, Donald Trump, Donald Trump, Drugs, Economics, Elections, Employment, Exercise, Federal Government, Fiscal Policy, Food, Freedom of Speech, Government, Government Dependency, Government Spending, Health, Health Care, Health Care Insurance, History, House of Representatives, Human, Law, Legal Drugs, Life, Media, Medicare, News, Obama, Philosophy, Photos, Politics, Polls, Progressives, Radio, Rand Paul, Rand Paul, Raymond Thomas Pronk, Rule of Law, Scandals, Security, Senate, Social Security, Tax Policy, Taxation, Taxes, United States of America, United States Supreme Court, Videos, Wealth, Welfare Spending, Wisdom | Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , |

Project_1

The Pronk Pops Show Podcasts

Pronk Pops Show 858: March 22, 2017

Pronk Pops Show 857: March 21, 2017

Pronk Pops Show 856: March 20, 2017

Pronk Pops Show 855: March 10, 2017

Pronk Pops Show 854: March 9, 2017

Pronk Pops Show 853: March 8, 2017

Pronk Pops Show 852: March 6, 2017

Pronk Pops Show 851: March 3, 2017

Pronk Pops Show 850: March 2, 2017

Pronk Pops Show 849: March 1, 2017

Pronk Pops Show 848: February 28, 2017

Pronk Pops Show 847: February 27, 2017

Pronk Pops Show 846: February 24, 2017

Pronk Pops Show 845: February 23, 2017

Pronk Pops Show 844: February 22, 2017

Pronk Pops Show 843: February 21, 2017

Pronk Pops Show 842: February 20, 2017

Pronk Pops Show 841: February 17, 2017

Pronk Pops Show 840: February 16, 2017

Pronk Pops Show 839: February 15, 2017

Pronk Pops Show 838: February 14, 2017

Pronk Pops Show 837: February 13, 2017

Pronk Pops Show 836: February 10, 2017

Pronk Pops Show 835: February 9, 2017

Pronk Pops Show 834: February 8, 2017

Pronk Pops Show 833: February 7, 2017

Pronk Pops Show 832: February 6, 2017

Pronk Pops Show 831: February 3, 2017

Pronk Pops Show 830: February 2, 2017

Pronk Pops Show 829: February 1, 2017

Pronk Pops Show 828: January 31, 2017

Pronk Pops Show 827: January 30, 2017

Pronk Pops Show 826: January 27, 2017

Pronk Pops Show 825: January 26, 2017

Pronk Pops Show 824: January 25, 2017

Pronk Pops Show 823: January 24, 2017

Pronk Pops Show 822: January 23, 2017

Pronk Pops Show 821: January 20, 2017

Pronk Pops Show 820: January 19, 2017

Pronk Pops Show 819: January 18, 2017

Pronk Pops Show 818: January 17, 2017

Pronk Pops Show 817: January 13, 2017

Pronk Pops Show 816: January 12, 2017

Pronk Pops Show 815: January 11, 2017

Pronk Pops Show 814: January 10, 2017

Pronk Pops Show 813: January 9, 2017

Pronk Pops Show 812: December 12, 2016

Pronk Pops Show 811: December 9, 2016

Pronk Pops Show 810: December 8, 2016

Pronk Pops Show 809: December 7, 2016

Pronk Pops Show 808: December 6, 2016

Pronk Pops Show 807: December 5, 2016

Pronk Pops Show 806: December 2, 2016

Pronk Pops Show 805: December 1, 2016

Part 2 — Story 1: House Freedom Caucus Is Right: First Complete Clean Repeal and Then Replace Obamacare — No Three Phases/Prongs Bull — Change Your Rules or American People Will Replace You — Restore Free Market Competition In Health Insurance Sector So That Companies and Consumers Are Free of Government Mandates and Dictates Thereby Lowering Premiums and Deductibles  — Freedom Works — Repeal and Replace Obamacare Now! — Videos

 

Image result for repeal and replace obamacare root and branchImage result for ludwig von mises quotes on consumer sovereignty

 Image result for repeal and replace obamacare root and branchImage result for ludwig von mises quotes on consumer sovereigntyImage result for branco cartoons repeal and replace obamacare

Image result for repeal and replace obamacare
Image result for repeal and replace obamacareImage result for repeal and replace obamacareImage result for repeal and replace obamacareImage result for branco cartoons repeal and replace obamacare

Image result for members of House freedom caucusImage result for repeal and replace obamacareImage result for repeal and replace obamacareImage result for repeal and replace obamacare
Image result for repeal and replace obamacare Image result for repeal and replace obamacare root and branchImage result for branco cartoons repeal and replace obamacare

Image result for ludwig von mises quotes on consumer sovereignty
Image result for ludwig von mises quotes on consumer sovereigntyImage result for repeal and replace obamacare

What Is Budget Reconciliation?

Video Transcript:

Led by President Donald Trump, Republicans have promised to repeal the Affordable Care Act. They have control of both houses of Congress and the White House, but they still have one big obstacle in that effort.

In the Senate, opponents could stage a filibuster — the right of the minority to try to talk a bill to death and keep senators from voting. It takes 60 votes to stop a filibuster. Republicans have a majority but only 52 seats. And Democrats say they won’t help take apart the health law they voted to pass seven years ago.

Instead, Republicans are vowing to use a budget procedure called “reconciliation.” It comes from a 1974 law called the Congressional Budget and Impoundment Control Act. Lots of major health laws have been passed using reconciliation, including those guaranteeing the right to emergency room care, creating the Children’s Health Insurance Plan, and allowing private plans as an alternative to traditional Medicare coverage.

Here’s how reconciliation would work. First, Congress has to pass a budget resolution.

That budget document has to be agreed on by the House and Senate, but it doesn’t go to the president for his signature.

The budget resolution does two main things. First, it sets spending targets for federal programs Congress funds every year. Those are known as appropriations.

But there are also programs funded by the federal government that don’t need annual approvals from Congress. These include tax cuts or increases and so-called entitlement programs like Medicare and Medicaid.

So the budget resolution also instructs the congressional committees in charge of those programs to propose changes in the law that would “reconcile” how much those programs cost with the targets set by the budget. This is what Republicans would use to order changes to the Affordable Care Act.

When the committees report back their proposed changes, they are assembled into a budget reconciliation bill.

In the Senate, budget reconciliation has its own special rules that make it easier to pass. Debate is strictly limited, and the bill only needs a simple majority to pass.

But there are limits, too. Budget reconciliation bills can only change things that directly impact the federal budget — either adding to or reducing federal spending.

For the Affordable Care Act, that means Congress could use budget reconciliation to eliminate spending, like the help people get to pay their premiums or funding to states to expand the Medicaid program for the poor. It can also repeal the taxes that help pay for those benefits, including the tax penalties for individuals who fail to have insurance.

But Congress can’t use reconciliation to change parts of the health law like provisions requiring insurance companies to provide certain benefits or sell coverage to people with preexisting conditions. Those don’t directly affect federal spending.

That has led insurance companies to complain that they will go broke if they still have to sell to sick people, but healthy people won’t have any incentive to get covered. In that case, they say, only sick people will buy insurance, and premiums will skyrocket.

And the new Republican Congress seems set on using the technique to take apart the health law. Whether that’s a good idea may depend on whether you favor or oppose the Affordable Care Act.

Sen. Mitch McConnell: ‘If’ The House Passes Repeal/Replace Bill, ‘I’ll Bring It Up’

Rand Paul Doesn’t Want the GOP to Fail at Obamacare Replacement Plan

Paul Ryan’s Obamacare Lite Plan with Skyrocket Prices | Rand Paul

Let’s Stop Kissing the Boots of Insurance Companies | Rand Paul

How Trump is trying to sell Republicans on the health care bill

FreedomWorks Day of Action Obamacare Repeal Rally

Watch House Freedom Caucus members speak out on health care bill

Reps. Gohmert, Meadows detail the new ObamaCare proposal

Trump makes final push for health care bill

Paul Ryan: President Trump ‘Knocked The Ball Out Of The Park’ With Capitol Visit | NBC News

Speaker Ryan on President Trump’s Visit: “We Are All-In To End This Obamacare Nightmare”

FNN: Paul Ryan’s FULL PowerPoint Presentation on American Health Care Act (Obamacare Replacement)

AWESOME!! PRESIDENT TRUMP KEEPING HIS PROMISE ON OBAMACARE REPEAL AND REPLACE

House Freedom Caucus Throws Support Behind Paul Health Care Plan

Rand Paul Unveils His Brilliant Replacement Plan for Obamacare

CSPAN | Rand Paul Answers Tough Questions on His Healthcare Plan

Rand Paul and Mark Sanford Unveil Obamacare / Affordable Care Act Replacement Bill

Rand Paul on Why He Walked Out of Obamacare Meeting

Reconciliation in Congress

Exclusive — Rand Paul: ‘Easily 35 No Votes’ Against Paul Ryan’s Obamacare 2.0, ‘I Would Predict They Pull Bill, Start Over’

by MATTHEW BOYLE

Sen. Rand Paul (R-KY) told Breitbart News exclusively on Tuesday afternoon that he expects House Speaker Paul Ryan will be forced to pull the American Health Care Act (AHCA) before a scheduled Thursday vote because Ryan will not get the votes to pass the legislation.

The AHCA has been dubbed “Obamacare Lite” by Paul — a leading conservative critic of the plan — and by other conservatives as “RyanCare,” “RINO-Care,” and “Obamacare 2.0,” since the bill does not actually fully repeal Obamacare and keeps many of the main structures that the now-former President Barack Obama installed in the healthcare system. It has come under intense scrutiny from both sides of the Republican Party — moderates and conservatives are lining up against the bill — and Ryan, despite publicly projecting confidence, cannot find the necessary 216 votes to pass the legislation.

Paul, one of the leading senators out of more than a dozen Republicans in the upper chamber criticizing the bill there, told Breitbart News in this exclusive interview he believes there are at least 35 House Republicans ready to vote against the bill in its current form. And he predicted that, unless some major changes come to the legislation between now and the scheduled vote on Thursday, Ryan will need to withdraw the bill and Republicans will have to start from scratch with a new bill and a new strategy on Obamacare.

Paul said in the in-person interview at his U.S. Senate office in the Russell Senate Office Building:

I think there’s easily 35 no votes right now so unless something happens in the next 24 hours, I would predict they pull the bill and start over. I think if conservatives stick together, they will have earned a seat at the table where real negotiation to make this bill an acceptable bill will happen. But it’s interesting what conservatives are doing to change the debate. We went from keeping the Obamacare taxes for a year—hundreds of billions of dollars—but they’re coming towards us because we’re standing firm. So we have to stick together, and if we do stick together there will be a real negotiation on this. The main goal I have is not to pass something that does not fix the situation. If a year from now, insurance rates and premiums are still going through the roof and it’s now a Republican plan it will be a disservice to the president and all of us if we pass something that doesn’t work.

.@RandPaul to @mboyle1: Obamacare Lite will hurt us in the next election. This bill will either get stopped or pulled in the next 48 hrs.

There is plenty of reason to believe that Paul is correct in predicting Ryan does not have the votes to pass this legislation and will need to pull the bill to start over. Despite overtures from President Donald Trump, the House Freedom Caucus members — and particularly its chairman Rep. Mark Meadows (R-NC) — remain steadfastly opposed to the bill.

 NBC News has confirmed at least 26 Republicans who are opposed:

NBC News has now ID’ed 26 House GOPers who are opposed/leaning strongly against House health-care bill, per @AlexNBCNews & @LACaldwellDC

But Breitbart News can confirm several more than that are definitely opposed to the legislation. To kill the bill, Republicans need just 21 Republicans opposed—and some are talking about holding a press conference on Wednesday or Thursday with the necessary number of House Republicans to crush RyanCare, appearing arm-in-arm in public opposition before a vote.

House GOP leadership made some last minute changes, too, which Paul — in his interview with Breitbart News — flatly said “no,” were not enough to get the bill passed. Regarding those changed, Paul said:

If you keep all the insurance mandates, and you keep subsidizing insurance, basically it’s Obamacare Lite. So I think it’s still Obamacare Lite. The modifications, some are going in the right direction, but they actually expanded some of the subsidies. So one of the new things about it is it’s actually $75 billion more in subsidies. So, I think they’re stuck trying to split the baby. They’re trying to give conservatives a few token changes. And they’re trying to give the moderates more subsidies.

Paul added that Ryan would not have dragged President Trump into this awful position if he had been more open and inclusive in the process from the beginning. In effect, Paul argued as he has done before, that Ryan is hurting President Trump by doing this the way he is doing it. Paul said:

I’m still unclear as to why they completely ignored conservatives early on in the process and then they had the audacity to look at conservatives and say ‘this is what you all campaigned on.’ That just, frankly, was never true. I was elected in 2010 in the big Tea Party wave that was for repealing Obamacare root and branch, rip the whole thing out. We were for repealing it. I still think that our grassroots conservative supporters are for repealing it. But somewhere along the line, Paul Ryan decided that it wasn’t so much about repealing it but about replacing it with Obamacare Lite. And I think that was a tactical error on their part to think ‘oh, we’ll just be for this and everybody will be for this’ when in reality no conservatives are really for the Ryan plan.

Paul would not say if Ryan will lose the confidence necessary to run the House of Representatives if this bill fails, as some have suggested. When asked if Ryan can still run the House if the bill goes down, Paul told Breitbart News that instead he thinks the bill going down would lead to real negotiations on healthcare reform. He said:

I think what it will be is the real negotiations will begin the moment his bill fails, and when his bill fails conservatives will have a seat at the table. As long as conservatives stay unified and don’t start negotiating one person at a time — what’s a really bad part of negotiations is if everybody starts saying individually ‘oh if you give me this, give me this, give me this’ because then you won’t really fix the main thrust of the bill and the main outcome is that insurance premiums continue to rise and we continue to bail out insurance companies that’s not repeal of Obamacare—that’s Obamacare Lite.

More from Sen. Rand Paul’s latest exclusive interview with Breitbart News is forthcoming.

http://www.breitbart.com/big-government/2017/03/21/exclusive-rand-paul-easily-35-no-votes-paul-ryans-obamacare-2-0-predict-pull-bill-start/

Conservative Review

Member Name Party State Liberty Score Years in DC Next Election

 Track Gary Palmer

Rep.

Gary Palmer R AL-6 A 100% 2 2018

David Brat

Rep.

Dave Brat R VA-7 A 100% 2 2018

Sen.

Mike Lee R UT A 100% 6 2022

Rep.

Louie Gohmert R TX-1 A 98% 12 2018

Sen.

Ted Cruz R TX A 97% 4 2018

Rep.

Jim Bridenstine R OK-1 A 97% 4 2018

Rep.

Justin Amash R MI-3 A 96% 6 2018

Rep.

Jeff Duncan R SC-3 A 96% 6 2018

Rep.

Jim Jordan R OH-4 A 96% 10 2018

Rep.

Thomas Massie R KY-4 A 94% 4 2018

Benjamin Sasse

Sen.

Benjamin Sasse R NE A 94% 2 2020

Rep.

Mark Meadows R NC-11 A 94% 4 2018

Ken Buck

Rep.

Ken Buck R CO-4 A 94% 2 2018

Rep.

Raul Labrador R ID-1 A 93% 6 2018

Sen.

Rand Paul R KY A 92% 6 2022

Trent Franks

Rep.

Trent Franks R AZ-8 A 90% 14 2018

Rep.

David Schweikert R AZ-6 A 90% 6 2018

Rep.

Mark Sanford R SC-1 A 90% 3 2018

Sen.

Tim Scott R SC B 89% 4 2022

Rep.

Ron DeSantis R FL-6 B 87% 4 2018

Rep.

Tom McClintock R CA-4 B 86% 8 2018

Rep.

Scott DesJarlais R TN-4 B 85% 6 2018

Rep.

Trey Gowdy R SC-4 B 85% 6 2018

Rep.

Doug Lamborn R CO-5 B 85% 10 2018

Rep.

Randy Weber R TX-14 B 84% 4 2018

Rep.

Paul Gosar R AZ-4 B 84% 6 2018

Rep.

Mo Brooks R AL-5 B 84% 6 2018

Rep.

Kenny Marchant R TX-24 B 84% 12 2018

Rep.

Sam Johnson R TX-3 B 82% 25 2018

Rep.

Steve King R IA-4 B 81% 14 2018

John Ratcliffe

Rep.

John Ratcliffe R TX-4 B 81% 2 2018

Jody Hice

Rep.

Jody Hice R GA-10 B 81% 2 2018

Rep.

Dana Rohrabacher R CA-48 B 80% 28 2018

Rep.

Andy Harris R MD-1 B 80% 6 2018

Rep.

Bill Posey R FL-8 B 80% 8 2018

Rep.

John J. Duncan Jr. R TN-2 B 80% 28 2018

– See more at: https://www.conservativereview.com/scorecard#sthash.RyaYlHY1.dpuf

Freedom Caucus

From Wikipedia, the free encyclopedia
This article is about the U.S. Congressional organization. For the Democratic political action organization, see Democratic Freedom Caucus.
House Freedom Caucus
Chairman Mark Meadows (NC)
Founded January 26, 2015; 2 years ago
Split from Republican Study Committee
Ideology Conservatism
Fiscal conservatism
Social conservatism[1]
Political position Right-wing to Far-right[2][3][4][5][6]
National affiliation Republican Party
Seats in the House

29 / 435

The Freedom Caucus, also known as the House Freedom Caucus, is a congressional caucus consisting of conservative Republican members of the United States House of Representatives.[7] It was formed in 2015 by a group of Congressmen as what member Jim Jordan called a “smaller, more cohesive, more agile and more active” group of conservatives.[8]

Many members are also part of the Republican Study Committee, another conservative House group.[8][9] The caucus is sympathetic to the Tea Party movement.[10] According to its mission statement, it “gives a voice to countless Americans who feel that Washington does not represent them. We support open, accountable and limited government, the Constitution and the rule of law, and policies that promote the liberty, safety and prosperity of all Americans.”[11]

History

The origins of the caucus lie at the mid-January 2015 Republican congressional retreat in Hershey, Pennsylvania. Nine conservative active Republican members of the House began planning a new Congressional caucus separate from the Republican Study Committee and apart from the House Republican Conference. The group ultimately became the nine founding members and the first board of directors for the new caucus consisting of Republican Representatives Scott Garrett of New Jersey, Jim Jordan of Ohio, John Fleming of Louisiana, Matt Salmon of Arizona, Justin Amash of Michigan, Raúl Labrador of Idaho, Mick Mulvaney of South Carolina, Ron DeSantis of Florida and Mark Meadows of North Carolina.[12] The group debated over a name for their new caucus eventually settling on “House Freedom Caucus” (HFC) because, according to founding member Mick Mulvaney, “it was so generic and universally awful that we had no reason to be against it.” The group of nine founding members in Hershey set as a criterion for new members that they had to be willing to vote against Speaker of the United States House of Representatives John Boehner on legislation that the group opposed.[13]

During the crisis over the funding of the Department of Homeland Security in early 2015, the Caucus offered four plans for resolution, but all were rejected by the Republican leadership. One of the caucus leaders, Labrador of Idaho, said the Caucus will offer an alternative that the most conservative Republican members could support.[14][needs update]

The House Freedom Caucus was involved in the resignation of Boehner on September 25, 2015, and the ensuing leadership battle for the new Speaker.[15] Members of the Caucus who had voted against Boehner for Speaker felt unfairly punished, accusing him of cutting them off from positions in the Republican Study Committee and depriving them of key committee assignments.[not in citation given] Boehner found it increasingly difficult to manage House Republicans with the fierce opposition of the Freedom Caucus, and he sparred with House Republican members (who later created and became members of the Freedom Caucus when it was created in 2015) in 2013 over their willingness to shut down the government in order to accomplish goals such as repealing the Affordable Care Act.[13][16][not in citation given]

Initially, Kevin McCarthy, the House Majority Leader, was the lead contender, but the Freedom Caucus withheld its support.[17] However, McCarthy withdrew from the race on September 28, 2015.[18] On the same day as McCarthy’s withdrawal, Reid Ribble resigned from the Freedom Caucus saying he had joined to promote certain policies and could not support the role that it was playing in the leadership race.[19]

On October 20, 2015, Paul Ryan announced that his bid for the Speaker of the United States House of Representatives was contingent on an official endorsement by the Freedom Caucus.[20] While the group could not reach the 80% approval that was needed to give an official endorsement, on October 21, 2015, it announced that it had reached a supermajority support for Ryan.[21] On October 29, 2015, Ryan succeeded John Boehner as the Speaker of the House.[22]

On November 17, 2015, Jim Jordan was re-elected as Chairman of the caucus.[citation needed]

The group has faced backlash from the Republican Party establishment during the 2016 election cycle.[23] One of its members, Congressman Tim Huelskamp, a Tea Party Republican representing Kansas’s First District, was defeated during a primary election on August 2, 2016, by Roger Marshall.[24] GOP Establishment PACs, many of whom also opposed Donald Trump, spent nearly $2 million to defeat Huelskamp.[25]

Membership

Congressional District map for Freedom Caucus membership of the 114th Congress. Former members in light color.

Members of the House Freedom Caucus as of March 2017 include:

Former members

See also

https://en.wikipedia.org/wiki/Freedom_Caucus

It’s Rand Paul vs Paul Ryan in the battle over Obamacare — and the future of the GOP

Brandon Morse

It’s Rand Paul vs Paul Ryan in the battle over Obamacare — and the future of the GOP

A protester wears a Repeal Obamacare button on his jacket during a Freedom Works rally Wednesday against the proposed GOP health care plan across from the U.S. Capitol in Washington, D.C. (Justin Sullivan/Getty Images)

The in-house Republican battle over the repeal of Obamacare is about to boil over as Kentucky Sen. Rand Paul and Speaker of the House Paul Ryan (R-Wis.) are engaged in an increasingly sharp war over words over their disagreements on how to proceed forward with the promised repeal and replace of former President Obama’s signature legislation.

Paul has been waging a war against the House GOP Obamacare repeal and replace plan since before it was given to the public. Calling it “Obamacare Lite,” Paul has lambasted not only the bill, but his fellow Republicans for their less-than-diligent attempts at getting rid of the unpopular health care law. This time, he turned his attention toward Ryan, who has been the bill’s primary spokesman.

“I think that Paul Ryan’s selling [Donald Trump] a bill of goods that he didn’t explain to the president, and the grassroots doesn’t want what Paul Ryan is selling,” Paul told CNN.

Paul Ryan, during an segment on CNN’s “The Lead with Jake Tapper,” fired back at the Kentucky senator, claiming that his remarks were a jab at President Donald Trump.

“Frankly, I think that’s kind of an insulting remark to the president — as if he doesn’t know what he’s doing,” Ryan said.

“We think this is a smarter way to go,” Ryan said to Tapper. “The alternative is the status quo, and the status quo is in the middle of a collapse.”

Ryan has made the case that this version of the Obamacare repeal bill is the “closest we will ever get” to repealing it.

Paul, however, believes that Trump is open to changing his mind on the health care bill, despite his prior statements of broad approval, and that it’s Republican leadership who have “dug in their heels.”

“They are not going to compromise. So the only way that we are going to get to a compromise where they listen to the grassroots that wants complete repeal, the only way we got to that compromise is that we have to demonstrate to the House leadership that we have the votes to stop them.”

Other Republicans in Congress have joined Paul in his efforts to push a more conservative version of a repeal bill, which focuses solely on repeal, and repeal alone. Rep. Jim Jordan and Paul have both submitted versions of the bill in the Senate and the House, and has the support of conservative legislators such as Rep. Justin Amash, Sen. Mike LeeRep. Jeff Duncan, and Sen. Tom Cotton. This list of allies now also includes a group of moderate Republicans rattled by the recent Congressional Budget Office report.

As the battle continues between the conservatives and GOP leadership, the faith of the voters hangs in the balance, according to the conservatives. Paul believes that should the GOP pass “Obamacare Lite,” Republicans will pay for it come election time. Duncan wrote in the Daily Signal that should the bill pass, voters “will feel betrayed.”

If that is true, then winner of the struggle between Paul and Ryan may determine the GOP’s future momentum.

http://www.theblaze.com/news/2017/03/17/its-rand-paul-vs-paul-ryan-in-the-battle-over-obamacare-and-the-future-of-the-gop/

Rand Paul Unveils His Brilliant Obamacare Replacement Plan

WASHINGTON (AP) — Time for talk running out, President Donald Trump on Tuesday warned wavering House Republicans that their jobs were on the line in next year’s elections if they failed to back a GOP bill that would overhaul Barack Obama’s Affordable Care Act.

The countdown quickened toward an expected vote Thursday on legislation undoing much of the law that provided health coverage to some 20 million Americans. Trump huddled behind closed doors with rank-and-file Republicans just hours after GOP leaders unveiled changes intended to pick up votes by doling out concessions to centrists and hardliners alike.

“If we fail to get it done, fail to (meet) the promises made by all of us, including the president, then it could have a very detrimental effect to Republicans in ’18 who are running for re-election,” said Rep. Mike Conaway, R-Texas. “If it fails, then there will be a lot of people looking for work in 2018.”

Trump’s message to Republicans: “If you don’t pass the bill there could be political costs,” said Rep. Walter Jones, R-N.C.

The outlook for House passage remains dicey even with the revisions.

The GOP bill would scale back the role of government in the private health insurance market, and limit future federal financing for Medicaid. It would also repeal tax cuts on the wealthy that Democrats used to pay for Obama’s coverage expansion. Fines enforcing the Obama-era requirement that virtually all Americans have coverage would be eliminated.

The nonpartisan Congressional Budget Office estimates that 24 million fewer people will have health insurance in 2026 under the GOP bill.

Trump warned House Republicans they’d seal their political doom if they waver, with the party potentially losing majority control of the House. Still, several conservatives were steadfast in their opposition even after the session with Trump and the leadership’s changes.

“The president wouldn’t have been here this morning if they have the votes,” said Rep. Rod Blum, R-Iowa, a member of the Freedom Caucus who complained that the GOP bill leaves too much government regulation in place.

Rep. Don Bacon, R-Neb., said he was convinced to back the bill in part by Trump’s urging and the changes.

“I think a vote ‘no’ is a vote for Obamacare,” Bacon said. “We can vote for this, and continue to make it better. I intend to vote ‘yes’ Thursday.”

Speaker Paul Ryan, R-Wis., told reporters that if Republicans pass the legislation, “people will reward us. If we don’t keep our promise, it will be very hard to manage this.”

If the bill advances, prospects are uncertain in the Senate, where Republicans hold a slim majority. Six GOP senators have expressed deep misgivings including Tom Cotton of Arkansas, who said Tuesday he cannot support the House bill.

In an Associated Press interview, Senate Majority Leader Mitch McConnell, R-Ky., signaled he’d use Trump’s clout to pressure unhappy Republicans in his chamber. McConnell said he’s optimistic that in the end no Republican senator will want to be held responsible for “Obamacare’s” survival.

“I would hate to be a Republican whose vote prevented us from keeping the commitment we’ve made to the American people for almost 10 years now,” McConnell said.

The House GOP bill would dismantle Obama’s requirements that most people buy policies and that larger companies cover workers. Federal subsidies based on peoples’ incomes and the cost of insurance would end, and a Medicaid expansion to 11 million more low-income people would disappear.

Instead, the bill would provide tax credits based chiefly on age to help people pay premiums. Open-ended federal payments to help states cover Medicaid costs would be cut. Insurers could charge older consumers five times the premiums they charge younger people instead of Obama’s 3-1 limit, and would boost premiums 30 percent for those who let coverage lapse.

The latest changes to the bill by GOP leaders were largely aimed at addressing dissent that the measure would leave many older people with higher costs.

Included was an unusual approach: language paving the way for the Senate, if it chooses, to make the bill’s tax credit more generous for people age 50-64. Republicans said the plan sets aside $85 billion over 10 years for that purpose. The income tax threshold for deducting medical expenses would be lowered to 5.8 percent, from the current 10 percent.

The leaders’ proposals would accelerate the repeal of tax increases Obama imposed on higher earners, the medical industry and others.

On Medicaid, the changes would provide higher federal payments to help states care for older and disabled beneficiaries. States would be able to impose work requirements for able-bodied adults. But the bill would still limit future federal financing for Medicaid, seen by many state officials as a cost shift. Obama’s Medicaid expansion would be repealed.

In a bid to cement support from upstate New Yorkers, the revisions would also stop that state from passing on over $2 billion a year in Medicaid costs to upstate counties, though it exempts Democratic-run New York City from that protection. Local officials have complained the practice overburdens their budgets.

Democrats remain solidly opposed to the GOP repeal effort.

Rep. Chris Collins, R-N.Y., said Trump told Republicans he would campaign for them if they backed the bill.

Associated Press reporters Matthew Daly, Kevin Freking, Richard Lardner, Stephen Ohlemacher in Washington and Thomas Beaumont in Iowa contributed to this report.

http://hosted.ap.org/dynamic/stories/U/US_CONGRESS_HEALTH_OVERHAUL?SITE=AP&SECTION=HOME&TEMPLATE=DEFAULT&CTIME=2017-03-21-03-20-21

The Pronk Pops Show Podcasts Portfolio

Listen To Pronk Pops Podcast or Download Shows 857-858

Listen To Pronk Pops Podcast or Download Shows 850-856

Listen To Pronk Pops Podcast or Download Shows 845-849

Listen To Pronk Pops Podcast or Download Shows 840-844

Listen To Pronk Pops Podcast or Download Shows 833-839

Listen To Pronk Pops Podcast or Download Shows 827-832

Listen To Pronk Pops Podcast or Download Shows 821-826

Listen To Pronk Pops Podcast or Download Shows 815-820

Listen To Pronk Pops Podcast or Download Shows 806-814

Listen To Pronk Pops Podcast or Download Shows 800-805

Listen To Pronk Pops Podcast or Download Shows 793-799

Listen To Pronk Pops Podcast or Download Shows 785-792

Listen To Pronk Pops Podcast or Download Shows 777-784

Listen To Pronk Pops Podcast or Download Shows 769-776

Listen To Pronk Pops Podcast or Download Shows 759-768

Listen To Pronk Pops Podcast or Download Shows 751-758

Listen To Pronk Pops Podcast or Download Shows 745-750

Listen To Pronk Pops Podcast or Download Shows 738-744

Listen To Pronk Pops Podcast or Download Shows 732-737

Listen To Pronk Pops Podcast or Download Shows 727-731

Listen To Pronk Pops Podcast or Download Shows 720-726

Listen To Pronk Pops Podcast or DownloadShows 713-719

Listen To Pronk Pops Podcast or DownloadShows 705-712

Listen To Pronk Pops Podcast or Download Shows 695-704

Listen To Pronk Pops Podcast or Download Shows 685-694

Listen To Pronk Pops Podcast or Download Shows 675-684

Listen To Pronk Pops Podcast or Download Shows 668-674

Listen To Pronk Pops Podcast or Download Shows 660-667

Listen To Pronk Pops Podcast or Download Shows 651-659

Listen To Pronk Pops Podcast or Download Shows 644-650

Listen To Pronk Pops Podcast or Download Shows 637-643

Listen To Pronk Pops Podcast or Download Shows 629-636

Listen To Pronk Pops Podcast or Download Shows 617-628

Listen To Pronk Pops Podcast or Download Shows 608-616

Listen To Pronk Pops Podcast or Download Shows 599-607

Listen To Pronk Pops Podcast or Download Shows 590-598

Listen To Pronk Pops Podcast or Download Shows 585- 589

Listen To Pronk Pops Podcast or Download Shows 575-584

Listen To Pronk Pops Podcast or Download Shows 565-574

Listen To Pronk Pops Podcast or Download Shows 556-564

Listen To Pronk Pops Podcast or Download Shows 546-555

Listen To Pronk Pops Podcast or Download Shows 538-545

Listen To Pronk Pops Podcast or Download Shows 532-537

Listen To Pronk Pops Podcast or Download Shows 526-531

Listen To Pronk Pops Podcast or Download Shows 519-525

Listen To Pronk Pops Podcast or Download Shows 510-518

Listen To Pronk Pops Podcast or Download Shows 500-509

Listen To Pronk Pops Podcast or Download Shows 490-499

Listen To Pronk Pops Podcast or Download Shows 480-489

Listen To Pronk Pops Podcast or Download Shows 473-479

Listen To Pronk Pops Podcast or Download Shows 464-472

Listen To Pronk Pops Podcast or Download Shows 455-463

Listen To Pronk Pops Podcast or Download Shows 447-454

Listen To Pronk Pops Podcast or Download Shows 439-446

Listen To Pronk Pops Podcast or Download Shows 431-438

Listen To Pronk Pops Podcast or Download Shows 422-430

Listen To Pronk Pops Podcast or Download Shows 414-421

Listen To Pronk Pops Podcast or Download Shows 408-413

Listen To Pronk Pops Podcast or Download Shows 400-407

Listen To Pronk Pops Podcast or Download Shows 391-399

Listen To Pronk Pops Podcast or Download Shows 383-390

Listen To Pronk Pops Podcast or Download Shows 376-382

Listen To Pronk Pops Podcast or Download Shows 369-375

Listen To Pronk Pops Podcast or Download Shows 360-368

Listen To Pronk Pops Podcast or Download Shows 354-359

Listen To Pronk Pops Podcast or Download Shows 346-353

Listen To Pronk Pops Podcast or Download Shows 338-345

Listen To Pronk Pops Podcast or Download Shows 328-337

Listen To Pronk Pops Podcast or Download Shows 319-327

Listen To Pronk Pops Podcast or Download Shows 307-318

Listen To Pronk Pops Podcast or Download Shows 296-306

Listen To Pronk Pops Podcast or Download Shows 287-295

Listen To Pronk Pops Podcast or Download Shows 277-286

Listen To Pronk Pops Podcast or Download Shows 264-276

Listen To Pronk Pops Podcast or Download Shows 250-263

Listen To Pronk Pops Podcast or Download Shows 236-249

Listen To Pronk Pops Podcast or Download Shows 222-235

Listen To Pronk Pops Podcast or Download Shows 211-221

Listen To Pronk Pops Podcast or Download Shows 202-210

Listen To Pronk Pops Podcast or Download Shows 194-201

Listen To Pronk Pops Podcast or Download Shows 184-193

Listen To Pronk Pops Podcast or Download Shows 174-183

Listen To Pronk Pops Podcast or Download Shows 165-173

Listen To Pronk Pops Podcast or Download Shows 158-164

Listen To Pronk Pops Podcast or Download Shows151-157

Listen To Pronk Pops Podcast or Download Shows 143-150

Listen To Pronk Pops Podcast or Download Shows 135-142

Listen To Pronk Pops Podcast or Download Shows 131-134

Listen To Pronk Pops Podcast or Download Shows 124-130

Listen To Pronk Pops Podcast or Download Shows 121-123

Listen To Pronk Pops Podcast or Download Shows 118-120

Listen To Pronk Pops Podcast or Download Shows 113 -117

Listen To Pronk Pops Podcast or Download Show 112

Listen To Pronk Pops Podcast or Download Shows 108-111

Listen To Pronk Pops Podcast or Download Shows 106-108

Listen To Pronk Pops Podcast or Download Shows 104-105

Listen To Pronk Pops Podcast or Download Shows 101-103

Listen To Pronk Pops Podcast or Download Shows 98-100

Listen To Pronk Pops Podcast or Download Shows 94-97

Listen To Pronk Pops Podcast or Download Show 93

Listen To Pronk Pops Podcast or Download Show 92

Listen To Pronk Pops Podcast or Download Show 91

Listen To Pronk Pops Podcast or Download Shows 88-90

Listen To Pronk Pops Podcast or Download Shows 84-87

Listen To Pronk Pops Podcast or Download Shows 79-83

Listen To Pronk Pops Podcast or Download Shows 74-78

Listen To Pronk Pops Podcast or Download Shows 71-73

Listen To Pronk Pops Podcast or Download Shows 68-70

Listen To Pronk Pops Podcast or Download Shows 65-67

Listen To Pronk Pops Podcast or Download Shows 62-64

Listen To Pronk Pops Podcast or Download Shows 58-61

Listen To Pronk Pops Podcast or Download Shows 55-57

Listen To Pronk Pops Podcast or Download Shows 52-54

Listen To Pronk Pops Podcast or Download Shows 49-51

Listen To Pronk Pops Podcast or Download Shows 45-48

Listen To Pronk Pops Podcast or Download Shows 41-44

Listen To Pronk Pops Podcast or Download Shows 38-40

Listen To Pronk Pops Podcast or Download Shows 34-37

Listen To Pronk Pops Podcast or Download Shows 30-33

Listen To Pronk Pops Podcast or Download Shows 27-29

Listen To Pronk Pops Podcast or Download Shows 17-26

Listen To Pronk Pops Podcast or Download Shows 16-22

Listen To Pronk Pops Podcast or Download Shows 10-15

Listen To Pronk Pops Podcast or Download Shows 1-9

Read Full Post | Make a Comment ( None so far )

« Previous Entries

Liked it here?
Why not try sites on the blogroll...