Hate Speech

The Pronk Pops Show 868, April 6, 2017, Story 1: Neoconservatives and Progressive Global Interventionists Elite Banging The War Drums For American Empire Warfare and Welfare State vs. We The People America First Non-interventionists For American Republic Peace and Prosperity Economy — American People Not Readily Accepting Big Lie Media Propaganda on Syria Chemical Gas Air Attack — Another False Flag — Sunni and Shia Have Being Killing Each Other For Hundreds of Years — Stop Being Imperial Umpire For A Religious Sectarian Civil War and Proxy War — National Interest — Oil and Gas — Videos

Posted on April 6, 2017. Filed under: American History, Benghazi, Bernie Sanders, Blogroll, Bombs, Breaking News, Business, College, Communications, Computers, Congress, Corruption, Countries, Cruise Missiles, Defense Spending, Donald J. Trump, Donald J. Trump, Donald Trump, Donald Trump, Egypt, Elections, Empires, European History, European Union, Federal Government, Foreign Policy, Fourth Amendment, Free Trade, Freedom of Speech, Genocide, Government, Government Dependency, Government Spending, Great Britain, Hate Speech, History, House of Representatives, Human, Human Behavior, Iran Nuclear Weapons Deal, Iraq, Islam, Islamic Republic of Iran, Islamic State, Israel, Jordan, Law, Libya, Life, Lying, Marco Rubio, Media, Medicare, Middle East, MIssiles, National Security Agency, Nerve Gas, News, Nuclear Weapons, Obama, Philosophy, Photos, Pistols, Politics, Polls, President Barack Obama, President Trump, Progressives, Qatar, Radio, Rand Paul, Rand Paul, Raymond Thomas Pronk, Regulation, Religion, Rifles, Rule of Law, Russia, Scandals, Second Amendment, Security, Senate, Social Security, Spying, Surveillance and Spying On American People, Surveillance/Spying, Syria, Taxation, Taxes, Technology, Terror, Terrorism, U.S. Negotiations with Islamic Republic of Iran, United Kingdom, United States Constitution, United States of America, Videos, Violence, War, Wealth, Weapons, Weather, Welfare Spending, Wisdom | Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , |

Project_1

The Pronk Pops Show Podcasts

Pronk Pops Show 868: April 6, 2017

Pronk Pops Show 867: April 5, 2017

Pronk Pops Show 866: April 3, 2017

Pronk Pops Show 865: March 31, 2017

Pronk Pops Show 864: March 30, 2017

Pronk Pops Show 863: March 29, 2017

Pronk Pops Show 862: March 28, 2017

Pronk Pops Show 861: March 27, 2017

Pronk Pops Show 860: March 24, 2017

Pronk Pops Show 859: March 23, 2017

Pronk Pops Show 858: March 22, 2017

Pronk Pops Show 857: March 21, 2017

Pronk Pops Show 856: March 20, 2017

Pronk Pops Show 855: March 10, 2017

Pronk Pops Show 854: March 9, 2017

Pronk Pops Show 853: March 8, 2017

Pronk Pops Show 852: March 6, 2017

Pronk Pops Show 851: March 3, 2017

Pronk Pops Show 850: March 2, 2017

Pronk Pops Show 849: March 1, 2017

Pronk Pops Show 848: February 28, 2017

Pronk Pops Show 847: February 27, 2017

Pronk Pops Show 846: February 24, 2017

Pronk Pops Show 845: February 23, 2017

Pronk Pops Show 844: February 22, 2017

Pronk Pops Show 843: February 21, 2017

Pronk Pops Show 842: February 20, 2017

Pronk Pops Show 841: February 17, 2017

Pronk Pops Show 840: February 16, 2017

Pronk Pops Show 839: February 15, 2017

Pronk Pops Show 838: February 14, 2017

Pronk Pops Show 837: February 13, 2017

Pronk Pops Show 836: February 10, 2017

Pronk Pops Show 835: February 9, 2017

Pronk Pops Show 834: February 8, 2017

Pronk Pops Show 833: February 7, 2017

Pronk Pops Show 832: February 6, 2017

Pronk Pops Show 831: February 3, 2017

Pronk Pops Show 830: February 2, 2017

Pronk Pops Show 829: February 1, 2017

Pronk Pops Show 828: January 31, 2017

Pronk Pops Show 827: January 30, 2017

Pronk Pops Show 826: January 27, 2017

Pronk Pops Show 825: January 26, 2017

Pronk Pops Show 824: January 25, 2017

Pronk Pops Show 823: January 24, 2017

Pronk Pops Show 822: January 23, 2017

Pronk Pops Show 821: January 20, 2017

Pronk Pops Show 820: January 19, 2017

Pronk Pops Show 819: January 18, 2017

Pronk Pops Show 818: January 17, 2017

Pronk Pops Show 817: January 13, 2017

Pronk Pops Show 816: January 12, 2017

Pronk Pops Show 815: January 11, 2017

Pronk Pops Show 814: January 10, 2017

Pronk Pops Show 813: January 9, 2017

Updated

Breaking News

Undeclared War!

President Trump Launches 59 Cruise Missile Attack From Two U.S. Destroyers Against Syrian Air Base 

President Trump Neoconned!

Trump Orders ATTACK on Syria – April 6, 2017 – FULL Press Conference

RAW USA launches cruise missile strike on Syria Regime Breaking News April 6 2017 

RAW USA launches cruise missiles strike on Syria RUSSIA IRAN backed ASSAD Regime after chemical Warfare weapons attack Breaking News April 6 2017

Neo-CONNED speech by Ron Paul

U.S. Launches Missiles at Syrian Base After Chemical Weapons Attack

The United States launched dozens of cruise missiles Thursday night at a Syrian airfield in response to what it believes was Syria’s use of banned chemical weapons that killed at least 100 people, U.S. military officials told NBC News.

Two U.S. warships in the Mediterranean Sea fired 59 Tomahawk missiles intended for a single target — Ash Sha’irat in Homs province in western Syria, the officials said. That’s the airfield from which the United States believes the government of Syrian President Bashar al-Assad fired the banned weapons.

There was no immediate word on casualties. U.S. officials told NBC News that people were not targeted and that aircraft and infrastructure at the site were hit, including the runway and gas fuel pumps.y

Trump Speaks on Missile Strike in Syria 2:48

“Assad choked out the lives of helpless men, women and children,” President Donald Trump said in remarks from Mar-a-Lago, his family compound in Palm Beach, Florida.

“It is in this vital national security interest of the United States to prevent and deter the spread and use of deadly chemical weapons,” said Trump, who called on other countries to end the bloodshed in Syria.

Related: Trump: Why I Launched a Missile Attack on Syria

Trump is in Florida for a meeting with Chinese President Xi Jinpeng. Defense Secretary James Mattis, Secretary of State Rex Tillerson and national security adviser H.R. McMaster traveled to Florida with him.

Defense Secretary James Mattis, Secretary of State Rex Tillerson and national security adviser H.R. McMaster traveled to Florida with Trump. In Washington, Vice President Mike Pence returned to the White House after having gone home for dinner Thursday evening.

Syrian television characterized the missile strike “as American aggression” Friday morning. But Ahrar Al Sham, the largest Syrian armed rebel group, told NBC News it “welcomes any U.S. intervention through surgical strikes that would deter the Assad regime capabilities to kill civilians and shorten the suffering of our people.”

Syria Crisis: Trump Given Military Options After Chemical Attack 2:25

Tillerson and Nikki Haley, the U.S. ambassador to the United Nations, have bluntly blamed Syria for the chemical weapons attack, whose victims included at least 25 children.

Tillerson told reporters on Thursday that “there is no doubt in our minds” that the Syrian regime was responsible for the attack. And in a combative speech at the U.N. Security Council on Wednesday, Haley warned: “When the United Nations consistently fails in its duty to act collectively, there are times in the life of states that we are compelled to take our own action.”y

Tillerson on Assad Regime: He Has ‘No Role’ to Govern Syria0:58

NBC News reported Thursday that Defense Secretary James Mattis briefed President Donald Trump on U.S. military options, which included carrying out targeted strikes against those responsible for Tuesday’s attack.

There was no immediate reaction from Russia, which Tillerson and Haley have accused of turning a blind eye to Syria’s transgressions.

“Russia cannot escape responsibility for this,” Haley said at the United Nations. “They chose to close their eyes to the barbarity. They defied the conscience of the world.”

Thursday, Tillerson urged Russia to “consider carefully their continued support of the Assad regime.”

Story 1: Progressive Global Interventionists Elite Banging The War Drums For American Empire Warfare and Welfare State vs. We The People America First Non-interventionists For American Republic Peace and Prosperity Economy — American People Not Readily Accepting Big Lie Media Propaganda on Syria Chemical Gas Air Attack — Another False Flag — Sunni and Shia Have Being Killing Each Other For Hundreds of Years — Stop Being Imperial Umpire For A Religious Sectarian Civil War — National Interest — Oil and Gas — Videos

Image result for false flagImage result for false flagImage result for false flagImage result for map syria united states attack on syria air base april 2017Image result for map syria united states attack on syria air base april 2017Image result for cartoons syria sarin false flagImage result for cartoons syria sarin false flagImage result for cartoons syria sarin false flagImage result for number killed in syrian civil war through 2016Image result for syrian gas attack april 5, 2017 map idlib syriaImage result for syrian gas attack april 2017  Image result for syrian gas attack april 2017Image result for syrian gas attack april 5, 2017 map

Image result for cartoons syria sarin false flagImage result for cartoons syria sarin false flagImage result for syria sarin false flag

Image result for cartoons on syria

Image result for cartoons on syria

Image result for cartoons on syriaImage result for cartoons on syria

Image result for map syria turkey jordan air base attacked by united statesImage result for map syria turkey jordan air base attacked by united states

Image result for map syria turkey jordan air base attacked by united states

Image result for map syria turkey jordan air base attacked by united states

President Trump may be considering military action in Syria

Gen. Keane on the possibility of US military action in Syria

Trump Orders Attack On Syria! Will Russia Respond? Is Trump Wrong?

Syria Gas Attack: Assad’s Doing…Or False Flag?

Streamed live on Apr 5, 2017

Just days after the US Administration changed course on Syrian President Assad, saying he could stay, an alleged chemical weapon attack that killed dozens of civilians has been blamed on the Syrian government. Did Assad sign his own death warrant with such an attack…or does some other entity benefit?

[youytube=https://www.youtube.com/watch?v=LULzvg1gA5U]

Ron Paul: The Word That Best Defines Libertarianism Is Non-Intervention

Sen. John Barrasso Speaking on Trump Considering Military Action in Syria & North Korea

Cotton: President Trump struck the ‘right tone’ on Syria

Corker Comments on Suspected Chemical Weapons Attack in Syria

Rubio, Cardin call for Assad, Putin to be held accountable for Syria chemical weapons attack

Will the U.S. take military action in Syria?

Do powerful people in Washington want to know the truth?

Syrian Chemical False Flag Exposed

Laura Ingraham Show PODCAST April 6, 2017 – Bob Costa: ‘Trump Has Always Used His Family In Business

Unconfirmed Syria Chemical Weapons Attack is Iraq Weapons of Mass Destruction REDUX

What we know about the chemical attack in Syria

Syria Gas Attack: Assad’s Doing…Or False Flag?

Syria’s war: Who is fighting and why?

Was Syrian Chemical Attack A False Flag?

Understanding the Refugee Crisis in Europe, Syria, and around the World

Aftermath of Syrian chemical attack sparks outrage

World leaders condemn the Syrian chemical attack

Syria nerve gas attack: Chemical weapons expert debunks Assad’s defense

War in Syria: Russia and West clash over Idlib gas attack (part 1)

Published on Apr 5, 2017

Subscribe to France 24 now:
http://f24.my/youtubeEN

FRANCE 24 live news stream: all the latest news 24/7
http://f24.my/YTliveEN

On Tuesday in Idlib, a province in the Northwest of Syria, at least seventy people were killed, 20 of them children, in what appears to have been a chemical weapon attack in the rebel-held town of Khan Sheikhoun. Initial reports point to the nerve agent Sarin gas. Our panel of experts asks who was behind this attack. What explanations are being given, and do they stack up?
Click here for PART TWO.

Another suspected chemical weapons attack is latest chapter in brutal Syrian conflict

‘Assad Has Unleashed Horror in Syria’: World Reacts to Alleged Chemical Attack

Syria Gas Attack: Russia says chemical depot held by rebels bombed

Turkish President Erdogan calls chemical attack in Syria “inhuman and unacceptable”

“The Desperate BBC Propaganda Machine Blames Assad For Chemical Attack Before Any Investigation.”

Russia denies involvement in reported Syrian chemical attack

Children caught in Syria ‘chemical attack’- BBC News

Published on Apr 5, 2017

The UN Security Council has held an emergency session to discuss the suspected gas attack on a rebel-held town in Syria. The attack is believed to have killed more than 70 people, including children. The Syrian government has denied responsibility, while its ally Russia says the gas came from rebel weapons on the ground. But those claims have been widely rejected by western governments, as our Chief International Correspondent Lyse Doucet reports.

Syria conflict: ‘Chemical attack’ in Idlib kills 58 – BBC News

Published on Apr 4, 2017

At least 58 people have been killed and dozens wounded in a suspected chemical attack on a rebel-held town in north-western Syria, a monitoring group says. The Syrian Observatory for Human Rights reported that strikes on Khan Sheikhoun by Syrian government or Russian jets had caused many people to choke. Later, aircraft fired rockets at local clinics treating some of the survivors, medics and opposition activists said. The Syrian government has repeatedly denied using chemical weapons.

UN Ambassador Nikki Haley Condemns Russia, Iran After Chemical Attack In Syria | NBC News

UK: Chemical Attack Bears All Hallmarks of Assad

UNSC holds emergency meeting on Syria chemical attack

WATCH LIVE: U.N. Security Council Holds Emergency Meeting On Syria Chemical Attack | TIME

The TRUTH About the Syria Gas Attack

Hillary in Rat Line for Syria False Flag Sarin Gas Attack says Pulitzer Prize Winning Journalist

Sy Hersh Reveals Potential Turkish Role in Syria Chemical Strike That Almost Sparked U.S. Bombing

Global Empire – The World According to Seymour Hersh [Part Two]

Published on Aug 10, 2016

Tariq Ali talks to investigative journalist, Seymour Hersh, about his revelations concerning the chemical attack at Ghouta, Syria in August 2013.

Seymour Hersh Exposes Erdogan’s Chemical Adventure in Syria

Published on Apr 8, 2014

The US author reveals secret US reports warning that Al-Nusrah terrorist group affiliated with Qatar and Turkey, posses a chemical weapons cell. Worst threat since 9/11.

Global Empire – The World According to Seymour Hersh [Part One]

Published on Aug 10, 2016

Tariq Ali talks to investigative journalist, Seymour Hersh, about the assassination of Osama bin Laden in Pakistan in 2011 and describes what the Americans and Pakistanis knew about his whereabouts.

Global Empire – Syria After Trump

Seymour Hersh: Obama “Cherry-Picked” Intelligence on Syrian Chemical Attack to Justify U.S. Strike

Published on Dec 9, 2013

Writing in the London Review of Books, Hersh argues that the Obama administration “cherry-picked intelligence to justify a strike against Assad.” The administration failed to disclose it knew Syrian rebels in the al-Nusra Front had the ability to produce chemical weapons. Evidence obtained in the days after the attack was also allegedly distorted to make it appear it was gathered in real time.

Whose sarin? Seymour M. Hersh
Barack Obama did not tell the whole story this autumn when he tried to make the case that Bashar al-Assad was responsible for the chemical weapons attack near Damascus on 21 August. In some instances, he omitted important intelligence, and in others he presented assumptions as facts. Most significant, he failed to acknowledge something known to the US intelligence community: that the Syrian army is not the only party in the country’s civil war with access to sarin, the nerve agent that a UN study concluded — without assessing responsibility — had been used in the rocket attack. In the months before the attack, the American intelligence agencies produced a series of highly classified reports, culminating in a formal Operations Order — a planning document that precedes a ground invasion — citing evidence that the al-Nusra Front, a jihadi group affiliated with al-Qaida, had mastered the mechanics of creating sarin and was capable of manufacturing it in quantity. When the attack occurred al-Nusra should have been a suspect, but the administration cherry-picked intelligence to justify a strike against Assad.

In his nationally televised speech about Syria on 10 September, Obama laid the blame for the nerve gas attack on the rebel-held suburb of Eastern Ghouta firmly on Assad’s government, and made it clear he was prepared to back up his earlier public warnings that any use of chemical weapons would cross a ‘red line’: ‘Assad’s government gassed to death over a thousand people,’ he said. ‘We know the Assad regime was responsible … And that is why, after careful deliberation, I determined that it is in the national security interests of the United States to respond to the Assad regime’s use of chemical weapons through a targeted military strike.’ Obama was going to war to back up a public threat, but he was doing so without knowing for sure who did what in the early morning of 21 August.

He cited a list of what appeared to be hard-won evidence of Assad’s culpability: ‘In the days leading up to August 21st, we know that Assad’s chemical weapons personnel prepared for an attack near an area where they mix sarin gas. They distributed gas masks to their troops. Then they fired rockets from a regime-controlled area into 11 neighbourhoods that the regime has been trying to wipe clear of opposition forces.’ Obama’s certainty was echoed at the time by Denis McDonough, his chief of staff, who told the New York Times: ‘No one with whom I’ve spoken doubts the intelligence’ directly linking Assad and his regime to the sarin attacks.

But in recent interviews with intelligence and military officers and consultants past and present, I found intense concern, and on occasion anger, over what was repeatedly seen as the deliberate manipulation of intelligence. One high-level intelligence officer, in an email to a colleague, called the administration’s assurances of Assad’s responsibility a ‘ruse’. The attack ‘was not the result of the current regime’, he wrote. A former senior intelligence official told me that the Obama administration had altered the available information — in terms of its timing and sequence — to enable the president and his advisers to make intelligence retrieved days after the attack look as if it had been picked up and analyzed in real time, as the attack was happening. The distortion, he said, reminded him of the 1964 Gulf of Tonkin incident, when the Johnson administration reversed the sequence of National Security Agency intercepts to justify one of the early bombings of North Vietnam. The same official said there was immense frustration inside the military and intelligence bureaucracy: ‘The guys are throwing their hands in the air and saying, “How can we help this guy” — Obama — “when he and his cronies in the White House make up the intelligence as they go along?”‘…()

Obama Was Lying!

President Obama’s Syria Address [FULL SPEECH]

Seymour Hersh’s Latest Bombshell: U.S. Military Undermined Obama on Syria with Tacit Help to Assad

Published on Dec 22, 2015

A new report by the Pulitzer-winning veteran journalist Seymour Hersh says the Joints Chiefs of Staff has indirectly supported Bashar al-Assad in an effort to help him defeat jihadist groups. Hersh reports the Joint Chiefs sent intelligence via Russia, Germany and Israel on the understanding it would be transmitted to help Assad push back Jabhat al-Nusra and the Islamic State. Hersh also claims the military even undermined a U.S. effort to arm Syrian rebels in a bid to prove it was serious about helping Assad fight their common enemies. Hersh says the Joints Chiefs’ maneuvering was rooted in several concerns, including the U.S. arming of unvetted Syrian rebels with jihadist ties, a belief the administration was overly focused on confronting Assad’s ally in Moscow, and anger the White House was unwilling to challenge Turkey and Saudi Arabia over their support of extremist groups in Syria. Hersh joins us to detail his claims and respond to his critics.

US, Russia Announce Syria Chemical Weapons Deal

U.S. Ship Begins Neutralizing Syrian Chemical Weapons

MV Cape Ray Storage Area Tour

MV Cape Ray Disposal Practice

MV Cape Ray FDHS

Published on Jul 2, 2014

As part of the U.N. Organization for the Prohibition of Chemical Weapons (OPCW) Joint Mission to eliminate chemical materials from the Syrian Arab Republic, the U.S. will destroy approximately 700 metric tons of chemicals aboard the MV Cape Ray. Danish and Norwegian vessels will transport the chemicals to a yet-unnamed Italian port for transfer to the MV Cape Ray. The MV Cape Ray, part of the U.S. Maritime Administration’s Ready Reserve Fleet, has been retrofitted with two field-deployable hydrolysis systems designed to neutralize the dangerous chemicals before disposal at a commercial facility.

MV Cape Ray’s Bridge

MV Cape Ray Command Post Tour

MV Cape Ray Laboratory Tour

False flag

From Wikipedia, the free encyclopedia
“False colors” redirects here. For the imaging technique, see False-color.

This US Douglas A-26 C Invader was painted in fake Cuban Air Force colors for the military invasion of Cuba undertaken by the CIA-sponsored paramilitary group Brigade 2506 in April 1961.

The contemporary term false flag describes covert operations that are designed to deceive in such a way that activities appear as though they are being carried out by entities, groups, or nations other than those who actually planned and executed them.[1]

Historically, the term “false flag” has its origins in naval warfare where the use of a flag other than the belligerent’s true battle flag before (but not while) engaging the enemy has long been accepted as a permissible ruse de guerre; by contrast, flying a false flag while engaging the enemy constitutes perfidy.[1]

Operations carried out during peace-time by civilian organizations, as well as covert government agencies, can (by extension) also be called false flag operations if they seek to hide the real organization behind an operation.[citation needed]

Use in warfare

In land warfare such operations are generally deemed acceptable in certain circumstances, such as to deceive enemies providing that the deception is not perfidious and all such deceptions are discarded before opening fire upon the enemy. Similarly in naval warfare such a deception is considered permissible provided the false flag is lowered and the true flag raised before engaging in battle:[2]auxiliary cruisers operated in such a fashion in both World Wars, as did Q-ships, while merchant vessels were encouraged to use false flags for protection.

Such masquerades promoted confusion not just of the enemy but of historical accounts: in 1914 the Battle of Trindade was fought between the British auxiliary cruiser RMS Carmania and the German auxiliary cruiser SMS Cap Trafalgar which had been altered to look like Carmania. (Contrary to some possibly mendacious accounts, the RMS Carmania had not been altered to resemble the Cap Trafalgar.)

Another notable example was the World War II German commerce raider Kormoran which surprised and sank the Australian light cruiser HMAS Sydney in 1941 while disguised as a Dutch merchant ship, causing the greatest recorded loss of life on an Australian warship. While Kormoran was fatally damaged in the engagement and its crew captured the outcome represented a considerable psychological victory for the Germans.[3]

Other examples from WWII included a Kriegsmarineensign in the St Nazaire Raid and captured a German code book: the old destroyer Campbeltown, which the British planned to sacrifice in the operation, was provided with cosmetic modifications that involved cutting the ship’s funnels and chamfering the edges to resemble a German Type 23torpedo boat.

By this ruse the British were able to get within two miles (3 km) of the harbour before the defences responded, where the explosive-rigged Campbeltown and commandos successfully disabled or destroyed the key dock structures of the port.[4][5]

Air warfare

In December 1922–February 1923, Rules concerning the Control of Wireless Telegraphy in Time of War and Air Warfare, drafted by a commission of jurists at the Hague regulates:[6]

Art. 3. A military aircraft must carry an exterior mark indicating its nationality and its military character.
Art. 19. The use of false exterior marks is forbidden.

This draft was never adopted as a legally binding treaty, but the ICRC states in its introduction on the draft that ‘To a great extent, [the draft rules] correspond to the customary rules and general principles underlying treaties on the law of war on land and at sea’,[7] and as such these two non–controversial articles were already part of customary law.[8]

Land warfare

In land warfare, the use of a false flag is similar to that of naval warfare: the trial of Otto Skorzeny, who planned and commanded Operation Greif, by a U.S. military tribunal at the Dachau Trials included a finding that Skorzeny was not guilty of a crime by ordering his men into action in American uniforms. He had relayed to his men the warning of German legal experts: that if they fought in American uniforms, they would be breaking the laws of war; however, they probably were not doing so simply by wearing the American uniforms. During the trial, a number of arguments were advanced to substantiate this position and the German and U.S. military seem to have been in agreement.

In the transcript of the trial,[9] it is mentioned that Paragraph 43 of the Field Manual published by the War Department, United States Army, on 1 October 1940, under the entry Rules of Land Warfare states “National flags, insignias and uniforms as a ruse – in practice it has been authorized to make use of these as a ruse. The foregoing rule (Article 23 of the Annex of the IVth Hague Convention), does not prohibit such use, but does prohibit their improper use. It is certainly forbidden to make use of them during a combat. Before opening fire upon the enemy, they must be discarded’.”

The American Soldiers’ Handbook was also quoted by Defense Counsel: “The use of the enemy flag, insignia, and uniform is permitted under some circumstances. They are not to be used during actual fighting, and if used in order to approach the enemy without drawing fire, should be thrown away or removed as soon as fighting begins.” Subsequently, the outcome of the trial has been codified in the 1977 Protocol Additional to the Geneva Conventions of 12 August 1949 (Protocol I):

Article 37. – Prohibition of perfidy

1. It is prohibited to kill, injure, or capture an adversary by resort to perfidy. Acts inviting the confidence of an adversary to lead him to believe that he is entitled to, or is obliged to accord, protection under the rules of international law applicable in armed conflict, with intent to betray that confidence, shall constitute perfidy. The following acts are examples of perfidy:
(a) The feigning of an intent to negotiate under a flag of truce or of a surrender;
(b) The feigning of an incapacitation by wounds or sickness;
(c) The feigning of civilian, non-combatant status; and
(d) The feigning of protected status by the use of signs, emblems or uniforms of the United Nations or of neutral or other States not Parties to the conflict.
2. Ruses of war are not prohibited. Such ruses are acts which are intended to mislead an adversary or to induce him to act recklessly but which infringe no rule of international law applicable in armed conflict and which are not perfidious because they do not invite the confidence of an adversary with respect to protection under that law. The following are examples of such ruses: the use of camouflage, decoys, mock operations and disinformation.

Article 38. – Recognized emblems

1. It is prohibited to make improper use of the distinctive emblem of the Red Cross, Red Crescent or Red Lion and Sun or of other emblems, signs or signals provided for by the Conventions or by this Protocol. It is also prohibited to misuse deliberately in an armed conflict other internationally recognized protective emblems, signs or signals, including the flag of truce, and the protective emblem of cultural property.
2. It is prohibited to make use of the distinctive emblem of the United Nations, except as authorized by that Organization.

Article 39. – Emblems of nationality

1. It is prohibited to make use in an armed conflict of the flags or military emblems, insignia or uniforms of neutral or other States not Parties to the conflict.
2. It is prohibited to make use of the flags or military emblems, insignia or uniforms of adverse Parties while engaging in attacks or in order to shield, favour, protect or impede military operations.
3. Nothing in this Article or in Article 37, paragraph 1 ( d ), shall affect the existing generally recognized rules of international law applicable to espionage or to the use of flags in the conduct of armed conflict at sea.

Cyber warfare

A false flag in the cyber domain is slightly different and easier to perpetrate than in other physical theaters of war. Cyber false flags refer to tactics used in covert cyber attacks by a perpetrator to deceive or misguide attribution attempts including the attacker’s origin, identity, movement, and/or code/exploitation. This misdirection tactic can cause misattribution (permitting response and/or counterattack as a condiciosine qua non under international law) or misperception which can lead to retaliation against the wrong adversary.

Cyber false flags can exist in the cyber domain when:

  1. Weaponized cyber exploits use recycled code/variants from previous attacks;
  2. Exploits are developed to mimic the scope and complexity of other malware;
  3. Exploits are procured rather than developed;
  4. Exploits are executed from new/unknown operator command servers;
  5. Malware calls out to or connects to known operator command servers;
  6. The action or attack is outsourced;
  7. The compromise is socially engineered to misguide investigations towards other operators;
  8. The audit trail or lack thereof conceals actual intent or actions with other exploits designed to mislead investigators.

As pretexts for war

Russo-Swedish War

In 1788, the head tailor at the Royal Swedish Opera received an order to sew a number of Russian military uniforms. These were then used by the Swedes to stage an attack on Puumala, a Swedish outpost on the Russo-Swedish border, on 27 June 1788. This caused an outrage in Stockholm and impressed the Riksdag of the Estates, the Swedish national assembly, who until then had refused to agree to an offensive war against Russia. The Puumala incident allowed King Gustav III of Sweden, who lacked the constitutional authority to initiate unprovoked hostilities without the Estates’ consent, to launch the Russo-Swedish War (1788–1790).[10]

Second Sino-Japanese War

Japanese experts inspect the scene of the ‘railway sabotage’ on South Manchurian Railway

In September 1931, Japanese officers fabricated a pretext for invading Manchuria by blowing up a section of railway. Though the explosion was too weak to disrupt operations on the rail line, the Japanese nevertheless used this Mukden incident to seize Manchuria and create a puppet government for what they termed the “independent” state of Manchukuo.[11]

World War II

Gleiwitz incident

Alfred Naujocks

The Gleiwitz incident in 1939 involved Reinhard Heydrich fabricating evidence of a Polish attack against Germany to mobilize German public opinion for war and to justify the war with Poland. Alfred Naujocks was a key organiser of the operation under orders from Heydrich. It led to the deaths of Nazi concentration camp victims who were dressed as German soldiers and then shot by the Gestapo to make it seem that they had been shot by Polish soldiers. This, along with other false flag operations in Operation Himmler, would be used to mobilize support from the German population for the start of World War II in Europe.[12]

The operation failed to convince international public opinion of the German claims, and both Britain and France—Poland’s allies—declared war two days after Germany invaded Poland.[13]

Winter War

On November 26, 1939, the Soviet armyshelled Mainila, a Russian village near the Finnish border. Soviet authorities blamed Finland for the attack and used the incident as a pretext to invade Finland, starting the Winter War, four days later.[14]

Cuban Revolution

Operation Northwoods

Operation Northwoods memorandum (13 March 1962)[15]

The proposed, but never executed, 1962 Operation Northwoods plot by the U.S. Department of Defense for a war with Cuba involved scenarios such as fabricating the hijacking or shooting down of passenger and military planes, sinking a U.S. ship in the vicinity of Cuba, burning crops, sinking a boat filled with Cuban refugees, attacks by alleged Cuban infiltrators inside the United States, and harassment of U.S. aircraft and shipping and the destruction of aerial drones by aircraft disguised as Cuban MiGs.[16] These actions would be blamed on Cuba, and would be a pretext for an invasion of Cuba and the overthrow of Fidel Castro‘s communist government. It was authored by the Joint Chiefs of Staff, but then rejected by President John F. Kennedy. The surprise discovery of the documents relating to Operation Northwoods was a result of the comprehensive search for records related to the assassination of President John F. Kennedy by the Assassination Records Review Board in the mid-1990s.[17] Information about Operation Northwoods was later publicized by James Bamford.[18]

As a tactic to undermine political opponents

Reichstag fire

Main article: Reichstag fire

The Reichstag fire was an arson attack on the Reichstag building in Berlin on 27 February 1933. The fire started in the Session Chamber,[19] and, by the time the police and firemen arrived, the main Chamber of Deputies was engulfed in flames. Police searched the building and found Marinus van der Lubbe, a young Dutchcouncil communist and unemployed bricklayer, who had recently arrived in Germany to carry out political activities.[citation needed]

The fire was used as evidence by the Nazis that the Communists were beginning a plot against the German government. Van der Lubbe and four Communist leaders were subsequently arrested. Adolf Hitler, who was sworn in as Chancellor of Germany four weeks before, on 30 January, urged President Paul von Hindenburg to pass an emergency decree to counter the “ruthless confrontation of the Communist Party of Germany“.[20] With civil liberties suspended, the government instituted mass arrests of Communists, including all of the Communist parliamentary delegates. With their bitter rival Communists gone and their seats empty, the National Socialist German Workers Party went from being a plurality party to the majority; subsequent elections confirmed this position and thus allowed Hitler to consolidate his power.[citation needed]

Historians disagree as to whether Van der Lubbe acted alone, as he said, to protest the condition of the German working class, or whether the arson was planned and ordered by the Nazis, then dominant in the government themselves, as a false flag operation.[21][22]

Project TP-Ajax

On 4 April 1953, the CIA was ordered to undermine the government of Iran over a four-month period, as a precursor to overthrowing Prime Minister Mohammad Mosaddegh.[23] One tactic used to undermine Mosaddegh was to carry out false flag attacks “on mosques and key public figures”, to be blamed on Iranian communists loyal to the government.[23]

The CIA project was code-named TP-Ajax, and the tactic of a “directed campaign of bombings by Iranians posing as members of the Communist party”,[24] involved the bombing of “at least” one well known Muslim’s house by CIA agents posing as Communists.[24] The CIA determined that the tactic of false flag attacks added to the “positive outcome” of Project TPAJAX.[23]

However, as “the C.I.A. burned nearly all of its files on its role in the 1953 coup in Iran”, the true extent of the tactic has been difficult for historians to discern.[25]

Pseudo-operations

Pseudo-operations are those in which forces of one power disguise themselves as enemy forces. For example, a state power may disguise teams of operatives as insurgents and, with the aid of defectors, infiltrate insurgent areas.[26] The aim of such pseudo-operations may be to gather short or long-term intelligence or to engage in active operations, in particularassassinations of important enemies. However, they usually involve both, as the risks of exposure rapidly increase with time and intelligence gathering eventually leads to violent confrontation. Pseudo-operations may be directed by military or police forces, or both. Police forces are usually best suited to intelligence tasks; however, military provide the structure needed to back up such pseudo-ops with military response forces. According to US military expert Lawrence Cline (2005), “the teams typically have been controlled by police services, but this largely was due to the weaknesses in the respective military intelligence systems.”[citation needed]

Charlemagne Péralte of Haiti was assassinated in 1919, after checkpoints were passed by military disguised as guerrilla fighters.

The State Political Directorate (OGPU) of the Soviet Union set up such an operation from 1921 to 1926. During Operation Trust, they used loose networks of White Army supporters and extended them, creating the pseudo-“Monarchist Union of Central Russia” (MUCR) in order to help the OGPU identify real monarchists and anti-Bolsheviks.[citation needed]

An example of a successful assassination was United States MarineSergeantHerman H. Hanneken leading a patrol of his HaitianGendarmerie disguised as enemy guerrillas in 1919. The Patrol successfully passed several enemy checkpoints in order to assassinate the guerilla leader Charlemagne Péralte near Grande-Rivière-du-Nord. Hanneken was awarded the Medal of Honor and was commissioned a Second Lieutenant for his deed.[citation needed]

During the Mau Mau uprising in the 1950s, captured Mau Mau members who switched sides and specially trained British troops initiated the pseudo-gang concept to successfully counter Mau Mau. In 1960 Frank Kitson, (who was later involved in the Northern Irish conflict and is now a retired British General), published Gangs and Counter-gangs, an account of his experiences with the technique in Kenya; information included how to counter gangs and measures of deception, including the use of defectors, which brought the issue a wider audience.[citation needed]

Another example of combined police and military oversight of pseudo-operations include the Selous Scouts in the former country Rhodesia (now Zimbabwe), governed by white minority rule until 1980. The Selous Scouts were formed at the beginning of Operation Hurricane, in November 1973, by Major (later Lieutenant Colonel) Ronald Reid-Daly. As with all Special Forces in Rhodesia, by 1977 they were controlled by COMOPS (Commander, Combined Operations) Commander Lieutenant General Peter Walls. The Selous Scouts were originally composed of 120 members, with all officers being white and the highest rank initially available for black soldiers being colour sergeant. They succeeded in turning approximately 800 insurgents who were then paid by Special Branch, ultimately reaching the number of 1,500 members. Engaging mainly in long-range reconnaissance and surveillance missions, they increasingly turned to offensive actions, including the attempted assassination of Zimbabwe People’s Revolutionary Army leader Joshua Nkomo in Zambia. This mission was finally aborted by the Selous Scouts, and attempted again, unsuccessfully, by the Rhodesian Special Air Service.[27]

Some offensive operations attracted international condemnation, in particular the Selous Scouts’ raid on a Zimbabwe African National Liberation Army (ZANLA) camp at Nyadzonya Pungwe, Mozambique in August 1976. ZANLA was then led by Josiah Tongogara. Using Rhodesian trucks and armored cars disguised as Mozambique military vehicles, 84 scouts killed 1,284 people in the camp-the camp was registered as a refugee camp by the United Nations (UN). Even according to Reid-Daly, most of those killed were unarmed guerrillas standing in formation for a parade. The camp hospital was also set ablaze by the rounds fired by the Scouts, killing all patients.[28] According to David Martin and Phyllis Johnson, who visited the camp shortly before the raid, it was only a refugee camp that did not host any guerrillas. It was staged for UN approval.[29]

According to a 1978 study by the Directorate of Military Intelligence, 68% of all insurgent deaths inside Rhodesia could be attributed to the Selous Scouts, who were disbanded in 1980.[30]

If the action is a police action, then these tactics would fall within the laws of the state initiating the pseudo, but if such actions are taken in a civil war or during a belligerent military occupation then those who participate in such actions would not be privileged belligerents. The principle of plausible deniability is usually applied for pseudo-teams. (See the above section Laws of war). Some false flag operations have been described by Lawrence E. Cline, a retired US Army intelligence officer, as pseudo-operations, or “the use of organized teams which are disguised as guerrilla groups for long- or short-term penetration of insurgent-controlled areas.”[citation needed]

Pseudo Operations should be distinguished, notes Cline, from the more common police or intelligence infiltration of guerrilla or criminal organizations. In the latter case, infiltration is normally done by individuals. Pseudo teams, on the other hand, are formed as needed from organized units, usually military or paramilitary. The use of pseudo teams has been a hallmark of a number of foreign counterinsurgency campaigns.”[26]

Similar false flag tactics were also employed during the Algerian civil war, starting in the middle of 1994. Death squads composed of Département du Renseignement et de la Sécurité (DRS) security forces disguised themselves as Islamist terrorists and committed false flag terror attacks. Such groups included the Organisation of Young Free Algerians (OJAL) or the Secret Organisation for the Safeguard of the Algerian Republic (OSSRA)[31] According to Roger Faligot and Pascal Kropp (1999), the OJAL was reminiscent of “the Organization of the French Algerian Resistance (ORAF), a group of counter-terrorists created in December 1956 by the Direction de la surveillance du territoire (Territorial Surveillance Directorate, or DST) whose mission was to carry out terrorist attacks with the aim of quashing any hopes of political compromise”.[32]

Espionage

Main article: False flag penetrator

In espionage the term “false flag” describes the recruiting of agents by operatives posing as representatives of a cause the prospective agents are sympathetic to, or even the agents’ own government. For example, during the Cold War, several female West German civil servants were tricked into stealing classified documents by agents of the East GermanStasi intelligence service, pretending to be members of West German peace advocacy groups (the Stasi agents were also described as “Romeos,” indicating that they also used their sex appeal to manipulate their targets, making this operation a combination of the false flag and “honey trap” techniques).[33]

The technique can also be used to expose enemy agents in one’s own service, by having someone approach the suspect and pose as an agent of the enemy. Earl Edwin Pitts, a 13-year veteran of the U.S. Federal Bureau of Investigation and an attorney, was caught when he was approached by FBI agents posing as Russian agents.[citation needed]

British intelligence officials in World War II allowed double agents to fire-bomb a power station and a food dump in the UK to protect their cover, according to declassified documents. The documents stated the agents took precautions to ensure they did not cause serious damage. One of the documents released also stated: “It should be recognised that friends as well as enemies must be completely deceived.”[34]

Civilian usage

While false flag operations originate in warfare and government, they also can occur in civilian settings among certain factions, such as businesses, special interest groups, religions, political ideologies and campaigns for office.[citation needed]

Businesses

In business and marketing, similar operations are being employed in some public relations campaigns (see Astroturfing). Telemarketing firms practice false flag type behavior when they pretend to be a market research firm (referred to as “sugging“). In some rare cases, members of an unsuccessful business will destroy some of their own property to conceal an unrelated crime (e.g., safety violations, embezzlement) but make it appear as though the destruction was done by a rival company.[citation needed]

Political campaigning

Political campaigning has a long history of this tactic in various forms, including in person, print media and electronically in recent years. This can involve when supporters of one candidate pose as supporters of another, or act as “straw men” for their preferred candidate to debate against. This can happen with or without the candidate’s knowledge. The Canuck letter is an example of one candidate creating a false document and attributing it as coming from another candidate in order to discredit that candidate.[citation needed]

In the final days of Florida’s 1994 gubernatorial campaign, Democratic Governor Lawton Chiles ran a false flag operation that paid for tens of thousands of calls to elderly voters using false organization names. The calls purported to be from Republican groups and told voters that Jeb Bush was against Social Security and seniors. Chiles denied his campaign was behind the calls. After winning re-election and facing an investigation, Chiles admitted the truth in November 1995.[35]

In 2006, individuals practicing false flag behavior were discovered and “outed” in New Hampshire[36][37] and New Jersey[38] after blog comments claiming to be from supporters of a political candidate were traced to the IP address of paid staffers for that candidate’s opponent.

On 19 February 2011, Indiana Deputy Prosecutor Carlos Lam sent a private email to Wisconsin Governor Scott Walker suggesting that he run a “‘false flag’ operation” to counter the protests against Walker’s proposed restrictions on public employees’ collective bargaining rights:

If you could employ an associate who pretends to be sympathetic to the unions’ cause to physically attack you (or even use a firearm against you), you could discredit the unions … Employing a false flag operation would assist in undercutting any support that the media may be creating in favor of the unions.[39][40]

The press had acquired a court order to access all of Walker’s emails and Lam’s email was exposed. At first, Lam vehemently denied it, but eventually admitted it and resigned.[40]

Ideological

A bomb threat forged by Scientology operatives.

Proponents of political or religious ideologies will sometimes use false flag tactics. This can be done to discredit or implicate rival groups, create the appearance of enemies when none exist, or create the illusion of organized and directed persecution. This can be used to gain attention and sympathy from outsiders, in particular the media, or to convince others within the group that their beliefs are under attack and in need of protection.

In retaliation for writing The Scandal of Scientology, some members of the Church of Scientology stole stationery from author Paulette Cooper‘s home and then used that stationery to forge bomb threats and have them mailed to a Scientology office. The Guardian’s Office also had a plan for further operations to discredit Cooper known as Operation Freakout, but several Scientology operatives were arrested in a separate investigation and the plan was exposed.[41]

See also

Concepts

Examples

https://en.wikipedia.org/wiki/False_flag

42 FALSE-FLAG ATTACKS OFFICIALY ADMITTED TO

Mirrored from Washington’s Blog (due to their server being swamped)

Presidents, Prime Ministers, Congressmen, Generals, Spooks, Soldiers and Police ADMIT to False Flag Terror

In the following instances, officials in the government which carried out the attack (or seriously proposed an attack) admit to it, either orally, in writing, or through photographs or videos:

(1) Japanese troops set off a small explosion on a train track in 1931, and falsely blamed it on China in order to justify an invasion of Manchuria. This is known as the “Mukden Incident” or the “Manchurian Incident”. The Tokyo International Military Tribunal found: “Several of the participators in the plan, including Hashimoto [a high-ranking Japanese army officer], have on various occasions admitted their part in the plot and have stated that the object of the ‘Incident’ was to afford an excuse for the occupation of Manchuria by the Kwantung Army ….” And see this.

(2) A major with the Nazi SS admitted at the Nuremberg trials that – under orders from the chief of the Gestapo – he and some other Nazi operatives faked attacks on their own people and resources which they blamed on the Poles, to justify the invasion of Poland.

(3) Nazi general Franz Halder also testified at the Nuremberg trials that Nazi leader Hermann Goering admitted to setting fire to the German parliament building in 1933, and then falsely blaming the communists for the arson.

(4) Soviet leader Nikita Khrushchev admitted in writing that the Soviet Union’s Red Army shelled the Russian village of Mainila in 1939 – while blaming the attack on Finland – as a basis for launching the “Winter War” against Finland. Russian president Boris Yeltsin agreed that Russia had been the aggressor in the Winter War.

(5) The Russian Parliament, current Russian president Putin and former Soviet leader Gorbachev all admit that Soviet leader Joseph Stalin ordered his secret police to execute 22,000 Polish army officers and civilians in 1940, and then falsely blamed it on the Nazis.

(6) The British government admits that – between 1946 and 1948 – it bombed 5 ships carrying Jews attempting to flee the Holocaust to seek safety in Palestine, set up a fake group called “Defenders of Arab Palestine”, and then had the psuedo-group falsely claim responsibility for the bombings (and see this, this and this).

(7) Israel admits that in 1954, an Israeli terrorist cell operating in Egypt planted bombs in several buildings, including U.S. diplomatic facilities, then left behind “evidence” implicating the Arabs as the culprits (one of the bombs detonated prematurely, allowing the Egyptians to identify the bombers, and several of the Israelis later confessed) (and see this and this).

(8) The CIA admits that it hired Iranians in the 1950’s to pose as Communists and stage bombings in Iran in order to turn the country against its democratically-elected prime minister.

(9) The Turkish Prime Minister admitted that the Turkish government carried out the 1955 bombing on a Turkish consulate in Greece – also damaging the nearby birthplace of the founder of modern Turkey – and blamed it on Greece, for the purpose of inciting and justifying anti-Greek violence.

(10) The British Prime Minister admitted to his defense secretary that he and American president Dwight Eisenhower approved a plan in 1957 to carry out attacks in Syria and blame it on the Syrian government as a way to effect regime change.

(11) The former Italian Prime Minister, an Italian judge, and the former head of Italian counterintelligence admit that NATO, with the help of the Pentagon and CIA, carried out terror bombings in Italy and other European countries in the 1950s and blamed the communists, in order to rally people’s support for their governments in Europe in their fight against communism. As one participant in this formerly-secret program stated: “You had to attack civilians, people, women, children, innocent people, unknown people far removed from any political game. The reason was quite simple. They were supposed to force these people, the Italian public, to turn to the state to ask for greater security” (and see this) (Italy and other European countries subject to the terror campaign had joined NATO before the bombings occurred). And watch this BBC special. They also allegedly carried out terror attacks in France, Belgium, Denmark, Germany, Greece, the Netherlands, Norway, Portugal, the UK, and other countries.

False flag attacks carried out pursuant to this program include – by way of example only:

(12) In 1960, American Senator George Smathers suggested that the U.S. launch “a false attack made on Guantanamo Bay which would give us the excuse of actually fomenting a fight which would then give us the excuse to go in and [overthrow Castro]”.

(13) Official State Department documents show that, in 1961, the head of the Joint Chiefs and other high-level officials discussed blowing up a consulate in the Dominican Republic in order to justify an invasion of that country. The plans were not carried out, but they were all discussed as serious proposals.

(14) As admitted by the U.S. government, recently declassified documents show that in 1962, the American Joint Chiefs of Staff signed off on a plan to blow up AMERICAN airplanes (using an elaborate plan involving the switching of airplanes), and also to commit terrorist acts on American soil, and then to blame it on the Cubans in order to justify an invasion of Cuba. See the following ABC news report; the official documents; and watch this interview with the former Washington Investigative Producer for ABC’s World News Tonight with Peter Jennings.

(15) In 1963, the U.S. Department of Defense wrote a paper promoting attacks on nations within the Organization of American States – such as Trinidad-Tobago or Jamaica – and then falsely blaming them on Cuba.

(16) The U.S. Department of Defense even suggested covertly paying a person in the Castro government to attack the United States: “The only area remaining for consideration then would be to bribe one of Castro’s subordinate commanders to initiate an attack on Guantanamo.”

(17) The NSA admits that it lied about what really happened in the Gulf of Tonkin incident in 1964 … manipulating data to make it look like North Vietnamese boats fired on a U.S. ship so as to create a false justification for the Vietnam war.

(18) A U.S. Congressional committee admitted that – as part of its “Cointelpro” campaign – the FBI had used many provocateurs in the 1950s through 1970s to carry out violent acts and falsely blame them on political activists.

(19) A top Turkish general admitted that Turkish forces burned down a mosque on Cyprus in the 1970s and blamed it on their enemy. He explained: “In Special War, certain acts of sabotage are staged and blamed on the enemy to increase public resistance. We did this on Cyprus; we even burnt down a mosque.” In response to the surprised correspondent’s incredulous look the general said, “I am giving an example”.

(20) A declassified 1973 CIA document reveals a program to train foreign police and troops on how to make booby traps, pretending that they were training them on how to investigate terrorist acts:

The Agency maintains liaison in varying degrees with foreign police/security organizations through its field stations ….

[CIA provides training sessions as follows:]

a. Providing trainees with basic knowledge in the uses of commercial and military demolitions and incendiaries as they may be applied in terrorism and industrial sabotage operations.

b. Introducing the trainees to commercially available materials and home laboratory techniques, likely to he used in the manufacture of explosives and incendiaries by terrorists or saboteurs.

c. Familiarizing the trainees with the concept of target analysis and operational planning that a saboteur or terrorist must employ.

d. Introducing the trainees to booby trapping devices and techniques giving practical experience with both manufactured and improvised devices through actual fabrication.

***

The program provides the trainees with ample opportunity to develop basic familiarity and use proficiently through handling, preparing and applying the various explosive charges, incendiary agents, terrorist devices and sabotage techniques.

(21) The German government admitted (and see this) that, in 1978, the German secret service detonated a bomb in the outer wall of a prison and planted “escape tools” on a prisoner – a member of the Red Army Faction – which the secret service wished to frame the bombing on.

(22) A Mossad agent admits that, in 1984, Mossad planted a radio transmitter in Gaddaffi’s compound in Tripoli, Libya which broadcast fake terrorist trasmissions recorded by Mossad, in order to frame Gaddaffi as a terrorist supporter. Ronald Reagan bombed Libya immediately thereafter.

(23) The South African Truth and Reconciliation Council found that, in 1989, the Civil Cooperation Bureau (a covert branch of the South African Defense Force) approached an explosives expert and asked him “to participate in an operation aimed at discrediting the ANC [the African National Congress] by bombing the police vehicle of the investigating officer into the murder incident”, thus framing the ANC for the bombing.

(24) An Algerian diplomat and several officers in the Algerian army admit that, in the 1990s, the Algerian army frequently massacred Algerian civilians and then blamed Islamic militants for the killings (and see this video; and Agence France-Presse, 9/27/2002, French Court Dismisses Algerian Defamation Suit Against Author).

(25) The United States Army’s 1994 publication Special Forces Foreign Internal Defense Tactics Techniques and Procedures for Special Forces – updated in 2004 – recommends employing terrorists and using false flag operations to destabilize leftist regimes in Latin America. False flag terrorist attacks were carried out in Latin America and other regions as part of the CIA’s “Dirty Wars“. And see this.

(26) Similarly, a CIA “psychological operations” manual prepared by a CIA contractor for the Nicaraguan Contra rebels noted the value of assassinating someone on your own side to create a “martyr” for the cause. The manual was authenticated by the U.S. government. The manual received so much publicity from Associated Press, Washington Post and other news coverage that – during the 1984 presidential debate – President Reagan was confronted with the following question on national television:

At this moment, we are confronted with the extraordinary story of a CIA guerrilla manual for the anti-Sandinista contras whom we are backing, which advocates not only assassinations of Sandinistas but the hiring of criminals to assassinate the guerrillas we are supporting in order to create martyrs.

(27) An Indonesian fact-finding team investigated violent riots which occurred in 1998, and determined that “elements of the military had been involved in the riots, some of which were deliberately provoked“.

(28) Senior Russian Senior military and intelligence officers admit that the KGB blew up Russian apartment buildings in 1999 and falsely blamed it on Chechens, in order to justify an invasion of Chechnya (and see this report and this discussion).

(29) As reported by BBC, the New York Times, and Associated Press, Macedonian officials admit that the government murdered 7 innocent immigrants in cold blood and pretended that they were Al Qaeda soldiers attempting to assassinate Macedonian police, in order to join the “war on terror”.

(30)  At the July 2001 G8 Summit in Genoa, Italy, black-clad thugs were videotaped getting out of police cars, and were seen by an Italian MP carrying “iron bars inside the police station”.  Subsequently, senior police officials in Genoa subsequently  admitted that police planted two Molotov cocktails and faked the stabbing of a police officer at the G8 Summit, in order to justify a violent crackdown against protesters.

(31) The U.S. falsely blamed Iraq for playing a role in the 9/11 attacks – as shown by a memo from the defense secretary – as one of the main justifications for launching the Iraq war. Even after the 9/11 Commission admitted that there was no connection, Dick Cheney said that the evidence is “overwhelming” that al Qaeda had a relationship with Saddam Hussein’s regime, that Cheney “probably” had information unavailable to the Commission, and that the media was not ‘doing their homework’ in reporting such ties. Top U.S. government officials now admit that the Iraq war was really launched for oil … not 9/11 or weapons of mass destruction. Despite previous “lone wolf” claims, many U.S. government officials now say that 9/11 was state-sponsored terror; but Iraq was not the state which backed the hijackers. (Many U.S. officials have alleged that 9/11 was a false flag operation by rogue elements of the U.S. government; but such a claim is beyond the scope of this discussion. The key point is that the U.S. falsely blamed it on Iraq, when it knew Iraq had nothing to do with it.).

(32) Although the FBI now admits that the 2001 anthrax attacks were carried out by one or more U.S. government scientists, a senior FBI official says that the FBI was actually told to blame the Anthrax attacks on Al Qaeda by White House officials (remember what the anthrax letters looked like). Government officials also confirm that the white House tried to link the anthrax to Iraq as a justification for regime change in that country.

(33) According to the Washington Post, Indonesian police admit that the Indonesian military killed American teachers in Papua in 2002 and blamed the murders on a Papuan separatist group in order to get that group listed as a terrorist organization.

(34) The well-respected former Indonesian president also admits that the government probably had a role in the Bali bombings.

(35) Police outside of a 2003 European Union summit in Greece were filmed planting Molotov cocktails on a peaceful protester

(36) Former Department of Justice lawyer John Yoo suggested in 2005 that the US should go on the offensive against al-Qaeda, having “our intelligence agencies create a false terrorist organization. It could have its own websites, recruitment centers, training camps, and fundraising operations. It could launchfake terrorist operations and claim credit for real terrorist strikes, helping to sow confusion within al-Qaeda’s ranks, causing operatives to doubt others’ identities and to question the validity of communications.”

(37) Similarly, in 2005, Professor John Arquilla of the Naval Postgraduate School – a renowned US defense analyst credited with developing the concept of ‘netwar’ – called for western intelligence services to create new “pseudo gang” terrorist groups, as a way of undermining “real” terror networks. According to Pulitzer-Prize winning journalist Seymour Hersh, Arquilla’s ‘pseudo-gang’ strategy was, Hersh reported, already being implemented by the Pentagon:

“Under Rumsfeld’s new approach, I was told, US military operatives would be permitted to pose abroad as corrupt foreign businessmen seeking to buy contraband items that could be used in nuclear-weapons systems. In some cases, according to the Pentagon advisers, local citizens could be recruited and asked to join up with guerrillas or terrorists

The new rules will enable the Special Forces community to set up what it calls ‘action teams’ in the target countries overseas which can be used to find and eliminate terrorist organizations. ‘Do you remember the right-wing execution squads in El Salvador?’ the former high-level intelligence official asked me, referring to the military-led gangs that committed atrocities in the early nineteen-eighties. ‘We founded them and we financed them,’ he said. ‘The objective now is to recruit locals in any area we want. And we aren’t going to tell Congress about it.’ A former military officer, who has knowledge of the Pentagon’s commando capabilities, said, ‘We’re going to be riding with the bad boys.'”

(38) United Press International reported in June 2005:

U.S. intelligence officers are reporting that some of the insurgents in Iraq are using recent-model Beretta 92 pistols, but the pistols seem to have had their serial numbers erased. The numbers do not appear to have been physically removed; the pistols seem to have come off a production line without any serial numbers. Analysts suggest the lack of serial numbers indicates that the weapons were intended for intelligence operations or terrorist cells with substantial government backing. Analysts speculate that these guns are probably from either Mossad or the CIA. Analysts speculate that agent provocateurs may be using the untraceable weapons even as U.S. authorities use insurgent attacks against civilians as evidence of the illegitimacy of the resistance.

(39) Undercover Israeli soldiers admitted in 2005 to throwing stones at other Israeli soldiers so they could blame it on Palestinians, as an excuse to crack down on peaceful protests by the Palestinians.

(40) Quebec police admitted that, in 2007, thugs carrying rocks to a peaceful protest were actually undercover Quebec police officers (and see this).

(41) A 2008 US Army special operations field manual recommends that the U.S. military use surrogate non-state groups such as “paramilitary forces, individuals, businesses, foreign political organizations, resistant or insurgent organizations, expatriates, transnational terrorism adversaries, disillusioned transnational terrorism members, black marketers, and other social or political ‘undesirables.'” The manual specifically acknowledged that U.S. special operations can involve both counterterrorism and “Terrorism” (as well as “transnational criminal activities, including narco-trafficking, illicit arms-dealing, and illegal financial transactions.”)

(42)  The former head of Secret Services and Head of State of Italy (Francesco Cossiga) advised the 2008 minister in charge of the police, on how to deal with protests from teachers and students:

He should do what I did when I was Minister of the Interior … infiltrate the movement with agents provocateurs inclined to do anything …. And after that, with the strength of the gained population consent,  … beat them for blood and beat for blood also those teachers that incite them. Especially the teachers. Not the elderly, of course, but the girl teachers yes.

(43) At the G20 protests in London in 2009, a British member of parliament saw plain clothes police officers attempting to incite the crowd to violence.

(44) Egyptian politicians admitted (and see this) that government employees looted priceless museum artifacts in 2011 to try to discredit the protesters.

(45) Rioters who discredited the peaceful protests against the swearing in of the Mexican president in 2012 admitted that they were paid 300 pesos each to destroy everything in their path. According to Wikipedia, photos also show the vandals waiting in groups behind police lines prior to the violence.

(46) A Colombian army colonel has admitted that his unit murdered 57 civilians, then dressed them in uniforms and claimed they were rebels killed in combat.

(47) On November 20, 2014, Mexican agent provocateurs were transported by army vehicles to participate in the 2014 Iguala mass kidnapping protests, as was shown by videos and pictures distributed via social networks.

(48) The highly-respected writer for the Telegraph Ambrose Evans-Pritchard says that the head of Saudi intelligence – Prince Bandar – recently admitted that the Saudi government controls “Chechen” terrorists.

(49) High-level American sources admitted that the Turkish government – a fellow NATO country – carried out the chemical weapons attacks blamed on the Syrian government; and high-ranking Turkish government admitted on tape plans to carry out attacks and blame it on the Syrian government.

(50) The Ukrainian security chief admits that the sniper attacks which started the Ukrainian coup were carried out in order to frame others. Ukrainian officials admit that the Ukrainian snipers fired on both sides, to create maximum chaos.

(51) Britain’s spy agency has admitted (and see this) that it carries out “digital false flag” attacks on targets, framing people by writing offensive or unlawful material … and blaming it on the target.

(52) U.S. soldiers have admitted that if they kill innocent Iraqis and Afghanis, they then “drop” automatic weapons near their body so they can pretend they were militants

(53) Similarly, police frame innocent people for crimes they didn’t commit. The practice is so well-known that the New York Times noted in 1981:

In police jargon, a throwdown is a weapon planted on a victim.

Newsweek reported in 1999:

Perez, himself a former [Los Angeles Police Department] cop, was caught stealing eight pounds of cocaine from police evidence lockers. After pleading guilty in September, he bargained for a lighter sentence by telling an appalling story of attempted murder and a “throwdown”-police slang for a weapon planted by cops to make a shooting legally justifiable. Perez said he and his partner, Officer Nino Durden, shot an unarmed 18th Street Gang member named Javier Ovando, then planted a semiautomatic rifle on the unconscious suspect and claimed that Ovando had tried to shoot them during a stakeout.

Wikipedia notes:

As part of his plea bargain, Perez implicated scores of officers from the Rampart Division’s anti-gang unit, describing routinely beating gang members, planting evidence on suspects, falsifying reports and covering up unprovoked shootings.

(As a side note – and while not technically false flag attacks – police have been busted framing innocent people in many other ways, as well.)

(54) A former U.S. intelligence officer recently alleged:

Most terrorists are false flag terrorists or are created by our own security services.

(55) The head and special agent in charge of the FBI’s Los Angeles office said that most terror attacks are committed by the CIA and FBI as false flags.  Similarly, the director of the National Security Agency under Ronald Reagan – Lt. General William Odom said:

By any measure the US has long used terrorism. In ’78-79 the Senate was trying to pass a law against international terrorism – in every version they produced, the lawyers said the US would be in violation.

(audio here).

(56) Leaders throughout history have acknowledged the “benefits” of of false flags to justify their political agenda:

Terrorism is the best political weapon for nothing drives people harder than a fear of sudden death”.
– Adolph Hitler

“Why of course the people don’t want war … But after all it is the leaders of the country who determine the policy, and it is always a simple matter to drag the people along, whether it is a democracy, or a fascist dictatorship, or a parliament, or a communist dictatorship … Voice or no voice, the people can always be brought to the bidding of the leaders. That is easy. All you have to do is to tell them they are being attacked, and denounce the pacifists for lack of patriotism and exposing the country to danger. It works the same in any country.”
– Hermann Goering, Nazi leader.

“The easiest way to gain control of a population is to carry out acts of terror. [The public] will clamor for such laws if their personal security is threatened”.
– Josef Stalin

Postscript: Private parties – such as NBC News, as well as Muslims, Jews, Scientologists, African-Americans and Neo-Nazis – play this game as well.

www.whatreallyhappened.comhttp://www.whatreallyhappened.com/WRHARTICLES/42falseflags.php#ixzz4dVI2Q7La

The Red Line and the Rat Line

Seymour M. Hersh on Obama, Erdoğan and the Syrian rebels

In 2011 Barack Obama led an allied military intervention in Libya without consulting the US Congress. Last August, after the sarin attack on the Damascus suburb of Ghouta, he was ready to launch an allied air strike, this time to punish the Syrian government for allegedly crossing the ‘red line’ he had set in 2012 on the use of chemical weapons.Then with less than two days to go before the planned strike, he announced that he would seek congressional approval for the intervention. The strike was postponed as Congress prepared for hearings, and subsequently cancelled when Obama accepted Assad’s offer to relinquish his chemical arsenal in a deal brokered by Russia. Why did Obama delay and then relent on Syria when he was not shy about rushing into Libya? The answer lies in a clash between those in the administration who were committed to enforcing the red line, and military leaders who thought that going to war was both unjustified and potentially disastrous.

Obama’s change of mind had its origins at Porton Down, the defence laboratory in Wiltshire. British intelligence had obtained a sample of the sarin used in the 21 August attack and analysis demonstrated that the gas used didn’t match the batches known to exist in the Syrian army’s chemical weapons arsenal. The message that the case against Syria wouldn’t hold up was quickly relayed to the US joint chiefs of staff. The British report heightened doubts inside the Pentagon; the joint chiefs were already preparing to warn Obama that his plans for a far-reaching bomb and missile attack on Syria’s infrastructure could lead to a wider war in the Middle East. As a consequence the American officers delivered a last-minute caution to the president, which, in their view, eventually led to his cancelling the attack.

For months there had been acute concern among senior military leaders and the intelligence community about the role in the war of Syria’s neighbours, especially Turkey. Prime Minister Recep Erdoğan was known to be supporting the al-Nusra Front, a jihadist faction among the rebel opposition, as well as other Islamist rebel groups. ‘We knew there were some in the Turkish government,’ a former senior US intelligence official, who has access to current intelligence, told me, ‘who believed they could get Assad’s nuts in a vice by dabbling with a sarin attack inside Syria – and forcing Obama to make good on his red line threat.’

The joint chiefs also knew that the Obama administration’s public claims that only the Syrian army had access to sarin were wrong. The American and British intelligence communities had been aware since the spring of 2013 that some rebel units in Syria were developing chemical weapons. On 20 June analysts for the US Defense Intelligence Agency issued a highly classified five-page ‘talking points’ briefing for the DIA’s deputy director, David Shedd, which stated that al-Nusra maintained a sarin production cell: its programme, the paper said, was ‘the most advanced sarin plot since al-Qaida’s pre-9/11 effort’. (According to a Defense Department consultant, US intelligence has long known that al-Qaida experimented with chemical weapons, and has a video of one of its gas experiments with dogs.) The DIA paper went on: ‘Previous IC [intelligence community] focus had been almost entirely on Syrian CW [chemical weapons] stockpiles; now we see ANF attempting to make its own CW … Al-Nusrah Front’s relative freedom of operation within Syria leads us to assess the group’s CW aspirations will be difficult to disrupt in the future.’ The paper drew on classified intelligence from numerous agencies: ‘Turkey and Saudi-based chemical facilitators,’ it said, ‘were attempting to obtain sarin precursors in bulk, tens of kilograms, likely for the anticipated large scale production effort in Syria.’ (Asked about the DIA paper, a spokesperson for the director of national intelligence said: ‘No such paper was ever requested or produced by intelligence community analysts.’)

Last May, more than ten members of the al-Nusra Front were arrested in southern Turkey with what local police told the press were two kilograms of sarin. In a 130-page indictment the group was accused of attempting to purchase fuses, piping for the construction of mortars, and chemical precursors for sarin. Five of those arrested were freed after a brief detention. The others, including the ringleader, Haytham Qassab, for whom the prosecutor requested a prison sentence of 25 years, were released pending trial. In the meantime the Turkish press has been rife with speculation that the Erdoğan administration has been covering up the extent of its involvement with the rebels. In a news conference last summer, Aydin Sezgin, Turkey’s ambassador to Moscow, dismissed the arrests and claimed to reporters that the recovered ‘sarin’ was merely ‘anti-freeze’.

The DIA paper took the arrests as evidence that al-Nusra was expanding its access to chemical weapons. It said Qassab had ‘self-identified’ as a member of al-Nusra, and that he was directly connected to Abd-al-Ghani, the ‘ANF emir for military manufacturing’. Qassab and his associate Khalid Ousta worked with Halit Unalkaya, an employee of a Turkish firm called Zirve Export, who provided ‘price quotes for bulk quantities of sarin precursors’. Abd-al-Ghani’s plan was for two associates to ‘perfect a process for making sarin, then go to Syria to train others to begin large scale production at an unidentified lab in Syria’. The DIA paper said that one of his operatives had purchased a precursor on the ‘Baghdad chemical market’, which ‘has supported at least seven CW efforts since 2004’.

A series of chemical weapon attacks in March and April 2013 was investigated over the next few months by a special UN mission to Syria. A person with close knowledge of the UN’s activity in Syria told me that there was evidence linking the Syrian opposition to the first gas attack, on 19 March in Khan Al-Assal, a village near Aleppo. In its final report in December, the mission said that at least 19 civilians and one Syrian soldier were among the fatalities, along with scores of injured. It had no mandate to assign responsibility for the attack, but the person with knowledge of the UN’s activities said: ‘Investigators interviewed the people who were there, including the doctors who treated the victims. It was clear that the rebels used the gas. It did not come out in public because no one wanted to know.’

In the months before the attacks began, a former senior Defense Department official told me, the DIA was circulating a daily classified report known as SYRUP on all intelligence related to the Syrian conflict, including material on chemical weapons. But in the spring, distribution of the part of the report concerning chemical weapons was severely curtailed on the orders of Denis McDonough, the White House chief of staff. ‘Something was in there that triggered a shit fit by McDonough,’ the former Defense Department official said. ‘One day it was a huge deal, and then, after the March and April sarin attacks’ – he snapped his fingers – ‘it’s no longer there.’ The decision to restrict distribution was made as the joint chiefs ordered intensive contingency planning for a possible ground invasion of Syria whose primary objective would be the elimination of chemical weapons.

In the aftermath of the 21 August attack Obama ordered the Pentagon to draw up targets for bombing. Early in the process, the former intelligence official said, ‘the White House rejected 35 target sets provided by the joint chiefs of staff as being insufficiently “painful” to the Assad regime.’ The original targets included only military sites and nothing by way of civilian infrastructure. Under White House pressure, the US attack plan evolved into ‘a monster strike’: two wings of B-52 bombers were shifted to airbases close to Syria, and navy submarines and ships equipped with Tomahawk missiles were deployed. ‘Every day the target list was getting longer,’ the former intelligence official told me. ‘The Pentagon planners said we can’t use only Tomahawks to strike at Syria’s missile sites because their warheads are buried too far below ground, so the two B-52 air wings with two-thousand pound bombs were assigned to the mission. Then we’ll need standby search-and-rescue teams to recover downed pilots and drones for target selection. It became huge.’ The new target list was meant to ‘completely eradicate any military capabilities Assad had’, the former intelligence official said. The core targets included electric power grids, oil and gas depots, all known logistic and weapons depots, all known command and control facilities, and all known military and intelligence buildings.

Britain and France were both to play a part. On 29 August, the day Parliament voted against Cameron’s bid to join the intervention, the Guardian reported that he had already ordered six RAF Typhoon fighter jets to be deployed to Cyprus, and had volunteered a submarine capable of launching Tomahawk missiles. The French air force – a crucial player in the 2011 strikes on Libya – was deeply committed, according to an account in Le Nouvel Observateur; François Hollande had ordered several Rafale fighter-bombers to join the American assault. Their targets were reported to be in western Syria.

By the last days of August the president had given the Joint Chiefs a fixed deadline for the launch. ‘H hour was to begin no later than Monday morning [2 September], a massive assault to neutralise Assad,’ the former intelligence official said. So it was a surprise to many when during a speech in the White House Rose Garden on 31 August Obama said that the attack would be put on hold, and he would turn to Congress and put it to a vote.

At this stage, Obama’s premise – that only the Syrian army was capable of deploying sarin – was unravelling. Within a few days of the 21 August attack, the former intelligence official told me, Russian military intelligence operatives had recovered samples of the chemical agent from Ghouta. They analysed it and passed it on to British military intelligence; this was the material sent to Porton Down. (A spokesperson for Porton Down said: ‘Many of the samples analysed in the UK tested positive for the nerve agent sarin.’ MI6 said that it doesn’t comment on intelligence matters.)

The former intelligence official said the Russian who delivered the sample to the UK was ‘a good source – someone with access, knowledge and a record of being trustworthy’. After the first reported uses of chemical weapons in Syria last year, American and allied intelligence agencies ‘made an effort to find the answer as to what if anything, was used – and its source’, the former intelligence official said. ‘We use data exchanged as part of the Chemical Weapons Convention. The DIA’s baseline consisted of knowing the composition of each batch of Soviet-manufactured chemical weapons. But we didn’t know which batches the Assad government currently had in its arsenal. Within days of the Damascus incident we asked a source in the Syrian government to give us a list of the batches the government currently had. This is why we could confirm the difference so quickly.’

The process hadn’t worked as smoothly in the spring, the former intelligence official said, because the studies done by Western intelligence ‘were inconclusive as to the type of gas it was. The word “sarin” didn’t come up. There was a great deal of discussion about this, but since no one could conclude what gas it was, you could not say that Assad had crossed the president’s red line.’ By 21 August, the former intelligence official went on, ‘the Syrian opposition clearly had learned from this and announced that “sarin” from the Syrian army had been used, before any analysis could be made, and the press and White House jumped at it. Since it now was sarin, “It had to be Assad.”’

The UK defence staff who relayed the Porton Down findings to the joint chiefs were sending the Americans a message, the former intelligence official said: ‘We’re being set up here.’ (This account made sense of a terse message a senior official in the CIA sent in late August: ‘It was not the result of the current regime. UK & US know this.’) By then the attack was a few days away and American, British and French planes, ships and submarines were at the ready.

The officer ultimately responsible for the planning and execution of the attack was General Martin Dempsey, chairman of the joint chiefs. From the beginning of the crisis, the former intelligence official said, the joint chiefs had been sceptical of the administration’s argument that it had the facts to back up its belief in Assad’s guilt. They pressed the DIA and other agencies for more substantial evidence. ‘There was no way they thought Syria would use nerve gas at that stage, because Assad was winning the war,’ the former intelligence official said. Dempsey had irritated many in the Obama administration by repeatedly warning Congress over the summer of the danger of American military involvement in Syria. Last April, after an optimistic assessment of rebel progress by the secretary of state, John Kerry, in front of the House Foreign Affairs Committee, Dempsey told the Senate Armed Services Committee that ‘there’s a risk that this conflict has become stalemated.’

Dempsey’s initial view after 21 August was that a US strike on Syria – under the assumption that the Assad government was responsible for the sarin attack – would be a military blunder, the former intelligence official said. The Porton Down report caused the joint chiefs to go to the president with a more serious worry: that the attack sought by the White House would be an unjustified act of aggression. It was the joint chiefs who led Obama to change course. The official White House explanation for the turnabout – the story the press corps told – was that the president, during a walk in the Rose Garden with Denis McDonough, his chief of staff, suddenly decided to seek approval for the strike from a bitterly divided Congress with which he’d been in conflict for years. The former Defense Department official told me that the White House provided a different explanation to members of the civilian leadership of the Pentagon: the bombing had been called off because there was intelligence ‘that the Middle East would go up in smoke’ if it was carried out.

The president’s decision to go to Congress was initially seen by senior aides in the White House, the former intelligence official said, as a replay of George W. Bush’s gambit in the autumn of 2002 before the invasion of Iraq: ‘When it became clear that there were no WMD in Iraq, Congress, which had endorsed the Iraqi war, and the White House both shared the blame and repeatedly cited faulty intelligence. If the current Congress were to vote to endorse the strike, the White House could again have it both ways – wallop Syria with a massive attack and validate the president’s red line commitment, while also being able to share the blame with Congress if it came out that the Syrian military wasn’t behind the attack.’ The turnabout came as a surprise even to the Democratic leadership in Congress. In September the Wall Street Journal reported that three days before his Rose Garden speech Obama had telephoned Nancy Pelosi, leader of the House Democrats, ‘to talk through the options’. She later told colleagues, according to the Journal, that she hadn’t asked the president to put the bombing to a congressional vote.

bama’s move for congressional approval quickly became a dead end. ‘Congress was not going to let this go by,’ the former intelligence official said. ‘Congress made it known that, unlike the authorisation for the Iraq war, there would be substantive hearings.’ At this point, there was a sense of desperation in the White House, the former intelligence official said. ‘And so out comes Plan B. Call off the bombing strike and Assad would agree to unilaterally sign the chemical warfare treaty and agree to the destruction of all of chemical weapons under UN supervision.’ At a press conference in London on 9 September, Kerry was still talking about intervention: ‘The risk of not acting is greater than the risk of acting.’ But when a reporter asked if there was anything Assad could do to stop the bombing, Kerry said: ‘Sure. He could turn over every single bit of his chemical weapons to the international community in the next week … But he isn’t about to do it, and it can’t be done, obviously.’ As the New York Times reported the next day, the Russian-brokered deal that emerged shortly afterwards had first been discussed by Obama and Putin in the summer of 2012. Although the strike plans were shelved, the administration didn’t change its public assessment of the justification for going to war. ‘There is zero tolerance at that level for the existence of error,’ the former intelligence official said of the senior officials in the White House. ‘They could not afford to say: “We were wrong.”’ (The DNI spokesperson said: ‘The Assad regime, and only the Assad regime, could have been responsible for the chemical weapons attack that took place on 21 August.’)

*The full extent of US co-operation with Turkey, Saudi Arabia and Qatar in assisting the rebel opposition in Syria has yet to come to light. The Obama administration has never publicly admitted to its role in creating what the CIA calls a ‘rat line’, a back channel highway into Syria. The rat line, authorised in early 2012, was used to funnel weapons and ammunition from Libya via southern Turkey and across the Syrian border to the opposition. Many of those in Syria who ultimately received the weapons were jihadists, some of them affiliated with al-Qaida. (The DNI spokesperson said: ‘The idea that the United States was providing weapons from Libya to anyone is false.’)

In January, the Senate Intelligence Committee released a report on the assault by a local militia in September 2012 on the American consulate and a nearby undercover CIA facility in Benghazi, which resulted in the death of the US ambassador, Christopher Stevens, and three others. The report’s criticism of the State Department for not providing adequate security at the consulate, and of the intelligence community for not alerting the US military to the presence of a CIA outpost in the area, received front-page coverage and revived animosities in Washington, with Republicans accusing Obama and Hillary Clinton of a cover-up. A highly classified annex to the report, not made public, described a secret agreement reached in early 2012 between the Obama and Erdoğan administrations. It pertained to the rat line. By the terms of the agreement, funding came from Turkey, as well as Saudi Arabia and Qatar; the CIA, with the support of MI6, was responsible for getting arms from Gaddafi’s arsenals into Syria. A number of front companies were set up in Libya, some under the cover of Australian entities. Retired American soldiers, who didn’t always know who was really employing them, were hired to manage procurement and shipping. The operation was run by David Petraeus, the CIA director who would soon resign when it became known he was having an affair with his biographer. (A spokesperson for Petraeus denied the operation ever took place.)

The operation had not been disclosed at the time it was set up to the congressional intelligence committees and the congressional leadership, as required by law since the 1970s. The involvement of MI6 enabled the CIA to evade the law by classifying the mission as a liaison operation. The former intelligence official explained that for years there has been a recognised exception in the law that permits the CIA not to report liaison activity to Congress, which would otherwise be owed a finding. (All proposed CIA covert operations must be described in a written document, known as a ‘finding’, submitted to the senior leadership of Congress for approval.) Distribution of the annex was limited to the staff aides who wrote the report and to the eight ranking members of Congress – the Democratic and Republican leaders of the House and Senate, and the Democratic and Republicans leaders on the House and Senate intelligence committees. This hardly constituted a genuine attempt at oversight: the eight leaders are not known to gather together to raise questions or discuss the secret information they receive.

The annex didn’t tell the whole story of what happened in Benghazi before the attack, nor did it explain why the American consulate was attacked. ‘The consulate’s only mission was to provide cover for the moving of arms,’ the former intelligence official, who has read the annex, said. ‘It had no real political role.’

Washington abruptly ended the CIA’s role in the transfer of arms from Libya after the attack on the consulate, but the rat line kept going. ‘The United States was no longer in control of what the Turks were relaying to the jihadists,’ the former intelligence official said. Within weeks, as many as forty portable surface-to-air missile launchers, commonly known as manpads, were in the hands of Syrian rebels. On 28 November 2012, Joby Warrick of the Washington Post reported that the previous day rebels near Aleppo had used what was almost certainly a manpad to shoot down a Syrian transport helicopter. ‘The Obama administration,’ Warrick wrote, ‘has steadfastly opposed arming Syrian opposition forces with such missiles, warning that the weapons could fall into the hands of terrorists and be used to shoot down commercial aircraft.’ Two Middle Eastern intelligence officials fingered Qatar as the source, and a former US intelligence analyst speculated that the manpads could have been obtained from Syrian military outposts overrun by the rebels. There was no indication that the rebels’ possession of manpads was likely the unintended consequence of a covert US programme that was no longer under US control.

By the end of 2012, it was believed throughout the American intelligence community that the rebels were losing the war. ‘Erdoğan was pissed,’ the former intelligence official said, ‘and felt he was left hanging on the vine. It was his money and the cut-off was seen as a betrayal.’ In spring 2013 US intelligence learned that the Turkish government – through elements of the MIT, its national intelligence agency, and the Gendarmerie, a militarised law-enforcement organisation – was working directly with al-Nusra and its allies to develop a chemical warfare capability. ‘The MIT was running the political liaison with the rebels, and the Gendarmerie handled military logistics, on-the-scene advice and training – including training in chemical warfare,’ the former intelligence official said. ‘Stepping up Turkey’s role in spring 2013 was seen as the key to its problems there. Erdoğan knew that if he stopped his support of the jihadists it would be all over. The Saudis could not support the war because of logistics – the distances involved and the difficulty of moving weapons and supplies. Erdoğan’s hope was to instigate an event that would force the US to cross the red line. But Obama didn’t respond in March and April.’

There was no public sign of discord when Erdoğan and Obama met on 16 May 2013 at the White House. At a later press conference Obama said that they had agreed that Assad ‘needs to go’. Asked whether he thought Syria had crossed the red line, Obama acknowledged that there was evidence such weapons had been used, but added, ‘it is important for us to make sure that we’re able to get more specific information about what exactly is happening there.’ The red line was still intact.

The foreign policy expert told me that the account he heard originated with Donilon. (It was later corroborated by a former US official, who learned of it from a senior Turkish diplomat.) According to the expert, Erdoğan had sought the meeting to demonstrate to Obama that the red line had been crossed, and had brought Fidan along to state the case. When Erdoğan tried to draw Fidan into the conversation, and Fidan began speaking, Obama cut him off and said: ‘We know.’ Erdoğan tried to bring Fidan in a second time, and Obama again cut him off and said: ‘We know.’ At that point, an exasperated Erdoğan said, ‘But your red line has been crossed!’ and, the expert told me, ‘Donilon said Erdoğan “fucking waved his finger at the president inside the White House”.’ Obama then pointed at Fidan and said: ‘We know what you’re doing with the radicals in Syria.’ (Donilon, who joined the Council on Foreign Relations last July, didn’t respond to questions about this story. The Turkish Foreign Ministry didn’t respond to questions about the dinner. A spokesperson for the National Security Council confirmed that the dinner took place and provided a photograph showing Obama, Kerry, Donilon, Erdoğan, Fidan and Davutoğlu sitting at a table. ‘Beyond that,’ she said, ‘I’m not going to read out the details of their discussions.’)

But Erdoğan did not leave empty handed. Obama was still permitting Turkey to continue to exploit a loophole in a presidential executive order prohibiting the export of gold to Iran, part of the US sanctions regime against the country. In March 2012, responding to sanctions of Iranian banks by the EU, the SWIFT electronic payment system, which facilitates cross-border payments, expelled dozens of Iranian financial institutions, severely restricting the country’s ability to conduct international trade. The US followed with the executive order in July, but left what came to be known as a ‘golden loophole’: gold shipments to private Iranian entities could continue. Turkey is a major purchaser of Iranian oil and gas, and it took advantage of the loophole by depositing its energy payments in Turkish lira in an Iranian account in Turkey; these funds were then used to purchase Turkish gold for export to confederates in Iran. Gold to the value of $13 billion reportedly entered Iran in this way between March 2012 and July 2013.

The programme quickly became a cash cow for corrupt politicians and traders in Turkey, Iran and the United Arab Emirates. ‘The middlemen did what they always do,’ the former intelligence official said. ‘Take 15 per cent. The CIA had estimated that there was as much as two billion dollars in skim. Gold and Turkish lira were sticking to fingers.’ The illicit skimming flared into a public ‘gas for gold’ scandal in Turkey in December, and resulted in charges against two dozen people, including prominent businessmen and relatives of government officials, as well as the resignations of three ministers, one of whom called for Erdoğan to resign. The chief executive of a Turkish state-controlled bank that was in the middle of the scandal insisted that more than $4.5 million in cash found by police in shoeboxes during a search of his home was for charitable donations.

Late last year Jonathan Schanzer and Mark Dubowitz reported in Foreign Policy that the Obama administration closed the golden loophole in January 2013, but ‘lobbied to make sure the legislation … did not take effect for six months’. They speculated that the administration wanted to use the delay as an incentive to bring Iran to the bargaining table over its nuclear programme, or to placate its Turkish ally in the Syrian civil war. The delay permitted Iran to ‘accrue billions of dollars more in gold, further undermining the sanctions regime’.*

The American decision to end CIA support of the weapons shipments into Syria left Erdoğan exposed politically and militarily. ‘One of the issues at that May summit was the fact that Turkey is the only avenue to supply the rebels in Syria,’ the former intelligence official said. ‘It can’t come through Jordan because the terrain in the south is wide open and the Syrians are all over it. And it can’t come through the valleys and hills of Lebanon – you can’t be sure who you’d meet on the other side.’ Without US military support for the rebels, the former intelligence official said, ‘Erdoğan’s dream of having a client state in Syria is evaporating and he thinks we’re the reason why. When Syria wins the war, he knows the rebels are just as likely to turn on him – where else can they go? So now he will have thousands of radicals in his backyard.’

A US intelligence consultant told me that a few weeks before 21 August he saw a highly classified briefing prepared for Dempsey and the defense secretary, Chuck Hagel, which described ‘the acute anxiety’ of the Erdoğan administration about the rebels’ dwindling prospects. The analysis warned that the Turkish leadership had expressed ‘the need to do something that would precipitate a US military response’. By late summer, the Syrian army still had the advantage over the rebels, the former intelligence official said, and only American air power could turn the tide. In the autumn, the former intelligence official went on, the US intelligence analysts who kept working on the events of 21 August ‘sensed that Syria had not done the gas attack. But the 500 pound gorilla was, how did it happen? The immediate suspect was the Turks, because they had all the pieces to make it happen.’

As intercepts and other data related to the 21 August attacks were gathered, the intelligence community saw evidence to support its suspicions. ‘We now know it was a covert action planned by Erdoğan’s people to push Obama over the red line,’ the former intelligence official said. ‘They had to escalate to a gas attack in or near Damascus when the UN inspectors’ – who arrived in Damascus on 18 August to investigate the earlier use of gas – ‘were there. The deal was to do something spectacular. Our senior military officers have been told by the DIA and other intelligence assets that the sarin was supplied through Turkey – that it could only have gotten there with Turkish support. The Turks also provided the training in producing the sarin and handling it.’ Much of the support for that assessment came from the Turks themselves, via intercepted conversations in the immediate aftermath of the attack. ‘Principal evidence came from the Turkish post-attack joy and back-slapping in numerous intercepts. Operations are always so super-secret in the planning but that all flies out the window when it comes to crowing afterwards. There is no greater vulnerability than in the perpetrators claiming credit for success.’ Erdoğan’s problems in Syria would soon be over: ‘Off goes the gas and Obama will say red line and America is going to attack Syria, or at least that was the idea. But it did not work out that way.’

The post-attack intelligence on Turkey did not make its way to the White House. ‘Nobody wants to talk about all this,’ the former intelligence official told me. ‘There is great reluctance to contradict the president, although no all-source intelligence community analysis supported his leap to convict. There has not been one single piece of additional evidence of Syrian involvement in the sarin attack produced by the White House since the bombing raid was called off. My government can’t say anything because we have acted so irresponsibly. And since we blamed Assad, we can’t go back and blame Erdoğan.’

Barring a major change in policy by Obama, Turkey’s meddling in the Syrian civil war is likely to go on. ‘I asked my colleagues if there was any way to stop Erdoğan’s continued support for the rebels, especially now that it’s going so wrong,’ the former intelligence official told me. ‘The answer was: “We’re screwed.” We could go public if it was somebody other than Erdoğan, but Turkey is a special case. They’re a Nato ally. The Turks don’t trust the West. They can’t live with us if we take any active role against Turkish interests. If we went public with what we know about Erdoğan’s role with the gas, it’d be disastrous. The Turks would say: “We hate you for telling us what we can and can’t do.”’

4 April

https://www.lrb.co.uk/v36/n08/seymour-m-hersh/the-red-line-and-the-rat-line

Ghouta chemical attack

From Wikipedia, the free encyclopedia
Ghouta chemical attack
Part of the Syrian Civil War
Ghouta massacre1.JPG

Some of the victims of the Ghouta chemical attack
Location Ghouta, Syria
Coordinates Eastern Ghouta: within 750 meters (2,460 ft) from[1]
33.5238301°N 36.3566995°E
Western Ghouta: within 500 meters (1,600 ft) from[1]
33.4602966°N 36.1972287°E
Date 21 August 2013[2]
Attack type
Chemical attack
Deaths Various estimates:
at least 281 (French intelligence)[3]
at least 350 (UK intelligence)[4]
355 (MSF)[5]
494 (Damascus Media Office)[6]
502 (SOHR)[7]
635 (SRGC)[8]
923 (VDC)[9]
1,300 (SNC)[10]
1,338 (LCC)[11]
1,429 (United States)[12][13]
1,729 (FSA)[14]
Non-fatal injuries
3,600 patients displaying neurotoxic symptoms in 3 hospitals supported by MSF[5]
Perpetrators Unknown

The Ghouta chemical attack occurred in Ghouta, Syria, during the Syrian Civil War in the early hours of 21 August 2013. Two opposition-controlled areas in the suburbs around Damascus, Syria were struck by rockets containing the chemical agent sarin. Estimates of the death toll range from at least 281 people[3] to 1,729.[14] The attack was the deadliest use of chemical weapons since the Iran–Iraq War.[15][16][17]

Inspectors from the United Nations Mission already in Syria to investigate an earlier alleged chemical weapons attack,[18](p6)[19] requested access to sites in Ghouta the day after the attack,[20][21][22][22][23][24] and called for a ceasefire to allow inspectors to visit the Ghouta sites.[20] The Syrian government granted the UN’s request on 25 August,[25][26][27] and inspectors visited and investigated Moadamiyah in Western Ghouta the next day, and Zamalka and Ein Tarma in Eastern Ghouta on 28 and 29 August.[18](p6)[28][29]

The UN investigation team confirmed “clear and convincing evidence” of the use of sarin delivered by surface-to-surface rockets,[18][30] and a 2014 report by the UN Human Rights Council found that “significant quantities of sarin were used in a well-planned indiscriminate attack targeting civilian-inhabited areas, causing mass casualties. The evidence available concerning the nature, quality and quantity of the agents used on 21 August indicated that the perpetrators likely had access to the chemical weapons stockpile of the Syrian military, as well as the expertise and equipment necessary to manipulate safely large amount of chemical agents.”[31] It also stated that the chemical agents used in the Khan al-Assal chemical attack “bore the same unique hallmarks as those used in Al-Ghouta.”[32][31][33]

The Syrian opposition,[34] as well as many governments, the Arab League and the European Union[35][36][37] stated the attack was carried out by forces of Syrian President Bashar al-Assad.[38] The Syrian and Russian governments blamed the opposition for the attack,[34] the Russian government calling the attack a false flag operation by the opposition to draw foreign powers into the civil war on the rebels’ side.[39]Åke Sellström, the leader of the UN Mission, characterized government explanations of rebel chemical weapons acquisition as unconvincing, resting in part upon “poor theories.”[40]

Several countries including France, the United Kingdom, and the United States debated whether to intervene militarily against Syrian government forces.[41][42][43][44] On 6 September 2013, the United States Senate filed a resolution to authorize use of military force against the Syrian military in response to the Ghouta attack.[45] On 10 September 2013, the military intervention was averted when the Syrian government accepted a US–Russian negotiated deal to turn over “every single bit” of its chemical weapons stockpiles for destruction and declared its intention to join the Chemical Weapons Convention.[46][47]

Background

The Ghouta area is composed of densely populated suburbs to the east and south of Damascus, part of the province of Rif Dimashq.[48] Ghouta is a primarily conservative Sunni region.[49] Since early in the civil war, civilians in rebel-held Eastern Ghouta have almost entirely sided with the opposition to Syria’s government.[50][51] The opposition has controlled much of Eastern Ghouta since 2012, partly cutting off Damascus from the countryside.[48]Muadamiyat al-Sham in Western Ghouta had been under government siege since April 2013.[52] Ghouta had been the scene of continuing clashes for more than a year before the chemical attack, with government forces launching repeated missile assaults trying to dislodge the rebels. The week of the attack, the Syrian government launched an offensive to capture opposition-held Damascus suburbs.[51]

The attack came one year and one day after US President Barack Obama‘s 20 August 2012 “red line” remarks, in which he warned: “We have been very clear to the Assad regime, but also to other players on the ground, that a red line for us is we start seeing a whole bunch of chemical weapons moving around or being utilized. That would change my calculus. That would change my equation.”[53][54][55] Syria was one of five non-signatories to the 1997 Chemical Weapons Convention at the time. After the “red line” remarks, and before the chemical attack in Ghouta, chemical weapons were suspected to have been used in four attacks in the country.[56]

Khan al-Assal chemical attack

The Khan al-Assal chemical attack occurred on 19 March 2013, when a government-controlled area of Khan al-Asal, a district of Aleppo in northern Syria, was struck by a rocket containing the nerve agent sarin. According to the Syrian Observatory for Human Rights the attack resulted in at least 26 fatalities, including 16 government soldiers and 10 civilians.[57] The Syrian government later reported to the United Nations that one soldier and 19 civilians died and that 17 soldiers and 107 civilians were injured.[2](p32) A medic at the local civilian hospital said he personally had witnessed Syrian army soldiers helping the wounded and dealing with fatalities at the scene.[58]

The sarin used in the Khan al-Assal attack “bore the same unique hallmarks” as the sarin used in the Ghouta attack.[32][31](p19)

Independent International Commission of Inquiry

The United Nations Human Rights Council established the Independent International Commission of Inquiry on the Syrian Arab Republic on 22 August 2011 to investigate human rights violations during the Syrian civil war. One of the topics the commission investigated was possible use of chemical weapons. In early June 2013, the Fifth Report of the Commission of Inquiry stated that there were reasonable grounds to believe that limited amounts of toxic chemicals were used in four attacks, but more evidence was needed “to determine the precise chemical agents used, their delivery systems or the perpetrator.”[59](p21)[60][61] On 22 June, the head of the Commission of Inquiry, Paulo Pinheiro, said the UN could not determine who used chemical weapons in Syria based on evidence sent by the United States, Britain and France.[62]

Assessments prior to the attack

US assessment

US Secretary of Defense Chuck Hagel stated on 25 April that US intelligence showed the Assad government had likely used sarin on a small scale.[63] However, the White House announced that “much more” work had to be done to verify the intelligence assessments.[64]

On 13 June 2013, the United States government publicly announced it had concluded that the Assad government had used limited amounts of chemical weapons on multiple occasions against rebel forces, killing 100 to 150 people. US officials stated that sarin was the agent used.[65] Deputy National Security Advisor Ben Rhodes did not say whether this showed that Syria had crossed the “red line” established by President Obama in August 2012. Rhodes stated: “The president has said that the use of chemical weapons would change his calculus, and it has.”[66] The French government announced that its own tests confirmed US assertions.[67]

Russian assessment

Russian Foreign Minister Sergei Lavrov said “the accusations of Damascus using chemical weapons put forth by the USA are not backed by credible facts.”[68] Lavrov further stated that the Syrian government had no motive to use chemical weapons since the government already maintained a military advantage over the rebel fighters.[69]

Attacks

The attacks affected two separate opposition-controlled districts in the Damascus suburbs, located 16 kilometres apart.[1](p1)

Eastern Ghouta attack

The first attack took place around 2:30 a.m. on 21 August 2013[70][71] in Eastern Ghouta, a rebel-held suburb to the east of Damascus.[72] The area was on a rebel weapons supply route from Jordan and had been under siege by the Syrian military and Hezbollah for months.[73][74]

At least 8, and possibly 12, rockets struck within a 1500 by 500 meter area in the Zamalka and nearby Ein Tarma neighborhoods.[note 1] The rockets were all of the same improvised type, each with an estimated capacity to carry 50–60 liters (11–13 imp gal; 13–16 U.S. gal) of sarin.[1](p9)[18](p24) The rocket engine was similar in type and parameters to a 122 mm GRAD unguided surface-to-surface rocket, while the chemical warhead and the stabilization fin was of an artisan-type.[1][75] One (or both) of the labs examining the environmental samples taken from Zamalka (and Ein Tarma[18](pp28–29)) found at least traces of sarin in 14 of the 17 cases.[2](pp45–49) One of the labs described the sarin level as a “high level concentration” in 4 of the 17 samples.[2](pp45–49)

Western Ghouta attack

The second attack took place in the Western Ghouta area around 5:00 in the morning on 21 August. On 22 August, a witness who works for Moadamiya media center said he had counted seven rockets that fell in two areas of Moadamiya during the early morning of 21 August. He said four rockets hit next to the Rawda Mosque and another three in the area between Qahweh Street and Zeytouneh Street, which he said was approximately 500 meters to the east of the Rawda Mosque. He said all the rockets were of the same type.[1]

While no chemical warhead was ever found in the Western Ghouta area, one rocket engine has been identified as a 140mm M-14 unguided surface-to-surface rocket. This type of rocket can be fitted with three types of warheads: high explosive-fragmentation, white phosphorus smoke, or a chemical warhead containing 2 liters (0.44 imp gal; 0.53 U.S. gal) of sarin.[1](p5) None of the 13 environmental samples taken from Western Ghouta tested positive for sarin, although three had “degradation and/or by-products.”[2](pp43–45)

Chemical weapons capability

At the time of the attack, Syria was not a party to the Chemical Weapons Convention,[76] which prohibits the development, production, stockpiling, transfer and use of chemical weapons, although in 1968 it acceded to the 1925 Geneva Protocol for the Prohibition of the Use in War of Asphyxiating, Poisonous or Other Gases. In 2012 Syria publicly stated it possessed chemical and biological weapons and would use them if it faced a foreign attack.[77]

According to French intelligence, the Syrian Scientific Studies and Research Center (SSRC) is responsible for producing toxic agents for use in war. A group named “Branch 450” is allegedly responsible for filling munitions with chemicals and maintaining security of the chemical agent stockpiles.[78] As of September 2013, French intelligence estimated the Syrian stockpile at 1,000 tonnes, including Yperite, VX and “several hundred tonnes of sarin.”[78]

The UK’s Joint Intelligence Committee publicly dismissed the possibility of rebel responsibility for the attack in Ghouta, stating that rebels are incapable of an attack of its scale.[79] The Committee stated that “there is no credible intelligence or evidence to substantiate the claims or the possession of CW by the opposition.”[80]

Åke Sellström, a Swedish scientist who led the UN mission to investigate the attacks, said it was difficult to see how rebels could have weaponized the toxins,[81] but admitted that he didn’t know who the perpetrator was.[40]According to the Associated Press, “chemical and biological weapons experts have been relatively consistent in their analysis, saying only a military force with access to and knowledge of missile delivery systems and the sarin gas suspected in Ghouta could have carried out an attack capable of killing hundreds of people.”[82]

Initial claims

Both the opposition and the Syrian government said a chemical attack was carried out in the suburbs around Damascus on 21 August 2013. Anti-government activists said the Syrian government was to blame for the attack, while the Syrian government said foreign fighters and their international backers were to blame.[71][83]

Opposition claims

On the day of the attack, George Sabra, the head of the Syrian National Council, said 1,300 people had been killed as shells loaded with poisonous gas rained down on the capital’s eastern suburbs of Douma, Jobar, Zamalka, Arbeen and Ein Tarma.[84] A spokesman for the Free Syrian Army’s Supreme Military Council, Qassim Saadeddine, said, “people are growing desperate as they watch another round of political statements and UN meetings without any hope of action.”[72]Ahmad Jarba, who was the president of the Syrian National Coalition at the time of the attack, called on the UN investigators to travel to “the site of the massacre” and for an urgent United Nations Security Council meeting on the subject.[10] The Syrian Observatory for Human Rights said the attack was committed by the Syrian regime and called on Ban Ki-moon, Secretary-General of the United Nations, “to apply all pressure within his powers to pressure the Syrian regime.”[85][86]

The next day, a spokesman for the Syrian National Coalition, Khaled al-Saleh, said at least six doctors died after treating victims, and that they didn’t yet have the number of dead first responders.[87]

Government claims

Syria’s Deputy Prime Minister for Economic Affairs, Qadri Jamil, said foreign fighters and their international backers were to blame for the attack.[83] Syrian state television, SANA, said the accusations were fabricated to distract a team of UN chemical weapons experts which had arrived three days before the attacks.[6] Syrian President Bashar al-Assad said the claims that his government had used chemical weapons would go against elementary logic and that “accusations of this kind are entirely political.”[88][89]

UN investigation

On 19 March 2013, the Syrian government reported to the UN Security Council that the rebels had fired a rocket containing chemical materials into a government controlled part of Khan al-Asal, a district of Aleppo in northern Syria,[90] and requested a UN mission to investigate it.[91][92] As a response, the UN Secretary-General Ban Ki-moon created the “United Nations Mission to Investigate Alleged Uses of Chemical Weapons in the Syrian Arab Republic.”[92][93] The Syrian government first refused to allow the UN mission to be expanded to places outside Khan al-Assal,[94] but agreed in July 2013 to also allow investigation of the alleged attack in Sheikh Maqsood on 13 April 2013 and the alleged attack in Saraqib on 29 April 2013.[95][2](p7)

On 23 April 2013, the New York Times reported that the British and French governments had sent a confidential letter to the UN Secretary-General, stating there was evidence that the Syrian government had used chemical weapons in Aleppo, Homs and perhaps Damascus. Israel also claimed that the Syrian government had used chemical weapons on 19 March near Aleppo and Damascus.[96] On 24 April, Syria blocked UN investigators from entering Syria, while UN Under-Secretary for Political Affairs Jeffrey Feltman said this would not prevent an inquiry from being carried out.[97]

On 18 August 2013, three days before the Ghouta attack, a UN mission headed by Åke Sellström[18] arrived in Damascus with permission from the Syrian government to investigate earlier alleged chemical weapons use.[98] On the day of the attack, UN Secretary-General Ban Ki-moon expressed “the need to investigate [the Ghouta incident as] soon as possible,” hoping for consent from the Syrian government.[98] The next day, UN High Commissioner for Human Rights Navi Pillay urged government and opposition forces to allow an investigation[99] and Ban requested the government provide immediate access.[25][100] On 23 August, clashes between rebel and government forces continued in and around Ghouta, government shelling continued and UN inspectors were denied access for a second day.[22][24]White House officials were convinced that the Syrian government was trying to hide the evidence of chemical weapons use by shelling the sites and delaying their inspection.[25] Ban called for a ceasefire to allow the inspectors to visit the attack sites.[20] On 25 August the government and various rebel factions agreed to a ceasefire for five hours each day from 26 to 29 August.[101][102]

Early in the morning of 26 August several mortars hit central Damascus, including one that fell near the Four Seasons Hotel where the UN inspectors were staying.[103] Later in the day the UN team came under sniper fire en route to Moadamiyah in western Ghouta (to the southwest of central Damascus), forcing them to return to their hotel and replace one of their vehicles before continuing their investigation four hours later.[104][105] The attack prompted a rebuke from Ban toward the fighters.[106][107] After returning to Moadamiyah the UN team visited clinics and makeshift field hospitals, collected samples and conducted interviews with witnesses, survivors and doctors.[104] The inspectors spoke with 20 victims of the attacks and took blood and hair samples, soil samples, and samples from domestic animals.[107] As a result of the delay caused by the sniper attack, the team’s time in Moadamiyah was substantially shortened, with the scheduled expiry of the daily cease-fire leaving them around 90 minutes on the ground.[102][107][108]

On 28 and 29 August the UN team visited Zamalka and Ein Tarma in Eastern Ghouta, east of central Damascus, for a total time of five-and-a-half hours.[18](p6) On 30 August the team visited a Syrian government military hospital in Mazzeh and collected samples.[109] The mission left Syria early on August 31,[110] promising to return to complete the original objective to investigate the previously alleged attack sites. The Syrian government wanted the mission to stay and investigate them at that time.[111]

UN Ghouta Area report

The UN report on the investigation into the Ghouta chemical attacks was published on 16 September 2013. The report stated: “the environmental, chemical and medical samples we have collected provide clear and convincing evidence that surface-to-surface rockets containing the nerve agent sarin were used in Ein Tarma, Moadamiyah and Zamalka in the Ghouta area of Damascus.”[18](p8)[30] UN Secretary-General Ban Ki-moon called the findings “beyond doubt and beyond the pale,” and clear evidence of a war crime. “The results are overwhelming and indisputable,” he said. Ban stated a majority of the blood samples, environmental samples and rockets or rocket fragments recovered tested positive for sarin.[112] The report, which was “careful not to blame either side,” said that during the mission’s work in areas under rebel control, “individuals arrived carrying other suspected munitions indicating that such potential evidence is being moved and possibly manipulated.”[113] The UN investigators were accompanied by a rebel leader:

A leader of the local opposition forces … was identified and requested to take ‘custody’ of the Mission … to ensure the security and movement of the Mission, to facilitate the access to the most critical cases/witnesses to be interviewed and sampled by the Mission and to control patients and crowd in order for the Mission to focus on its main activities.[18](p13)

The British UN Ambassador stated that the report’s lead author, Åke Sellström, said the quality of the sarin used in the attack was higher than that used by Iraq in the Iran-Iraq war,[114] implying a purity higher than the Iraqi chemical weapons program‘s low purity of 45–60%.[115] (By comparison, Aum Shinrikyo used nearly pure sarin in the 1994 Matsumoto incident.[116])

Responses

According to Human Rights Watch, hundreds of kilograms of sarin were used in the attack, which it said suggested government responsibility, as opposition forces were not known to possess significant amounts of sarin.[117]

The Russian government dismissed the initial UN report after it was released, calling it “one-sided” and “distorted.”[118] On 17 September, Russian Foreign Minister Sergei Lavrov reiterated his government’s belief that the opposition carried out the attacks as a “provocation.”[119] The United Nations High Representative for Disarmament Affairs Angela Kane said the inspection team would review Russia’s objections.[111]

An August 2013 Scientific American article described difficulties that could arise when attempting to identify the manufacturer of sarin from soil or tissue samples.[120]

An Iranian chemical weapons expert, Abbas Foroutan, said in October 2013 that the UN should publish more details about the investigation than were provided in the report, including victims’ pulse rates and blood pressure and their response to the atropine treatment, the victims’ levels of acetylcholinesterase (sarin is an acetylcholinesterase inhibitor) and more technical details on the lab testing process.[121][122]

Final UN Mission report

The UN inspection team returned to Syria to continue investigations into other alleged chemical attacks in late September 2013. A final report on Ghouta and six other alleged attacks (including three alleged to have occurred after the Ghouta attack) was released in December 2013.[111] The inspectors wrote that they “collected clear and convincing evidence that chemical weapons were used also against civilians, including children, on a relatively large scale in the Ghouta area of Damascus on 21 August 2013.” The conclusion was based on:

  • Impacted and exploded surface-to-surface rockets, capable to carry a chemical payload, were found to contain sarin;
  • Close to the rocket impact sites, in the area where patients were affected, the environment was found to be contaminated by sarin;
  • The epidemiology of over fifty interviews given by survivors and health care workers provided ample corroboration of the medical and scientific results;
  • A number of patients/survivors were clearly diagnosed as intoxicated by an organophosphorous compound;
  • Blood and urine samples from the same patients were found positive for sarin and sarin signatures.[2](p19)

UN Human Rights Council report

The 7th Report of the Independent International Commission of Inquiry on the Syrian Arab Republic, a different group than the UN fact-finding mission, stated the sarin used in the Ghouta attack bore the “same unique hallmarks” as the sarin used in the Khan al-Assal attack. The report, dated 12 February 2014, also indicated that the perpetrators likely had access to the chemical weapons stockpile of the Syrian military. These conclusions were based on the fact-finding mission’s evidence, as the Commission of Inquiry did not conduct its own investigation of either chemical attack.[31]

Aftermath

The continuous fighting has severely limited the quality of medical care for injured survivors of the attack. A month after the attack, approximately 450 survivors still required medical attention for lingering symptoms such as respiratory and vision problems.[123] By early October 2013, the 13,000 residents of Moadhamiya, one of the places targeted in the August attack, had been surrounded by pro-government forces and under siege for five months. Severe malnourishment and medical emergencies become pressing as all supply lines had stopped.[124] Care for chronic symptoms of sarin exposure had become “just one among a sea of concerns.”[123]

As countries such as the United States and the United Kingdom debated their response to the attacks, they encountered significant popular and legislative resistance to military intervention. In particular, British Prime Minister David Cameron’s request to the House of Commons to use military force was declined by a 285–272 margin.[125][126] UK government policy subsequently focused on providing humanitarian assistance inside Syria and to refugees in neighboring countries.[127]

Within a month of the attacks, Syria agreed to join the Chemical Weapons Convention and allow all its stockpiles to be destroyed.[128]The destruction began under OPCW supervision on 6 October 2013.[129] On 23 June 2014, the last shipment of Syria’s declared chemical weapons was shipped out of the country for destruction.[130] By 18 August 2014, all toxic chemicals were destroyed aboard the US naval vessel MV Cape Ray.[131]

Nine months after the attack, there is evidence that mothers from the affected areas are giving birth to children with defects and as stillborn.[132][133]

Evidence

Witness statements and victim symptoms

Syrian human rights lawyer Razan Zaitouneh, who was present in Eastern Ghouta, stated, “Hours [after the shelling], we started to visit the medical points in Ghouta to where injured were removed, and we couldn’t believe our eyes. I haven’t seen such death in my whole life. People were lying on the ground in hallways, on roadsides, in hundreds.”[134] Several medics working in Ghouta reported the administration of large quantities of atropine, a common antidote for nerve agent toxicity, to treat victims.[135][136]

Doctors Without Borders said the three hospitals it supports in Eastern Ghouta reported receiving roughly 3,600 patients with “neurotoxic symptoms” over less than three hours during the early morning of 21 August. Of those, 355 died.[137] The Local Coordination Committees of Syria claimed that of the 1,338 victims, 1,000 were in Zamalka, of which 600 bodies were transferred to medical points in other towns and 400 remained at a Zamalka medical center.[11] Some of the fatalities were rebel fighters.[138] The deadliness of the attack is believed to have been increased due to civilians reacting to the chemical attack as if it was typical government bombardment. For conventional artillery and rocket attacks, residents usually went to the basements of buildings, where in this case the heavier-than-air sarin sank into these below-ground, poorly ventilated areas.[139] Some of the victims died while sleeping.[72]

Abu Omar of the Free Syrian Army told The Guardian that the rockets involved in the attack were unusual because “you could hear the sound of the rocket in the air but you could not hear any sound of explosion” and no obvious damage to buildings occurred.[140] Human Rights Watch’s witnesses reported “symptoms and delivery methods consistent with the use of chemical nerve agents.”[19] Activists and local residents contacted by The Guardian said that “the remains of 20 rockets [thought to have been carrying neurotoxic gas] were found in the affected areas. Many [remained] mostly intact, suggesting that they did not detonate on impact and potentially dispersed gas before hitting the ground.”[141]

Child frothing at the mouth.

A child in Ghouta froths from the mouth, a medical condition “associated with exposure to nerve agents such as Sarin.”[142][143]

Doctors Without Borders also reported seeing a “large number of victims arriving with symptoms including convulsions, excessive saliva, pinpoint pupils, blurred vision and respiratory distress.”[144] Symptoms reported by Ghouta residents and doctors to Human Rights Watch included “suffocation, muscle spasms and frothing at the mouth.”[19]

Witness statements to The Guardian about symptoms included “people who were sleeping in their homes [who] died in their beds,” headaches and nausea, “foam coming out of [victims’] mouths and noses,” a “smell something like vinegar and rotten eggs,” suffocation, “bodies [that] were turning blue,” a “smell like cooking gas” and redness and itching of the eyes.[140]Richard Spencer of The Telegraph summarised witness statements, stating, “The poison … may have killed hundreds, but it has left twitching, fainting, confused but compelling survivors.”[145]

On 22 August, the Center for Documentation of Violations in Syria published numerous testimonies. It summarised doctors’ and paramedics’ descriptions of the symptoms as “vomiting, foamy salivation, severe agitation, [pinpoint] pupils, redness of the eyes, dyspnea, neurological convulsions, respiratory and heart failure, blood out of the nose and mouth and, in some cases, hallucinations and memory loss”.[146]

Analysis of symptoms

Dr. Amesh Adalja, a senior associate for the Center for Biosecurity at the University of Pittsburgh Medical Center, said the reported symptoms are a textbook case of nerve-agent poisoning.[144]

Médecins Sans Frontières Director of Operations Bart Janssens stated that MSF “can neither scientifically confirm the cause of these symptoms nor establish who is responsible for the attack. However, the reported symptoms of the patients, in addition to the epidemiological pattern of the events – characterised by the massive influx of patients in a short period of time, the origin of the patients, and the contamination of medical and first aid workers – strongly indicate mass exposure to a neurotoxic agent.”[5]

Gwyn Winfield, Editorial Director at CBRNe World, analysed some videos from the day of the attack and wrote on the magazine’s website: “It is difficult to define [an] agent by the signs and symptoms. Clearly respiratory distress, some nerve spasms and a half hearted washdown (involving water and bare hands?!), but it could equally be a riot control agent as a [chemical warfare agent].”[147]

Rockets

A RPU-14 multiple rocket launcher, of a type that may have launched M-14 munitions found by UN inspectors on 26 August at a site in Moadamiyah.[148]

Human Rights Watch reported that two types of rockets were used: in Western Ghouta, a 140mm rocket made in the Soviet Union in 1967 and exported to Syria;[1](p5) and in Eastern Ghouta, a 330mm rocket of unknown origin.[1](p9) HRW also reported that at the time of the attack, Syrian rebels were not known to be in possession of the rockets used.[1](p20)[149]

Seymour Hersh has suggested that the 330mm rockets may have been produced locally, and with a limited range.[150] Blogger Eliot Higgins has looked at the munitions linked to the attack and analysed footage of the putative launchers inside government territory.[151]

According to a study published in January 2014 by Theodore Postol and Richard Lloyd, of the Massachusetts Institute of Technology, the rockets used in the attack had a range of about two kilometers, indicating the munitions could not have been fired from the ‘heart’ or from the Eastern edge of the Syrian Government Controlled Area shown in the Intelligence Map published by the White House on 30 August 2013.[75][152][153] A response from Higgins and Kaszeta included an observation that the Russian-language news site ANNA News had posted videos showing a Syrian government military operation running from June to August 2013 to clear positions between Jobar and Qaboun, a strip of land about 2 km away from the 21 August impact sites.[154] MIT Professor Theodore Postol contacted Dan Kaszeta and asked him how he came to the conclusion that Hexamine was the “smoking gun” regarding the alleged culpability of the Syrian Government. Åke Sellström told Postol that indeed “the presence of hexamine may mean that this substance was used as scavenger for protons when producing sarin” but that it was a common substance and not conclusive evidence implicating the Syrian government.[155]

Many of the munitions and their fragments had been moved; however, in two cases, the UN could identify the likely launch azimuths.[156] Triangulating rocket trajectories suggests that the origin of the attack may have been within government or rebel-held territory. Consideration of missile ranges influences calculations as to whether rockets originated from the government or rebel-held regions.[150][157]

Communications

Two purported intercepts of communications that appeared to implicate the Syrian government received prominent media coverage. One was a phone call allegedly between Syrian officials which Israel’s Unit 8200 was said to have intercepted and passed to the US.[158] The other was a phone call which the German Bundesnachrichtendienst said it had intercepted, between a high-ranking representative of Hezbollah and the Iranian embassy, in which the purported Hezbollah official said that poison gas had been used and that Assad’s order to attack with chemical weapons had been a strategic error.[159][160]

On 29 August the Associated Press reported that, according to two U.S. intelligence officials and two other U.S. officials, the U.S. intercept was a conversation between “low-level” Syrian officials with no direct link to the upper echelons of the government or military.[161]

The Bild am Sonntag newspaper subsequently reported that German intelligence indicated that Assad had likely not ordered the attacks.[162] According to Bild, “intelligence interception specialists” relying on communications intercepted by the German vessel Oker said that Syrian military commanders had repeatedly been asking permission to launch chemical attacks for around four months, with permission always being denied from the presidential palace. The sources concluded that 21 August attack had probably not been approved by Bashar al-Assad.[162][163][164]

Video

Murad Abu Bilal, Khaled Naddaf and other Center for Documentation of Violations in Syria and Local Coordination Committees of Syria (LCC) media staff went to Zamalka soon after the attacks to film and obtain other documentary evidence. Almost all the journalists died from inhalation of the neurotoxins, except Murad Abu Bilal, who was the only Zamalka LCC media member to survive.[165][166] The videos were published on YouTube, attracting worldwide media attention.[167]

Experts who have analysed the first video said it shows the strongest evidence yet consistent with the use of a lethal toxic agent. Visible symptoms reportedly included rolling eyes, foaming at the mouth, and tremors. There was at least one image of a child suffering miosis, the pin-point pupil effect associated with the nerve agent Sarin, a powerful neurotoxin reportedly used before in Syria. Ralph Trapp, a former scientist at the Organisation for the Prohibition of Chemical Weapons, said the footage showed what a chemical weapons attack on a civilian area would look like, and went on to note “This is one of the first videos I’ve seen from Syria where the numbers start to make sense. If you have a gas attack you would expect large numbers of people, children and adults, to be affected, particularly if it’s in a built-up area.”[167]

Some experts, among them Jean Pascal Zanders, initially stated that evidence that sarin was used, as claimed by pro-rebel sources, was still lacking and highlighted the lack of second-hand contaminations typically associated with use of weapons-grade nerve agents: “I remain sceptical that it was a nerve agent like sarin. I would have expected to see more convulsions,” he said. “The other thing that seems inconsistent with sarin is that, given the footage of first responders treating victims without proper protective equipment, you would expect to see considerable secondary casualties from contamination – which does not appear to be evident.” However, after Zanders saw footage imminently after the attack, he changed his mind, saying: “The video footage and pictures this time are of a far better quality. You can clearly see the typical signs of asphyxiation, including a pinkish blueish tinge to the skin colour. There is one image of an adult woman where you can see the tell-tale blackish mark around her mouth, all of which suggests death from asphyxiation.”[167] Zanders however cautioned that these symptoms covered a range of neurotoxicants, including some available for civilian use as pest control agents, and said that until the UN reported its analysis of samples, “I can’t make a judgement. I have to keep an open mind.”[168]

According to a report by The Daily Telegraph, “videos uploaded to YouTube by activists showed rows of motionless bodies and medics attending to patients apparently in the grip of seizures. In one piece of footage, a young boy appeared to be foaming at the mouth while convulsing.”[84]

Hamish de Bretton-Gordon, a former commander of British Chemical and Biological counterterrorism forces,[169] told BBC that the images were very similar to previous incidents he had witnessed, although he could not verify the footage.[170]

Foreign government assessments

According to public statements, intelligence agencies in Israel,[171] the United Kingdom,[172] the United States,[12] France,[173]Turkey,[174] and Germany[175] concluded that the Syrian government was most likely responsible for the attacks. Western intelligence agencies agreed that video evidence is consistent with the use of a nerve agent, such as sarin. Laboratory tests showed traces of sarin, in blood and hair samples collected from emergency workers who responded to the attacks.[176]

Russia said there was no evidence tying the Syrian government to the attack and that it was likely carried out by an opposition group.[177]

France

On 2 September, the French government published a nine-page intelligence report blaming the Syrian government for the Ghouta attacks.[3][78][178] An unnamed French government official said that the analysis was carried out by the Directorate-General for External Security (DGSE) and Direction du renseignement militaire (DRM) based on satellite and video images, on-the-ground sources, and samples collected from two April attacks.[179] The report said analysis of samples collected from attacks in Saraqeb and Jobar in April 2013 had confirmed the use of sarin.[78]

The Guardian reported that French intelligence had images that showed rocket attacks on opposition neighborhoods from government-controlled areas to the east and west of Damascus. The report said that the government later launched conventional bombing of those neighborhoods in order to destroy evidence of a chemical attack.[180] Based on analysis of 47 videos, the report said at least 281 fatalities occurred. Using other sources and extrapolation a chemical attack model estimated the total number of death at approximately 1,500.[3]

Germany

The Bundesnachrichtendienst said it intercepted a phone call between a Hezbollah official and the Iranian Embassy in which the Hezbollah representative criticised Assad’s decision to attack with poison gas, apparently confirming its use by the Syrian government.[159][160] German newspaper Der Spiegel reported on 3 September that BND President Gerhard Schindler told them that based on the agency’s evidence, Germany now shared the United Kingdom, United States, and France’s view that the attacks were carried out by the Syrian government. However, they also said the attack may have been much more potent than intended, speculating that there may have been an error in mixing the chemical weapons used.[181][182]

Israel

Without going into detail, Israeli Intelligence Minister Yuval Steinitz said on 22 August 2013 that Israel’s intelligence assessment was that the Syrian government used chemical weapons in the Damascus area.[171] Defense Minister Moshe Ya’alon said the Syrian government had already used chemical weapons against the rebels on a smaller scale multiple times prior to the Ghouta attacks.[183]Fox News reported that Unit 8200 helped provide intelligence to the United States, Israel’s closest international ally, implicating the Syrian government in the attacks.[184] Prime Minister Benjamin Netanyahu said at the General debate of the sixty-eighth session of the United Nations General Assembly that Syrian government used the chemical weapons against its own people.[185]

Russia

Russian officials said that there was no proof that the government of Syria had a hand in the chemical attacks. Russian Foreign Minister Sergei Lavrov described the American, British and French intelligence reports as “unconvincing”[186] and said at a joint news conference with his French counterpart Laurent Fabius after the release of the United Nations report in mid-September that he continued to believe the rebels carried out the attack.[177]Russian President Vladimir Putin said he wanted to see evidence that would make it “obvious” who used chemical weapons in Ghouta.[187]

In a commentary published in The New York Times on 11 September 2013, Putin wrote that “there is every reason to believe [poison gas] was used not by the Syrian Army, but by opposition forces, to provoke intervention by their powerful foreign patrons,”.[39] Lavrov said on 18 September that “new evidence” given to Russia by the Syrian government would be forthcoming.[188]

Turkey

The Turkish government-run Anadolu Agency published an unconfirmed report on 30 August 2013, pointing to the Syrian 155th Missile Brigade and the 4th Armored Division as the perpetrators of the two attacks. It said the attack had involved 15 to 20 missiles with chemical warheads at around 02:45 on 21 August, targeting residential areas between Douma and Zamalka in Eastern Ghouta. It claimed that the 155th Missile Brigade had used 9K52 Luna-M missiles, M600 missiles, or both, fired from Kufeyte, while other rockets with a 15- to 70-kilometer range were fired by the 4th Armored Division from Mount Qasioun. The agency did not explain its source.[189]

United Kingdom

A report on the attacks by the United Kingdom’s Joint Intelligence Committee (JIC) was published on 29 August 2013 prior to a vote on intervention by the House of Commons of the United Kingdom. The report said at least 350 people were killed and that it was “highly likely” that the attacks had been carried out by the Syrian government, resting in part on the firm view that the Syrian opposition was not capable of carrying out a chemical weapons attack on this scale, and on the JIC view that the Syrian government had used chemical weapons in the Syrian civil war on a small scale on 14 previous occasions.[4] Analysis of the Ghouta attacks themselves was based largely on reviewing video footage and publicly available witness evidence. The report conceded problems with motivation for the attacks, saying there was “no obvious political or military trigger for regime use of CW on an apparently larger scale now.”[79][190][191][192] British officials said they believe the Syrian military used chemical weapons, including the nerve agent sarin, on a small scale against the opposition on at least 14 times prior to the Ghouta attacks and described “a clear pattern of regime use” of the nerve agent since 2012.[193]

The report was met with substantial scepticism in the British media, with the Daily Mail explicitly comparing it with the “dodgy dossier” the UK government had published in 2003 prior to the Iraq War.[194] A vote in the House of Commons to approve UK participation in military action against Syria was narrowly rejected, with some MPs arguing that the case for Syrian government culpability was not sufficiently strong to justify approving action.[195][196]Prime Minister David Cameron himself had been forced to concede that “in the end there is no 100 percent certainty about who is responsible.”[197][198]

United States

The map of “Areas of Influence” and “Areas Reportedly affected by the 21 August Chemical Attack” that was published by the White House on 30 August 2013.[12]

A controversial “US government assessment of the Ghouta attacks” was published by the White House on 30 August 2013, with a longer classified version made available to members of Congress. The report blamed the chemical attacks on the Syrian government, saying rockets containing a nerve agent were fired from government-held territory into neighborhoods in the early morning, impacting at least 12 locations. It stated 1,429 people were killed, including at least 426 children. It dismissed the possibility that evidence supporting the US government’s conclusion could have been manufactured by the opposition, stating it “does not have the capability” to fabricate videos, eyewitness accounts, and other information. The report also said that the US believed Syrian officials directed the attacks, based on “intercepted communications.”[12] A major element, as reported by news media, was an intercepted telephone call between a Syrian Ministry of Defense official and a Syrian 155th Brigade chemical weapons unit commander in which the former demanded answers for the attacks.[199] According to some reports, this phone intercept was provided to the U.S. by Israeli Intelligence CorpsUnit 8200.[158]

The U.S. government assessment suggested a motive for the attack, describing it as “a desperate effort to push back rebels from several areas in the capital’s densely packed eastern suburbs.” The report then states that evidence suggests “the high civilian death toll surprised and panicked senior Syrian officials, who called off the attack and then tried to cover it up.”[200] Secretary of State John Kerry later announced that hair, blood, soil, and cloth samples collected from the attack sites had tested positive for sarin or its immediate breakdown products.[201][202]

At least three members of Congress, including at least one member of President Barack Obama‘s Democratic Party, expressed skepticism about the US intelligence report, calling the evidence circumstantial and thin.[203][204][205][206] Obama’s request that Congress authorize military force was not put to a vote of either the House of Representatives or the Senate, and the president ultimately admitted that “I wouldn’t say I’m confident” that he could convince Congress to support strikes against Syria.[207]

Democratic Party Representative Alan Grayson offered some details regarding the classified report, which he described as 12 pages long, and criticized both the four-page public summary and the classified report. Grayson said the unclassified summary relied on “intercepted telephone calls, ‘social media’ postings and the like, but not one of these is actually quoted or attached … (As to whether the classified summary is the same, I couldn’t possibly comment, but again, draw your own conclusion.)” Grayson cited as a problematic example the intercepted phone call between a Syrian Ministry of Defense official and the Syrian 155th Brigade, the transcript of which was not provided in the classified report, leaving Grayson unable to judge the accuracy of a report in The Daily Caller that the call’s implications had been misrepresented in the report.[205][206]

The AP quoted anonymous US intelligence officials as saying that the evidence presented in the report linking Assad to the attack was “not a slam dunk.”[161]Jeffrey Goldberg also reported that James Clapper, the Director of National Intelligence, personally told President Obama that the case for the Syrian government’s responsibility was strong but not a “slam dunk.”[208] The AP later characterized the evidence released by the administration as circumstantial and said the government had denied its requests for more direct evidence, including satellite imagery and communications intercepts cited in the government assessment.[209]

IPS news analyst Gareth Porter questioned why the report was released by the White House as a “government assessment” as opposed being released by the Office of the Director of National Intelligence as an “intelligence community assessment.” Porter quoted former intelligence officials who said the report was “evidently an administration document” and who also suggested evidence was “cherry-picked” to support the conclusion that the Syrian government carried out the attacks.[210]

On 8 September 2013, the then White House Chief-of-Staff, Denis McDonough said the administration lacks the “irrefutable, beyond-a-reasonable-doubt evidence”, but that a “common-sense test” implicates Assad.[211] The U.S. publicly stated there was no “reliable” evidence that the opposition had access to chemical weapons, although Seymour Hersh reported that U.S. intelligence agencies privately assessed some rebel factions to be capable of sarin production.[150]

Legal status

Attack

At the time of the attack, Syria was not a member of the Chemical Weapons Convention. However, Human Rights Watch argues that the Ghouta chemical attack was illegal under a different international agreement:

Syria is a party to the 1925 Geneva Gas protocol, which bans the use in war of asphyxiating, poisonous or other gases, and of all analogous liquids, materials or devices. The use of chemical weapons is also prohibited as a matter of customary international humanitarian law, or the laws of war. The prohibition on the use of chemical weapons applies to all armed conflicts, including so-called non-international armed conflicts such as the current fighting in Syria. The International Criminal Tribunal for the former Yugoslavia, in the Tadic case, stated “there undisputedly emerged a general consensus in the international community on the principle that the use of [chemical] weapons is also prohibited in internal armed conflicts.”[1](p21)

International Criminal Court referral

Human Rights Watch stated that the UN Security Council should refer the Syria situation to the International Criminal Court (ICC) “to ensure accountability for all war crimes and crimes against humanity.”[136]Amnesty International also said that the Syria situation should be referred to the ICC because “the best way for the United States to signal its abhorrence for war crimes and crimes against humanity and to promote justice in Syria, would be to reaffirm its support for the Rome Statute establishing the International Criminal Court.”[212] However, as the amendment to the Rome Statute of the International Criminal Court explicitly making it a war crime to use chemical weapons in an internal conflict has not been ratified by any major state nor Syria, the legal situation is complex and reliant on the attack being a part of a wider war crime.[213]

Reactions

Domestic

Information Minister Omran al-Zoubi was quoted by the official state news agency, Syrian Arab News Agency (SANA), as saying that the government did not and would not use such weapons, if in fact they even existed. Al-Zoubi said, “everything that has been said is absurd, primitive, illogical and fabricated. What we say is what we mean: there is no use of such things (chemical weapons) at all, at least not by the Syrian army or the Syrian state, and it’s easy to prove and it is not that complicated.”[214] SANA called the reports of chemical attacks as “untrue and designed to derail the ongoing UN inquiry.” A Syrian military official appeared on state television denouncing the reports as “a desperate opposition attempt to make up for rebel defeats on the ground.”[71] Deputy Foreign Minister Faisal Mekdad declared it a tactic by the rebels to turn around the civil war which he said “they were losing” and that, though the government had admitted to having stocks of chemical weapons, stated they would never be used “inside Syria”.[215]Democratic Union Party leader Salih Muslim said he doubted that the Syrian government carried out the chemical attack.[216]

The National Coalition called the attack a “coup de grace that kills all hopes for a political solution in Syria.”[217] In a statement on Facebook, the Coventry-based Syrian Observatory for Human Rights, an anti-government activist network, blamed the attack on the Syrian military and said of the incident that “we assure the world that silence and inaction in the face of such gross and large-scale war crimes, committed in this instance by the Syrian regime, will only embolden the criminals to continue in this path. The international community is thus complicit in these crimes because of its [polarisation], silence and inability to work on a settlement that would lead to the end of the daily bloodshed in Syria.”[218]

International

The international community condemned the attacks. United States President Barack Obama said the US military should strike targets in Syria to retaliate for the government’s purported use of chemical weapons, a proposal publicly supported by French President François Hollande, but condemned by Russia and Iran.[219][220] The Arab League stated it would support military action against Syria in the event of UN support, though member states Algeria, Egypt, Iraq, Lebanon, and Tunisia opposed it.[221]

At the end of August, the House of Commons of the United Kingdom voted against military intervention in Syria.[222] In early September, the United States Congress began debating a proposed authorisation to use military force, although votes on the resolution were indefinitely postponed amid opposition from many legislators[223] and tentative agreement between Obama and Russian President Vladimir Putin on an alternative proposal, under which Syria would declare and surrender its chemical weapons to be destroyed under international supervision.[224]

In contrast to the positions of their governments, polls in early September indicated that most people in the US, UK, Germany and France opposed military intervention in Syria.[225][226][227][228][229] One poll indicated that 50% of Americans could support military intervention with cruise missiles only, “meant to destroy military units and infrastructure that have been used to carry out chemical attacks.”[230] In a survey of American military personnel, around 75% said they opposed air strikes on Syria, with 80% saying an attack would not be “in the U.S. national interest”.[231] Meanwhile, a Russian poll suggested that most Russians supported neither side in the conflict, with less than 10% saying they supported Assad.[232]

Allegations of false flag attack

The attacks prompted some U.S. intelligence officials to speculate they were meant to draw the West into the war,[161] a concept dismissed by others.[233][234] In December 2013 Seymour Hersh wrote that in the days before and after the attack, sensors notifying U.S. intelligence agencies of Syrian chemical weapons deployment did not activate, and intelligence briefings shown to the U.S. president contained no information about an impending government chemical weapons attack.[150] Publicly, the U.S. government cited classified intercepts of communications it said were between Syrian officials, unavailable to the public, which they state prove Syrian government forces carried out the chemical attack.[12] Criticizing what they called a misleading presentation of intelligence, a former senior U.S. intelligence official quoted by Seymour Hersh said the transcript actually included intercepts from many months prior to the attack, collated to make them appear related to the Ghouta attacks.[150]

In April 2014 Hersh wrote an article proposing the attacks were committed by Al-Qaeda affiliate Al-Nusra Front, whom Hersh writes were supplied with sarin by Turkey.[235][236] Hersh’s argument received some support,[237][238]but was dismissed by other commentators.[239][240] The US and Turkish governments denied the accuracy of Hersh’s article.[241] On October 20, 2015, Republican People’s Party deputy Eren Erdem stated that documents from a Turkish government investigation showed that ISIL and affiliated groups received help from Turkish intelligence to carry out the Ghouta chemical attack.[242][243]

See also

https://en.wikipedia.org/wiki/Ghouta_chemical_attack

The victims of a bombing in northern Syria this week were exposed to sarin, a banned but easily manufactured poison that has been widely used in chemical weapons, Turkish officials who conducted autopsies on the victims said on Thursday.

What is sarin?

Sarin is a nerve agent, one of a class of chemical weapons that affect the brain’s ability to communicate with the body’s organs through the nervous system. It is a colorless, tasteless, odorless liquid that was first synthesized in Germany in 1938 as a potential pesticide.

Sarin is considered “the most volatile of the nerve agents,” according to the Centers for Disease Control and Prevention. “This means it can easily and quickly evaporate from a liquid into a vapor and spread into the environment.”

Sarin vapor does not last long, but it can be deadly if inhaled. Contact with sarin liquid on exposed surfaces, in food, or in water can also be fatal. Its effects may strike quickly or be delayed after exposure.

How does it work?

All nerve agents belong to a class of organic compounds that contain phosphorous, and work in essentially the same way, by inhibiting the action of a crucial enzyme in the body that allows muscles and organs to contract. Without the enzyme’s action, the muscles and organs are constantly stimulated and stop working properly; asphyxiation soon follows.

How is it weaponized?

Sarin is dangerous to handle and has a short shelf life, so it is usually stored in the form of two separate precursor compounds that will produce sarin when mixed together.

On the battlefield, sarin and other nerve agents can be used against targets by spraying them as a liquid or an aerosol. Chemical bombs are designed to spray out the liquid on detonation. The Syrian government is believed to have used such a bomb this week in Idlib Province.

The United Nations Chemical Convention, which bans the use of sarin in war, went into effect in 1997. The Syrian government agreed in 2013 to destroy its chemical weapons stockpile, including sarin.

How toxic is it?

According to the United States military, sarin is 81 times as toxic as cyanide and 543 times as toxic as chlorine, which has been used in Syria as a chemical weapon. Chlorine has legitimate commercial uses and is not banned.

What are the symptoms of exposure?

Symptoms of exposure may include the pupils of the eyes shrinking to pinpoints, rapid breathing, vomiting, convulsions, paralysis and respiratory failure. Swift medical attention can reverse the effects of low levels of exposure.

https://www.nytimes.com/2017/04/06/world/middleeast/sarin-nerve-agent.html?&moduleDetail=section-news-1&action=click&contentCollection=Middle%20East&region=Footer&module=MoreInSection&version=WhatsNext&contentID=WhatsNext&pgtype=article

Sarin

From Wikipedia, the free encyclopedia
For other uses, see Sarin (disambiguation).
Not to be confused with Serine, Sarrin, or Saran (disambiguation).
Sarin[1]
Sarin-2D-by-AHRLS-2011.png
Sarin-3D-balls-by-AHRLS-2012.png
Names
Preferred IUPAC name

(RS)-Propan-2-yl methylphosphonofluoridate
Other names

(RS)-O-Isopropyl methylphosphonofluoridate; IMPF;
GB;[2]
2-(Fluoro-methylphosphoryl)oxypropane;
Phosphonofluoridic acid, P-methyl-, 1-methylethyl ester
Identifiers
3D model (Jmol)
ChEBI
ChemSpider
UNII
Properties
C4H10FO2P
Molar mass 140.09 g·mol−1
Appearance Clear colorless liquid
Odor Odorless in pure form. Impure sarin can smell like mustard or burned rubber.
Density 1.0887 g/cm3 (25 °C)
1.102 g/cm3 (20 °C)
Melting point −56 °C (−69 °F; 217 K)
Boiling point 158 °C (316 °F; 431 K)
Miscible
log P 0.30
Hazards
Main hazards It is a lethal cholinergic agent.
Safety data sheet Lethal Nerve Agent Sarin (GB)
Extremely Toxic (T+)[3]
NFPA 704
Flammability code 1: Must be pre-heated before ignition can occur. Flash point over 93 °C (200 °F). E.g., canola oil Health code 4: Very short exposure could cause death or major residual injury. E.g., VX gas Reactivity code 0: Normally stable, even under fire exposure conditions, and is not reactive with water. E.g., liquid nitrogen Special hazards (white): no code

NFPA 704 four-colored diamond

Lethal dose or concentration (LD, LC):
550 ug/kg (rat, oral) [4]
Except where otherwise noted, data are given for materials in their standard state (at 25 °C [77 °F], 100 kPa).
 verify (what is Yes ?)
Infobox references

Sarin, or GB (G-series, ‘B’), is a colorless, odorless liquid,[5] used as a chemical weapon due to its extreme potency as a nerve agent. It is generally considered a weapon of mass destruction. Production and stockpiling of sarin was outlawed as of April 1997 by the Chemical Weapons Convention of 1993, and it is classified as a Schedule 1 substance. In June 1994, the UN Special Commission on Iraqi disarmament destroyed the nerve agent sarin under Security Council resolution 687 (1991) concerning the disposal of Iraq’s weapons of mass destruction.[6]

Sarin is an organophosphorus compound with the formula [(CH3)2CHO]CH3P(O)F. It can be lethal even at very low concentrations, where death can occur within one[7][8] to ten minutes after direct inhalation of a lethal dose, due to suffocation from lung muscle paralysis, unless some antidotes, typically atropine and an oxime, such as pralidoxime, are quickly administered.[5] People who absorb a non-lethal dose, but do not receive immediate medical treatment, may suffer permanent neurological damage.

Production and structure

Sarin is a chiral molecule because it has four chemically distinct substituents attached to the tetrahedral phosphorus center.[9] The SP form (the (–) optical isomer) is the more active enantiomer due to its greater binding affinity to acetylcholinesterase.[10][11] The P-F bond is easily broken by nucleophilic agents, such as water and hydroxide. At high pH, sarin decomposes rapidly to nontoxic phosphonic acid derivatives.

It is usually manufactured and weaponized as a racemic mixture—an equal mixture of both enantiomeric forms, as this is a simpler process and provides an adequate weapon.

A number of production pathways can be used to create sarin. The final reaction typically involves attachment of the isopropoxy group to the phosphorus with an alcoholysis with isopropyl alcohol. Two variants of this process are common. One is the reaction of methylphosphonyl difluoride with isopropyl alcohol, which produces hydrofluoric acid as a byproduct:

Sarin synth with racemic stereochemistry.png

The second process, uses equal quantities of methylphosphonyl difluoride and methylphosphonic dichloride, a mixture “Di-Di” in this process, rather than just the difluoride. This reaction also gives sarin, but hydrochloric acid as a byproduct instead. The Di-Di process was used by the United States for the production of its unitary sarin stockpile.[12]

The scheme below describes an example of Di-Di process. The selection of reagents is arbitrary and reaction conditions and product yield depend on the selected reagents. Inert atmosphere and anhydrous conditions are used for synthesis of sarin and other organophosphates.

An example of

As both reactions leave considerable acid in the product, bulk sarin produced without further treatment has a very poor shelf life and would be rather destructive to containers or weapon systems. Various methods have been tried to resolve these problems. In addition to industrial refining techniques to purify the chemical itself, various additives have been tried to combat the effects of the acid, such as:

Another byproduct of these two chemical processes is diisopropyl methylphosphonate, formed when a second isopropyl alcohol reacts with the sarin itself. This chemical degrades into isopropyl methylphosphonic acid.[19]

Biological effects

Sarin (red), acetylcholinesterase (yellow), acetylcholine (blue)

Like all other nerve agents, sarin attacks the nervous system by interfering with the degradation of the neurotransmitter acetylcholine at neuromuscular junctions. Death will usually occur as a result of asphyxia due to the inability to control the muscles involved in breathing function.

Specifically, sarin is a potent inhibitor of acetylcholinesterase,[20] an enzyme that degrades the neurotransmitter acetylcholine after it is released into the synaptic cleft. In vertebrates, acetylcholine is the neurotransmitter used at the neuromuscular junction, where signals are transmitted between neurons from the central nervous systems to muscle fibres. Normally, acetylcholine is released from the neuron to stimulate the muscle, after which it is degraded by acetylcholinesterase, allowing the muscle to relax. A build-up of acetylcholine in the synaptic cleft, due to the inhibition of cholinesterase, means the neurotransmitter continues to act on the muscle fibre, so that any nerve impulses are effectively continually transmitted.

Sarin acts on cholinesterase by forming a covalent bond with the particular serine residue at the active site. Fluoride is the leaving group, and the resulting phosphoester is robust and biologically inactive.[21][22]

Its mechanism of action resembles that of some commonly used insecticides, such as malathion. In terms of biological activity, it resembles carbamate insecticides, such as Sevin, and the medicines pyridostigmine, neostigmine, and physostigmine.

Degradation and shelf life

Rabbit used to check for leaks at former sarin production plant (Rocky Mountain Arsenal), 1970

The most important chemical reactions of phosphoryl halides is the hydrolysis of the bond between phosphorus and the fluoride. This P-F bond is easily broken by nucleophilic agents, such as water and hydroxide. At high pH, sarin decomposes rapidly to nontoxic phosphonic acid derivatives.[23][24] The initial breakdown of sarin is into isopropyl methylphosphonic acid (IMPA), a chemical that is not commonly found in nature except as a breakdown product of sarin (this is useful for detecting the recent deployment of sarin as a weapon). IMPA then degrades into methylphosphonic acid (MPA), which can also be produced by other organophosphates.[25]

Sarin without the residual acid removed degrades after a period of several weeks to several months. The shelf life can be shortened by impurities in precursor materials. According to the CIA, some Iraqi sarin had a shelf life of only a few weeks, owing mostly to impure precursors.[26]

Along with nerve agents such as tabun and VX, sarin can have a maximum shelf-life of five years.[27] Sarin’s otherwise-short shelf life can be extended by increasing the purity of the precursor and intermediates and incorporating stabilizers such as tributylamine. In some formulations, tributylamine is replaced by diisopropylcarbodiimide (DIC), allowing sarin to be stored in aluminium casings. In binary chemical weapons, the two precursors are stored separately in the same shell and mixed to form the agent immediately before or when the shell is in flight. This approach has the dual benefit of solving the stability issue and increasing the safety of sarin munitions.

Effects and treatment]

Sarin has a high volatility (ease with which a liquid can turn into a gas) relative to similar nerve agents, therefore inhalation can be very dangerous and even vapor concentrations may immediately penetrate the skin. A person’s clothing can release sarin for about 30 minutes after it has come in contact with sarin gas, which can lead to exposure of other people.[28]

Even at very low concentrations, sarin can be fatal. Death may follow in 1 to 10 minutes after direct inhalation of a lethal dose unless antidotes, typically atropine and pralidoxime, are quickly administered.[5] Atropine, an antagonist to muscarinic acetylcholine receptors, is given to treat the physiological symptoms of poisoning. Since muscular response to acetylcholine is mediated through nicotinic acetylcholine receptors, atropine does not counteract the muscular symptoms. Pralidoxime can regenerate cholinesterases if administered within approximately five hours. Biperiden, a synthetic acetylcholine antagonist, has been suggested as an alternative to atropine due to its better blood–brain barrier penetration and higher efficacy.[29]

As a nerve gas, sarin in its purest form is estimated to be 26 times more deadly than cyanide.[30] The LD50 of subcutaneously injected sarin in mice is 172 μg/kg.[31] Treatment measures have been described.[32]

Initial symptoms following exposure to sarin are a runny nose, tightness in the chest and constriction of the pupils. Soon after, the victim has difficulty breathing and experiences nausea and drooling. As the victim continues to lose control of bodily functions, the victim vomits, defecates and urinates. This phase is followed by twitching and jerking. Ultimately, the victim becomes comatose and suffocates in a series of convulsive spasms. Moreover, common mnemonics for the symptomatology of organophosphate poisoning, including sarin gas, are the “killer B’s” of bronchorrhea and bronchospasm because they are the leading cause of death,[33] and SLUDGE – Salivation, Lacrimation, Urination, Defecation, Gastrointestinal distress, and Emesis.

Diagnostic tests

Controlled studies in healthy men have shown that a nontoxic 0.43 mg oral dose administered in several portions over a 3-day interval caused average maximum depressions of 22 and 30%, respectively, in plasma and erythrocyte cholinesterase levels. A single acute 0.5 mg dose caused mild symptoms of intoxication and an average reduction of 38% in both measures of cholinesterase activity. Sarin in blood is rapidly degraded either in vivo or in vitro. Its primary inactive metabolites have in vivo serum half-lives of approximately 24 hours. The serum level of unbound isopropylmethylphosphonic acid (IMPA), a sarin hydrolysis product, ranged from 2-135 µg/L in survivors of a terrorist attack during the first 4 hours post-exposure. Sarin or its metabolites may be determined in blood or urine by gas or liquid chromatography, while cholinesterase activity is usually measured by enzymatic methods.[34]

A newer method called “Fluoride Regeneration” or “Fluoride Reactivation” detects the presence of nerve agents for a longer period after exposure than the methods described above. Fluoride reactivation is a technique has been explored since at least the early 2000s. This technique obviates some of the deficiencies of older procedures. Sarin not only reacts with the water in the blood plasma through hydrolysis (forming so-called ‘free metabolites’), but also reacts with various proteins to form ‘protein adducts’. These protein adducts are not so easily removed from the body, and remain for a longer period of time than the free metabolites. One clear advantage of this process is that the period, post-exposure, for determination of Sarin exposure is much longer, possibly 5 to 8 weeks according to at least one study.[35][36]

Toxicity

Sarin is highly toxic, whether by respiratory or dermal exposure. The toxicity of sarin in humans is largely based on calculations from studies with animals. The general consensus is that the lethal concentration of sarin in air is approximately 35 mg per cubic meter per minute for a two-minute exposure time by a healthy adult breathing normally (exchanging 15 liters of air per minute). This number represents the estimated lethal concentration for 50% of exposed victims, the LCt50 value. There are many ways to make relative comparisons between toxic substances. The list below compares some current and historic chemical warfare agents with sarin, with a direct comparison to the respiratory Lct50:

History

Sarin was discovered in 1938 in Wuppertal-Elberfeld in Germany by scientists at IG Farben who were attempting to create stronger pesticides; it is the most toxic of the four G-Series nerve agents made by Germany. The compound, which followed the discovery of the nerve agent tabun, was named in honor of its discoverers: Schrader, Ambros, Gerhard Ritter, and von der Linde.[39]

Use as a weapon

In mid-1939, the formula for the agent was passed to the chemical warfare section of the German Army Weapons Office, which ordered that it be brought into mass production for wartime use. Pilot plants were built, and a high-production facility was under construction (but was not finished) by the end of World War II. Estimates for total sarin production by Nazi Germany range from 500 kg to 10 tons.[40] Though sarin, tabun and soman were incorporated into artillery shells, Germany did not use nerve agents against Allied targets.

U.S. Honest John missile warhead cutaway, showing M134 sarin bomblets (c. 1960)

  • 1950s (early): NATO adopted sarin as a standard chemical weapon, and both the USSR and the United States produced sarin for military purposes.
  • 1953: 20-year-old Ronald Maddison, a Royal Air Force engineer from Consett, County Durham, died in human testing of sarin at the Porton Down chemical warfare testing facility in Wiltshire, England. Ten days after his death an inquest was held in secret which returned a verdict of “misadventure”. In 2004, the inquest was reopened and, after a 64-day inquest hearing, the jury ruled that Maddison had been unlawfully killed by the “application of a nerve agent in a non-therapeutic experiment”.[41]
  • 1957: Regular production of sarin chemical weapons ceased in the United States, though existing stocks of bulk sarin were re-distilled until 1970.[42]
  • 1976: Chile’s intelligence service, DINA, assigns biochemist Eugenio Berríos to develop sarin gas within its program Proyecto Andrea, to be used as a weapon against its opponents.[43]One of DINA’s goals was to package it in spray cans for easy use, which, according to testimony by former DINA agent Michael Townley, was one of the planned procedures in the 1976 assassination of Letelier.[43] Berríos later testified that it was used in a number of assassinations.[44][45]
  • March 1988: Over two days in March, the ethnic Kurd city of Halabja in northern Iraq (population 70,000) was bombarded with chemical bombs, which included sarin, in the Halabja poison gas attack. An estimated 5,000 people died.[46]
  • April 1988: Sarin was used four times against Iranian soldiers at the end of the Iran–Iraq War, helping Iraqi forces to retake control of the al-Faw Peninsula during the Second Battle of al-Faw.
  • 1993: The United Nations Chemical Weapons Convention was signed by 162 member countries, banning the production and stockpiling of many chemical weapons, including sarin. It went into effect on April 29, 1997, and called for the complete destruction of all specified stockpiles of chemical weapons by April 2007.[47] When the convention entered force, the parties declared worldwide stockpiles of 15,047 tonnes of sarin. As of December 2015, 89% of the stockpiles had been destroyed.[48]
  • 1994: Matsumoto incident; the Japanese religious sect Aum Shinrikyo released an impure form of sarin in Matsumoto, Nagano, killing eight people and harming over 200. The Australian sheep station Banjawarn was a testing ground.
  • 1995: Tokyo subway sarin attack; the Aum Shinrikyo sect released an impure form of sarin in the Tokyo Metro. Twelve people died.[49]
  • 2004: Iraqi insurgents detonated a 155 mm shell containing binary precursors for sarin near a U.S. convoy in Iraq. The shell was designed to mix the chemicals as it spun during flight. The detonated shell released only a small amount of sarin gas, either because the explosion failed to mix the binary agents properly or because the chemicals inside the shell had degraded with age. Two United States soldiers were treated after displaying the early symptoms of exposure to sarin.[50]
  • 2013: Ghouta chemical attack; sarin was used in an attack in the Ghouta region of the Rif Dimashq Governorate of Syria during the Syrian civil war.[51] Varying[52] sources gave a death toll of 322[53] to 1,729.[54]
  • 2017: Khan Shaykhun chemical attack; sarin gas was allegedly used on the rebel-held Idlib Province in Syria. Civilian death toll of ~100 reported, over 300 more injured.[55][56]

https://en.wikipedia.org/wiki/Sarin

The Pronk Pops Show Podcasts Portfolio

Listen To Pronk Pops Podcast or Download Shows 864-868

Listen To Pronk Pops Podcast or Download Shows 857-863

Listen To Pronk Pops Podcast or Download Shows 850-856

Listen To Pronk Pops Podcast or Download Shows 845-849

Listen To Pronk Pops Podcast or Download Shows 840-844

Listen To Pronk Pops Podcast or Download Shows 833-839

Listen To Pronk Pops Podcast or Download Shows 827-832

Listen To Pronk Pops Podcast or Download Shows 821-826

Listen To Pronk Pops Podcast or Download Shows 815-820

Listen To Pronk Pops Podcast or Download Shows 806-814

Listen To Pronk Pops Podcast or Download Shows 800-805

Listen To Pronk Pops Podcast or Download Shows 793-799

Listen To Pronk Pops Podcast or Download Shows 785-792

Listen To Pronk Pops Podcast or Download Shows 777-784

Listen To Pronk Pops Podcast or Download Shows 769-776

Listen To Pronk Pops Podcast or Download Shows 759-768

Listen To Pronk Pops Podcast or Download Shows 751-758

Listen To Pronk Pops Podcast or Download Shows 745-750

Listen To Pronk Pops Podcast or Download Shows 738-744

Listen To Pronk Pops Podcast or Download Shows 732-737

Listen To Pronk Pops Podcast or Download Shows 727-731

Listen To Pronk Pops Podcast or Download Shows 720-726

Listen To Pronk Pops Podcast or DownloadShows 713-719

Listen To Pronk Pops Podcast or DownloadShows 705-712

Listen To Pronk Pops Podcast or Download Shows 695-704

Listen To Pronk Pops Podcast or Download Shows 685-694

Listen To Pronk Pops Podcast or Download Shows 675-684

Listen To Pronk Pops Podcast or Download Shows 668-674

Listen To Pronk Pops Podcast or Download Shows 660-667

Listen To Pronk Pops Podcast or Download Shows 651-659

Listen To Pronk Pops Podcast or Download Shows 644-650

Listen To Pronk Pops Podcast or Download Shows 637-643

Listen To Pronk Pops Podcast or Download Shows 629-636

Listen To Pronk Pops Podcast or Download Shows 617-628

Listen To Pronk Pops Podcast or Download Shows 608-616

Listen To Pronk Pops Podcast or Download Shows 599-607

Listen To Pronk Pops Podcast or Download Shows 590-598

Listen To Pronk Pops Podcast or Download Shows 585- 589

Listen To Pronk Pops Podcast or Download Shows 575-584

Listen To Pronk Pops Podcast or Download Shows 565-574

Listen To Pronk Pops Podcast or Download Shows 556-564

Listen To Pronk Pops Podcast or Download Shows 546-555

Listen To Pronk Pops Podcast or Download Shows 538-545

Listen To Pronk Pops Podcast or Download Shows 532-537

Listen To Pronk Pops Podcast or Download Shows 526-531

Listen To Pronk Pops Podcast or Download Shows 519-525

Listen To Pronk Pops Podcast or Download Shows 510-518

Listen To Pronk Pops Podcast or Download Shows 500-509

Listen To Pronk Pops Podcast or Download Shows 490-499

Listen To Pronk Pops Podcast or Download Shows 480-489

Listen To Pronk Pops Podcast or Download Shows 473-479

Listen To Pronk Pops Podcast or Download Shows 464-472

Listen To Pronk Pops Podcast or Download Shows 455-463

Listen To Pronk Pops Podcast or Download Shows 447-454

Listen To Pronk Pops Podcast or Download Shows 439-446

Listen To Pronk Pops Podcast or Download Shows 431-438

Listen To Pronk Pops Podcast or Download Shows 422-430

Listen To Pronk Pops Podcast or Download Shows 414-421

Listen To Pronk Pops Podcast or Download Shows 408-413

Listen To Pronk Pops Podcast or Download Shows 400-407

Listen To Pronk Pops Podcast or Download Shows 391-399

Listen To Pronk Pops Podcast or Download Shows 383-390

Listen To Pronk Pops Podcast or Download Shows 376-382

Listen To Pronk Pops Podcast or Download Shows 369-375

Listen To Pronk Pops Podcast or Download Shows 360-368

Listen To Pronk Pops Podcast or Download Shows 354-359

Listen To Pronk Pops Podcast or Download Shows 346-353

Listen To Pronk Pops Podcast or Download Shows 338-345

Listen To Pronk Pops Podcast or Download Shows 328-337

Listen To Pronk Pops Podcast or Download Shows 319-327

Listen To Pronk Pops Podcast or Download Shows 307-318

Listen To Pronk Pops Podcast or Download Shows 296-306

Listen To Pronk Pops Podcast or Download Shows 287-295

Listen To Pronk Pops Podcast or Download Shows 277-286

Listen To Pronk Pops Podcast or Download Shows 264-276

Listen To Pronk Pops Podcast or Download Shows 250-263

Listen To Pronk Pops Podcast or Download Shows 236-249

Listen To Pronk Pops Podcast or Download Shows 222-235

Listen To Pronk Pops Podcast or Download Shows 211-221

Listen To Pronk Pops Podcast or Download Shows 202-210

Listen To Pronk Pops Podcast or Download Shows 194-201

Listen To Pronk Pops Podcast or Download Shows 184-193

Listen To Pronk Pops Podcast or Download Shows 174-183

Listen To Pronk Pops Podcast or Download Shows 165-173

Listen To Pronk Pops Podcast or Download Shows 158-164

Listen To Pronk Pops Podcast or Download Shows151-157

Listen To Pronk Pops Podcast or Download Shows 143-150

Listen To Pronk Pops Podcast or Download Shows 135-142

Listen To Pronk Pops Podcast or Download Shows 131-134

Listen To Pronk Pops Podcast or Download Shows 124-130

Listen To Pronk Pops Podcast or Download Shows 121-123

Listen To Pronk Pops Podcast or Download Shows 118-120

Listen To Pronk Pops Podcast or Download Shows 113 -117

Listen To Pronk Pops Podcast or Download Show 112

Listen To Pronk Pops Podcast or Download Shows 108-111

Listen To Pronk Pops Podcast or Download Shows 106-108

Listen To Pronk Pops Podcast or Download Shows 104-105

Listen To Pronk Pops Podcast or Download Shows 101-103

Listen To Pronk Pops Podcast or Download Shows 98-100

Listen To Pronk Pops Podcast or Download Shows 94-97

Listen To Pronk Pops Podcast or Download Show 93

Listen To Pronk Pops Podcast or Download Show 92

Listen To Pronk Pops Podcast or Download Show 91

Listen To Pronk Pops Podcast or Download Shows 88-90

Listen To Pronk Pops Podcast or Download Shows 84-87

Listen To Pronk Pops Podcast or Download Shows 79-83

Listen To Pronk Pops Podcast or Download Shows 74-78

Listen To Pronk Pops Podcast or Download Shows 71-73

Listen To Pronk Pops Podcast or Download Shows 68-70

Listen To Pronk Pops Podcast or Download Shows 65-67

Listen To Pronk Pops Podcast or Download Shows 62-64

Listen To Pronk Pops Podcast or Download Shows 58-61

Listen To Pronk Pops Podcast or Download Shows 55-57

Listen To Pronk Pops Podcast or Download Shows 52-54

Listen To Pronk Pops Podcast or Download Shows 49-51

Listen To Pronk Pops Podcast or Download Shows 45-48

Listen To Pronk Pops Podcast or Download Shows 41-44

Listen To Pronk Pops Podcast or Download Shows 38-40

Listen To Pronk Pops Podcast or Download Shows 34-37

Listen To Pronk Pops Podcast or Download Shows 30-33

Listen To Pronk Pops Podcast or Download Shows 27-29

Listen To Pronk Pops Podcast or Download Shows 17-26

Listen To Pronk Pops Podcast or Download Shows 16-22

Listen To Pronk Pops Podcast or Download Shows 10-15

Listen To Pronk Pops Podcast or Download Shows 1-9

Read Full Post | Make a Comment ( None so far )

The Pronk Pops Show 853, March 8, 2017, Story 1: Republicans United For Clean Repeal of Obamacare and Divided On Obamacare Replacement — Conservatives, Classical Liberals and Libertarians Oppose House Rollover Republican Ryancare — CATO Institute, Club for Growth, Freedom Works Heritage Foundation and House Freedom Caucus, Republican Study Committee and American People All Oppose Obamacare 2.0 Lite — Support Senator Rand Paul’s Bill and Freedom Caucus — Negotiate — Negotiate — Negotiate — Videos — Story 2: Wikileaks Vault 7 Release Reveals CIA’s Collection of Hacking Tools and Malware of Secret Surveillance Spying Security State (S5) — Intelligence Community Are Listening and Watching — George Orwell Was An Optimist — Two Party Turnkey Tyranny — Videos -_

Posted on March 8, 2017. Filed under: Addiction, American History, Animal, Benghazi, Blogroll, Breaking News, Communications, Congress, Constitutional Law, Corruption, Countries, Culture, Defense Spending, Donald J. Trump, Donald Trump, Elections, Fast and Furious, Government, Government Dependency, Government Spending, Hate Speech, Health, Health Care, Health Care Insurance, Hillary Clinton, History, House of Representatives, Human Behavior, Illegal Immigration, Illegal Immigration, Immigration, Independence, Iran Nuclear Weapons Deal, Islam, Law, Legal Immigration, Life, Lying, Medicare, Obama, Philosophy, Photos, Politics, Polls, Progressives, Rand Paul, Raymond Thomas Pronk, Religion, Scandals, Science, Security, Senate, Social Science, Social Security, Socials Security, Spying, Taxation, Taxes, Terror, Terrorism, Unemployment, Videos, Violence, War, Wealth, Weather, Welfare Spending, Wisdom | Tags: , , , , , , , , , , , , |

Project_1

The Pronk Pops Show Podcasts

Pronk Pops Show 853: March 8, 2017

Pronk Pops Show 852: March 6, 2017

Pronk Pops Show 851: March 3, 2017

Pronk Pops Show 850: March 2, 2017

Pronk Pops Show 849: March 1, 2017

Pronk Pops Show 848: February 28, 2017

Pronk Pops Show 847: February 27, 2017

Pronk Pops Show 846: February 24, 2017

Pronk Pops Show 845: February 23, 2017

Pronk Pops Show 844: February 22, 2017

Pronk Pops Show 843: February 21, 2017

Pronk Pops Show 842: February 20, 2017

Pronk Pops Show 841: February 17, 2017

Pronk Pops Show 840: February 16, 2017

Pronk Pops Show 839: February 15, 2017

Pronk Pops Show 838: February 14, 2017

Pronk Pops Show 837: February 13, 2017

Pronk Pops Show 836: February 10, 2017

Pronk Pops Show 835: February 9, 2017

Pronk Pops Show 834: February 8, 2017

Pronk Pops Show 833: February 7, 2017

Pronk Pops Show 832: February 6, 2017

Pronk Pops Show 831: February 3, 2017

Pronk Pops Show 830: February 2, 2017

Pronk Pops Show 829: February 1, 2017

Pronk Pops Show 828: January 31, 2017

Pronk Pops Show 827: January 30, 2017

Pronk Pops Show 826: January 27, 2017

Pronk Pops Show 825: January 26, 2017

Pronk Pops Show 824: January 25, 2017

Pronk Pops Show 823: January 24, 2017

Pronk Pops Show 822: January 23, 2017

Pronk Pops Show 821: January 20, 2017

Pronk Pops Show 820: January 19, 2017

Pronk Pops Show 819: January 18, 2017

Pronk Pops Show 818: January 17, 2017

Pronk Pops Show 817: January 13, 2017

Pronk Pops Show 816: January 12, 2017

Pronk Pops Show 815: January 11, 2017

Pronk Pops Show 814: January 10, 2017

Pronk Pops Show 813: January 9, 2017

Pronk Pops Show 812: December 12, 2016

Pronk Pops Show 811: December 9, 2016

Pronk Pops Show 810: December 8, 2016

Pronk Pops Show 809: December 7, 2016

Pronk Pops Show 808: December 6, 2016

Pronk Pops Show 807: December 5, 2016

Pronk Pops Show 806: December 2, 2016

Pronk Pops Show 805: December 1, 2016

 

Story 1: Republicans United For Clean Repeal of Obamacare and Divided On Obamacare Replacement — Conservatives, Classical Liberals and Libertarians Oppose House Rollover Republican Ryancare — CATO Institute, Club for Growth, Freedom Works Heritage Foundation and House Freedom Caucus,  Republican Study Committee and American People  All Oppose Obamacare 2.0 Lite — Support Senator Rand Paul’s Bill and Freedom Caucus — Negotiate — Negotiate — Negotiate — Videos — 

Image result for cartoons on repeal and repace obamacare

Image result for cartoon branco republican repeal and replace obamacare

Image result for vault 7 cia

Image result for cartoons on obamacare

Conservative Freedom Caucus Torpedoes GOP Obamacare Replacement

MAJOR: Paul Ryan Introduces American Health Care Act, House GOP’s Obamacare Replacement

SABOTAGE! WHAT PAUL RYAN JUST DID TO TRUMPCARE PROVES HE’S A TRAITOR TO THE PRESIDENT

Speaker Paul Ryan: There isn’t chaos in GOP-led Congress

SEAN HANNITY INTERVIEWS TOM PRICE ABOUT TRUMP’S NEW HEALTHCARE PLAN – 3/7/17

Trump’s HHS Secretary On Obamacare Replacement Bill

Ingraham takes issue with GOP’s health care replacement bill

Herman Cain on Obamacare replacement bill: Consumers now back in charge

Laffer: Obamacare replacement bill worth 2,000-3,000 points on the Dow

President Trump Holds Meeting On Obamacare Replacement with House Deputy Whip Team 3/7/17

GOP releases Obamacare replacement details

York: Fate of GOP health care bill lies with Freedom Caucus

Republicans unveil Obamacare replacement

Trump backs healthcare tax credit amid conservative opposition

Sen. Rand Paul unveils ObamaCare replacement plan

Conservatives lash out at House GOP’s Obamacare replacement bill

March 7 at 3:01 PM
Influential conservative lawmakers and activist groups panned health-care legislation drafted by House Republican leaders Tuesday, throwing the GOP’s plan to undo the Affordable Care Act in serious doubt less than 24 hours after it was released.Those groups dubbed the House bill, backed by House Speaker Paul D. Ryan (R-Wis.), as “Obamacare Lite,” “RyanCare” or “RINOcare” — a reference to “Republican in name only,” a popular conservative epithet for establishment politicians.The Ryan-backed bill offers a more conservative vision for the nation’s health-care system, replacing federal insurance subsidies with a new form of individual tax credits and phasing out most of the ACA’s taxes. But key lawmakers and outside groups, who can rile up the party’s base against legislative plans, said the legislation does not go far enough in pulling back elements of President Barack Obama’s overhaul.“The House Republican proposal released last night not only accepts the flawed progressive premises of Obamacare but expands upon them,” Michael Needham, the head of Heritage Action for America, said in a statement Tuesday. “Congressional Republicans should fully repeal the failed law and begin a genuine effort to deliver on longstanding campaign promises that create a free market health care system.”Two other groups, FreedomWorks and the Club for Growth, decried the plans Tuesday as a betrayal of campaign promises.

A day after House Republicans released a plan to supplant the Affordable Care Act, Sen. Rand Paul (R-Ky.) outlined the issues he has with their proposal, indicating it might be unconstitutional. (Alice Li, Jayne Orenstein/The Washington Post)

“If this warmed-over substitute for government-run health care remains unchanged, the Club for Growth will key vote against it,” said the group’s president, David McIntosh, referring to a process in which lawmakers are graded on their votes, the better to use them as ammunition on the campaign trail.

The dilemma Republican congressional leaders face is, if they change the legislation to appease hard-line conservatives, they are likely to alienate more-moderate members who are wary of disrupting insurance markets and taking coverage away from those who gained it under the ACA.

The margin for dissent is slim: Assuming no Democrats break ranks to support the bill, for the overhaul to pass, Republicans can lose only 21 votes in the House and two votes in the Senate.

CONTENT FROM WELLS FARGO ADVISORS
Keep these factors in mind when planning for retirement
Understanding the risks that can come between you and the retirement you want is an important step toward meeting your goals.

Four key Republicans in the Senate have expressed worries about the plan’s possible impact on lower-income people who received Medicaid coverage through the ACA’s expansion of that program. The four senators are split on exactly what proposals would meet their standards, but none are likely to support the course of action favored by many conservatives — passing a 2015 bill that repealed key ACA provisions without immediately including replacement provisions.

There were some signs of hope for the House plan Tuesday. President Trump offered an early boost to GOP leaders with a morning tweet: “Our wonderful new Healthcare Bill is now out for review and negotiation. ObamaCare is a complete and total disaster — is imploding fast!”

Vice President Pence attended a Senate Republican policy luncheon Tuesday and, in a break with normal practice, joined Senate Majority Leader Mitch McConnell and other GOP leaders at a news conference afterward to defend the House approach as “the framework for reform.”

“We are certainly open to improvements and recommendations in the legislative process, but this is the bill, and the president supports the American Health Care Act,” he said. “We are looking forward to working very directly with leadership in the House and the Senate in the weeks ahead. We are very confident that the American Health Care Act, with their help, will be on the president’s desk.”

In another sign of the administration’s support, Health and Human Services Secretary Tom Price sent a letter Tuesday to the chairmen of the two House committees processing the legislation, calling it a “necessary and important first step toward fulfilling our promises to the American people.”

But Price, who authored a similar ACA replacement proposal when he served in the House, said that achieving all of Trump’s health-care goals “will require more than what is possible” in the current legislation, which is limited in its scope to take advantage of special budget rules allowing for easier Senate passage.

He specifically mentioned allowing insurance to be sold across state lines, pharmaceutical cost reductions and “medical legal reforms,” an apparent reference to long-standing GOP proposals to limit malpractice liability.

Senate Majority Leader Mitch McConnell (R-Ky.) offered measured support for the proposed legislation and said he would bring it to the Senate floor should it pass the House.

“I encourage every member to review [the legislation] because I hope to call it up when we receive it from the House,” McConnell said Tuesday on the Senate floor. “We’ve come a long way. We’ve got a lot further to go, but we’re making significant progress. Working arm in arm with the House and the new administration, we’re going to keep our promise to the American people.”

While some of the fiercest criticism came from hard-right activist groups that have dogged Republican congressional leaders for years, other more establishment-minded organs joined the chorus of dissent.

National Review published an editorial Tuesday that said the legislation was “a disappointment” and has “serious flaws even as a first step toward full repeal and replacement.”

Republicans, the influential conservative magazine said, “would be better off rallying behind a bill in which they really believe, even if Democrats kill it with a filibuster,than trying and failing to enact a bill that they support only tepidly.”

Leaders involved in drafting the bills sought to defend their plan against the onslaught of criticism, describing it as the product of months of internal discussions and saying its details could still change.

“We now have a bill that’s available for all to read,” said Rep. Greg Walden (R-Ore.), chairman of the House Energy and Commerce Committee, which helped craft one of them, at a news conference Tuesday. “I’d encourage them to do it. I’d encourage them to look against their own bills and what they’ve supported in the past. And then let’s have a thoughtful legislative discussion.”

Rep. Kevin Brady (R-Tex.), chairman of the House Ways and Means Committee, which produced the other bill, said: “As Republicans, we have a choice. We can act now, or we can keep fiddling around and squander this opportunity to repeal Obamacare and begin a new chapter of freedom for the American people. House Republicans are choosing to act now.”

Still, agitation among conservatives was evident Monday night and poured into Tuesday.

CONTENT FROM WELLS FARGO ADVISORS
Keep these factors in mind when planning for retirement
Understanding the risks that can come between you and the retirement you want is an important step toward meeting your goals.

“Keep the ‘Cadillac’ tax in place? Keep Medicaid in place until 2020?” said Rep. Jim Jordan (R-Ohio), a co-founder of the House Freedom Caucus, referring to high-priced health-care plans. “We didn’t have Medicaid expansion in the bill we sent to President Obama, but we have it in the one we send to President Trump? That makes no sense to me.”

“Obamacare 2.0,” tweeted Rep. Justin Amash (R-Mich.), a libertarian who frequently breaks with GOP leadership.

Under two bills drafted by separate House committees, the government would no longer penalize Americans for failing to have health insurance but would try to encourage people to maintain coverage by allowing insurers to impose a 30 percent surcharge for those who do not have continuous coverage.

The legislation would preserve two of the most popular features of the 2010 health-care law, letting young adults stay on their parents’ health plans until age 26 and forbidding insurers to deny coverage or charge more to people with preexisting medical problems. It would also target Planned Parenthood, rendering the women’s health organization ineligible for Medicaid reimbursements or federal family -planning grants — a key priority for antiabortion groups.

Taken together, the bills introduced Monday represent the Republicans’ first attempt — and best shot to date, with an ally in the White House — to translate into action seven years of talking points about demolishing the ACA.

At the same time, major aspects of the House GOP plan reflect the treacherous terrain that Republicans face to win enough votes within their own conferences in the GOP-controlled House and Senate.

The bills must address concerns of both conservatives worried about the plan’s cost and the notion it might enshrine a new federal entitlement, as well as more moderate members who want to ensure that their constituents, including those who received coverage under the ACA’s Medicaid expansion, retain access to affordable health care.

The Freedom Caucus, a block of roughly 30 House hard-liners who criticized earlier versions of the bill, is set to meet Tuesday night to discuss the health-care bill and perhaps develop a list of demands to present to GOP leaders.

Members of the Republican Study Committee, a larger conservative group, were already critical of key elements of the plan. “This is a Republican welfare entitlement,” reads an RSC analysis distributed late Monday, addressing the inclusion of refundable tax credits in the plan.

With no Democrats expected to vote to pass the bill and four House GOP seats vacant, Republicans can afford to lose no more than 21 members in the lower chamber.

In recognition of the close vote that is expected, House Majority Whip Steve Scalise (R-La.) and several deputy whips are expected to visit the White House Tuesday afternoon to discuss the health-care bill with Trump administration officials.

On Tuesday morning, Trump signaled the work on the proposal was not completely finished, referring to selling insurance across state lines and saying that change would come in “phase 2 & 3 of healthcare rollout.” The president also said he was “working on new system where there will be competition in the Drug Industry” that will lead prices to “come way down.”

Conservative critics of the measure had noted the plan’s exclusion of selling insurance across state lines. “The problems with this bill are not just what’s in it, but also what’s missing,” said McIntosh.

Yet attacks from the right were not the only challenge facing Republican leaders.

Four key Republican senators, all from states that opted to expand Medicaid under the ACA, said they would oppose any new plan that would leave millions of Americans uninsured.

“We will not support a plan that does not include stability for Medicaid expansion populations or flexibility for states,” Sens. Rob Portman (Ohio), Shelley Moore Capito (W.Va.), Cory Gardner (Colo.) and Lisa Murkowski (Alaska) wrote in a letter to McConnell on Monday.

The plan from House Republicans would substantially redesign Medicaid with the goal of balancing the GOP’s antipathy toward the ACA’s expansion of the program against the concerns of a significant cadre of Republican governors — and the lawmakers from their states — who fear losing millions of dollars that the law has funneled to help insure low-income residents.

Democrats, meanwhile, have given no indication that they intend to work with Republicans, and top party leaders decried the GOP plan Monday as a betrayal of everyday Americans. “Trumpcare doesn’t replace the Affordable Care Act, it forces millions of Americans to pay more for less care,” said Senate Minority Leader Charles E. Schumer (D-N.Y.).

In particular, the plan to target Planned Parenthood has already generated fierce pushback from Democrats and doubts from some Republicans who have noted that federal funds are already barred from funding abortions and that Planned Parenthood provides routine medical care to millions of American women.

https://www.washingtonpost.com/powerpost/house-leaders-brace-for-the-task-ahead-selling-obamacare-lite/2017/03/07/ab2f721e-02e5-11e7-ad5b-d22680e18d10_story.html?utm_term=.b64bbc38491c

A Disappointing Start

by THE EDITORS March 7, 2017 12:45 PM We believe that Obamacare should be repealed and replaced with policies that enable Americans to make their own decisions about what sort of health insurance to

We believe that Obamacare should be repealed and replaced with policies that enable Americans to make their own decisions about what sort of health insurance to buy, and that their options should include low-premium coverage that protects them against the risk of major financial setbacks resulting from health care. The legislation released last night by House Republicans is, even on the most charitable reading, only a first step toward that goal.

It does not repeal all of Obamacare, leaving many of its regulations in place. The apparent rationale for this omission is that eliminating the regulations would subject the legislation to a fatal Senate filibuster. We have recommended that Republicans defang the regulations by replacing Obamacare’s subsidies with a simple new tax credit that people could use to buy insurance governed by a new, lighter regulatory regime. That way Obamacare’s regulations would stay on the books but no longer hinder consumer choice. But Republicans shrank from this option, too.

We disagree with this tactical decision, which places Senate parliamentary rules — or, rather, places guesses about how those rules would operate — ahead of good health policy and making good on longstanding party promises. It also seems to us that Republicans would be better off rallying behind a bill in which they really believe, even if Democrats kill it with a filibuster, than trying and failing to enact a bill that they support only tepidly. That second outcome may now take place.

Moreover, the legislation has some serious flaws even as a first step toward full repeal and replacement. It eliminates Obamacare’s fines on people who go without insurance, but in their place creates a new surcharge for people who let their insurance lapse and then try to purchase a new policy. The goal is to keep healthy people from leaving the insurance rolls and thus destabilizing insurance markets.

The surcharge is a heavy-handed instrument: Insurers would be obligated to impose it regardless of their preferences. Yet the surcharge might not achieve its goal. A lot of healthy people might well decide to go without insurance and run the risk of paying a surcharge if they get sick later. The surcharge even undermines its own goal, since it would discourage healthy people who had already left the insurance rolls from getting back on them.

The bill has its good points. If the surcharge works, the deregulation in the bill would lower premiums. Many of Obamacare’s taxes would be repealed. Obamacare’s tax credits create high effective marginal tax rates for people in the lower middle class; the bill’s replacement tax credits would avoid this problem. Permissible contributions to and limits on health savings accounts would be loosened. Federal contributions to Medicaid would be capped, ending the perverse incentives that have for decades enabled the growth of the program. All in all, though, the bill is a disappointment. And it is not too late to get a second opinion.

All in all, though, the bill is a disappointment. And it is not too late to get a second opinion.

 http://www.nationalreview.com/article/445558/obamacare-replacement-republican-plan-house-representatives-disappointing

Story 2: Wikileaks Vault 7 Release Reveals CIA’s Collection of Hacking Tools and Malware of Secret Surveillance Spying Security State (S5) — Intelligence Community Are Listening and Watching — George Orwell Was An Optimist — Two Party Turnkey Tyranny — Videos — 

Image result for vault 7 cia

Image result for vault 7 cia

Image result for george orwell quotesImage result for george orwell quotesImage result for george orwell quotesImage result for george orwell quotesImage result for george orwell quotesImage result for george orwell quotesImage result for george orwell quotesImage result for george orwell quotesImage result for george orwell quotesImage result for george orwell quotesImage result for george orwell quotesImage result for george orwell quotesImage result for george orwell quotesImage result for george orwell quotesImage result for george orwell quotesImage result for george orwell quotes

Image result for george orwell quotesImage result for george orwell quotes

Image result for george orwell quotesImage result for george orwell quotesImage result for george orwell quotesImage result for george orwell quotesImage result for george orwell quotesImage result for george orwell quotesImage result for george orwell quotesImage result for george orwell quotes

Image result for george orwell quotes

Ari Fleischer on CIA leaks, wiretapping claims

Wikileaks Claims CIA Is Hacking Americans’ Electronics – Tucker Carlson Tonight – Fox News – 3/7/17

Wikileaks dumps information claiming proof of CIA hacking

What Pisses Me Off About Wikileaks Vault 7 Release

‘Cyber warfare is a new frontline’: CIA created malware designed to penetrate software – WikiLeaks

VAULT 7: CIA Staged Fake Russian Hacking to Set Up Trump — Russian Cyber-Attack M.O. As False Flag

Former CIA Director: Wikileaks Dump Could Be ‘Very Damaging’ | Andrea Mitchell | MSNBC

On the Russia Lunacy & Wikileaks BOMBSHELL Leak of CIA Hacking Force

Wikileaks Vault 7: A Massive and Confusing Revelation

WikiLeaks UNLEASHES ‘Year Zero’ CIA Hacking Tools (Vault 7)

WIKILEAKS VAULT 7: The C.I.A. Is Listening Via Everything

Inside Vault 7: CIA Hacking Tools Published by Wikileaks

George Orwell 1984 Telescreen Exercise

Nineteen Eighty-Four (1984) – Last Scene

ANIMAL FARM – full movie

1984 George Orwell – Full Movie – Hollywood best Greatest blockbuster movie Film

Watch Nineteen Eighty Four Watch Movies Online Free

George Orwell: A Life in Pictures Full Documentary (High Quality)

A Final Warning from George Orwell

Wikileaks Unveils ‘Vault 7’: “The Largest Ever Publication Of Confidential CIA Documents”; Another Snowden Emerges

Tyler Durden's picture

TwitterFacebookReddit

WikiLeaks has published what it claims is the largest ever release of confidential documents on the CIA. It includes more than 8,000 documents as part of ‘Vault 7’, a series of leaks on the agency, which have allegedly emerged from the CIA’s Center For Cyber Intelligence in Langley, and which can be seen on the org chart below, which Wikileaks also released:

A total of 8,761 documents have been published as part of ‘Year Zero’, the first in a series of leaks the whistleblower organization has dubbed ‘Vault 7.’ WikiLeaks said that ‘Year Zero’ revealed details of the CIA’s “global covert hacking program,” including “weaponized exploits” used against company products including “Apple’s iPhone, Google’s Android and Microsoft’s Windows and even Samsung TVs, which are turned into covert microphones.”

WikiLeaks tweeted the leak, which it claims came from a network inside the CIA’s Center for Cyber Intelligence in Langley, Virginia.

Among the more notable disclosures which, if confirmed, “would rock the technology world“, the CIA had managed to bypass encryption on popular phone and messaging services such as Signal, WhatsApp and Telegram. According to the statement from WikiLeaks, government hackers can penetrate Android phones and collect “audio and message traffic before encryption is applied.”

Another profound revelation is that the CIA can engage in “false flag” cyberattacks which portray Russia as the assailant. Discussing the CIA’s Remote Devices Branch’s UMBRAGE group, Wikileaks’ source notes that it “collects and maintains a substantial library of attack techniques ‘stolen’ from malware produced in other states including the Russian Federation.

“With UMBRAGE and related projects the CIA cannot only increase its total number of attack types but also misdirect attribution by leaving behind the “fingerprints” of the groups that the attack techniques were stolen from. UMBRAGE components cover keyloggers, password collection, webcam capture, data destruction, persistence, privilege escalation, stealth, anti-virus (PSP) avoidance and survey techniques.”

As Kim Dotcom summarizes this finding, “CIA uses techniques to make cyber attacks look like they originated from enemy state. It turns DNC/Russia hack allegation by CIA into a JOKE

CIA uses techniques to make cyber attacks look like they originated from enemy state. It turns DNC/Russia hack allegation by CIA into a JOKE

But perhaps what is most notable is the purported emergence of another Snowden-type whistleblower: the source of the information told WikiLeaks in a statement that they wish to initiate a public debate about the “security, creation, use, proliferation and democratic control of cyberweapons.”  Policy questions that should be debated in public include “whether the CIA’s hacking capabilities exceed its mandated powers and the problem of public oversight of the agency,” WikiLeaks claims the source said.

The FAQ section of the release, shown below, provides further details on the extent of the leak, which was “obtained recently and covers through 2016”. The time period covered in the latest leak is between the years 2013 and 2016, according to the CIA timestamps on the documents themselves. Secondly, WikiLeaks has asserted that it has not mined the entire leak and has only verified it, asking that journalists and activists do the leg work.

Among the various techniques profiled by WikiLeaks is “Weeping Angel”, developed by the CIA’s Embedded Devices Branch (EDB), which infests smart TVs, transforming them into covert microphones. After infestation, Weeping Angel places the target TV in a ‘Fake-Off’ mode, so that the owner falsely believes the TV is off when it is on. In ‘Fake-Off’ mode the TV operates as a bug, recording conversations in the room and sending them over the Internet to a covert CIA server.

As Kim Dotcom chimed in on Twitter, “CIA turns Smart TVs, iPhones, gaming consoles and many other consumer gadgets into open microphones” and added ” CIA turned every Microsoft Windows PC in the world into spyware. Can activate backdoors on demand, including via Windows update”

BREAKING: CIA turns Smart TVs, iPhones, gaming consoles and many other consumer gadgets into open microphones.

Dotcom also added that “Obama accused Russia of cyberattacks while his CIA turned all internet enabled consumer electronics in Russia into listening devices. Wow!”

Obama accused Russia of cyberattacks while his CIA turned all internet enabled consumer electronics in Russia into listening devices. Wow!

Julian Assange, WikiLeaks editor stated that “There is an extreme proliferation risk in the development of cyber ‘weapons’. Comparisons can be drawn between the uncontrolled proliferation of such ‘weapons’, which results from the inability to contain them combined with their high market value, and the global arms trade. But the significance of “Year Zero” goes well beyond the choice between cyberwar and cyberpeace. The disclosure is also exceptional from a political, legal and forensic perspective.”

Key Highlights from the Vault 7 release so far:

  • “Year Zero” introduces the scope and direction of the CIA’s global covert hacking program, its malware arsenal and dozens of “zero day” weaponized exploits against a wide range of U.S. and European company products, include Apple’s iPhone, Google’s Android and Microsoft’s Windows and even Samsung TVs, which are turned into covert microphones.
  • Wikileaks claims that the CIA lost control of the majority of its hacking arsenal including malware, viruses, trojans, weaponized “zero day” exploits, malware remote control systems and associated documentation. This extraordinary collection, which amounts to more than several hundred million lines of code, gives its possessor the entire hacking capacity of the CIA. The archive appears to have been circulated among former U.S. government hackers and contractors in an unauthorized manner, one of whom has provided WikiLeaks with portions of the archive.
  • By the end of 2016, the CIA’s hacking division, which formally falls under the agency’s Center for Cyber Intelligence (CCI), had over 5000 registered users and had produced more than a thousand hacking systems, trojans, viruses, and other “weaponized” malware. Such is the scale of the CIA’s undertaking that by 2016, its hackers had utilized more code than that used to run Facebook.
  • The CIA had created, in effect, its “own NSA” with even less accountability and without publicly answering the question as to whether such a massive budgetary spend on duplicating the capacities of a rival agency could be justified.
  • Once a single cyber ‘weapon’ is ‘loose’ it can spread around the world in seconds, to be used by rival states, cyber mafia and teenage hackers alike.

Snowden 2.0?

  • In a statement to WikiLeaks the source details policy questions that they say urgently need to be debated in public, including whether the CIA’s hacking capabilities exceed its mandated powers and the problem of public oversight of the agency. The source wishes to initiate a public debate about the security, creation, use, proliferation and democratic control of cyberweapons.

CIA targets iPhones, Androids, smart TVs:

  • CIA malware and hacking tools are built by EDG (Engineering Development Group), a software development group within CCI (Center for Cyber Intelligence), a department belonging to the CIA’s DDI (Directorate for Digital Innovation). The DDI is one of the five major directorates of the CIA (see this organizational chart of the CIA for more details).
  • The increasing sophistication of surveillance techniques has drawn comparisons with George Orwell’s 1984, but “Weeping Angel”, developed by the CIA’s Embedded Devices Branch (EDB), which infests smart TVs, transforming them into covert microphones, is surely its most emblematic realization.

Also cars, suggesting that the CIA may have a role in the death of Michael Hastings:

  • As of October 2014 the CIA was also looking at infecting the vehicle control systems used by modern cars and trucks.
  • The purpose of such control is not specified, but it would permit the CIA to engage in nearly undetectable assassinations.

And computers:

  • The CIA also runs a very substantial effort to infect and control Microsoft Windows users with its malware. This includes multiple local and remote weaponized “zero days”, air gap jumping viruses such as “Hammer Drill” which infects software distributed on CD/DVDs, infectors for removable media such as USBs, systems to hide data in images or in covert disk areas ( “Brutal Kangaroo”) and to keep its malware infestations going.

Hoarding of Zero Day exploits:

  • In the wake of Edward Snowden’s leaks about the NSA, the U.S. technology industry secured a commitment from the Obama administration that the executive would disclose on an ongoing basis — rather than hoard — serious vulnerabilities, exploits, bugs or “zero days” to Apple, Google, Microsoft, and other US-based manufacturers.
  • Serious vulnerabilities not disclosed to the manufacturers places huge swathes of the population and critical infrastructure at risk to foreign intelligence or cyber criminals who independently discover or hear rumors of the vulnerability. If the CIA can discover such vulnerabilities so can others.

Proliferation of leaked/hacked Cyberwar programs:

  • While nuclear proliferation has been restrained by the enormous costs and visible infrastructure involved in assembling enough fissile material to produce a critical nuclear mass, cyber ‘weapons’, once developed, are very hard to retain. Cyber ‘weapons’ are in fact just computer programs which can be pirated like any other. Since they are entirely comprised of information they can be copied quickly with no marginal cost.
  • Over the last three years the United States intelligence sector, which consists of government agencies such as the CIA and NSA and their contractors, such as Booze Allan Hamilton, has been subject to unprecedented series of data exfiltrations by its own workers.
  • Once a single cyber ‘weapon’ is ‘loose’ it can spread around the world in seconds, to be used by peer states, cyber mafia and teenage hackers alike.

The U.S. Consulate in Frankfurt is a covert CIA hacker base

  • In addition to its operations in Langley, Virginia the CIA also uses the U.S. consulate in Frankfurt as a covert base for its hackers covering Europe, the Middle East and Africa. CIA hackers operating out of the Frankfurt consulate ( “Center for Cyber Intelligence Europe” or CCIE) are given diplomatic (“black”) passports and State Department cover.
  • The instructions for incoming CIA hackers make Germany’s counter-intelligence efforts appear inconsequential: “Breeze through German Customs because you have your cover-for-action story down pat, and all they did was stamp your passport”

Examples of CIA projects

  • The CIA’s Engineering Development Group (EDG) management system contains around 500 different projects (only some of which are documented by “Year Zero”) each with their own sub-projects, malware and hacker tools. The majority of these projects relate to tools that are used for penetration, infestation (“implanting”), control, and exfiltration.
  • Umbrage: The CIA’s Remote Devices Branch’s UMBRAGE group collects and maintains a substantial library of attack techniques ‘stolen’ from malware produced in other states including the Russian Federation. With UMBRAGE and related projects the CIA cannot only increase its total number of attack types but also misdirect attribution by leaving behind the “fingerprints” of the groups that the attack techniques were stolen from.
  • Fine Dining:  Fine Dining comes with a standardized questionnaire i.e menu that CIA case officers fill out. The questionnaire is used by the agency’s OSB (Operational Support Branch) to transform the requests of case officers into technical requirements for hacking attacks (typically “exfiltrating” information from computer systems) for specific operations.  Among the list of possible targets of the collection are ‘Asset’, ‘Liason Asset’, ‘System Administrator’, ‘Foreign Information Operations’, ‘Foreign Intelligence Agencies’ and ‘Foreign Government Entities’. Notably absent is any reference to extremists or transnational criminals.
  • ‘Improvise’; a toolset for configuration, post-processing, payload setup and execution vector selection for survey/exfiltration tools supporting all major operating systems like Windows (Bartender), MacOS (JukeBox) and Linux (DanceFloor).
  • HIVE: HIVE is a multi-platform CIA malware suite and its associated control software. The project provides customizable implants for Windows, Solaris, MikroTik (used in internet routers) and Linux platforms and a Listening Post (LP)/Command and Control (C2) infrastructure to communicate with these implants. The implants are configured to communicate via HTTPS with the webserver of a cover domain; each operation utilizing these implants has a separate cover domain and the infrastructure can handle any number of cover domains.

And some key sections from the FAQ:

  • What time period is covered? The years 2013 to 2016. The sort order of the pages within each level is determined by date (oldest first). WikiLeaks has obtained the CIA’s creation/last modification date for each page but these do not yet appear for technical reasons. Usually the date can be discerned or approximated from the content and the page order. If it is critical to know the exact time/date contact WikiLeaks.
  • What is “Vault 7” “Vault 7” is a substantial collection of material about CIA activities obtained by WikiLeaks.
  • What is the total size of “Vault 7”? The series is the largest intelligence publication in history.
  • When was each part of “Vault 7” obtained?: Part one was obtained recently and covers through 2016. Details on the other parts will be available at the time of publication.
  • Is each part of “Vault 7” from a different source? Details on the other parts will be available at the time of publication.
  • How did WikiLeaks obtain each part of “Vault 7”? Sources trust WikiLeaks to not reveal information that might help identify them.
  • Isn’t WikiLeaks worried that the CIA will act against its staff to stop the series? No. That would be certainly counter-productive.

* * *

PREVIOUSLY

As a reminder, last night Wikileaks announced that it has released an encrypted torrent file which reportedly contains information on the mysterious “Vault 7”, and which we now know is the biggest “collection of material about CIA activities obtained by WikiLeaks.publication in history.” It can be downloaded now at the following URL, and accessed using the password “SplinterItIntoAThousandPiecesAndScatterItIntoTheWinds”

Wikileaks had previously announced that it would hold an 8am Eastern press conference, as part of the unveiling.

ANNOUNCE: WikiLeaks press conference in under five hours at 8am ET / 1pm UTC / 14:00 CET. Streamed live.

However, there appeared to have been some complications, with Wikileaks tweeting that “the press conference is under attack: Facebook+Periscope video used by WikiLeaks’ editor Julian Assange have been attacked. Activating contingency plans”

Press conf under attack: Facebook+Periscope video used by WikiLeaks’ editor Julian Assange have been attacked. Activating contingency (1/2)

Wikileaks then announced that “As Mr. Assange’s Perscipe+Facebook video stream links are under attack his video press conference will be rescheduled.”

NOTICE: As Mr. Assange’s Perscipe+Facebook video stream links are under attack his video press conference will be rescheduled.

In a separate tweet, Wikileaks has just released the passphrase to decrypt the torrent file: RELEASE: CIA Vault 7 Year Zero decryption passphrase:

SplinterItIntoAThousandPiecesAndScatterItIntoTheWinds

RELEASE: CIA Vault 7 Year Zero decryption passphrase:

SplinterItIntoAThousandPiecesAndScatterItIntoTheWinds

As a result, since Assange appears to have been unable to launch his previously scheduled press conference, he has gone ahead and issued the press release on Vault 7 Part 1 “Year Zero, which is titled: Inside the CIA’s global hacking force:

Press Release

Vault 7: CIA Hacking Tools Revealed

Today, Tuesday 7 March 2017, WikiLeaks begins its new series of leaks on the U.S. Central Intelligence Agency. Code-named “Vault 7” by WikiLeaks, it is the largest ever publication of confidential documents on the agency.

The first full part of the series, “Year Zero”, comprises 8,761 documents and files from an isolated, high-security network situated inside the CIA’s Center for Cyber Intelligence in Langley, Virgina. It follows an introductory disclosure last month of CIA targeting French political parties and candidates in the lead up to the 2012 presidential election.

Recently, the CIA lost control of the majority of its hacking arsenal including malware, viruses, trojans, weaponized “zero day” exploits, malware remote control systems and associated documentation. This extraordinary collection, which amounts to more than several hundred million lines of code, gives its possessor the entire hacking capacity of the CIA. The archive appears to have been circulated among former U.S. government hackers and contractors in an unauthorized manner, one of whom has provided WikiLeaks with portions of the archive.

“Year Zero” introduces the scope and direction of the CIA’s global covert hacking program, its malware arsenal and dozens of “zero day” weaponized exploits against a wide range of U.S. and European company products, include Apple’s iPhone, Google’s Android and Microsoft’s Windows and even Samsung TVs, which are turned into covert microphones.

Since 2001 the CIA has gained political and budgetary preeminence over the U.S. National Security Agency (NSA). The CIA found itself building not just its now infamous drone fleet, but a very different type of covert, globe-spanning force — its own substantial fleet of hackers. The agency’s hacking division freed it from having to disclose its often controversial operations to the NSA (its primary bureaucratic rival) in order to draw on the NSA’s hacking capacities.

By the end of 2016, the CIA’s hacking division, which formally falls under the agency’s Center for Cyber Intelligence (CCI), had over 5000 registered users and had produced more than a thousand hacking systems, trojans, viruses, and other “weaponized” malware. Such is the scale of the CIA’s undertaking that by 2016, its hackers had utilized more code than that used to run Facebook. The CIA had created, in effect, its “own NSA” with even less accountability and without publicly answering the question as to whether such a massive budgetary spend on duplicating the capacities of a rival agency could be justified.

In a statement to WikiLeaks the source details policy questions that they say urgently need to be debated in public, including whether the CIA’s hacking capabilities exceed its mandated powers and the problem of public oversight of the agency. The source wishes to initiate a public debate about the security, creation, use, proliferation and democratic control of cyberweapons.

Once a single cyber ‘weapon’ is ‘loose’ it can spread around the world in seconds, to be used by rival states, cyber mafia and teenage hackers alike.

Julian Assange, WikiLeaks editor stated that “There is an extreme proliferation risk in the development of cyber ‘weapons’. Comparisons can be drawn between the uncontrolled proliferation of such ‘weapons’, which results from the inability to contain them combined with their high market value, and the global arms trade. But the significance of “Year Zero” goes well beyond the choice between cyberwar and cyberpeace. The disclosure is also exceptional from a political, legal and forensic perspective.”

Wikileaks has carefully reviewed the “Year Zero” disclosure and published substantive CIA documentation while avoiding the distribution of ‘armed’ cyberweapons until a consensus emerges on the technical and political nature of the CIA’s program and how such ‘weapons’ should analyzed, disarmed and published.

Wikileaks has also decided to redact and anonymise some identifying information in “Year Zero” for in depth analysis. These redactions include ten of thousands of CIA targets and attack machines throughout Latin America, Europe and the United States. While we are aware of the imperfect results of any approach chosen, we remain committed to our publishing model and note that the quantity of published pages in “Vault 7” part one (“Year Zero”) already eclipses the total number of pages published over the first three years of the Edward Snowden NSA leaks.

* * *

Analysis

CIA malware targets iPhone, Android, smart TVs

CIA malware and hacking tools are built by EDG (Engineering Development Group), a software development group within CCI (Center for Cyber Intelligence), a department belonging to the CIA’s DDI (Directorate for Digital Innovation). The DDI is one of the five major directorates of the CIA (see this organizational chart of the CIA for more details).

The EDG is responsible for the development, testing and operational support of all backdoors, exploits, malicious payloads, trojans, viruses and any other kind of malware used by the CIA in its covert operations world-wide.

The increasing sophistication of surveillance techniques has drawn comparisons with George Orwell’s 1984, but “Weeping Angel”, developed by the CIA’s Embedded Devices Branch (EDB), which infests smart TVs, transforming them into covert microphones, is surely its most emblematic realization.

The attack against Samsung smart TVs was developed in cooperation with the United Kingdom’s MI5/BTSS. After infestation, Weeping Angel places the target TV in a ‘Fake-Off’ mode, so that the owner falsely believes the TV is off when it is on. In ‘Fake-Off’ mode the TV operates as a bug, recording conversations in the room and sending them over the Internet to a covert CIA server.

As of October 2014 the CIA was also looking at infecting the vehicle control systems used by modern cars and trucks. The purpose of such control is not specified, but it would permit the CIA to engage in nearly undetectable assassinations.

The CIA’s Mobile Devices Branch (MDB) developed numerous attacks to remotely hack and control popular smart phones. Infected phones can be instructed to send the CIA the user’s geolocation, audio and text communications as well as covertly activate the phone’s camera and microphone.

Despite iPhone’s minority share (14.5%) of the global smart phone market in 2016, a specialized unit in the CIA’s Mobile Development Branch produces malware to infest, control and exfiltrate data from iPhones and other Apple products running iOS, such as iPads. CIA’s arsenal includes numerous local and remote “zero days” developed by CIA or obtained from GCHQ, NSA, FBI or purchased from cyber arms contractors such as Baitshop. The disproportionate focus on iOS may be explained by the popularity of the iPhone among social, political, diplomatic and business elites.

A similar unit targets Google’s Android which is used to run the majority of the world’s smart phones (~85%) including Samsung, HTC and Sony. 1.15 billion Android powered phones were sold last year. “Year Zero” shows that as of 2016 the CIA had 24 “weaponized” Android “zero days” which it has developed itself and obtained from GCHQ, NSA and cyber arms contractors.

These techniques permit the CIA to bypass the encryption of WhatsApp, Signal, Telegram, Wiebo, Confide and Cloackman by hacking the “smart” phones that they run on and collecting audio and message traffic before encryption is applied.

CIA malware targets Windows, OSx, Linux, routers

The CIA also runs a very substantial effort to infect and control Microsoft Windows users with its malware. This includes multiple local and remote weaponized “zero days”, air gap jumping viruses such as “Hammer Drill” which infects software distributed on CD/DVDs, infectors for removable media such as USBs, systems to hide data in images or in covert disk areas ( “Brutal Kangaroo”) and to keep its malware infestations going.

Many of these infection efforts are pulled together by the CIA’s Automated Implant Branch (AIB), which has developed several attack systems for automated infestation and control of CIA malware, such as “Assassin” and “Medusa”.

Attacks against Internet infrastructure and webservers are developed by the CIA’s Network Devices Branch (NDB).

The CIA has developed automated multi-platform malware attack and control systems covering Windows, Mac OS X, Solaris, Linux and more, such as EDB’s “HIVE” and the related “Cutthroat” and “Swindle” tools, which are described in the examples section below.

CIA ‘hoarded’ vulnerabilities (“zero days”)

In the wake of Edward Snowden’s leaks about the NSA, the U.S. technology industry secured a commitment from the Obama administration that the executive would disclose on an ongoing basis — rather than hoard — serious vulnerabilities, exploits, bugs or “zero days” to Apple, Google, Microsoft, and other US-based manufacturers.

Serious vulnerabilities not disclosed to the manufacturers places huge swathes of the population and critical infrastructure at risk to foreign intelligence or cyber criminals who independently discover or hear rumors of the vulnerability. If the CIA can discover such vulnerabilities so can others.

The U.S. government’s commitment to the Vulnerabilities Equities Process came after significant lobbying by US technology companies, who risk losing their share of the global market over real and perceived hidden vulnerabilities. The government stated that it would disclose all pervasive vulnerabilities discovered after 2010 on an ongoing basis.

“Year Zero” documents show that the CIA breached the Obama administration’s commitments. Many of the vulnerabilities used in the CIA’s cyber arsenal are pervasive and some may already have been found by rival intelligence agencies or cyber criminals.

As an example, specific CIA malware revealed in “Year Zero” is able to penetrate, infest and control both the Android phone and iPhone software that runs or has run presidential Twitter accounts. The CIA attacks this software by using undisclosed security vulnerabilities (“zero days”) possessed by the CIA but if the CIA can hack these phones then so can everyone else who has obtained or discovered the vulnerability. As long as the CIA keeps these vulnerabilities concealed from Apple and Google (who make the phones) they will not be fixed, and the phones will remain hackable.

The same vulnerabilities exist for the population at large, including the U.S. Cabinet, Congress, top CEOs, system administrators, security officers and engineers. By hiding these security flaws from manufacturers like Apple and Google the CIA ensures that it can hack everyone &mdsh; at the expense of leaving everyone hackable.

‘Cyberwar’ programs are a serious proliferation risk

Cyber ‘weapons’ are not possible to keep under effective control.

While nuclear proliferation has been restrained by the enormous costs and visible infrastructure involved in assembling enough fissile material to produce a critical nuclear mass, cyber ‘weapons’, once developed, are very hard to retain.

Cyber ‘weapons’ are in fact just computer programs which can be pirated like any other. Since they are entirely comprised of information they can be copied quickly with no marginal cost.

Securing such ‘weapons’ is particularly difficult since the same people who develop and use them have the skills to exfiltrate copies without leaving traces — sometimes by using the very same ‘weapons’ against the organizations that contain them. There are substantial price incentives for government hackers and consultants to obtain copies since there is a global “vulnerability market” that will pay hundreds of thousands to millions of dollars for copies of such ‘weapons’. Similarly, contractors and companies who obtain such ‘weapons’ sometimes use them for their own purposes, obtaining advantage over their competitors in selling ‘hacking’ services.

Over the last three years the United States intelligence sector, which consists of government agencies such as the CIA and NSA and their contractors, such as Booze Allan Hamilton, has been subject to unprecedented series of data exfiltrations by its own workers.

A number of intelligence community members not yet publicly named have been arrested or subject to federal criminal investigations in separate incidents.

Most visibly, on February 8, 2017 a U.S. federal grand jury indicted Harold T. Martin III with 20 counts of mishandling classified information. The Department of Justice alleged that it seized some 50,000 gigabytes of information from Harold T. Martin III that he had obtained from classified programs at NSA and CIA, including the source code for numerous hacking tools.

Once a single cyber ‘weapon’ is ‘loose’ it can spread around the world in seconds, to be used by peer states, cyber mafia and teenage hackers alike.

http://www.zerohedge.com/news/2017-03-07/wikileaks-hold-press-conference-vault-7-release-8am-eastern

WikiLeaks Posts Thousands of Purported CIA Cyberhacking Documents

Records show CIA able to spy on smartphones, internet TVs

WikiLeaks released thousands of documents and files Tuesday that it said exposed hacking tools the Central Intelligence Agency uses.

WikiLeaks released thousands of documents and files Tuesday that it said exposed hacking tools the Central Intelligence Agency uses.PHOTO: LARRY DOWNING/REUTERS

WASHINGTON—WikiLeaks released thousands of documents and files Tuesday that it said exposed tools the Central Intelligence Agency uses to hack smartphones, computer operating systems, messenger applications and internet-connected televisions.

The unauthorized disclosure—the first part of which WikiLeaks said consisted of 8,761 documents and files from the CIA’s Center for Cyber Intelligence—confronts President Donald Trump with a threat from the very organization that leaked documents on his opponent, Democrat Hillary Clinton, during the 2016 presidential campaign.

WikiLeaks named the series of files “Vault 7” and called the unauthorized disclosure the “largest ever publication of confidential documents on the agency,” saying it exposed the malware and exploits the agency amassed to hack smartphones and turn some televisions into covert microphones.

A CIA spokesman declined to comment “on the authenticity or content of purported intelligence documents.”

An intelligence source said some of the information does pertain to tools that the CIA uses to hack computers and other devices. This person said disclosing the information would jeopardize ongoing intelligence-gathering operations and the revelations were far more significant than the leaks of Edward Snowden, a former contractor for the National Security Agency who exposed active surveillance programs in 2013.

Mr. Snowden’s leaks revealed names of programs, companies that assist the NSA in surveillance and in some cases the targets of American spying. But the recent leak purports to contain highly technical details about how surveillance is carried out. That would make them far more revealing and useful to an adversary, this person said.

In one sense, Mr. Snowden provided a briefing book on U.S. surveillance, but the CIA leaks could provide the blueprints.

WikiLeaks said in its statement that it was not publishing such information as computer source code that could be used to replicate the tools it claims to have exposed. But the group left open the possibility of publishing those crucial details if “a consensus emerges on the technical and political nature of the CIA’s program and how such ‘weapons’ should [sic] analyzed, disarmed and published.”

Mr. Snowden said in a tweet Tuesday, “Still working through the publication, but what @Wikileaks has here is genuinely a big deal. Looks authentic.”

WikiLeaks said the CIA recently “lost control” of the majority of its hacking arsenal. “This extraordinary collection, which amounts to more than several hundred million lines of code, gives its possessor the entire hacking capacity of the CIA,” the site said in a statement. “The archive appears to have been circulating among former U.S. government hackers and contractors in an unauthorized manner, one of whom has provided WikiLeaks with portions of the archive.”

The website put out what it called the first installment in a series of planned leaks on Tuesday, calling it “Year Zero.” It said the first installment “introduces the scope and direction of the CIA’s global covert hacking program, its malware arsenal and dozens of ‘zero day’ weaponized exploits against a wide range of U.S. and European company products.”

WikiLeaks said the information on CIA hacking came from an unidentified source who believes the spy agency’s hacking authorities “urgently need to be debated in public, including whether the CIA’s hacking capabilities exceed its mandated powers and the problem of public oversight of the agency.”

Much of what WikiLeaks posted Tuesday appeared to be a kind of internal Wikipedia for U.S. cyber-warfare developers to collaborate, post and access information about available hacking tools. In many instances, WikiLeaks has redacted entries that appear to link to specific executable files. The documents show, for example, what capabilities exist to bypass antivirus software, with a different entry for each antivirus company.

The revelations are sure to fuel an ongoing debate over whether intelligence agencies that discover security flaws in popular technology should disclose them, so that the users can defend themselves from hackers, or keep that information secret for use in intelligence operations.

One document claims that the CIA has discovered numerous ways to hack into versions of Apple’s iOS, the mobile operating system used on iPhones. In general, hacking tools for the iPhone are considered especially valuable because the technology is so widely used, experts said. One particular hacking tool appears to remain on an iPhone even after it has been rebooted, which would make it particularly valuable to an intruder.

“These documents, which appear to be authentic, show that the intelligence community has deliberately maintained vulnerabilities in the most common devices used by hundreds of millions of people,” Ben Wizner, the director of the Speech, Privacy, and Technology Project at the American Civil Liberties Union, said in a statement.

“Those vulnerabilities will be exploited not just by our security agencies, but by hackers and governments around the world. The government has the capacity and obligation to help technology companies fix vulnerabilities as soon as they are discovered,” Mr. Wizner said.

This is the latest high-profile leak of information by WikiLeaks, which last fall published emails stolen from Mrs. Clinton’s campaign chairman, John Podesta. U.S. intelligence agencies concluded that Russian government hackers stole those emails and provided them to WikiLeaks.

WikiLeaks said the documents show the CIA’s ability to bypass the encryption of popular messenger applications, including WhatsApp, Signal, Telegram and Confide by hacking the smartphones they run on and collecting audio and message traffic before the applications encrypt the user’s texts.

The site said the documents also show how the CIA developed other mobile hacking technologies, including the ability to activate the camera and microphone of a target’s smartphone covertly and surreptitiously retrieve a target’s geolocation, audio and text communications.

WikiLeaks said one of the documents also shows how the CIA developed a program to hack internet-connected televisions in conjunction with British intelligence. The attacks can place Samsung smart TVs in a fake off mode, so the owner believes the television is switched off, while in reality it is functioning as a bug and recording conversations in the room, WikiLeaks said.

https://www.wsj.com/articles/wikileaks-posts-thousands-of-purported-cia-cyberhacking-documents-1488905823

WikiLeaks publishes massive trove of CIA spying files in ‘Vault 7’ release

Julian Assange claims that documents are the most comprehensive CIA release ever and are far larger than the Snowden files

The Independent Tech

WikiLeaks has published a huge trove of what appear to be CIA spying secrets.

The files are the most comprehensive release of US spying files ever made public, according to Julian Assange. In all, there are 8,761 documents that account for “the entire hacking capacity of the CIA”, Mr Assange claimed in a release, and the trove is just the first of a series of “Vault 7” leaks.

Already, the files include far more pages than the Snowden files that exposed the vast hacking power of the NSA and other agencies.

 In publishing the documents, WikiLeaks had ensured that the CIA had “lost control of its arsenal”, he claimed. That included a range of software and exploits that if real could allow unparalleled control of computers around the world.

It includes software that could allow people to take control of the most popular consumer electronics products used today, claimed WikiLeaks.

“‘Year Zero’ introduces the scope and direction of the CIA’s global covert hacking program, its malware arsenal and dozens of “zero day” weaponized exploits against a wide range of U.S. and European company products, include Apple’s iPhone, Google’s Android and Microsoft’s Windows and even Samsung TVs, which are turned into covert microphones,” the organisation said in a release.

The public files don’t include the cyber weapons themselves, according to a statement. The organisation will refrain from distributing “armed” software “until a consensus emerges on the technical and political nature of the CIA’s program and how such ‘weapons’ should analyzed, disarmed and published”, it said.

The files were made available by a source who intended for them to start a conversation about whether the CIA had gained too much power, according to the organisation.

“In a statement to WikiLeaks the source details policy questions that they say urgently need to be debated in public, including whether the CIA’s hacking capabilities exceed its mandated powers and the problem of public oversight of the agency,” a release read. “The source wishes to initiate a public debate about the security, creation, use, proliferation and democratic control of cyberweapons.”

It also redacts the details of some of the names, locations and targets that are identified in the documents.

The organisation had teased the release in advance with strange messages about the release being “Year Zero”, and references to “Vault 7”. It had planned to release the files later on but that plan was thrown off when its press conference came under cyber attack, Mr Assange claimed.

http://www.independent.co.uk/life-style/gadgets-and-tech/news/wikileaks-cia-vault-7-julian-assange-year-zero-documents-download-spying-secrets-a7616031.html

WikiLeaks releases ‘entire hacking capacity of the CIA’

Gutfeld: ‘Day Without a Woman’ strike sends wrong message

WikiLeaks on Tuesday released what it said is the full hacking capacity of the CIA in a stunning 8,000-plus page disclosure the anti-secrecy website contends is “the largest ever publication of confidential documents on the agency.”

The 8,761 documents and files — released as “Vault 7 Part 1” and titled “Year Zero” — were obtained from an “isolated, high-security network” at the CIA’s Center for Cyber Intelligence in Langley, Va., a press release from the website said. The trove had been “circulated among former U.S. government hackers and contractors,” one of whom “recently” gave the archive to WikiLeaks. The CIA allegedly employs more than 5,000 people in its cyber spying operation and had produced more than 1,000 programs as of 2016.

“We do not comment on the authenticity or content of purported intelligence documents,” a CIA spokesperson told Fox News.

The collection of purported intelligence documents includes information on CIA-developed malware — bearing names such as “Assassin” and “Medusa” — intended to target iPhones, Android phones, smart TVs and Microsoft, Mac and Linux operating systems, among others. An entire unit in the CIA is devoted to inventing programs to hack data from Apple products, according to WikiLeaks.

WIKILEAKS OFFERS REWARD FOR INFO ON OBAMA MISDEEDS

Some of the remote hacking programs can allegedly turn numerous electronic devices into recording and transmitting stations to spy on their targets, with the information then sent back to secret CIA servers. One document appears to show the CIA was trying to “infect” vehicle control systems in cars and trucks for unspecified means.

WikiLeaks hinted that the capabilites revealed in Tuesday’s disclosure could have even darker utility than simply spying.

“It would permit the CIA to engage in nearly undetectable assassinations,” the release stated.

WikiLeaks confirms CIA can effectively bypass Signal + Telegram + WhatsApp + Confide encryptionhttps://wikileaks.org/ciav7p1 

FLASHBACK: WIKILEAKS REVEALS CLINTON ‘HITS’ FILE ON SANDERS

The site said the CIA additionally failed to disclose security vulnerabilities and bugs to major U.S. software manufacturers, violating an Obama administration commitment made in January 2014. Instead, the agency used the software vulnerabilities — which could also be exploited by rival agencies, nations and groups — for its own ends, WikiLeaks said.

CIA hackers celebrated what they saw as the financial largesse of Obama towards them with “Make It Rain” gifhttps://wikileaks.org/ciav7p1/cms/files/makeitrain.gif 

“As an example, specific CIA malware revealed in ‘Year Zero’ is able to penetrate, infest and control both the Android phone and iPhone software that runs or has run presidential Twitter accounts,” the WikiLeaks release stated.

Digital rights non-profit Access Now said in a statement on Tuesday it was “fantasy to believe only the ‘good guys'” would be able to use the discovered vulnerabilities.

“Today, our digital security has been compromised because the CIA has been stockpiling vulnerabilities rather than working with companies to patch them,” Senior Legislative Manager Nathan White said.

The CIA allegedly also maintains a database of malware created in other nations — WikiLeaks specifically cites Russia — in order to disguise its own hacking attempts as the work of another group.

In what is described by WikiLeaks as “one of the most astounding intelligence own goals in living memory,” the CIA is said to have made most of its programs unclassified to avoid legal consequences for transmitting classified information through the Internet — a move that increased the risk of outside groups pirating the cyber spying tools.

WikiLeaks also revealed the U.S. Consulate in Frankfurt is a hacking base, and the website provided the methods by which agents obfuscate customs officers to gain entry to Germany, pretending to provide technical consultation.

WikiLeaks said its source released the files because they believed questions surrounding the CIA’s reach “urgently need to be debated in public,” echoing the motives of many previous leakers.

PSA: This incorrectly implies CIA hacked these apps / encryption. But the docs show iOS/Android are what got hacked – a much bigger problem. https://twitter.com/wikileaks/status/839120909625606152 

Still working through the publication, but what @Wikileaks has here is genuinely a big deal. Looks authentic.

One such former leaker, Edward Snowden, tweeted Tuesday afternoon about the WikiLeaks release.

“Still working through the publication, but what @Wikileaks has here is genuinely a big deal. Looks authentic,” wrote Snowden, who has been granted asylum in Russia as he seeks to avoid criminal prosecution in the U.S.

Some of the WikiLeaks files include redacted information, such as tens “of thousands of CIA targets and attack machines throughout Latin America, Europe and the United States.”

http://www.foxnews.com/us/2017/03/07/wikileaks-releases-entire-hacking-capacity-cia.html

Vault 7: CIA Hacking Tools Revealed

  • Releases
  • Documents

Press Release

Today, Tuesday 7 March 2017, WikiLeaks begins its new series of leaks on the U.S. Central Intelligence Agency. Code-named “Vault 7” by WikiLeaks, it is the largest ever publication of confidential documents on the agency.

The first full part of the series, “Year Zero”, comprises 8,761 documents and files from an isolated, high-security network situated inside the CIA’s Center for Cyber Intelligence in Langley, Virgina. It follows an introductory disclosure last month of CIA targeting French political parties and candidates in the lead up to the 2012 presidential election.

Recently, the CIA lost control of the majority of its hacking arsenal including malware, viruses, trojans, weaponized “zero day” exploits, malware remote control systems and associated documentation. This extraordinary collection, which amounts to more than several hundred million lines of code, gives its possessor the entire hacking capacity of the CIA. The archive appears to have been circulated among former U.S. government hackers and contractors in an unauthorized manner, one of whom has provided WikiLeaks with portions of the archive.

“Year Zero” introduces the scope and direction of the CIA’s global covert hacking program, its malware arsenal and dozens of “zero day” weaponized exploits against a wide range of U.S. and European company products, include Apple’s iPhone, Google’s Android and Microsoft’s Windows and even Samsung TVs, which are turned into covert microphones.

Since 2001 the CIA has gained political and budgetary preeminence over the U.S. National Security Agency (NSA). The CIA found itself building not just its now infamous drone fleet, but a very different type of covert, globe-spanning force — its own substantial fleet of hackers. The agency’s hacking division freed it from having to disclose its often controversial operations to the NSA (its primary bureaucratic rival) in order to draw on the NSA’s hacking capacities.

By the end of 2016, the CIA’s hacking division, which formally falls under the agency’s Center for Cyber Intelligence (CCI), had over 5000 registered users and had produced more than a thousand hacking systems, trojans, viruses, and other “weaponized” malware. Such is the scale of the CIA’s undertaking that by 2016, its hackers had utilized more code than that used to run Facebook. The CIA had created, in effect, its “own NSA” with even less accountability and without publicly answering the question as to whether such a massive budgetary spend on duplicating the capacities of a rival agency could be justified.

In a statement to WikiLeaks the source details policy questions that they say urgently need to be debated in public, including whether the CIA’s hacking capabilities exceed its mandated powers and the problem of public oversight of the agency. The source wishes to initiate a public debate about the security, creation, use, proliferation and democratic control of cyberweapons.

Once a single cyber ‘weapon’ is ‘loose’ it can spread around the world in seconds, to be used by rival states, cyber mafia and teenage hackers alike.

Julian Assange, WikiLeaks editor stated that “There is an extreme proliferation risk in the development of cyber ‘weapons’. Comparisons can be drawn between the uncontrolled proliferation of such ‘weapons’, which results from the inability to contain them combined with their high market value, and the global arms trade. But the significance of “Year Zero” goes well beyond the choice between cyberwar and cyberpeace. The disclosure is also exceptional from a political, legal and forensic perspective.”

Wikileaks has carefully reviewed the “Year Zero” disclosure and published substantive CIA documentation while avoiding the distribution of ‘armed’ cyberweapons until a consensus emerges on the technical and political nature of the CIA’s program and how such ‘weapons’ should analyzed, disarmed and published.

Wikileaks has also decided to redact and anonymise some identifying information in “Year Zero” for in depth analysis. These redactions include ten of thousands of CIA targets and attack machines throughout Latin America, Europe and the United States. While we are aware of the imperfect results of any approach chosen, we remain committed to our publishing model and note that the quantity of published pages in “Vault 7” part one (“Year Zero”) already eclipses the total number of pages published over the first three years of the Edward Snowden NSA leaks.

Analysis

CIA malware targets iPhone, Android, smart TVs

CIA malware and hacking tools are built by EDG (Engineering Development Group), a software development group within CCI (Center for Cyber Intelligence), a department belonging to the CIA’s DDI (Directorate for Digital Innovation). The DDI is one of the five major directorates of the CIA (see this organizational chart of the CIA for more details).

The EDG is responsible for the development, testing and operational support of all backdoors, exploits, malicious payloads, trojans, viruses and any other kind of malware used by the CIA in its covert operations world-wide.

The increasing sophistication of surveillance techniques has drawn comparisons with George Orwell’s 1984, but “Weeping Angel”, developed by the CIA’s Embedded Devices Branch (EDB), which infests smart TVs, transforming them into covert microphones, is surely its most emblematic realization.

The attack against Samsung smart TVs was developed in cooperation with the United Kingdom’s MI5/BTSS. After infestation, Weeping Angel places the target TV in a ‘Fake-Off’ mode, so that the owner falsely believes the TV is off when it is on. In ‘Fake-Off’ mode the TV operates as a bug, recording conversations in the room and sending them over the Internet to a covert CIA server.

As of October 2014 the CIA was also looking at infecting the vehicle control systems used by modern cars and trucks. The purpose of such control is not specified, but it would permit the CIA to engage in nearly undetectable assassinations.

The CIA’s Mobile Devices Branch (MDB) developed numerous attacks to remotely hack and control popular smart phones. Infected phones can be instructed to send the CIA the user’s geolocation, audio and text communications as well as covertly activate the phone’s camera and microphone.

Despite iPhone’s minority share (14.5%) of the global smart phone market in 2016, a specialized unit in the CIA’s Mobile Development Branch produces malware to infest, control and exfiltrate data from iPhones and other Apple products running iOS, such as iPads. CIA’s arsenal includesnumerous local and remote “zero days” developed by CIA or obtained from GCHQ, NSA, FBI or purchased from cyber arms contractors such as Baitshop. The disproportionate focus on iOS may be explained by the popularity of the iPhone among social, political, diplomatic and business elites.

A similar unit targets Google’s Android which is used to run the majority of the world’s smart phones (~85%) including Samsung, HTC and Sony. 1.15 billion Android powered phones were sold last year. “Year Zero” shows that as of 2016 the CIA had 24 “weaponized” Android “zero days” which it has developed itself and obtained from GCHQ, NSA and cyber arms contractors.

These techniques permit the CIA to bypass the encryption of WhatsApp, Signal, Telegram, Wiebo, Confide and Cloackman by hacking the “smart” phones that they run on and collecting audio and message traffic before encryption is applied.

CIA malware targets Windows, OSx, Linux, routers

The CIA also runs a very substantial effort to infect and control Microsoft Windows users with its malware. This includes multiple local and remote weaponized “zero days”, air gap jumping viruses such as “Hammer Drill” which infects software distributed on CD/DVDs, infectors for removable media such as USBs, systems to hide data in images or in covert disk areas ( “Brutal Kangaroo”) and to keep its malware infestations going.

Many of these infection efforts are pulled together by the CIA’s Automated Implant Branch (AIB), which has developed several attack systems for automated infestation and control of CIA malware, such as “Assassin” and “Medusa”.

Attacks against Internet infrastructure and webservers are developed by the CIA’s Network Devices Branch (NDB).

The CIA has developed automated multi-platform malware attack and control systems covering Windows, Mac OS X, Solaris, Linux and more, such as EDB’s “HIVE” and the related “Cutthroat” and “Swindle” tools, which are described in the examples section below.

CIA ‘hoarded’ vulnerabilities (“zero days”)

In the wake of Edward Snowden’s leaks about the NSA, the U.S. technology industry secured a commitment from the Obama administration that the executive would disclose on an ongoing basis — rather than hoard — serious vulnerabilities, exploits, bugs or “zero days” to Apple, Google, Microsoft, and other US-based manufacturers.

Serious vulnerabilities not disclosed to the manufacturers places huge swathes of the population and critical infrastructure at risk to foreign intelligence or cyber criminals who independently discover or hear rumors of the vulnerability. If the CIA can discover such vulnerabilities so can others.

The U.S. government’s commitment to the Vulnerabilities Equities Process came after significant lobbying by US technology companies, who risk losing their share of the global market over real and perceived hidden vulnerabilities. The government stated that it would disclose all pervasive vulnerabilities discovered after 2010 on an ongoing basis.

“Year Zero” documents show that the CIA breached the Obama administration’s commitments. Many of the vulnerabilities used in the CIA’s cyber arsenal are pervasive and some may already have been found by rival intelligence agencies or cyber criminals.

As an example, specific CIA malware revealed in “Year Zero” is able to penetrate, infest and control both the Android phone and iPhone software that runs or has run presidential Twitter accounts. The CIA attacks this software by using undisclosed security vulnerabilities (“zero days”) possessed by the CIA but if the CIA can hack these phones then so can everyone else who has obtained or discovered the vulnerability. As long as the CIA keeps these vulnerabilities concealed from Apple and Google (who make the phones) they will not be fixed, and the phones will remain hackable.

The same vulnerabilities exist for the population at large, including the U.S. Cabinet, Congress, top CEOs, system administrators, security officers and engineers. By hiding these security flaws from manufacturers like Apple and Google the CIA ensures that it can hack everyone &mdsh; at the expense of leaving everyone hackable.

‘Cyberwar’ programs are a serious proliferation risk

Cyber ‘weapons’ are not possible to keep under effective control.

While nuclear proliferation has been restrained by the enormous costs and visible infrastructure involved in assembling enough fissile material to produce a critical nuclear mass, cyber ‘weapons’, once developed, are very hard to retain.

Cyber ‘weapons’ are in fact just computer programs which can be pirated like any other. Since they are entirely comprised of information they can be copied quickly with no marginal cost.

Securing such ‘weapons’ is particularly difficult since the same people who develop and use them have the skills to exfiltrate copies without leaving traces — sometimes by using the very same ‘weapons’ against the organizations that contain them. There are substantial price incentives for government hackers and consultants to obtain copies since there is a global “vulnerability market” that will pay hundreds of thousands to millions of dollars for copies of such ‘weapons’. Similarly, contractors and companies who obtain such ‘weapons’ sometimes use them for their own purposes, obtaining advantage over their competitors in selling ‘hacking’ services.

Over the last three years the United States intelligence sector, which consists of government agencies such as the CIA and NSA and their contractors, such as Booz Allan Hamilton, has been subject to unprecedented series of data exfiltrations by its own workers.

A number of intelligence community members not yet publicly named have been arrested or subject to federal criminal investigations in separate incidents.

Most visibly, on February 8, 2017 a U.S. federal grand jury indicted Harold T. Martin III with 20 counts of mishandling classified information. The Department of Justice alleged that it seized some 50,000 gigabytes of information from Harold T. Martin III that he had obtained from classified programs at NSA and CIA, including the source code for numerous hacking tools.

Once a single cyber ‘weapon’ is ‘loose’ it can spread around the world in seconds, to be used by peer states, cyber mafia and teenage hackers alike.

U.S. Consulate in Frankfurt is a covert CIA hacker base

In addition to its operations in Langley, Virginia the CIA also uses the U.S. consulate in Frankfurt as a covert base for its hackers covering Europe, the Middle East and Africa.

CIA hackers operating out of the Frankfurt consulate ( “Center for Cyber Intelligence Europe” or CCIE) are given diplomatic (“black”) passports and State Department cover. The instructions for incoming CIA hackers make Germany’s counter-intelligence efforts appear inconsequential: “Breeze through German Customs because you have your cover-for-action story down pat, and all they did was stamp your passport”

Your Cover Story (for this trip)
Q: Why are you here?
A: Supporting technical consultations at the Consulate.

Two earlier WikiLeaks publications give further detail on CIA approaches to customs and secondary screening procedures.

Once in Frankfurt CIA hackers can travel without further border checks to the 25 European countries that are part of the Shengen open border area — including France, Italy and Switzerland.

A number of the CIA’s electronic attack methods are designed for physical proximity. These attack methods are able to penetrate high security networks that are disconnected from the internet, such as police record database. In these cases, a CIA officer, agent or allied intelligence officer acting under instructions, physically infiltrates the targeted workplace. The attacker is provided with a USB containing malware developed for the CIA for this purpose, which is inserted into the targeted computer. The attacker then infects and exfiltrates data to removable media. For example, the CIA attack system Fine Dining, provides 24 decoy applications for CIA spies to use. To witnesses, the spy appears to be running a program showing videos (e.g VLC), presenting slides (Prezi), playing a computer game (Breakout2, 2048) or even running a fake virus scanner (Kaspersky, McAfee, Sophos). But while the decoy application is on the screen, the underlaying system is automatically infected and ransacked.

How the CIA dramatically increased proliferation risks

In what is surely one of the most astounding intelligence own goals in living memory, the CIA structured its classification regime such that for the most market valuable part of “Vault 7” — the CIA’s weaponized malware (implants + zero days), Listening Posts (LP), and Command and Control (C2) systems — the agency has little legal recourse.

The CIA made these systems unclassified.

Why the CIA chose to make its cyberarsenal unclassified reveals how concepts developed for military use do not easily crossover to the ‘battlefield’ of cyber ‘war’.

To attack its targets, the CIA usually requires that its implants communicate with their control programs over the internet. If CIA implants, Command & Control and Listening Post software were classified, then CIA officers could be prosecuted or dismissed for violating rules that prohibit placing classified information onto the Internet. Consequently the CIA has secretly made most of its cyber spying/war code unclassified. The U.S. government is not able to assert copyright either, due to restrictions in the U.S. Constitution. This means that cyber ‘arms’ manufactures and computer hackers can freely “pirate” these ‘weapons’ if they are obtained. The CIA has primarily had to rely on obfuscation to protect its malware secrets.

Conventional weapons such as missiles may be fired at the enemy (i.e into an unsecured area). Proximity to or impact with the target detonates the ordnance including its classified parts. Hence military personnel do not violate classification rules by firing ordnance with classified parts. Ordnance will likely explode. If it does not, that is not the operator’s intent.

Over the last decade U.S. hacking operations have been increasingly dressed up in military jargon to tap into Department of Defense funding streams. For instance, attempted “malware injections” (commercial jargon) or “implant drops” (NSA jargon) are being called “fires” as if a weapon was being fired. However the analogy is questionable.

Unlike bullets, bombs or missiles, most CIA malware is designed to live for days or even years after it has reached its ‘target’. CIA malware does not “explode on impact” but rather permanently infests its target. In order to infect target’s device, copies of the malware must be placed on the target’s devices, giving physical possession of the malware to the target. To exfiltrate data back to the CIA or to await further instructions the malware must communicate with CIA Command & Control (C2) systems placed on internet connected servers. But such servers are typically not approved to hold classified information, so CIA command and control systems are also made unclassified.

A successful ‘attack’ on a target’s computer system is more like a series of complex stock maneuvers in a hostile take-over bid or the careful planting of rumors in order to gain control over an organization’s leadership rather than the firing of a weapons system. If there is a military analogy to be made, the infestation of a target is perhaps akin to the execution of a whole series of military maneuvers against the target’s territory including observation, infiltration, occupation and exploitation.

Evading forensics and anti-virus

A series of standards lay out CIA malware infestation patterns which are likely to assist forensic crime scene investigators as well as Apple, Microsoft, Google, Samsung, Nokia, Blackberry, Siemens and anti-virus companies attribute and defend against attacks.

“Tradecraft DO’s and DON’Ts” contains CIA rules on how its malware should be written to avoid fingerprints implicating the “CIA, US government, or its witting partner companies” in “forensic review”. Similar secret standards cover the use of encryption to hide CIA hacker and malware communication (pdf), describing targets & exfiltrated data (pdf) as well as executing payloads (pdf) and persisting (pdf) in the target’s machines over time.CIA hackers developed successful attacks against most well known anti-virus programs. These are documented in AV defeats, Personal Security Products, Detecting and defeating PSPs and PSP/Debugger/RE Avoidance. For example, Comodo was defeated by CIA malware placing itself in the Window’s “Recycle Bin”. While Comodo 6.x has a “Gaping Hole of DOOM”.

CIA hackers discussed what the NSA’s “Equation Group” hackers did wrong and how the CIA’s malware makers could avoid similar exposure.

Examples

The CIA’s Engineering Development Group (EDG) management system contains around 500 different projects (only some of which are documented by “Year Zero”) each with their own sub-projects, malware and hacker tools.

The majority of these projects relate to tools that are used for penetration, infestation (“implanting”), control, and exfiltration.

Another branch of development focuses on the development and operation of Listening Posts (LP) and Command and Control (C2) systems used to communicate with and control CIA implants; special projects are used to target specific hardware from routers to smart TVs.

Some example projects are described below, but see the table of contents for the full list of projects described by WikiLeaks’ “Year Zero”.

UMBRAGE

The CIA’s hand crafted hacking techniques pose a problem for the agency. Each technique it has created forms a “fingerprint” that can be used by forensic investigators to attribute multiple different attacks to the same entity.

This is analogous to finding the same distinctive knife wound on multiple separate murder victims. The unique wounding style creates suspicion that a single murderer is responsible. As soon one murder in the set is solved then the other murders also find likely attribution.

The CIA’s Remote Devices Branch‘s UMBRAGE group collects and maintains a substantial library of attack techniques ‘stolen’ from malware produced in other states including the Russian Federation.

With UMBRAGE and related projects the CIA cannot only increase its total number of attack types but also misdirect attribution by leaving behind the “fingerprints” of the groups that the attack techniques were stolen from.

UMBRAGE components cover keyloggers, password collection, webcam capture, data destruction, persistence, privilege escalation, stealth, anti-virus (PSP) avoidance and survey techniques.

Fine Dining

Fine Dining comes with a standardized questionnaire i.e menu that CIA case officers fill out. The questionnaire is used by the agency’s OSB (Operational Support Branch) to transform the requests of case officers into technical requirements for hacking attacks (typically “exfiltrating” information from computer systems) for specific operations. The questionnaire allows the OSB to identify how to adapt existing tools for the operation, and communicate this to CIA malware configuration staff. The OSB functions as the interface between CIA operational staff and the relevant technical support staff.

Among the list of possible targets of the collection are ‘Asset’, ‘Liason Asset’, ‘System Administrator’, ‘Foreign Information Operations’, ‘Foreign Intelligence Agencies’ and ‘Foreign Government Entities’. Notably absent is any reference to extremists or transnational criminals. The ‘Case Officer’ is also asked to specify the environment of the target like the type of computer, operating system used, Internet connectivity and installed anti-virus utilities (PSPs) as well as a list of file types to be exfiltrated like Office documents, audio, video, images or custom file types. The ‘menu’ also asks for information if recurring access to the target is possible and how long unobserved access to the computer can be maintained. This information is used by the CIA’s ‘JQJIMPROVISE’ software (see below) to configure a set of CIA malware suited to the specific needs of an operation.

Improvise (JQJIMPROVISE)

‘Improvise’ is a toolset for configuration, post-processing, payload setup and execution vector selection for survey/exfiltration tools supporting all major operating systems like Windows (Bartender), MacOS (JukeBox) and Linux (DanceFloor). Its configuration utilities like Margarita allows the NOC (Network Operation Center) to customize tools based on requirements from ‘Fine Dining’ questionairies.

HIVE

HIVE is a multi-platform CIA malware suite and its associated control software. The project provides customizable implants for Windows, Solaris, MikroTik (used in internet routers) and Linux platforms and a Listening Post (LP)/Command and Control (C2) infrastructure to communicate with these implants.

The implants are configured to communicate via HTTPS with the webserver of a cover domain; each operation utilizing these implants has a separate cover domain and the infrastructure can handle any number of cover domains.

Each cover domain resolves to an IP address that is located at a commercial VPS (Virtual Private Server) provider. The public-facing server forwards all incoming traffic via a VPN to a ‘Blot’ server that handles actual connection requests from clients. It is setup for optional SSL client authentication: if a client sends a valid client certificate (only implants can do that), the connection is forwarded to the ‘Honeycomb’ toolserver that communicates with the implant; if a valid certificate is missing (which is the case if someone tries to open the cover domain website by accident), the traffic is forwarded to a cover server that delivers an unsuspicious looking website.

The Honeycomb toolserver receives exfiltrated information from the implant; an operator can also task the implant to execute jobs on the target computer, so the toolserver acts as a C2 (command and control) server for the implant.

Similar functionality (though limited to Windows) is provided by the RickBobby project.

See the classified user and developer guides for HIVE.

Frequently Asked Questions

Why now?

WikiLeaks published as soon as its verification and analysis were ready.

In Febuary the Trump administration has issued an Executive Order calling for a “Cyberwar” review to be prepared within 30 days.

While the review increases the timeliness and relevance of the publication it did not play a role in setting the publication date.

Redactions

Names, email addresses and external IP addresses have been redacted in the released pages (70,875 redactions in total) until further analysis is complete.

  1. Over-redaction: Some items may have been redacted that are not employees, contractors, targets or otherwise related to the agency, but are, for example, authors of documentation for otherwise public projects that are used by the agency.
  2. Identity vs. person: the redacted names are replaced by user IDs (numbers) to allow readers to assign multiple pages to a single author. Given the redaction process used a single person may be represented by more than one assigned identifier but no identifier refers to more than one real person.
  3. Archive attachments (zip, tar.gz, …) are replaced with a PDF listing all the file names in the archive. As the archive content is assessed it may be made available; until then the archive is redacted.
  4. Attachments with other binary content are replaced by a hex dump of the content to prevent accidental invocation of binaries that may have been infected with weaponized CIA malware. As the content is assessed it may be made available; until then the content is redacted.
  5. The tens of thousands of routable IP addresses references (including more than 22 thousand within the United States) that correspond to possible targets, CIA covert listening post servers, intermediary and test systems, are redacted for further exclusive investigation.
  6. Binary files of non-public origin are only available as dumps to prevent accidental invocation of CIA malware infected binaries.

Organizational Chart

The organizational chart corresponds to the material published by WikiLeaks so far.

Since the organizational structure of the CIA below the level of Directorates is not public, the placement of the EDG and its branches within the org chart of the agency is reconstructed from information contained in the documents released so far. It is intended to be used as a rough outline of the internal organization; please be aware that the reconstructed org chart is incomplete and that internal reorganizations occur frequently.

Wiki pages

“Year Zero” contains 7818 web pages with 943 attachments from the internal development groupware. The software used for this purpose is called Confluence, a proprietary software from Atlassian. Webpages in this system (like in Wikipedia) have a version history that can provide interesting insights on how a document evolved over time; the 7818 documents include these page histories for 1136 latest versions.

The order of named pages within each level is determined by date (oldest first). Page content is not present if it was originally dynamically created by the Confluence software (as indicated on the re-constructed page).

What time period is covered?

The years 2013 to 2016. The sort order of the pages within each level is determined by date (oldest first).

WikiLeaks has obtained the CIA’s creation/last modification date for each page but these do not yet appear for technical reasons. Usually the date can be discerned or approximated from the content and the page order. If it is critical to know the exact time/date contact WikiLeaks.

What is “Vault 7”

“Vault 7” is a substantial collection of material about CIA activities obtained by WikiLeaks.

When was each part of “Vault 7” obtained?

Part one was obtained recently and covers through 2016. Details on the other parts will be available at the time of publication.

Is each part of “Vault 7” from a different source?

Details on the other parts will be available at the time of publication.

What is the total size of “Vault 7”?

The series is the largest intelligence publication in history.

How did WikiLeaks obtain each part of “Vault 7”?

Sources trust WikiLeaks to not reveal information that might help identify them.

Isn’t WikiLeaks worried that the CIA will act against its staff to stop the series?

No. That would be certainly counter-productive.

Has WikiLeaks already ‘mined’ all the best stories?

No. WikiLeaks has intentionally not written up hundreds of impactful stories to encourage others to find them and so create expertise in the area for subsequent parts in the series. They’re there. Look. Those who demonstrate journalistic excellence may be considered for early access to future parts.

Won’t other journalists find all the best stories before me?

Unlikely. There are very considerably more stories than there are journalists or academics who are in a position to write them.

https://wikileaks.org/ciav7p1/

The Pronk Pops Show Podcasts Portfolio

Listen To Pronk Pops Podcast or Download Shows 850-853

Listen To Pronk Pops Podcast or Download Shows 845-849

Listen To Pronk Pops Podcast or Download Shows 840-844

Listen To Pronk Pops Podcast or Download Shows 833-839

Listen To Pronk Pops Podcast or Download Shows 827-832

Listen To Pronk Pops Podcast or Download Shows 821-826

Listen To Pronk Pops Podcast or Download Shows 815-820

Listen To Pronk Pops Podcast or Download Shows 806-814

Listen To Pronk Pops Podcast or Download Shows 800-805

Listen To Pronk Pops Podcast or Download Shows 793-799

Listen To Pronk Pops Podcast or Download Shows 785-792

Listen To Pronk Pops Podcast or Download Shows 777-784

Listen To Pronk Pops Podcast or Download Shows 769-776

Listen To Pronk Pops Podcast or Download Shows 759-768

Listen To Pronk Pops Podcast or Download Shows 751-758

Listen To Pronk Pops Podcast or Download Shows 745-750

Listen To Pronk Pops Podcast or Download Shows 738-744

Listen To Pronk Pops Podcast or Download Shows 732-737

Listen To Pronk Pops Podcast or Download Shows 727-731

Listen To Pronk Pops Podcast or Download Shows 720-726

Listen To Pronk Pops Podcast or DownloadShows 713-719

Listen To Pronk Pops Podcast or DownloadShows 705-712

Listen To Pronk Pops Podcast or Download Shows 695-704

Listen To Pronk Pops Podcast or Download Shows 685-694

Listen To Pronk Pops Podcast or Download Shows 675-684

Listen To Pronk Pops Podcast or Download Shows 668-674

Listen To Pronk Pops Podcast or Download Shows 660-667

Listen To Pronk Pops Podcast or Download Shows 651-659

Listen To Pronk Pops Podcast or Download Shows 644-650

Listen To Pronk Pops Podcast or Download Shows 637-643

Listen To Pronk Pops Podcast or Download Shows 629-636

Listen To Pronk Pops Podcast or Download Shows 617-628

Listen To Pronk Pops Podcast or Download Shows 608-616

Listen To Pronk Pops Podcast or Download Shows 599-607

Listen To Pronk Pops Podcast or Download Shows 590-598

Listen To Pronk Pops Podcast or Download Shows 585- 589

Listen To Pronk Pops Podcast or Download Shows 575-584

Listen To Pronk Pops Podcast or Download Shows 565-574

Listen To Pronk Pops Podcast or Download Shows 556-564

Listen To Pronk Pops Podcast or Download Shows 546-555

Listen To Pronk Pops Podcast or Download Shows 538-545

Listen To Pronk Pops Podcast or Download Shows 532-537

Listen To Pronk Pops Podcast or Download Shows 526-531

Listen To Pronk Pops Podcast or Download Shows 519-525

Listen To Pronk Pops Podcast or Download Shows 510-518

Listen To Pronk Pops Podcast or Download Shows 500-509

Listen To Pronk Pops Podcast or Download Shows 490-499

Listen To Pronk Pops Podcast or Download Shows 480-489

Listen To Pronk Pops Podcast or Download Shows 473-479

Listen To Pronk Pops Podcast or Download Shows 464-472

Listen To Pronk Pops Podcast or Download Shows 455-463

Listen To Pronk Pops Podcast or Download Shows 447-454

Listen To Pronk Pops Podcast or Download Shows 439-446

Listen To Pronk Pops Podcast or Download Shows 431-438

Listen To Pronk Pops Podcast or Download Shows 422-430

Listen To Pronk Pops Podcast or Download Shows 414-421

Listen To Pronk Pops Podcast or Download Shows 408-413

Listen To Pronk Pops Podcast or Download Shows 400-407

Listen To Pronk Pops Podcast or Download Shows 391-399

Listen To Pronk Pops Podcast or Download Shows 383-390

Listen To Pronk Pops Podcast or Download Shows 376-382

Listen To Pronk Pops Podcast or Download Shows 369-375

Listen To Pronk Pops Podcast or Download Shows 360-368

Listen To Pronk Pops Podcast or Download Shows 354-359

Listen To Pronk Pops Podcast or Download Shows 346-353

Listen To Pronk Pops Podcast or Download Shows 338-345

Listen To Pronk Pops Podcast or Download Shows 328-337

Listen To Pronk Pops Podcast or Download Shows 319-327

Listen To Pronk Pops Podcast or Download Shows 307-318

Listen To Pronk Pops Podcast or Download Shows 296-306

Listen To Pronk Pops Podcast or Download Shows 287-295

Listen To Pronk Pops Podcast or Download Shows 277-286

Listen To Pronk Pops Podcast or Download Shows 264-276

Listen To Pronk Pops Podcast or Download Shows 250-263

Listen To Pronk Pops Podcast or Download Shows 236-249

Listen To Pronk Pops Podcast or Download Shows 222-235

Listen To Pronk Pops Podcast or Download Shows 211-221

Listen To Pronk Pops Podcast or Download Shows 202-210

Listen To Pronk Pops Podcast or Download Shows 194-201

Listen To Pronk Pops Podcast or Download Shows 184-193

Listen To Pronk Pops Podcast or Download Shows 174-183

Listen To Pronk Pops Podcast or Download Shows 165-173

Listen To Pronk Pops Podcast or Download Shows 158-164

Listen To Pronk Pops Podcast or Download Shows151-157

Listen To Pronk Pops Podcast or Download Shows 143-150

Listen To Pronk Pops Podcast or Download Shows 135-142

Listen To Pronk Pops Podcast or Download Shows 131-134

Listen To Pronk Pops Podcast or Download Shows 124-130

Listen To Pronk Pops Podcast or Download Shows 121-123

Listen To Pronk Pops Podcast or Download Shows 118-120

Listen To Pronk Pops Podcast or Download Shows 113 -117

Listen To Pronk Pops Podcast or Download Show 112

Listen To Pronk Pops Podcast or Download Shows 108-111

Listen To Pronk Pops Podcast or Download Shows 106-108

Listen To Pronk Pops Podcast or Download Shows 104-105

Listen To Pronk Pops Podcast or Download Shows 101-103

Listen To Pronk Pops Podcast or Download Shows 98-100

Listen To Pronk Pops Podcast or Download Shows 94-97

Listen To Pronk Pops Podcast or Download Show 93

Listen To Pronk Pops Podcast or Download Show 92

Listen To Pronk Pops Podcast or Download Show 91

Listen To Pronk Pops Podcast or Download Shows 88-90

Listen To Pronk Pops Podcast or Download Shows 84-87

Listen To Pronk Pops Podcast or Download Shows 79-83

Listen To Pronk Pops Podcast or Download Shows 74-78

Listen To Pronk Pops Podcast or Download Shows 71-73

Listen To Pronk Pops Podcast or Download Shows 68-70

Listen To Pronk Pops Podcast or Download Shows 65-67

Listen To Pronk Pops Podcast or Download Shows 62-64

Listen To Pronk Pops Podcast or Download Shows 58-61

Listen To Pronk Pops Podcast or Download Shows 55-57

Listen To Pronk Pops Podcast or Download Shows 52-54

Listen To Pronk Pops Podcast or Download Shows 49-51

Listen To Pronk Pops Podcast or Download Shows 45-48

Listen To Pronk Pops Podcast or Download Shows 41-44

Listen To Pronk Pops Podcast or Download Shows 38-40

Listen To Pronk Pops Podcast or Download Shows 34-37

Listen To Pronk Pops Podcast or Download Shows 30-33

Listen To Pronk Pops Podcast or Download Shows 27-29

Listen To Pronk Pops Podcast or Download Shows 17-26

Listen To Pronk Pops Podcast or Download Shows 16-22

Listen To Pronk Pops Podcast or Download Shows 10-15

Listen To Pronk Pops Podcast or Download Shows 1-9

Read Full Post | Make a Comment ( None so far )

The Pronk Pops Show 808, December 6, 2016, Story 1: Which Political Party Is A Greater Threat To The First Amendment of The U.S. Constitution? The Democratic Party Together With Big Lie Media — Videos

Posted on December 6, 2016. Filed under: Banking System, Budgetary Policy, Communications, Congress, Corruption, Countries, Donald J. Trump, Donald J. Trump, Donald Trump, Economics, Education, Elections, Fiscal Policy, Freedom of Speech, Hate Speech, Hillary Clinton, Hillary Clinton, House of Representatives, News, Philosophy, Photos, Politics, Polls, Rule of Law, Senate, Tax Policy, Ted Cruz, Terror, Terrorism, United States Constitution, United States of America, United States Supreme Court, Videos, Wealth, Wisdom | Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , |

Project_1

The Pronk Pops Show Podcasts

Pronk Pops Show 808: December 6, 2016

Pronk Pops Show 807: December 5, 2016

Pronk Pops Show 806: December 2, 2016

Pronk Pops Show 805: December 1, 2016

Pronk Pops Show 804: November 30, 2016

Pronk Pops Show 803: November 29, 2016

Pronk Pops Show 802: November 28, 2016

Pronk Pops Show 801: November 22, 2016

Pronk Pops Show 800: November 21, 2016

Pronk Pops Show 799: November 18, 2016

Pronk Pops Show 798: November 17, 2016

Pronk Pops Show 797: November 16, 2016

Pronk Pops Show 796: November 15, 2016

Pronk Pops Show 795: November 14, 2016

Pronk Pops Show 794: November 10, 2016

Pronk Pops Show 793: November 9, 2016

Pronk Pops Show 792: November 8, 2016

Pronk Pops Show 791: November 7, 2016

Pronk Pops Show 790: November 4, 2016

Pronk Pops Show 789: November 3, 2016

Pronk Pops Show 788: November 2, 2016

Pronk Pops Show 787: October 31, 2016

Pronk Pops Show 786: October 28, 2016

Pronk Pops Show 785: October 27, 2016

Pronk Pops Show 784: October 26, 2016 

Pronk Pops Show 783: October 25, 2016

Pronk Pops Show 782: October 24, 2016

Pronk Pops Show 781: October 21, 2016

Pronk Pops Show 780: October 20, 2016

Pronk Pops Show 779: October 19, 2016

Pronk Pops Show 778: October 18, 2016

Pronk Pops Show 777: October 17, 2016

Pronk Pops Show 776: October 14, 2016

Pronk Pops Show 775: October 13, 2016

Pronk Pops Show 774: October 12, 2016

Pronk Pops Show 773: October 11, 2016

Pronk Pops Show 772: October 10, 2016

Pronk Pops Show 771: October 7, 2016

Pronk Pops Show 770: October 6, 2016

Pronk Pops Show 769: October 5, 2016 

Pronk Pops Show 768: October 3, 2016

Pronk Pops Show 767: September 30, 2016

Pronk Pops Show 766: September 29, 2016

Pronk Pops Show 765: September 28, 2016

Pronk Pops Show 764: September 27, 2016

Pronk Pops Show 763: September 26, 2016

Pronk Pops Show 762: September 23, 2016

Pronk Pops Show 761: September 22, 2016

Pronk Pops Show 760: September 21, 2016

Pronk Pops Show 759: September 20, 2016

Pronk Pops Show 758: September 19, 2016

Pronk Pops Show 757: September 16, 2016

Pronk Pops Show 756: September 15, 2016

Pronk Pops Show 755: September 14, 2016

Pronk Pops Show 754: September 13, 2016

Pronk Pops Show 753: September 12, 2016

Pronk Pops Show 752: September 9, 2016

Pronk Pops Show 751: September 8, 2016

Pronk Pops Show 750: September 7, 2016

Pronk Pops Show 749: September 2, 2016

Pronk Pops Show 748: September 1, 2016

Story 1: Which Political Party Is A Greater Threat To The First Amendment of The U.S. Constitution? The Democratic Party Together With Big Lie Media — Videos

Image result for free speech congress should make no lawImage result for the facts about citizens united vs fecImage result for hillary the movieImage result for the facts about citizens united vs fec

TIME WARNER CEO: The ‘real threat’ to the First Amendment came from Democrats, not Trump

Time Warner CEO Thinks Democrats Are Worse For First Amendment Than Trump

What You Probably Haven’t Heard About Citizens United

Does Citizens United Protect Your Freedom of Speech? – Learn Liberty

Undoing Citizens United – Yea or Nay?

What Citizens United Didn’t Say

Justice Scalia on Citizens United (C-SPAN)

Richard Epstein on Citizens United

Sen. Rand Paul on Citizens United

Does Free Speech Offend You?

Why We’re Losing Liberty

A Progressive’s Guide to Political Correctness

Trump’s First Amendment Threat: Leftist Fearmongering

Goodbye To The First Amendment

Democrats Call For Banning InfoWars

Ted Cruz: “Democrats Vote to Repeal First Amendment”

Sen. Cruz Speaks in Opposition to Repealing First Amendment Free-Speech Protections

Sen. Elizabeth Warren Calls for Amendment to Overturn Citizens United

Free Speech Is Threatened on Campus

The Story of Citizens United v. FEC

Story of Citizens United v. FEC, The Critique ‌‌ – Lee Doren

Campaign Finance Reform and the Citizens United Supreme Court Decision

Citizens United v. Federal Elections Commission- With Credits

3 Reasons Not To Sweat The “Citizens United” SCOTUS Ruling

What You Probably Haven’t Heard About Citizens United

Does Citizens United Protect Your Freedom of Speech? – Learn Liberty

Generation Zero Full Documentary | Citizens United – Documentaries

Citizens United v. Federal Election Commission Oral Arguments

Campaign Finance: Lawyers’ Citizens United v. FEC U.S. Supreme Court Arguments (2009)

Hillary Clinton The Movie Banned by the Courts in 2008

Published on May 9, 2015

‘Hillary, the Movie’ case to be reheard
http://www.upi.com/Top_News/2009/06/2…
WASHINGTON, June 29 (UPI) — The U.S. Supreme Court said Monday it wants a case involving federal election law and an attack “documentary” on Hillary Clinton reheard next September.

The justices said new argument should address two key Supreme Court precedents upholding federal election law and whether the high court should “overrule either or both.”

At stake in the case is a provision of a 2002 federal campaign law that bans “election communications” funded by corporations or unions close to an election.

The justices heard argument earlier this term, with former U.S. Solicitor General Ted Olson representing the producers of “Hillary, the Movie.” The film’s backers wanted to make it available as an “on demand” movie on cable television during the 2008 race for the presidency.

But federal courts ruled the movie, financed partly with funds from unnamed corporations, violated the 2002 McCain-Feingold law.

Deputy U.S. Solicitor General Malcolm Stewart, defending the law, suggested the Constitution not only allows the restriction of the “documentary” message when offered “on demand,” but also on the Internet, on a DVD or in a book, even at a public library.

(Citizens United vs. Federal Election Commission, No. 08-205.)

Time Warner CEO Jeffrey Bewkes Says Democrats Were Bigger First Amendment Threat Than Trump

Francois G. Durand/Getty Images
Jeff Bewkes

“The threat to the First Amendment came from the Democratic side more,” he says, arguing that journalists viewed a Democratic plank “overly charitably” as campaign finance reform.

When it comes to politicians trampling free speech and free press, Time Warner CEO Jeffrey Bewkes said Tuesday that he doesn’t fear president-elect Donald Trump as much as he does his rivals on the other side of the aisle.

“The threat to the First Amendment came from the Democratic side,” Bewkes said during a conversation with Business Insider CEO Henry Blodget at a conference in New York in a session that was webcast.

Bewkes made the comment after Blodget noted that Trump had criticized CNN for allegedly unfair coverage, and even threatened some sort of regulation in retaliation against CNN, owned by Time Warner.

Robert Thomson

News Corp. CEO on Fake News Sites: “We’ve Gone From the Year of ‘Mad Men’ to Mad Metrics”

“I don’t think that’s a serious thing,” Bewkes told Blodget at the Ignition: Future of Digital conference. “If anybody is going to change the First Amendment — remember, the Democratic party had a campaign plank to change the First Amendment, and they were doing it in the guise of campaign finance reform.”

The CEO, continuing his theme, even acknowledged that the news media does, indeed, lean left, as conservatives have long complained.

“That was worrying me more, because the press tends to miss that because they tend to lean that way, and therefore they were supporting what they were viewing, I think overly charitably, as something in cleaning up money in politics when in fact what it would do is restrain multiple voices,” Bewkes argued. “So, I thought the threat to the First Amendment came from the Democratic side more. I think there won’t be a serious effort on the Republican side.”

Bewkes wasn’t specific, though Trump’s Democratic challenger Hillary Clinton promised many times to overturn the Citizens United Supreme Court decision that allowed the conservative group to promote its anti-Hillary movie. The decision gave corporations rights, similar to those of unions and individuals, to fund political speech.

Bewkes also said Trump wasn’t the only Republican candidate to complain of unfair coverage, as Ted Cruz and Jeb Bush and others also weren’t happy with CNN and the press. “That’s more about the nature of change in that party right now,” he said. “I think we’re going to see it on the Democratic side, too.”

Lowell McAdam

Verizon CEO Talks AT&T-Time Warner, Content Strategy

Bewkes also said he isn’t worried that Trump has said he’d like to prevent AT&T’s $85.4 billion acquisition of Time Warner, suggesting that maybe politicians who initially spoke against the merger confused Time Warner with Time Warner Cable, which would have been a tougher sale to regulators, given AT&T already owns pay-TV giant DirecTV.

“We were still before the election and we know some of the strains of populism in that election on both sides,” he said. “I’m not saying whether everybody thought it was the cable company merging with a phone company — they’re different competitive issues — but it isn’t that, and I think when it becomes clear what we’re doing it will become clear to everyone that it will be pro-competitive, pro-consumer and improve competition in advertising.”

After the BusinessInsider event, Bewkes headed to the UBS Global Media & Communications Conference for further discussion about CNN.

“CNN had a killer year,” he said. “We could say this has been an unusual year in world events, but it’s actually not true. Every year is … if you go back three or four years ago, everybody would be saying you’d have to have a political slant,” he said, suggesting that CNN is thriving yet unbiased.

When the conversation turned to digital distribution of Time Warner’s cable networks, Bewkes noted that DirecTV Now launched for $35 a month for 100 channels but $5 extra for HBO, and he suggested he’s open to more such deals for the premium channel. “We welcome distributors making aggressive price offerings,” he said.

He boasted of “a pretty hefty budget, a couple of billion dollars” at HBO, adding: “We’re not spending our programming money on library product, we’re doing original shows … We’ve been increasing it and we’ll keep increasing it.”

http://www.hollywoodreporter.com/news/time-warner-ceo-jeffrey-bewkes-says-democrats-were-bigger-first-amendment-threat-trump-953267

Citizens United v. FEC

From Wikipedia, the free encyclopedia
“Citizens United” redirects here. For the political organization, see Citizens United (organization). For other uses, see Citizens United (disambiguation).
Citizens United v. Federal Election Commission
Seal of the United States Supreme Court.svg

Argued March 24, 2009
Reargued September 9, 2009
Decided January 21, 2010
Full case name Citizens United, Appellant v. Federal Election Commission
Docket nos. 08-205
Citations 558 U.S. 310 (more)

130 S.Ct. 876
Argument Oral argument
Reargument Reargument
Opinion announcement Opinion announcement
Prior history denied appellants motion for a preliminary injunction 530 F. Supp. 2d 274 (D.D.C. 2008)[1] probable jurisdiction noted 128 S. Ct. 1471 (2008).
Holding
The Freedom of the Speech Clause of the First Amendment to the United States Constitution prohibits the government from restricting independent political expenditures by a nonprofit corporation. And the provision of the Bipartisan Campaign Reform Act prohibiting unions, corporations and not-for-profit organizations from broadcasting electioneering communications within 60 days of a general election or 30 days of a primary election violates the clause of the First Amendment to the United States Constitution. United States District Court for the District of Columbia reversed.
Court membership
Case opinions
Majority Kennedy, joined by Roberts, Scalia, Alito; Thomas (all but Part IV); Stevens, Ginsburg, Breyer, Sotomayor (only as to Part IV)
Concurrence Roberts, joined by Alito
Concurrence Scalia, joined by Alito; Thomas (in part)
Concur/dissent Stevens, joined by Ginsburg, Breyer, Sotomayor
Concur/dissent Thomas
Laws applied
U.S. Const. amend. I, Bipartisan Campaign Reform Act
This case overturned a previous ruling or rulings
McConnell v. FEC (in part)

Citizens United v. Federal Election Commission is a U.S. constitutional law and corporate law case dealing with the regulation of campaign spending by organizations. The United States Supreme Court held (5–4) on 21 January 2010 that freedom of speech prohibited the government from restricting independent political expenditures by a nonprofit corporation. The principles articulated by the Supreme Court in the case have also been extended to for-profit corporations, labor unions and other associations.[2][3]

In the case, the conservative non-profit organization Citizens United wanted to air a film critical of Hillary Clinton and to advertise the film during television broadcasts shortly before the 2008 Democratic primary election in which Clinton was running for U.S. President. This would violate a federal statute prohibiting certain electioneering communications near an election. The court found the provisions of the law that prohibited corporations and unions from making such electioneering communications to conflict with the U.S. Constitution.

The court, however, upheld requirements for public disclosure by sponsors of advertisements. The case did not affect the federal ban on direct contributions from corporations or unions to candidate campaigns or political parties.

Case summary

In the case, No. 08-205, 558 U.S. 310 (2010), the conservative non-profit organization Citizens United wanted to air a film critical of Hillary Clinton and to advertise the film during television broadcasts, which was a violation of the 2002 Bipartisan Campaign Reform Act, commonly known as the McCain–Feingold Act or “BCRA”.[4] Section 203 of BCRA defined an “electioneering communication” as a broadcast, cable, or satellite communication that mentioned a candidate within 60 days of a general election or 30 days of a primary, and prohibited such expenditures by corporations and unions. The United States District Court for the District of Columbia held that §203 of BCRA applied and prohibited Citizens United from advertising the film Hillary: The Movie in broadcasts or paying to have it shown on television within 30 days of the 2008 Democratic primaries.[1][5] The Supreme Court reversed this decision, striking down those provisions of BCRA that prohibited corporations (including nonprofit corporations) and unions from making independent expenditures and “electioneering communications”.[4] The majority decision overruled Austin v. Michigan Chamber of Commerce (1990) and partially overruled McConnell v. Federal Election Commission (2003).[6] The Court, however, upheld requirements for public disclosure by sponsors of advertisements (BCRA §201 and §311). The case did not involve the federal ban on direct contributions from corporations or unions to candidate campaigns or political parties, which remain illegal in races for federal office.[7]

Background

The Bipartisan Campaign Reform Act of 2002 (known as BCRA or McCain–Feingold Act) – specifically §203, which modified the Federal Election Campaign Act of 1971, 2 U.S.C. § 441b – prohibited corporations and unions from using their general treasury to fund “electioneering communications” (broadcast advertisements mentioning a candidate) within 30 days before a primary or 60 days before a general election. During the 2004 presidential campaign, a conservative nonprofit 501(c)(4) organization named Citizens United filed a complaint before the Federal Election Commission (FEC) charging that advertisements for Michael Moore’s film Fahrenheit 9/11, a docudrama critical of the Bush administration’s response to the terrorist attacks on September 11, 2001, constituted political advertising and thus could not be aired within the 30 days before a primary election or 60 days before a general election. The FEC dismissed the complaint after finding no evidence that broadcast advertisements for the film and featuring a candidate within the proscribed time limits had actually been made.[8] The FEC later dismissed a second complaint which argued that the movie itself constituted illegal corporate spending advocating the election or defeat of a candidate, which was illegal under the Taft-Hartley Act of 1947 and the Federal Election Campaign Act Amendments of 1974. In dismissing that complaint, the FEC found that:

The complainant alleged that the release and distribution of FAHRENHEIT 9/11 constituted an independent expenditure because the film expressly advocated the defeat of President Bush and that by being fully or partially responsible for the film’s release, Michael Moore and other entities associated with the film made excessive and/or prohibited contributions to unidentified candidates. The Commission found no reason to believe the respondents violated the Act because the film, associated trailers and website represented bona fide commercial activity, not “contributions” or “expenditures” as defined by the Federal Election Campaign Act.[9]

In the wake of these decisions, Citizens United sought to establish itself as a bona fide commercial film maker, producing several documentary films between 2005 and 2007. By early 2008, it sought to run television commercials to promote its political documentary Hillary: The Movie and to air the movie on DirecTV.[10]

In the District Court

In December 2007 Citizens United filed a complaint in the U.S. District Court for the District of Columbia challenging the constitutionality of several statutory provisions governing “electioneering communications”.[11] It asked the court to declare that the corporate and union funding restrictions were unconstitutional both on its face and as applied to Hillary: The Movie, and to enjoin the Federal Election Commission from enforcing its regulations. Citizens United also argued that the Commission’s disclosure and disclaimer requirements were unconstitutional as applied to the movie pursuant to the Supreme Court decision in Federal Election Commission v. Wisconsin Right to Life, Inc.. It also sought to enjoin the funding, disclosure, and disclaimer requirements as applied to Citizens United’s intended ads for the movie.

In accordance with special rules in section 403 of the BCRA, a three-judge court was convened to hear the case. On January 15, 2008, the court denied Citizens United’s motion for a preliminary injunction, finding that the suit had little chance of success because the movie had no reasonable interpretation other than as an appeal to vote against Senator Clinton, that it was therefore express advocacy, not entitled to exemption from the ban on corporate funding of electioneering communications, and that television advertisements for the movie within 30 days of a primary violated the BCRA restrictions on “electioneering communications”.[12] The court held that the Supreme Court in McConnell v. FEC (2003) had found the disclosure requirements constitutional as to all electioneering communications, and Wisconsin RTL did not disturb this holding because the only issue of that case was whether speech that did not constitute the functional equivalent of express advocacy could be banned during the relevant pre-election period.

On July 18, 2008, the District Court granted summary judgement to the Federal Election Commission. In accordance with the special rules in the BCRA, Citizens United appealed to the Supreme Court which docketed the case on August 18, 2008 and granted certiorari on November 14, 2008.[13]

The Supreme Court heard oral argument on March 24, 2009[10][14][15] and then asked for further briefs on June 29; the re-argument was heard on September 9, 2009.[13]

Before the Supreme Court

During the original oral argument, Deputy Solicitor General Malcolm L. Stewart (representing the FEC) argued that under Austin v. Michigan Chamber of Commerce, the government would have the power to ban books if those books contained even one sentence expressly advocating the election or defeat of a candidate and were published or distributed by a corporation or labor union.[16] In response to this line of questioning, Stewart further argued that under Austin the government could ban the digital distribution of political books over the Amazon Kindle or prevent a union from hiring an author to write a political book.[17]

According to a 2012 article in The New Yorker by Jeffrey Toobin, the Court expected after oral argument to rule on the narrow question that had originally been presented: could Citizens United show the film? At the subsequent conference among the justices after oral argument, the vote was 5–4 in favor of Citizens United being allowed to show the film. The justices voted the same as they had in Federal Election Commission v. Wisconsin Right to Life, Inc., a similar 2007 case, with Chief Justice Roberts and Justices Scalia, Kennedy, Thomas and Alito in the majority.[18]

Chief Justice John Roberts wrote the initial opinion of the Court, holding that the BCRA allowed the showing of the film. A draft concurring opinion by Justice Kennedy argued that the court could and should have gone much further. The other justices in the majority began agreeing with Kennedy, and convinced Roberts to reassign the writing and allow Kennedy’s concurrence to become the majority opinion.[18]

On the other side, John Paul Stevens, the most senior justice in the minority, assigned the dissent to David Souter, who announced his retirement from the Court while he was working on it. The final draft went beyond critiquing the majority. Toobin described it as “air[ing] some of the Court’s dirty laundry,” writing that Souter’s dissent accused Roberts of having manipulated Court procedures to reach his desired result – an expansive decision that, Souter claimed, changed decades of election law and ruled on issues neither party to the litigation had presented.[18]

According to Toobin, Roberts was concerned that Souter’s dissent, likely to be his last opinion for the Court, could “damage the Court’s credibility.” He agreed with the minority to withdraw the opinion and schedule the case for reargument. However, when he did, the “Questions Presented” to the parties were more expansive, touching on the issues Kennedy had identified. According to Toobin, the eventual result was therefore a foregone conclusion from that point on.[18] Toobin’s account has been criticized for drawing conclusions unsupported by the evidence in his article.[19]

On June 29, 2009, the last day of the term, the Court issued an order directing the parties to re-argue the case on September 9 after briefing whether it might be necessary to overrule Austin and/or McConnell v. Federal Election Commission to decide the case.[20] Justice Stevens noted in his dissent that in its prior motion for summary judgment Citizens United had abandoned its facial challenge of BCRA §203, with the parties agreeing to the dismissal of the claim.[21]

Justice Sotomayor sat on the bench for the first time during the second round of oral arguments. This was the first case argued by then-Solicitor General and future Supreme Court Justice Elena Kagan. Former Bush Solicitor General Ted Olson and First Amendment lawyer Floyd Abrams argued for Citizens United, and former Clinton Solicitor General Seth Waxman defended the statute on behalf of various supporters.[22] Legal scholar Erwin Chemerinsky called it “one of the most important First Amendment cases in years”.[23]

Opinions of the Court

Majority opinion

Justice Kennedy, the author of the Court’s opinion.

Justice Kennedy’s majority opinion[24] found that the BCRA §203 prohibition of all independent expenditures by corporations and unions violated the First Amendment’s protection of free speech. The majority wrote, “If the First Amendment has any force, it prohibits Congress from fining or jailing citizens, or associations of citizens, for simply engaging in political speech.”[25]

Justice Kennedy’s opinion also noted that because the First Amendment does not distinguish between media and other corporations, the BCRA restrictions improperly allowed Congress to suppress political speech in newspapers, books, television, and blogs.[4] The Court overruled Austin, which had held that a state law that prohibited corporations from using treasury money to support or oppose candidates in elections did not violate the First and Fourteenth Amendments. The Court also overruled that portion of McConnell that upheld BCRA’s restriction of corporate spending on “electioneering communications”. The Court’s ruling effectively freed corporations and unions to spend money both on “electioneering communications” and to directly advocate for the election or defeat of candidates (although not to contribute directly to candidates or political parties).

The majority ruled that the Freedom of the Press clause of the First Amendment protects associations of individuals in addition to individual speakers, and further that the First Amendment does not allow prohibitions of speech based on the identity of the speaker. Corporations, as associations of individuals therefore, have free speech rights under the First Amendment. Because spending money is essential to disseminating speech, as established in Buckley v. Valeo, limiting a corporation’s ability to spend money is unconstitutional because it limits the ability of its members to associate effectively and to speak on political issues.

The decision overruled Austin because that decision allowed different restrictions on speech-related spending based on corporate identity. Additionally, the decision said that Austin was based on an “equality” rationale – trying to equalize speech between different speakers – that the Court had previously rejected as illegitimate under the First Amendment in Buckley. The Michigan statute at issue in Austin had distinguished between corporate and union spending, prohibiting the former while allowing the latter. The Austin Court, over the dissent by Justices Scalia, Kennedy, and O’Connor, had held that such distinctions were within the legislature’s prerogative. In Citizens United v. Federal Election Commission, however, the majority argued that the First Amendment purposefully keeps the government from interfering in the “marketplace of ideas” and “rationing” speech, and it is not up to the legislatures or the courts to create a sense of “fairness” by restricting speech.[24]

The majority also criticized Austin’s reasoning that the “distorting effect” of large corporate expenditures constituted a risk of corruption or the appearance of corruption. Rather, the majority argued that the government had no place in determining whether large expenditures distorted an audience’s perceptions, and that the type of “corruption” that might justify government controls on spending for speech had to relate to some form of “quid pro quo” transaction: “There is no such thing as too much speech.”[24] The public has a right to have access to all information and to determine the reliability and importance of the information. Additionally, the majority did not believe that reliable evidence substantiated the risk of corruption or the appearance of corruption, and so this rationale did not satisfy strict scrutiny.

The Court’s opinion relied heavily on the reasoning and principles of the landmark campaign finance case of Buckley and First National Bank of Boston v. Bellotti, in which the Court struck down a broad prohibition against independent expenditures by corporations in ballot initiatives and referenda.[24] Specifically, the Court echoed Bellotti’s rejection of categories based on a corporation’s purpose. The majority argued that to grant Freedom of the Press protections to media corporations, but not others, presented a host of problems; and so all corporations should be equally protected from expenditure restrictions.

The Court found that BCRA §§201 and 311, provisions requiring disclosure of the funder, were valid as applied to the movie advertisements and to the movie itself.[24] The majority ruled for the disclosure of the sources of campaign contributions, saying that

…prompt disclosure of expenditures can provide shareholders and citizens with the information needed to hold corporations and elected officials accountable for their positions and supporters. Shareholders can determine whether their corporation’s political speech advances the corporation’s interest in making profits, and citizens can see whether elected officials are “in the pocket” of so-called moneyed interests…This transparency enables the electorate to make informed decisions and give proper weight to different speakers and messages.[26][27]

Concurrences

Chief Justice Roberts, with whom Justice Alito joined, wrote separately “to address the important principles of judicial restraint and stare decisis implicated in this case”.[28]

Roberts wrote to further explain and defend the Court’s statement that “there is a difference between judicial restraint and judicial abdication.” Roberts explained why the Court must sometimes overrule prior decisions. Had prior Courts never gone against stare decisis, for example, “segregation would be legal, minimum wage laws would be unconstitutional, and the Government could wiretap ordinary criminal suspects without first obtaining warrants”. Roberts’ concurrence recited a plethora of case law in which the court had ruled against precedent. Ultimately, Roberts argued that “stare decisis…counsels deference to past mistakes, but provides no justification for making new ones”.[28]

Justice Scalia joined the opinion of the Court, and wrote a concurring opinion joined by Justice Alito in full and by Justice Thomas in part. Scalia addressed Justice Stevens‘ dissent, specifically with regard to the original understanding of the First Amendment. Scalia said Stevens’ dissent was “in splendid isolation from the text of the First Amendment…It never shows why ‘the freedom of speech’ that was the right of Englishmen did not include the freedom to speak in association with other individuals, including association in the corporate form.” He further considered the dissent’s exploration of the Framers’ views about the “role of corporations in society” to be misleading, and even if valid, irrelevant to the text. Scalia principally argued that the First Amendment was written in “terms of speech, not speakers” and that “Its text offers no foothold for excluding any category of speaker.”[29]Scalia argued that the Free Press clause was originally intended to protect the distribution of written materials and did not only apply to the media specifically. This understanding supported the majority’s contention that the Constitution does not allow the Court to separate corporations into media and non-media categories.[24]

Justice Thomas wrote a separate opinion concurring in all but the upholding of the disclosure provisions. In order to protect the anonymity of contributors to organizations exercising free speech, Thomas would have struck down the reporting requirements of BCRA §201 and §311 as well, rather than allowing them to be challenged only on a case-specific basis. Thomas’s primary argument was that anonymous free speech is protected and that making contributor lists public makes the contributors vulnerable to retaliation, citing instances of retaliation against contributors to both sides of a then recent California voter initiative. Thomas also expressed concern that such retaliation could extend to retaliation by elected officials. Thomas did not consider “as-applied challenges” to be sufficient to protect against the threat of retaliation.[30]

Dissent

Justice Stevens, the author of the dissenting opinion.

A dissenting opinion by Justice Stevens[31] was joined by Justice Ginsburg, Justice Breyer, and Justice Sotomayor. To emphasize his unhappiness with the majority, Stevens read part of his 90-page dissent from the bench.[32] Stevens concurred in the Court’s decision to sustain BCRA’s disclosure provisions, but dissented from the principal holding of the Court. He argued that the Court’s ruling “threatens to undermine the integrity of elected institutions across the Nation. The path it has taken to reach its outcome will, I fear, do damage to this institution.” He added: “A democracy cannot function effectively when its constituent members believe laws are being bought and sold.”[33]

Stevens also argued that the Court addressed a question not raised by the litigants when it found BCRA §203 to be facially unconstitutional, and that the majority “changed the case to give themselves an opportunity to change the law”.[24] He argued that the majority had expanded the scope beyond the questions presented by the appellant and that therefore a sufficient record for judging the case did not exist. Stevens argued that at a minimum the Court should have remanded the case for a fact-finding hearing, and that the majority did not consider other compilations of data, such as the Congressional record for justifying BCRA §203.

Stevens referenced a number of major cases to argue that the Court had long recognized that to deny Congress the power to safeguard against “the improper use of money to influence the result [of an election] is to deny to the nation in a vital particular the power of self protection”.[34] After recognizing that in Buckley v. Valeo the Court had struck down portions of a broad prohibition of independent expenditures from any sources, Stevens argued that nevertheless Buckley recognized the legitimacy of “prophylactic” measures for limiting campaign spending and found the prevention of “corruption” to be a reasonable goal for legislation. Consequently, Stevens argued that Buckley left the door open for carefully tailored future regulation.[24] Although the majority echoed many of the arguments in First National Bank of Boston v. Bellotti, Stevens argued that the majority opinion contradicted the reasoning of other campaign finance cases – in particular, Austin v. Michigan State Chamber of Commerce and McConnell v. Federal Election Commission – and found it telling that the majority, when citing such cases, referenced mainly dissenting opinions.

Stevens’ dissent specifically sought to address a number of the majority’s central arguments:

First, Stevens argued that the majority failed to recognize the possibility for corruption outside strict quid pro quo exchanges. He referenced facts from a previous BCRA challenge to argue that, even if the exchange of votes for expenditures could not be shown, contributors gain favorable political access from such expenditures.[24] The majority considered access to be insufficient justification for limiting speech rights.

Stevens, however, argued that in the past, even when striking down a ban on corporate independent expenditures, the Court “never suggested that such quid pro quo debts must take the form of outright vote buying or bribes” (Bellotti). Buckley, he said, also acknowledged that large independent expenditures present the same dangers as quid pro quo arrangements, although Buckley struck down limits on such independent expenditures. Using the record from a previous BCRA §203 challenge, he argued that independent expenditures were sometimes a factor in gaining political access and concluded that large independent expenditures generate more influence than direct campaign contributions.[24] Furthermore, Stevens argued that corporations could threaten Representatives and Senators with negative advertising to gain unprecedented leverage. Stevens supported his argument by citing Caperton v. A.T. Massey Coal Co.,[35] where the Court held that $3 million in independent expenditures in a judicial race raised sufficient questions about a judge’s impartiality to require the judge to recuse himself in a future case involving the spender. Stevens argued that it was contradictory for the majority to ignore the same risks in legislative and executive elections, and argued that the majority opinion would exacerbate the problem presented in Caperton because of the number of states with judicial elections and increased spending in judicial races.

Second, Stevens argued that the majority did not place enough emphasis on the need to prevent the “appearance of corruption” in elections. Earlier cases, including Buckley and Bellotti, recognized the importance of public confidence in democracy. Stevens cited recent data indicating that 80% of the public view corporate independent expenditures as a method used to gain unfair legislative access.[24] Stevens predicted that if the public believes that corporations dominate elections, disaffected voters will stop participating.

Third, Stevens argued that the majority’s decision failed to recognize the dangers of the corporate form. Austin held that the prevention of corruption, including the distorting influence of a dominant funding source, was a sufficient reason for regulating corporate independent expenditures. In defending Austin, Stevens argued that the unique qualities of corporations and other artificial legal entities made them dangerous to democratic elections. These legal entities, he argued, have perpetual life, the ability to amass large sums of money, limited liability, no ability to vote, no morality, no purpose outside profit-making, and no loyalty. Therefore, he argued, the courts should permit legislatures to regulate corporate participation in the political process.

Legal entities, Stevens wrote, are not “We the People” for whom our Constitution was established.[24] Therefore, he argued, they should not be given speech protections under the First Amendment. The First Amendment, he argued, protects individual self-expression, self-realization and the communication of ideas. Corporate spending is the “furthest from the core of political expression” protected by the Constitution, he argued, citing Federal Election Commission v. Beaumont,[36] and corporate spending on politics should be viewed as a business transaction designed by the officers or the boards of directors for no purpose other than profit-making. Stevens called corporate spending “more transactional than ideological”. Stevens also pointed out that any member of a corporation may spend personal money on promoting a campaign because BCRA only prohibited the use of general treasury money.

Fourth, Stevens attacked the majority’s central argument: that the prohibition of spending guards free speech and allows the general public to receive all available information. Relying on Austin, Stevens argued that corporations “unfairly influence” the electoral process with vast sums of money that few individuals can match, which distorts the public debate. Because a typical voter can only absorb so much information during a relevant election period, Stevens described “unfair corporate influence” as the potential to outspend others, to push others out of prime broadcasting spots and to dominate the “marketplace of ideas”.[24] This process, he argued, puts disproportionate focus on this speech and gives the impression of widespread support regardless of actual support. Thus, this process marginalizes the speech of other individuals and groups.

Stevens referred to the majority’s argument that “there is no such thing as too much speech” as “facile” and a “straw man” argument. He called it an incorrect statement of First Amendment law because the Court recognizes numerous exceptions to free speech, such as fighting words, obscenity restrictions, time, place and manner restrictions, etc. Throughout his dissent, Stevens said that the majority’s “slogan” ignored the possibility that too much speech from one source could “drown out” other points of view.

Fifth, Stevens criticized the majority’s fear that the government could use BCRA §203 to censor the media. The focus placed on this hypothetical fear made no sense to him because it did not relate to the facts of this case – if the government actually attempted to apply BCRA §203 to the media (and assuming that Citizens United could not constitute “media”), the Court could deal with the problem at that time. Stevens described the majority’s supposed protection of the media as nothing more than posturing. According to him, it was the majority’s new rule, announced in this case, that prohibited a law from distinguishing between “speakers” or funding sources. This new rule would be the only reason why media corporations could not be exempted from BCRA §203. In this, Stevens and the majority conceptualize the First Amendment’s protection of “the press” quite differently. Stevens argues that the “Press” is an entity, which can be distinguished from other persons and entities which are not “press”. The majority opinion viewed “freedom of the press” as an activity, applicable to all citizens or groups of citizens seeking to publish views.

Sixth, Stevens claimed that the majority failed to give proper deference to the legislature. Stevens predicted that this ruling would restrict the ability of the states to experiment with different methods for decreasing corruption in elections. According to Stevens, this ruling virtually ended those efforts, “declaring by fiat” that people will not “lose faith in our democracy”.[24] Stevens argued that the majority’s view of a self-serving legislature, passing campaign-spending laws to gain an advantage in retaining a seat, coupled with “strict scrutiny” of laws, would make it difficult for any campaign finance regulation to be upheld in future cases.

Seventh, Stevens argued that the majority opinion ignored the rights of shareholders. A series of cases protects individuals from legally compelled payment of union dues to support political speech.[37] Because shareholders invest money in corporations, Stevens argued that the law should likewise help to protect shareholders from funding speech that they oppose. The majority, however, argued that ownership of corporate stock was voluntary, and that unhappy shareholders could simply sell off their shares if they did not agree with the corporation’s speech. Stevens also argued that Political Action Committees (PACs), which allow individual members of a corporation to invest money in a separate fund, are an adequate substitute for general corporate speech and better protect shareholder rights. The majority, by contrast, had argued that most corporations are too small and lack the resources and raw number of shareholders and management staff necessary to cover the compliance, accounting, and administrative costs of maintaining a PAC. In this dispute, the opposing views essentially discussed differing types of entities: Stevens focused his argument on large, publicly held corporations, while the justices in the majority, and particularly Justice Scalia’s concurring opinion, placed an emphasis on small, closely held corporations and non-profits.

Stevens called the majority’s faith in “corporate democracy” an unrealistic method for a shareholder to oppose political funding. A derivative suit is slow, inefficient, risky and potentially expensive. Likewise, shareholder meetings only happen a few times a year, not prior to every decision or transaction. Rather, the officers and boards control the day-to-day spending, including political spending. According to Stevens, the shareholders have few options, giving them “virtually nonexistent” recourse for opposing a corporation’s political spending.[24] Furthermore, most shareholders use investment intermediaries, such as mutual funds or pensions, and by the time a shareholder may find out about a corporation’s political spending and try to object, the damage is done and the shareholder has funded disfavored speech.

Stevens concluded his dissent:

At bottom, the Court’s opinion is thus a rejection of the common sense of the American people, who have recognized a need to prevent corporations from undermining self government since the founding, and who have fought against the distinctive corrupting potential of corporate electioneering since the days of Theodore Roosevelt. It is a strange time to repudiate that common sense. While American democracy is imperfect, few outside the majority of this Court would have thought its flaws included a dearth of corporate money in politics.[25]

Subsequent developments

There was a wide range of reactions to the case from politicians, academics, attorneys, advocacy groups and journalists.

Support

Politicians

Senate Minority Leader Mitch McConnell, a plaintiff in the earlier related decision McConnell v. FEC, said:[38][39]

For too long, some in this country have been deprived of full participation in the political process. With today’s monumental decision, the Supreme Court took an important step in the direction of restoring the First Amendment rights of these groups by ruling that the Constitution protects their right to express themselves about political candidates and issues up until Election Day. By previously denying this right, the government was picking winners and losers. Our democracy depends upon free speech, not just for some but for all.

Republican campaign consultant Ed Rollins opined that the decision adds transparency to the election process and will make it more competitive.[40]

Advocacy groups

Citizens United, the group filing the lawsuit, said, “Today’s U.S. Supreme Court decision allowing Citizens United to air its documentary films and advertisements is a tremendous victory, not only for Citizens United but for every American who desires to participate in the political process.”[41] During litigation, Citizens United had support from the United States Chamber of Commerce and the National Rifle Association.[42]

Campaign finance attorney Cleta Mitchell, who had filed an amicus curiae brief on behalf of two advocacy organizations opposing the ban, wrote that “The Supreme Court has correctly eliminated a constitutionally flawed system that allowed media corporations (e.g., The Washington Post Co.) to freely disseminate their opinions about candidates using corporate treasury funds, while denying that constitutional privilege to Susie’s Flower Shop Inc. … The real victims of the corporate expenditure ban have been nonprofit advocacy organizations across the political spectrum.”[43]

Heritage Foundation fellow Hans A. von Spakovsky, a former Republican member of the Federal Election Commission, said “The Supreme Court has restored a part of the First Amendment that had been unfortunately stolen by Congress and a previously wrongly-decided ruling of the court.”[44]

Libertarian Cato Institute analysts John Samples and Ilya Shapiro wrote that restrictions on advertising were based on the idea “that corporations had so much money that their spending would create vast inequalities in speech that would undermine democracy”. However, “to make campaign spending equal or nearly so, the government would have to force some people or groups to spend less than they wished. And equality of speech is inherently contrary to protecting speech from government restraint, which is ultimately the heart of American conceptions of free speech.”[45]

The American Civil Liberties Union filed an amicus brief that supported the decision,[46] saying that “section 203 should now be struck down as facially unconstitutional”, though membership was split over the implications of the ruling and its board sent the issue to its special committee on campaign finance for further consideration.[47] On March 27, 2012, the ACLU reaffirmed its stance in support of the Supreme Court’s Citizens United ruling.[48]

Academics and attorneys

Bradley A. Smith, professor of law at Capital University Law School, former chairman of the FEC, founder of the Center for Competitive Politics and a leading proponent of deregulation of campaign finance, wrote that the major opponents of political free speech are “incumbent politicians” who “are keen to maintain a chokehold on such speech”. Empowering “small and midsize corporations – and every incorporated mom-and-pop falafel joint, local firefighters’ union, and environmental group – to make its voice heard” frightens them.[49] In response to statements by President Obama and others that the ruling would allow foreign entities to gain political influence through U.S. subsidiaries, Smith pointed out that the decision did not overturn the ban on political donations by foreign corporations and the prohibition on any involvement by foreign nationals in decisions regarding political spending by U.S. subsidiaries, which are covered by other parts of the law.[50]

Campaign finance expert Jan Baran, a member of the Commission on Federal Ethics Law Reform, agreed with the decision, writing that “The history of campaign finance reform is the history of incumbent politicians seeking to muzzle speakers, any speakers, particularly those who might publicly criticize them and their legislation. It is a lot easier to legislate against unions, gun owners, ‘fat cat’ bankers, health insurance companies and any other industry or ‘special interest’ group when they can’t talk back.” Baran further noted that in general conservatives and libertarians praised the ruling’s preservation of the First Amendment and freedom of speech, but that liberalsand campaign finance reformers criticized it as greatly expanding the role of corporate money in politics.[51]

Attorney Kenneth Gross, former associate general counsel of the FEC, wrote that corporations relied more on the development of long-term relationships, political action committees and personal contributions, which were not affected by the decision. He held that while trade associations might seek to raise funds and support candidates, corporations which have “signed on to transparency agreements regarding political spending” may not be eager to give.[43]

The New York Times asked seven academics to opine on how corporate money would reshape politics as a result of the court’s decision.[52] Three of the seven wrote that the effects would be minimal or positive: Christopher Cotton, a University of Miami School of Business assistant professor of economics, wrote that “There may be very little difference between seeing eight ads or seeing nine ads (compared to seeing one ad or two). And, voters recognize that richer candidates are not necessarily the better candidates, and in some cases, the benefit of running more ads is offset by the negative signal that spending a lot of money creates.[52] Eugene Volokh, a professor of law at UCLA, stated that the “most influential actors in most political campaigns” are media corporations which “overtly editorialize for and against candidates, and also influence elections by choosing what to cover and how to cover it”. Holding that corporations like Exxon would fear alienating voters by supporting candidates, the decision really meant that voters would hear “more messages from more sources”.[52] Joel Gora, a professor at Brooklyn Law School who had previously argued the case of Buckley v. Valeo on behalf of the American Civil Liberties Union, said that the decision represented “a great day for the First Amendment” writing that the Court had “dismantled the First Amendment ‘caste system’ in election speech”.[52]

Journalists

The Editorial Board of the San Antonio Express-News criticized McCain–Feingold’s exception for media corporations from the ban on corporate electioneering, writing that it “makes no sense” that the paper could make endorsements up until the day of the election but advocacy groups could not. “While the influence of money on the political process is troubling and sometimes corrupting, abridging political speech is the wrong way to counterbalance that influence.”[53]

Anthony Dick in National Review countered a number of arguments against the decision, asking rhetorically, “is there something uniquely harmful and/or unworthy of protection about political messages that come from corporations and unions, as opposed to, say, rich individuals, persuasive writers, or charismatic demagogues?” He noted that “a recent Gallup poll shows that a majority of the public actually agrees with the Court that corporations and unions should be treated just like individuals in terms of their political-expenditure rights”.[54] A Gallup poll taken in October 2009 and released soon after the decision showed 57 percent of those surveyed agreed that contributions to political candidates are a form of free speech and 55 percent agreed that the same rules should apply to individuals, corporations and unions. Sixty-four percent of Democrats and Republicans believed campaign donations are a form of free speech.[55]

Chicago Tribune editorial board member Steve Chapman wrote “If corporate advocacy may be forbidden as it was under the law in question, it’s not just Exxon Mobil and Citigroup that are rendered mute. Nonprofit corporations set up merely to advance goals shared by citizens, such as the American Civil Liberties Union and the National Rifle Association, also have to put a sock in it. So much for the First Amendment goal of fostering debate about public policy.”[56]

Opposition

Politicians

President Barack Obama stated that the decision “gives the special interests and their lobbyists even more power in Washington – while undermining the influence of average Americans who make small contributions to support their preferred candidates”.[57] Obama later elaborated in his weekly radio address saying, “this ruling strikes at our democracy itself” and “I can’t think of anything more devastating to the public interest”.[58] On January 27, 2010, Obama further condemned the decision during the 2010 State of the Union Address, stating that, “Last week, the Supreme Court reversed a century of law[59] to open the floodgates for special interests – including foreign corporations – to spend without limit in our elections. Well I don’t think American elections should be bankrolled by America’s most powerful interests, or worse, by foreign entities.” On television, the camera shifted to a shot of the SCOTUS judges in the front row directly in front of the President while he was making this statement, and Justice Samuel Alito was frowning, shaking his head side to side while mouthing the words “Not true”.[60][61][62][63][64][65]

Democratic Senator Russ Feingold, a lead sponsor of the 2002 Bipartisan Campaign Reform Act, stated “This decision was a terrible mistake. Presented with a relatively narrow legal issue, the Supreme Court chose to roll back laws that have limited the role of corporate money in federal elections since Teddy Roosevelt was president.”[66] Representative Alan Grayson, a Democrat, stated that it was “the worst Supreme Court decision since the Dred Scott case, and that the court had opened the door to political bribery and corruption in elections to come.[67] Democratic congresswoman Donna Edwards, along with constitutional law professor and Maryland Democratic State Senator Jamie Raskin, have advocated petitions to reverse the decision by means of constitutional amendment.[68] Rep. Leonard Boswell introduced legislation to amend the constitution.[69] Senator John Kerry also called for an Amendment to overrule the decision.[70] On December 8, 2011, Senator Bernie Sanders proposed the Saving American Democracy Amendment, which would reverse the court’s ruling.[71][72]

Republican Senator John McCain, co-crafter of the 2002 Bipartisan Campaign Reform Act and the party’s 2008 presidential nominee, said “there’s going to be, over time, a backlash … when you see the amounts of union and corporate money that’s going to go into political campaigns”.[73] McCain was “disappointed by the decision of the Supreme Court and the lifting of the limits on corporate and union contributions” but not surprised by the decision, saying that “It was clear that Justice Roberts, Alito and Scalia, by their very skeptical and even sarcastic comments, were very much opposed to BCRA.”[66] Republican Senator Olympia Snowe opined that “Today’s decision was a serious disservice to our country.”[74]

Although federal law after Citizens United v. Federal Election Commission still prohibited corporate contributions to all political parties, Sanda Everette, co-chair of the Green Party, stated that “The ruling especially hurts the ability of parties that don’t accept corporate contributions, like the Green Party, to compete.” Another Green Party officer, Rich Whitney, stated “In a transparently political decision, a majority of the US Supreme Court overturned its own recent precedent and paid tribute to the giant corporate interests that already wield tremendous power over our political process and political speech.”

Ralph Nader condemned the ruling,[75] saying that “With this decision, corporations can now directly pour vast amounts of corporate money, through independent expenditures, into the electoral swamp already flooded with corporate campaign PAC contribution dollars.” He called for shareholder resolutions asking company directors to pledge not to use company money to favor or oppose electoral candidates.[76] Pat Choate, former Reform Partycandidate for Vice President, stated, “The court has, in effect, legalized foreign governments and foreign corporations to participate in our electoral politics.”[77]

Senator Bernie Sanders, a contender in the 2016 Democratic Primary, has filed a constitutional amendment to overturn the Supreme Court’s Decision.[78] Further, both Sanders and Hillary Clinton have said that, if elected, they will only appoint Supreme Court Justices who are committed to the repeal of Citizens United.[79] In September 2015, Sanders said that “the foundations of American Democracy are being undermined” and called for sweeping campaign finance reform.[80]

International

Ambassador Janez Lenarčič, speaking for the Organization for Security and Co-operation in Europe‘s Office for Democratic Institutions and Human Rights (which has overseen over 150 elections) said the ruling may adversely affect the organization’s two commitments of “giving voters a genuine choice and giving candidates a fair chance” in that “it threatens to further marginalize candidates without strong financial backing or extensive personal resources, thereby in effect narrowing the political arena”.[81]

Academics and attorneys

Money isn’t speech and corporations aren’t people
— David Kairys[82]

The constitutional law scholar Laurence H. Tribe wrote that the decision “marks a major upheaval in First Amendment law and signals the end of whatever legitimate claim could otherwise have been made by the Roberts Court to an incremental and minimalist approach to constitutional adjudication, to a modest view of the judicial role vis-à-vis the political branches, or to a genuine concern with adherence to precedent” and pointed out, “Talking about a business corporation as merely another way that individuals might choose to organize their association with one another to pursue their common expressive aims is worse than unrealistic; it obscures the very real injustice and distortion entailed in the phenomenon of some people using other people’s money to support candidates they have made no decision to support, or to oppose candidates they have made no decision to oppose.”[83]

Former Supreme Court Justice Sandra Day O’Connor, whose opinions had changed from dissenting in Austin v. Michigan State Chamber of Commerce to co-authoring (with Stevens) the majority opinion in McConnell v. Federal Election Commission twelve years later, criticized the decision only obliquely, but warned, “In invalidating some of the existing checks on campaign spending, the majority in Citizens United has signaled that the problem of campaign contributions in judicial elections might get considerably worse and quite soon.”[84]

Richard L. Hasen, professor of election law at Loyola Law School, argued that the ruling “is activist, it increases the dangers of corruption in our political system and it ignores the strong tradition of American political equality”. He also described Justice Kennedy’s “specter of blog censorship” as sounding more like “the rantings of a right-wing talk show host than the rational view of a justice with a sense of political realism”.[85]

Kathleen M. Sullivan, professor at Stanford Law School and Steven J. Andre, adjunct professor at Lincoln Law School, argued that two different visions of freedom of speech exist and clashed in the case. An egalitarian vision skeptical of the power of large agglomerations of wealth to skew the political process conflicted with a libertarian vision skeptical of government being placed in the role of determining what speech people should or should not hear.[86][87] Wayne Batchis, Professor at the University of Delaware, in contrast, argues that the Citizens United decision represents a misguided interpretation of the non-textual freedom of association.[88]

The four other scholars of the seven writing in the aforementioned New York Times article were critical.[52] Richard L. Hasen, Distinguished Professor of election law at Loyola Law School argued differently from his Slate article above, concentrating on the “inherent risk of corruption that comes when someone spends independently to try to influence the outcome of judicial elections”, since judges are less publicly accountable than elected officials. Heather K. Gerken, Professor of Law at Yale Law School wrote that “The court has done real damage to the cause of reform, but that damage mostly came earlier, with decisions that made less of a splash.” Michael Waldman, director of the Brennan Center for Justice at N.Y.U. School of Law, opined that the decision “matches or exceeds Bush v. Gore in ideological or partisan overreaching by the court”, explaining how “Exxon or any other firm could spend Bloomberg-level sums in any congressional district in the country against, say, any congressman who supports climate change legislation, or health care, etc.” and Fred Wertheimer, founder and president of Democracy 21 considered that “Chief Justice Roberts has abandoned the illusory public commitments he made to ‘judicial modesty’ and ‘respect for precedent’ to cast the deciding vote for a radical decision that profoundly undermines our democracy,” and that “Congress and presidents past have recognized this danger and signed numerous laws over the years to prevent this kind of corruption of our government.”[52]

Journalists

The New York Times stated in an editorial, “The Supreme Court has handed lobbyists a new weapon. A lobbyist can now tell any elected official: if you vote wrong, my company, labor union or interest group will spend unlimited sums explicitly advertising against your re-election.”[89] Jonathan Alter called it the “most serious threat to American democracy in a generation”.[90] The Christian Science Monitor wrote that the Court had declared “outright that corporate expenditures cannot corrupt elected officials, that influence over lawmakers is not corruption, and that appearance of influence will not undermine public faith in our democracy”.[91]

Business leader

 Ben & Jerry’s ice cream, founded Stamp Stampede, a sustained protest to demonstrate widespread support for a proposed constitutional amendment to overturn Citizens United. The campaign encourages people to rubber stamp messages such as “Not To Be Used for Bribing Politicians” on paper currency. In 2014, Cohen told Salon, “As long as the Supreme Court rules money is speech, corporations and the wealthy are using it by giving piles of it to politicians to pass or not pass laws that they want. Now, the rest of the people, [those] who don’t have that money, can actually make their voice heard by using money to stamp a message out.”[92]

Media coverage

Political blogs

Most blogs avoided the theoretical aspects of the decision and focused on more personal and dramatic elements, including the Barack ObamaSamuel Alito face-off during the President’s State of the Union address.[93] There, President Obama argued that the decision “reversed a century of law” (the federal ban on corporate contributions dates back to the 1907 Tillman Act, and the ban on union and corporate expenditures dates from 1947) and that it would allow “foreign corporations to spend without limits in our elections”, during which Justice Alito, in the audience, perceptibly mouthed the words “not true”. This event received extensive comment from political bloggers, with a substantial amount of the coverage concentrated on whether or not foreign corporations would be able to make substantial political contributions in US elections. In the opinion, the Court had specifically indicated it was not overturning the ban on foreign contributions.

Opinion poll

ABC-Washington Post poll results.

An ABC–Washington Post poll conducted February 4–8, 2010, showed that 80% of those surveyed opposed (and 65% strongly opposed) the Citizens United ruling, which the poll described as saying “corporations and unions can spend as much money as they want to help political candidates win elections”. Additionally, 72% supported “an effort by Congress to reinstate limits on corporate and union spending on election campaigns”. The poll showed large majority support from Democrats, Republicans and independents.[94][95][96]

A Gallup Poll conducted in October 2009, after oral argument, but released after the Supreme Court released its opinion, found that 57 percent of those surveyed “agreed that money given to political candidates is a form of free speech” and 55 percent agreed that the “same rules should apply to individuals, corporations and unions”. However, in the same poll respondents by 52% to 41% prioritized limits on campaign contributions over protecting rights to support campaigns and 76% thought the government should be able to place limits on corporation or union donations.[97][98]

Separate polls by various conservative organizations, including the plaintiff Citizens United and the Center for Competitive Politics, found support for the decision.[99] In particular, the Center for Competitive Politics poll[100] found that 51% of respondents believed that Citizens United should have a right to air ads promoting Hillary: The Movie. The poll also found that only 22 percent had heard of the case.

Further court rulings

SpeechNow v. FEC

Main article: SpeechNOW v. FEC

SpeechNow is a nonprofit, unincorporated association organized as a section 527 entity under the U.S. Internal Revenue Code. The organization was formed by individuals who seek to pool their resources to make independent expenditures expressly advocating the election or defeat of federal candidates. SpeechNow planned to accept contributions only from individuals, not corporations or other sources prohibited under the Federal Election Campaign Act. On February 14, 2008, SpeechNow and several individual plaintiffs filed a complaint in the U.S. District Court for the District of Columbia challenging the constitutionality of the Federal Election Campaign Act provisions governing political committee registration, contribution limits and disclosure. The plaintiffs contended that the Act unconstitutionally restricts their association guaranteed under the First Amendment. By requiring registration as a political committee and limiting the monetary amount that an individual may contribute to a political committee, SpeechNow and the other plaintiffs asserted that the Act unconstitutionally restricted the individuals’ freedom of speech by limiting the amount that an individual can contribute to SpeechNow and thus the amount the organization may spend. SpeechNow also argued that the reporting required of political committees is unconstitutionally burdensome.[101]

On March 26, 2010, the U.S. Court of Appeals for the District of Columbia Circuit ruled in SpeechNow.org. v. FEC that the contribution limits of 2 U.S.C. §441a were unconstitutional as applied to individuals’ contributions to SpeechNow. The court also ruled that the reporting requirements of 2 U.S.C. §§432, 433 and 434(a) and the organizational requirements of 2 U.S.C. §431(4) and §431(8) can be constitutionally applied to SpeechNow.[101] A unanimous nine-judge panel of the United States Court of Appeals[102] struck down the federal limits on contributions to federal political committees that make only independent expenditures and do not contribute to candidates or political parties. This type of “independent expenditure committee” is inherently non-corruptive, the Court reasoned, and therefore contributions to such a committee can not be limited based on the government’s interest in preventing political corruption.[103] In light of the Supreme Court’s decision in Citizens United v. FEC, in which the Supreme Court held that the government has no anti-corruption interest in limiting independent expenditures, the appeals court ruled that “contributions to groups that make only independent expenditures cannot corrupt or create the appearance of corruption.” As a result, the court of appeals held that the government has no anti-corruption interest in limiting contributions to an independent group such as SpeechNow. Contribution limits as applied to SpeechNow “violate the First Amendment by preventing [individuals] from donating to SpeechNow in excess of the limits and by prohibiting SpeechNow from accepting donations in excess of the limits.” The court noted that its holding does not affect direct contributions to candidates, but rather contributions to a group that makes only independent expenditures.[101] The appeals court held that, while disclosure and reporting requirements do impose a burden on First Amendment interests, they “‘impose no ceiling on campaign related activities'” and “‘do not prevent anyone from speaking.'” Furthermore, the court held that the additional reporting requirements that the Commission would impose on SpeechNow if it were organized as a political committee are minimal, “given the relative simplicity with which SpeechNow intends to operate.” Since SpeechNow already had a number of “planned contributions” from individuals, the court ruled that SpeechNow could not compare itself to “ad hoc groups that want to create themselves on the spur of the moment.” Since the public has an interest in knowing who is speaking about a candidate and who is funding that speech, the court held that requiring such disclosure and organization as a political committee are sufficiently important governmental interests to justify the additional reporting and registration burdens on SpeechNow.[101]

Public electoral financing

Main article: McComish v. Bennett

On June 27, 2011, ruling in the consolidated cases of Arizona Free Enterprise Club’s Freedom Club PAC v. Bennett (No. 10-238) and McComish v. Bennett (No. 10-239), the Supreme Court deemed unconstitutional an Arizona law that provided extra taxpayer-funded support for office seekers who have been outspent by privately funded opponents or by independent political groups. A conservative 5–4 majority of justices said the law violated free speech, concluding the state was impermissibly trying to “level the playing field” through a public finance system. Arizona lawmakers had argued there was a compelling state interest in equalizing resources among competing candidates and interest groups.[104] Opponents said the law violated free-speech rights of the privately financed candidates and their contributors, inhibiting fundraising and spending, discouraging participation in campaigns and limiting what voters hear about politics.[105] Chief Justice John Roberts said in the court’s majority opinion that the law substantially burdened political speech and was not sufficiently justified to survive First Amendment scrutiny.[105]

As a consequence of the decision, states and municipalities are blocked from using a method of public financing that is simultaneously likely to attract candidates fearful that they will be vastly outspent and sensitive to avoiding needless government expense. “The government can still use taxpayer funds to subsidize political campaigns, but it can only do that in a manner that provides an alternative to private financing” said William R. Maurer, a lawyer with the Institute for Justice, which represented several challengers of the law. “It cannot create disincentives.”[106] The ruling meant the end of similar matching-fund programs in Connecticut, Maine and a few other places according to David Primo, a political science professor at the University of Rochester who was an expert witness for the law’s challengers.[107]

State campaign-spending limits

Despite the Citizens United ruling, In December 2011, the Montana Supreme Court, in Western Tradition Partnership, Inc. v. Attorney General of Montana, upheld that state’s law limiting corporate contributions. Examining the history of corporate interference in Montana government that led to the Corrupt Practices Law, the majority decided that the state still had a compelling reason to maintain the restrictions. It ruled that these restrictions on speech were narrowly tailored and withstood strict scrutiny and thus did not contradict Citizens United v. Federal Election Commission.

While granting permission to file a Certiorari petition, the US Supreme Court agreed to stay the Montana ruling, although Justices Ginsburg and Breyer wrote a short statement urging the Court “to consider whether, in light of the huge sums of money currently deployed to buy candidate’s allegiance, Citizens United should continue to hold sway”.[108] In June 2012, over the dissent of the same four judges who dissented in Citizens United, the Court simultaneously granted certiorari and summarily reversed the decision in American Tradition Partnership, Inc. v. Bullock, 567, U.S. __ (2012).[109] The Supreme Court majority rejected the Montana Supreme Court arguments in a two paragraph, twenty line per curiam opinion, stating that these arguments “either were already rejected in Citizens United, or fail to meaningfully distinguish that case.”[110] The ruling makes clear that states cannot bar corporate and union political expenditures in state elections.[111]

McCutcheon v. FECMain article: McCutcheon v. FEC

In addition to limiting the size of donations to individual candidates and parties, the Federal Election Campaign Act also includes aggregate caps on the total amount that an individual may give to all candidates and parties. In 2012, Shaun McCutcheon, a Republican Party activist,[112][113] sought to donate more than was allowed by the federal aggregate limit on federal candidates.[114] McCutcheon et al filed suit against the Federal Election Commission (FEC).[115] In 2014, the US Supreme Court reversed a ruling of the DC District Court‘s dismissal of McCutcheon v. FEC and struck down the aggregate limits. The plurality opinion invalidated only the aggregate contribution limits, not limits on giving to any one candidate or party. The decisive fifth vote for McCutcheon came from Justice Thomas, who concurred in the judgment on the grounds that all contribution limits are unconstitutional.[116]

Legislative responses

Legislative impact

The New York Times reported that 24 states with laws prohibiting or limiting independent expenditures by unions and corporations would have to change their campaign finance laws because of the ruling.[117]

After Citizens United and SpeechNow.org numerous state legislatures raised their limits on contributions to candidates and parties.[118] At the federal level, lawmakers substantially increased contribution limits to political parties as part of the 2014 budget bill.[119] Such changes are widely perceived as efforts to place candidates and parties on something closer to equal footing with organizations making independent expenditures.[119]

While many states and the federal government have raised contribution limits in response to Citizens United, proposals aimed at discouraging political spending, or providing for public financing of campaigns, have been less successful.

Senator Dick Durbin (D-IL) proposed that candidates who sign up small donors receive $900,000 in public money, but the proposal has not been acted on by Congress. Others proposed that laws on corporate governance be amended to assure that shareholders vote on political expenditures.[90]

In February 2010, Senator Charles E. Schumer of New York, immediate past Chairman of the Democratic Senatorial Campaign Committee, and Representative Chris Van Hollen of Maryland, Chairman of the Democratic Congressional Campaign Committee, outlined legislation aimed at undoing the decision.[120] In April 2010, they introduced such legislation in the Senate and House, respectively.[121] On June 24, 2010, H.R.5175 (The DISCLOSE Act) passed in the House of Representatives but failed in the Senate. It would have required additional disclosure by corporations of their campaign expenditures. The law, if passed, would also have prohibited political spending by U.S. companies with twenty percent or more foreign ownership, and by most government contractors.[122] The DISCLOSE Act included exemptions to its rules given to certain special interests such as the National Rifle Association and the American Association of Retired Persons. These gaps within the proposal attracted criticism from lawmakers on both political parties. “They are auctioning off pieces of the First Amendment in this bill… The bigger you are, the stronger you are, the less disclosure you have,” said Republican Congressman Dan Lungren of California. Democratic Congressman Adam Schiff of California commented, “I wish there had been no carve-outs”.[123] The bill was criticized as prohibiting much activity that was legal before Citizens United.[124]

The DISCLOSE Act twice failed to pass the U.S. Senate in the 111th Congress, in both instances reaching only 59 of the 60 votes required to overcome a unified Republican filibuster.[125][126] A scaled down version of the DISCLOSE Act was reintroduced in both the House and Senate in 2012 but did not pass.[citation needed]

Some have argued for a constitutional amendment to overturn the decision. Although the decision does not address “corporate personhood,” a long-established judicial and constitutional concept,[127] much attention has focused on that issue. Move to Amend, a coalition formed in response to the ruling,[128] seeks to amend the Constitution to abolish corporate personhood, thus stripping corporations of all rights under the Constitution.[129][130] In an online chat with web community Reddit, President Obama endorsed further consideration of a constitutional amendment and stated “Over the longer term, I think we need to seriously consider mobilizing a constitutional amendment process to overturn Citizens United (assuming the Supreme Court Doesn’t revisit it)”.[131] He further elaborated that “Even if the amendment process falls short, it can shine a spotlight on the super-PAC phenomenon and help apply pressure for change.”[131]

Legislative reactions by state and local lawmakers

Members of 16 state legislatures have called for a constitutional amendment to reverse the court’s decision: California, Colorado, Connecticut, Delaware, Hawaii, Illinois, Maine, Maryland, Massachusetts, Montana, New Jersey, New Mexico, Oregon, Rhode Island, Vermont and West Virginia.[132][133]

Most of these are non-binding resolutions. However, three states – Vermont, California, and Illinois – called for an Article V Convention to draft and propose a federal constitutional amendment to overturn Citizens United.[134] In Minnesota, the Minnesota Senate passed a similar resolution, “Senate File No. 17,” on May 2, 2013, but the House of Representatives returned the measure to the General Calendar (meaning the measure did not pass) on May 15, 2013.[135] Thirty-four states are needed to call an Article V convention.

On a local level, Washington D.C. and 400 other municipalities passed resolutions requesting a federal constitutional amendment.[136]

Since Citizens United, however, 13 states have actually raised their contribution limits.[118]

Political impact

The Citizens United ruling “opened the door” for unlimited election spending by corporations, but most of this spending has “ended up being funneled through the groups that have become known as super PACs”.[137] While critics predicted that the ruling would “bring about a new era of corporate influence in politics” allowing companies and businesspeople to “buy elections” to promote their financial interests, as of 2016, in fact large corporations still play a “negligible role” in presidential election spending. Instead large expenditures, usually through “Super PACS,” have come from “a small group of billionaires”, based largely on ideology. This has shifted power “away from the political parties and toward the … donors themselves. In part, this explains the large number and variety of candidates fielded by the Republicans in 2016.”[137] The ability of individuals to spend unlimited sums was first affirmed by the Supreme Court, however, not in Citizens United, but in Buckley v. Valeo, decided in 1976.

Super PACs

Citizens United v. Federal Election Commission has often been credited for the creation of “super PACs“, political action committees which make no financial contributions to candidates or parties, and so can accept unlimited contributions from individuals, corporations and unions. Certainly, the holding in Citizens United helped affirm the legal basis for super PACs by deciding that, for purposes of establishing a “compelling government interest” of corruption sufficient to justify government limitations on political speech, “independent expenditures, including those made by corporations, do not give rise to corruption or the appearance of corruption”.[138]

However, it took another decision, by the U.S. Court of Appeals for the District of Columbia Circuit, Speechnow.org v. Federal Election Commission, to actually authorize the creation of super PACs. While Citizens United held that corporations and unions could make independent expenditures, a separate provision of the Federal Election Campaign Act, at least as long interpreted by the Federal Election Commission, held that individuals could not contribute to a common fund without it becoming a PAC. PACs, in turn, were not allowed to accept corporate or union contributions of any size or to accept individual contributions in excess of $5,000. In Speechnow.org, the D.C. Circuit, sitting en banc, held 9–0 that in light of Citizens United, such restrictions on the sources and size of contributions could not apply to an organization that made only independent expenditures in support of or opposition to a candidate but not contributions to a candidate’s campaign.

Citizens United and SpeechNOW left their imprint on the 2012 United States presidential election, in which single individuals contributed large sums to “super PACs” supporting particular candidates. Sheldon Adelson, the gambling entrepreneur, gave approximately fifteen million dollars to support Newt Gingrich. Foster Friess, a Wyoming financier, donated almost two million dollars to Rick Santorum’s super PAC. Karl Rove organized super PACs that spent over $300 million in support of Republicans during the 2012 elections.[139]

In addition to indirectly providing support for the creation of super PACs, Citizens United allowed incorporated 501(c)(4) public advocacy groups (such as the National Rifle Association, the Sierra Club, and the group Citizens United itself) and trade associations to make expenditures in political races. Such groups may not, under the tax code, have a primary purpose of engaging in electoral advocacy. These organizations must disclose their expenditures, but unlike super PACs they do not have to include the names of their donors in their FEC filings. A number of partisan organizations such as Karl Rove‘s influential conservative Crossroads Grassroots Policy Strategies and the liberal 21st Century Colorado have since registered as tax-exempt 501(c)(4) groups (defined as groups promoting “social welfare”) and engaged in substantial political spending.[140][141] This has led to claims[142][143][144] of large secret donations, and questions about whether such groups should be required to disclose their donors. Historically, such non-profits have not been required to disclose their donors or names of members. See National Association for the Advancement of Colored People v. Alabama.

In an August 2015 essay in Der Spiegel, Markus Feldkirchen wrote that the Citizens United decision was “now becoming visible for the first time” in federal elections as the super-rich have “radically” increased donations to support their candidates and positions via super PACs. Feldkirchen also said in the first six months of 2015 the candidates and their super PACs received close to $400 million: “far more than in the entire previous campaign.” He opined that super-rich donating more than ever before to individual campaigns plus the “enormous” chasm in wealth has given the super-rich the power to steer the economic and political direction of the United States and undermine its democracy.[145] In October 2015, the New York Times observed that just 158 super-rich families each contributed $250,000 or more, while an additional 200 families gave more than $100,000 for the 2016 presidential election. Both groups contributed almost half of the “early money” for candidates in the 2016 presidential election as of June 30, 2015 through channels like super PACs legalized by the Supreme Court’s Citizens United decision.[146][147]

See also

https://en.wikipedia.org/wiki/Citizens_United_v._FEC

The Pronk Pops Show Podcasts Portfolio

Listen To Pronk Pops Podcast or Download  Shows 806-808

Listen To Pronk Pops Podcast or Download Shows 800-805

Listen To Pronk Pops Podcast or Download Shows 793-799

Listen To Pronk Pops Podcast or Download Shows 785-792

Listen To Pronk Pops Podcast or Download Shows 777-784

Listen To Pronk Pops Podcast or Download Shows 769-776

Listen To Pronk Pops Podcast or Download Shows 759-768

Listen To Pronk Pops Podcast or Download Shows 751-758

Listen To Pronk Pops Podcast or Download Shows 745-750

Listen To Pronk Pops Podcast or Download Shows 738-744

Listen To Pronk Pops Podcast or Download Shows 732-737

Listen To Pronk Pops Podcast or Download Shows 727-731

Listen To Pronk Pops Podcast or Download Shows 720-726

Listen To Pronk Pops Podcast or DownloadShows 713-719

Listen To Pronk Pops Podcast or Download Shows 705-712

Listen To Pronk Pops Podcast or Download Shows 695-704

Listen To Pronk Pops Podcast or Download Shows 685-694

Listen To Pronk Pops Podcast or Download Shows 675-684

Listen To Pronk Pops Podcast or Download Shows 668-674

Listen To Pronk Pops Podcast or Download Shows 660-667

Listen To Pronk Pops Podcast or Download Shows 651-659

Listen To Pronk Pops Podcast or Download Shows 644-650

Listen To Pronk Pops Podcast or Download Shows 637-643

Listen To Pronk Pops Podcast or Download Shows 629-636

Listen To Pronk Pops Podcast or Download Shows 617-628

Listen To Pronk Pops Podcast or Download Shows 608-616

Listen To Pronk Pops Podcast or Download Shows 599-607

Listen To Pronk Pops Podcast or Download Shows 590-598

Listen To Pronk Pops Podcast or Download Shows 585- 589

Listen To Pronk Pops Podcast or Download Shows 575-584

Listen To Pronk Pops Podcast or Download Shows 565-574

Listen To Pronk Pops Podcast or Download Shows 556-564

Listen To Pronk Pops Podcast or Download Shows 546-555

Listen To Pronk Pops Podcast or Download Shows 538-545

Listen To Pronk Pops Podcast or Download Shows 532-537

Listen To Pronk Pops Podcast or Download Shows 526-531

Listen To Pronk Pops Podcast or Download Shows 519-525

Listen To Pronk Pops Podcast or Download Shows 510-518

Listen To Pronk Pops Podcast or Download Shows 500-509

Listen To Pronk Pops Podcast or Download Shows 490-499

Listen To Pronk Pops Podcast or Download Shows 480-489

Listen To Pronk Pops Podcast or Download Shows 473-479

Listen To Pronk Pops Podcast or Download Shows 464-472

Listen To Pronk Pops Podcast or Download Shows 455-463

Listen To Pronk Pops Podcast or Download Shows 447-454

Listen To Pronk Pops Podcast or Download Shows 439-446

Listen To Pronk Pops Podcast or Download Shows 431-438

Listen To Pronk Pops Podcast or Download Shows 422-430

Listen To Pronk Pops Podcast or Download Shows 414-421

Listen To Pronk Pops Podcast or Download Shows 408-413

Listen To Pronk Pops Podcast or Download Shows 400-407

Listen To Pronk Pops Podcast or Download Shows 391-399

Listen To Pronk Pops Podcast or Download Shows 383-390

Listen To Pronk Pops Podcast or Download Shows 376-382

Listen To Pronk Pops Podcast or Download Shows 369-375

Listen To Pronk Pops Podcast or Download Shows 360-368

Listen To Pronk Pops Podcast or Download Shows 354-359

Listen To Pronk Pops Podcast or Download Shows 346-353

Listen To Pronk Pops Podcast or Download Shows 338-345

Listen To Pronk Pops Podcast or Download Shows 328-337

Listen To Pronk Pops Podcast or Download Shows 319-327

Listen To Pronk Pops Podcast or Download Shows 307-318

Listen To Pronk Pops Podcast or Download Shows 296-306

Listen To Pronk Pops Podcast or Download Shows 287-295

Listen To Pronk Pops Podcast or Download Shows 277-286

Listen To Pronk Pops Podcast or Download Shows 264-276

Listen To Pronk Pops Podcast or Download Shows 250-263

Listen To Pronk Pops Podcast or Download Shows 236-249

Listen To Pronk Pops Podcast or Download Shows 222-235

Listen To Pronk Pops Podcast or Download Shows 211-221

Listen To Pronk Pops Podcast or Download Shows 202-210

Listen To Pronk Pops Podcast or Download Shows 194-201

Listen To Pronk Pops Podcast or Download Shows 184-193

Listen To Pronk Pops Podcast or Download Shows 174-183

Listen To Pronk Pops Podcast or Download Shows 165-173

Listen To Pronk Pops Podcast or Download Shows 158-164

Listen To Pronk Pops Podcast or Download Shows151-157

Listen To Pronk Pops Podcast or Download Shows 143-150

Listen To Pronk Pops Podcast or Download Shows 135-142

Listen To Pronk Pops Podcast or Download Shows 131-134

Listen To Pronk Pops Podcast or Download Shows 124-130

Listen To Pronk Pops Podcast or Download Shows 121-123

Listen To Pronk Pops Podcast or Download Shows 118-120

Listen To Pronk Pops Podcast or Download Shows 113 -117

Listen To Pronk Pops Podcast or Download Show 112

Listen To Pronk Pops Podcast or Download Shows 108-111

Listen To Pronk Pops Podcast or Download Shows 106-108

Listen To Pronk Pops Podcast or Download Shows 104-105

Listen To Pronk Pops Podcast or Download Shows 101-103

Listen To Pronk Pops Podcast or Download Shows 98-100

Listen To Pronk Pops Podcast or Download Shows 94-97

Listen To Pronk Pops Podcast or Download Show 93

Listen To Pronk Pops Podcast or Download Show 92

Listen To Pronk Pops Podcast or Download Show 91

Listen To Pronk Pops Podcast or Download Shows 88-90

Listen To Pronk Pops Podcast or Download Shows 84-87

Listen To Pronk Pops Podcast or Download Shows 79-83

Listen To Pronk Pops Podcast or Download Shows 74-78

Listen To Pronk Pops Podcast or Download Shows 71-73

Listen To Pronk Pops Podcast or Download Shows 68-70

Listen To Pronk Pops Podcast or Download Shows 65-67

Listen To Pronk Pops Podcast or Download Shows 62-64

Listen To Pronk Pops Podcast or Download Shows 58-61

Listen To Pronk Pops Podcast or Download Shows 55-57

Listen To Pronk Pops Podcast or Download Shows 52-54

Listen To Pronk Pops Podcast or Download Shows 49-51

Listen To Pronk Pops Podcast or Download Shows 45-48

Listen To Pronk Pops Podcast or Download Shows 41-44

Listen To Pronk Pops Podcast or Download Shows 38-40

Listen To Pronk Pops Podcast or Download Shows 34-37

Listen To Pronk Pops Podcast or Download Shows 30-33

Listen To Pronk Pops Podcast or Download Shows 27-29

Listen To Pronk Pops Podcast or Download Shows 17-26

Listen To Pronk Pops Podcast or Download Shows 16-22

Listen To Pronk Pops Podcast or Download Shows 10-15

Listen To Pronk Pops Podcast or Download Shows 1-9

Read Full Post | Make a Comment ( None so far )

Liked it here?
Why not try sites on the blogroll...