Hillary Clinton

The Pronk Pops Show 867, April 4, 2017, Story 1: Russia Radical Islamic Terrorist Attack on Subway — Videos — Story 2: North Korea Ballistic Missile Launch — Videos–Story 3: Syria Chemical Nerve Gas Weapons Air Attack in Idlib Provence — Videos Story 4: Valid Use of National Security Agency (NSA) Intelligence or Abuse of Power of NSA Intelligence For Political Purposes — Big Lie Media Blackout Obamagate Surveillance/Spying Scandal with Susan Rice Unmasking American Identities For Foreign Intelligence Purpose (Legal and Legitimate) or Political Partisan Purpose (Illegal and Illegitimate) — Videos

Posted on April 5, 2017. Filed under: American History, Blogroll, Breaking News, Communications, Congress, Constitutional Law, Corruption, Defense Spending, Donald J. Trump, Donald J. Trump, Donald Trump, Donald Trump, Education, Elections, Federal Bureau of Investigation (FBI), Federal Government, Freedom of Speech, Government, Government Spending, Hillary Clinton, History, House of Representatives, Iraq, Law, Life, Media, National Security Agency, Nerve Gas, News, Nuclear Weapons, Obama, Philosophy, Photos, Politics, Polls, President Barack Obama, President Trump, Progressives, Raymond Thomas Pronk, Rule of Law, Russia, Scandals, Senate, Surveillance/Spying, Syria, United Kingdom, United States of America | Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , |

Project_1

The Pronk Pops Show Podcasts

Pronk Pops Show 867: April 5, 2017

Pronk Pops Show 866: April 3, 2017

Pronk Pops Show 865: March 31, 2017

Pronk Pops Show 864: March 30, 2017

Pronk Pops Show 863: March 29, 2017

Pronk Pops Show 862: March 28, 2017

Pronk Pops Show 861: March 27, 2017

Pronk Pops Show 860: March 24, 2017

Pronk Pops Show 859: March 23, 2017

Pronk Pops Show 858: March 22, 2017

Pronk Pops Show 857: March 21, 2017

Pronk Pops Show 856: March 20, 2017

Pronk Pops Show 855: March 10, 2017

Pronk Pops Show 854: March 9, 2017

Pronk Pops Show 853: March 8, 2017

Pronk Pops Show 852: March 6, 2017

Pronk Pops Show 851: March 3, 2017

Pronk Pops Show 850: March 2, 2017

Pronk Pops Show 849: March 1, 2017

Pronk Pops Show 848: February 28, 2017

Pronk Pops Show 847: February 27, 2017

Pronk Pops Show 846: February 24, 2017

Pronk Pops Show 845: February 23, 2017

Pronk Pops Show 844: February 22, 2017

Pronk Pops Show 843: February 21, 2017

Pronk Pops Show 842: February 20, 2017

Pronk Pops Show 841: February 17, 2017

Pronk Pops Show 840: February 16, 2017

Pronk Pops Show 839: February 15, 2017

Pronk Pops Show 838: February 14, 2017

Pronk Pops Show 837: February 13, 2017

Pronk Pops Show 836: February 10, 2017

Pronk Pops Show 835: February 9, 2017

Pronk Pops Show 834: February 8, 2017

Pronk Pops Show 833: February 7, 2017

Pronk Pops Show 832: February 6, 2017

Pronk Pops Show 831: February 3, 2017

Pronk Pops Show 830: February 2, 2017

Pronk Pops Show 829: February 1, 2017

Pronk Pops Show 828: January 31, 2017

Pronk Pops Show 827: January 30, 2017

Pronk Pops Show 826: January 27, 2017

Pronk Pops Show 825: January 26, 2017

Pronk Pops Show 824: January 25, 2017

Pronk Pops Show 823: January 24, 2017

Pronk Pops Show 822: January 23, 2017

Pronk Pops Show 821: January 20, 2017

Pronk Pops Show 820: January 19, 2017

Pronk Pops Show 819: January 18, 2017

Pronk Pops Show 818: January 17, 2017

Pronk Pops Show 817: January 13, 2017

Pronk Pops Show 816: January 12, 2017

Pronk Pops Show 815: January 11, 2017

Pronk Pops Show 814: January 10, 2017

Pronk Pops Show 813: January 9, 2017

Image result for russia subway attack
Image result for syrian gas attack april 5, 2017 map

Image result for susan rice unmasking

Image result for susan rice unmasking

 Story 1: Russia Radical Islamic Terrorist Attack on Subway — Videos

Image result for russia subway attack Image result for russia subway attackImage result for russia subway attackImage result for russia subway attackImage result for russia subway attackImage result for russia subway attackImage result for russia subway attackImage result for russia subway attackImage result for russia subway attackImage result for russia subway attackImage result for russia subway attackImage result for russia subway attackRussia confirms identity of St Petersburg suicide bomber

St. Petersburg Metro bomber identified as Kyrgyz-born Russian citizen

Kyrgyzstan native identified as bomber of Russian metro

Any Conspiracy Theory About the St. Petersburg Metro Blast Is OK So Long As It’s About Russia

Russian Metro Bomb Suspect a Muslim Born in Central Asia: Investigators

By | April 4, 2017 | Last Updated: April 4, 2017 3:56 pm

Emergency services direct pedestrians outside Sennaya Ploshchad metro station, following explosions in two train carriages at metro stations in St. Petersburg, Russia on April 3, 2017. (REUTERS/Anton Vaganov)OSH, Kyrgyzstan/ST. PETERSBURG, Russia—A Russian suicide bomber originally from mainly Muslim Kyrgyzstan detonated the explosives in a St Petersburg train carriage that killed 14 people and wounded 50, authorities said on Tuesday.

Suspect Akbarzhon Jalilov. (5th Channel Russia/via Reuters)

The suspect had radical Islamist links, Russian media cited law enforcement officials as saying, raising the possibility Monday’s attack could have been inspired by the ISIS terrorist group, which has not struck a major city in Russia before. So far, no-one has claimed responsibility for the blast.

Kyrgyz officials identified the suspect as Akbarzhon Jalilov, born in the city of Osh in 1995, and Russian officials confirmed his identity, saying he had also left a bomb found at another metro station before it went off.

Biographical details pieced together from social media and Russian officials suggested Jalilov was an fairly typical young St Petersburg resident with an interest in Islam as well as pop music and martial arts but no obvious links to militants.

His uncle, Eminzhon Jalilov, told Reuters by telephone that his nephew was a mosque-attending Muslim, but that he was “not a fanatic”.

The explosion in the middle of Monday afternoon occurred when the train was in a tunnel deep underground, amplifying the force of the blast. The carriage door was blown off, and witnesses described seeing injured passengers with bloodied and blackened bodies.

State investigative authorities said fragments of the body of the suspect had been found among the dead, indicating that he was a suicide bomber.

Blast victims lie near a subway train hit by a explosion at the Tekhnologichesky Institut subway station in St.Petersburg, Russia April 3, 2017. (AP Photo/www.vk.com/spb_today via AP)

“From the genetic evidence and the surveillance cameras there is reason to believe that the person behind the terrorist act in the train carriage was the same one who left a bag with an explosive device at the Ploshchad Vosstaniya station,” they said in a statement.

Russia has been on alert against attacks in reprisal for its military intervention in Syria, where Moscow’s forces have been supporting troops loyal to President Bashar al-Assad against Western-backed armed groups as well as ISIS, which grew out of the conflict.

ISIS, now under attack by all sides in Syria’s multi-faceted war, has repeatedly threatened revenge and been linked to recent bombings elsewhere in Europe.

If it is confirmed that the metro bomber was linked to radical Islamists, it could provoke anger among some Russians at Moscow’s decision to intervene in Syria, a year before an election which President Vladimir Putin is expected to win.

Previous Bombing

Officials said they were treating the blast as an act of terrorism, but there was no official confirmation of any link to Islamist radicals.

Russian Foreign Minister Sergei Lavrov said it was cynical to say the bombing in St Petersburg was revenge for Russia’s role in Syria. He said the attack showed that Moscow needed to press on with its fight against global terrorism.

A page on social media site VKontakte, the Russian equivalent of Facebook, belonging to someone with the same name and year of birth as Jalilov, included photos of him relaxing with friends in a bar, smoking from a hookah pipe. He was dressed in jackets and a baseball cap.

A Reuters reporter visited a house in Osh, southern Kyrgyzstan, which neighbors said was the family home of Jalilov. The home, a modest but well-maintained one-storey brick building, was empty.

A man leaves flowers during a memorial service for victims of a blast in St.Petersburg metro, outside Sennaya Ploshchad metro station in St. Petersburg, Russia on April 3, 2017. (REUTERS/Igor Russak)

Neighbors said Jalilov was from a family of ethnic Uzbeks, and that while they knew his parents they had not seen the young man for years. They said his father worked as a panel-beater in a car repair shop.

“They are a very good family. Always friendly, never argue. And they have good kids,” one of the neighbors, Mirkomil Akhmadaliyev, told Reuters.

Later on Tuesday, Jalilov’s mother appeared but refused to speak to reporters, saying she needed to retrieve something and hurry back to a security service office.

Russian Metro Bomb Suspect a Muslim Born in Central Asia: Investigators

Osh is part of the Fergana Valley, a fertile strip of land that straddles Kyrgyzstan, Uzbekistan and Tajikistan which is mainly populated by ethnic Uzbeks. It has a tradition of Islamist radicalism and hundreds of people have set out from the area to join ISIS in Syria and Iraq.

A blast at a nightclub in Istanbul on New Year’s Eve that killed 39 people involved a suspect from the same part of central Asia. The bomber in that attack said he had been acting under the direction of ISIS militants in Syria.

A still image of suspect Akbarzhon Jalilov walking at St Petersburg's metro station. (5th Channel Russia/via Reuters)

Jalilov’s uncle said his nephew moved to Russia in 2012. He is registered at an upscale apartment in the north of St Petersburg, according to a source in the Russian authorities, and he has a Daewoo Nexia car registered in his name.

A man who said he was a representative of the apartment’s owner told Reuters that Jalilov had never actually lived there, but had given the address as his residence in official documents.

His VKontakte page included links to a site featuring sayings from Muhammad ibn Abd al-Wahhab, an eighteenth century preacher on whose teaching Wahhabism, a conservative and hardline branch of Islam, is based. But there were no links to Islamist terrorists.

Putin Visit ‘Noteworthy’

Russia’s health minister Veronika Skvortsova said on Tuesday that the death toll from the blast, which hit at 2:40 p.m. (1140 GMT), had risen to 14, with 50 wounded.

St Petersburg television showed footage of the corpse of a man they said was the perpetrator. The man, with a close-cropped beard, resembled footage of a young man wearing a blue beanie hat and a jacket with a fur-lined hood captured on closed circuit television identified by Russian media as a suspect.

An injured person is helped by emergency services outside Sennaya Ploshchad metro station, following explosions in two train carriages at metro stations in St. Petersburg. (REUTERS/Anton Vaganov)

“It has been ascertained that an explosive device could have been detonated by a man, fragments of whose body were found in the third carriage of the train,” Russia’s state investigative committee said in a statement.

“The man has been identified but his identity will not be disclosed for now in the interests of the investigation,” the statement added.

President Putin, who was visiting St Petersburg at the time of the blast, went to the site late on Monday.

The Kremlin said it was “noteworthy” that Putin had been in the city. It did not elaborate, but said such attacks on Russia were a challenge for every citizen, including the president.

Russian president Vladimir Putin puts flowers down outside Tekhnologicheskiy Institut metro station in St. Petersburg, Russia on April 3, 2017. (REUTERS/Grigory Duko)

Two years ago, ISIS said it had brought down a plane carrying Russian tourists home from a Red Sea resort. All 224 people on board the flight were killed.

Monday’s blast raised security fears beyond Russian frontiers. France, which has itself suffered a series of attacks, announced additional security measures in Paris.

http://www.theepochtimes.com/n3/2239155-st-petersburg-metro-blast-suspect-likely-born-in-central-asia/print/

Story 2: North Korea Ballistic Missile Launch — Videos–

Image result for north korea launchers missile april 2017Image result for north korea launchers missile april 2017

US officials: North Korean missile launch likely a failure

Breaking News – North Korea Fired Ballistic Missile Into Japan Sea

Published on Apr 4, 2017

Breaking News – North Korea Fired Ballistic Missile Into Japan Sea

April 5th, 2017 – North Korea fired a ballistic missile into the Sea of Japan on Wednesday morning, US and South Korean officials said. The US official believes the projectile was likely a ballistic missile. North Korea’s missile test comes just a day before Chinese President Xi Jinping visits US President Donald Trump for a summit in Florida.

The projectile used in Wednesday’s test was launched at 6:42 a.m. Seoul time, from a site in the vicinity of Sinpo, South Hamgyong province, a South Korean Defense Ministry official said. It flew a distance of around 60 kilometers (37 miles), South Korean officials said.

North Korean missile fired ahead of US-China summit | April 5, 2017

North Korean missile fired ahead of US-China summit | April 5, 2017

Donald Trump: ‘We have a big problem’ in North Korea

Japan issues ‘strong protest’ over N.Korea missile launch

Official: North Korea fires projectile

Trump calls on China to get tough on North Korea

Can the Trump administration get North Korea under control?

Ash Carter: US Will DESTROY North Korea

US Military sends MOST DEADLY MESSAGE to North Korean Military

Published on Mar 26, 2017

A great video of the US Military sending it’s most deadly message to the leadership of the North Korean Military in Military exercise.
WATERS SURROUNDING THE KOREAN PENINSULA, Republic of Korea
(March. 19, 2017)- U.S. Navy ships assigned to Commander, Task Force (CTF) 30 and CTF 70 are scheduled to begin a series of exercises with the Republic of Korea (ROK) Navy March 21, 2017 to strengthen maritime interoperability and tactics, techniques and procedures.

The U.S. routinely conducts CSG operations in the waters around the Republic of Korea to exercise maritime maneuvers, strengthen the U.S.-ROK alliance, and improve regional security.

“This exercise is yet another example of the strength and resolve of the combined U.S. and the ROK naval force,” said Rear Adm. James Kilby, commander, Carl Vinson Carrier Strike Group. “The U.S. and the Republic of Korea share one of the strongest alliances in the world and we grow stronger as an alliance because of our routine exercises here in South Korea and the close relationship and ties that we forge from operating at sea together.”

The exercises will consist of a routine bilateral training, subject matter expert exchanges, anti-submarine and anti-surface warfare drills, communication drills, air defense exercises, counter-mine planning and distinguished visitor embarkations.

“This defensive exercise focuses on enhancing the interoperability between the ROK and US navies and helps both navies maintain a combined defense posture to protect the ROK from future North Korean unprovoked acts of aggression,” said Rear Adm, Choi, Sung-Mok, the chief of staff for the Republic of Korea Fleet.

Additional surface, subsurface, and air assets joining the bilateral exercise include Carrier Air Wing 2, Arleigh Burke-class guided-missile destroyers USS Barry (DDG 52), USS Wayne E Meyer (DDG 108), USS McCampbell (DDG 85), USS Stethem (DDG 63), Los Angeles-class nuclear fast attack submarine USS Columbus (SSN 762), and P-3/P-8 Maritime Patrol and Reconnaissance Aircraft from Commander, Task Force 72.

Vinson deployed to the region under U.S. 3rd Fleet command and control, including beyond the international dateline, which previously divided operational areas of responsibility for 3rd and 7th Fleets. Third Fleet operating forward offers additional options to the Pacific Fleet commander by leveraging the capabilities of 3rd and 7th Fleets. This operational concept allows both numbered fleets to complement one another and provide the foundation of stability in the Indo-Asia-Pacific region.

The U.S. Navy maintains a presence in the Indo-Asia-Pacific to help preserve peace and security and further our partnerships with friends and allies. Our forward presence contributes to freedom of navigation and lawful use of the sea, as well as furthers operational training and enables an exchange of culture, skills, and tactical knowledge.

For a list of participating Republic of Korea assets, please contact the Republic of Korea Navy Headquarters Public Affairs.

Video Description Credit: Lt. Joshua Kelsey

Video Credit: US Military

Thumbnail Credit: US Navy

US says it has ‘spoken enough about North Korea’ after new missile launch

Rex Tillerson’s enigmatic statement comes after Trump warned US would act alone on Pyongyang provocation if China did not intervene

Kim Jong-un at a North Korean army competition in Pyongyang
Kim Jong-un at a North Korean army competition in Pyongyang on 1 April. The ballistic missile launch from the east coast follows another two weeks ago. Photograph: KCNA/Reuters 

Japan and South Korea have condemned North Korea after it launched another ballistic missile – but the US refused to be drawn in, with secretary of state Rex Tillerson saying the country “has spoken enough about North Korea”.

Japan lodged a strong protest over the “extremely problematic launch”, which landed in waters off the Korean peninsula on the eve of a summit between US and Chinese leaders that is expected to focus on Pyongyang’s nuclear weapons programme.

The South Korean foreign ministry said it “threatens the peace and safety of the international community as well as the Korean peninsula”.

But Tillerson responded to the test with an aenigmatic statement saying only: “The United States has spoken enough about North Korea. We have no further comment.”

A few hours earlier, before news of the new missile launch broke, a senior Trump administration official suggested time was running out for a diplomatic solution.

“We would have loved to see North Korea join the community of nations,” the official said. “They have been given that opportunity over the course in different dialogues and offers over the course of four administrations with some of best diplomats and statesmen doing the best they could to bring about a resolution.

“The clock has now run out and all options are on the table for us.”

The missile was launched on Wednesday from Sinpo, a port city on North Korea’s east coast, and flew about 60km (37 miles), South Korea’s office of the joint chiefs of staff said in a short statement. Sinpo is the site of a North Korean submarine base.

The launch comes as the US president, Donald Trump, and China’s president, Xi Jinping, prepare for a summit this week at which adding pressure on the North to drop its arms development will take centre stage.

Abraham Denmark, a senior Asia policy official in Barack Obama’s Pentagon, said the North Korean launch was a statement of defiance ahead of the meeting, in which North Korea will top the agenda. “I would interpret the message to the United States and China from North Korea as ‘we’re going to continue to move down this path, and you cannot do anything about it,” Denmark said.

Tillerson’s reticence contrasts with Trump’s more aggressive recent comments on North Korea’s nuclear and ballistic missile programme.

In an interview with the Financial Times this week, Trump warned that the US was prepared to take unilateral action against Pyongyang if China failed to put pressure on North Korea to abandon its nuclear programme.

“Well, if China is not going to solve North Korea, we will,” Trump said. Asked how he would tackle North Korea, he said: “I’m not going to tell you. You know, I am not the United States of the past where we tell you where we are going to hit in the Middle East.”

He added: “China has great influence over North Korea. And China will either decide to help us with North Korea, or they won’t. And if they do, that will be very good for China, and if they don’t it won’t be good for anyone.”

North Korea’s foreign ministry criticised Trump’s comments and ongoing joint military exercises involving South Korea and the US that Pyongyang claims are a dress rehearsal for an invasion.

The “reckless actions” are driving the tense situation on the Korean peninsula “to the brink of a war”, a ministry spokesman was quoted as saying by the official KCNA news agency. It said the idea that the US could deprive Pyongyang of its “nuclear deterrent” through sanctions was “the wildest dream”.

Any launch of objects using the ballistic missile technology is a violation of UN security council resolutions but the North has defied the ban, claiming it is an infringement of its sovereign rights to self defence and pursuit of space exploration.

In a statement the US Pacific Command said it had detected and tracked the missile launch at 11.42am Hawaii time. “The launch of a single ballistic missile occurred at a land-based facility near Sinpo. The missile was tracked until it landed in the Sea of Japan at 11.51am. Initial assessments indicate the type of missile was a KN-15 medium range ballistic missile,” the statement said.

Japan’s prime minister, Shinzo Abe, warned of the possibility of further provocations by North Korea and said Tokyo would continue to work closely with the US to counter threats from missile launches.

Ralph Cossa, president of the Pacific Forum CSIS thinktank in Honolulu, said he was expecting North Korea to draw attention to itself to coincide with the Trump-Xi summit, perhaps by conducting a nuclear test.

“I’ve joked before that they don’t mind being hated but they definitely hate to be ignored,” Cossa said.

Pyongyang has also conducted two nuclear weapons tests since January 2016 and is believed to be developing an intercontinental ballistic missile (ICBM) that could hit the US, with its leader, Kim Jong-un, vowing to test launch one at any time.

Experts and officials in the South and the US believe the North is still some time away from mastering all the technology needed for an operational ICBM system, such as re-entry of the atmosphere and subsequent missile guidance.

Topping the agenda of the US-China summit in Florida will be whether Trump will make good on his threat to use crucial trade ties with China as a means of pressuring Beijing to do more to rein in Pyongyang.

A senior White House official said Trump’s meeting with Xi was a test for the US-Chinese relationship and that Trump wants economic ties that are fair, balanced and based on reciprocity.

China has condemned North Korean nuclear and missile tests but is wary of any measures that could lead to the regime’s collapse. Beijing fears political turmoil in the North could trigger a refugee crisis and see tens of thousands of South Korean and US troops lined up along its border.

https://www.theguardian.com/world/2017/apr/05/north-korea-launches-ballistic-missile-into-sea-says-seoul

Story 3: Syria Chemical Nerve Gas Weapons Air Attack in Idlib Provence — Videos

Image result for number killed in syrian civil war through 2016

Image result for syrian gas attack april 5, 2017 map idlib syriaImage result for syrian gas attack april 2017  Image result for syrian gas attack april 2017Image result for syrian gas attack april 5, 2017 map

Syria’s war: Who is fighting and why?

Understanding the Refugee Crisis in Europe, Syria, and around the World

Aftermath of Syrian chemical attack sparks outrage

World leaders condemn the Syrian chemical attack

Syria nerve gas attack: Chemical weapons expert debunks Assad’s defense

War in Syria: Russia and West clash over Idlib gas attack (part 1)

Published on Apr 5, 2017

Subscribe to France 24 now:
http://f24.my/youtubeEN

FRANCE 24 live news stream: all the latest news 24/7
http://f24.my/YTliveEN

On Tuesday in Idlib, a province in the Northwest of Syria, at least seventy people were killed, 20 of them children, in what appears to have been a chemical weapon attack in the rebel-held town of Khan Sheikhoun. Initial reports point to the nerve agent Sarin gas. Our panel of experts asks who was behind this attack. What explanations are being given, and do they stack up?
Click here for PART TWO.

Another suspected chemical weapons attack is latest chapter in brutal Syrian conflict

‘Assad Has Unleashed Horror in Syria’: World Reacts to Alleged Chemical Attack

Syria Gas Attack: Russia says chemical depot held by rebels bombed

Turkish President Erdogan calls chemical attack in Syria “inhuman and unacceptable”

“The Desperate BBC Propaganda Machine Blames Assad For Chemical Attack Before Any Investigation.”

Russia denies involvement in reported Syrian chemical attack

Children caught in Syria ‘chemical attack’- BBC News

Published on Apr 5, 2017

The UN Security Council has held an emergency session to discuss the suspected gas attack on a rebel-held town in Syria. The attack is believed to have killed more than 70 people, including children. The Syrian government has denied responsibility, while its ally Russia says the gas came from rebel weapons on the ground. But those claims have been widely rejected by western governments, as our Chief International Correspondent Lyse Doucet reports.

Syria conflict: ‘Chemical attack’ in Idlib kills 58 – BBC News

Published on Apr 4, 2017

At least 58 people have been killed and dozens wounded in a suspected chemical attack on a rebel-held town in north-western Syria, a monitoring group says. The Syrian Observatory for Human Rights reported that strikes on Khan Sheikhoun by Syrian government or Russian jets had caused many people to choke. Later, aircraft fired rockets at local clinics treating some of the survivors, medics and opposition activists said. The Syrian government has repeatedly denied using chemical weapons.

UN Ambassador Nikki Haley Condemns Russia, Iran After Chemical Attack In Syria | NBC News

UK: Chemical Attack Bears All Hallmarks of Assad

UNSC holds emergency meeting on Syria chemical attack

WATCH LIVE: U.N. Security Council Holds Emergency Meeting On Syria Chemical Attack | TIME

Story 4:  Valid Use of National Security Agency (NSA) Intelligence or Abuse of Power of NSA Intelligence For Political Purposes — Big Lie Media Blackout of Obamagate Surveillance/Spying Scandal with Susan Rice Unmasking American Identities For Foreign Intelligence Purpose (Legal and Legitimate) or Political Partisan Purpose (Illegal and Illegitimate) — Videos

Image result for susan rice unmaskingImage result for susan rice unmaskingImage result for susan rice unmaskingImage result for susan rice unmaskingImage result for susan rice unmaskingImage result for susan rice unmaskingImage result for liars bengahziImage result for cartoons susan rice unmaskingImage result for susan rice unmasking

Malzberg | Andrew McCarthy: Rice Unmasking “Extraordinarily Serious”

Chicago’s Morning Answer – Andrew McCarthy – April 5, 2017

Fmr. FBI agent defines the Susan Rice unmasking

Hannity: Exposing the Obama administration’s sabotage

Tucker Carlson Tonight Full Show 4/4/2017 – Fox News HD April 03, 2017

Judge Napolitano on if Susan Rice did anything illegal

Susan Rice: ‘I Leaked Nothing To Nobody’ About Intelligence (Exclusive) | Andrea Mitchell | MSNBC

The optics of the Susan Rice revelations

Ron Paul on the fallout from the Susan Rice controversy

Susan Rice Slithers Through A Maze of Mendacity, Lies and Misrepresentation With MSM Support

Did Susan Rice break any laws?

Gutfeld: Did Susan Rice break the law?

Rand Paul: Susan Rice ‘Ought to Be Under Subpoena,’ Asked If Obama Knew About Eavesdropping

Why the Susan Rice Unmasking Case Is Important and What You Need to Know

Ingraham blasts lack of media coverage on Susan Rice story

Laura Ingraham takes on the Susan Rice revelations

Where does the Susan Rice story go from here?

Krauthammer: Susan Rice appears to be contradicting herself

Bloomberg Reports Susan Rice Repeatedly Asked To Unmask Names of Trump Aides – Hugh Hewitt

Susan Rice’s White House Unmasking: A Watergate-style Scandal

by ANDREW C. MCCARTHY April 4, 2017 12:08 PM

Her interest was not in national security but to advance the political interests of the Democratic party.

The thing to bear in mind is that the White House does not do investigations. Not criminal investigations, not intelligence investigations.

Remember that.

Why is that so important in the context of explosive revelations that Susan Rice, President Obama’s national-security adviser, confidant, and chief dissembler, called for the “unmasking” of Trump campaign and transition officials whose identities and communications were captured in the collection of U.S. intelligence on foreign targets?

Because we’ve been told for weeks that any unmasking of people in Trump’s circle that may have occurred had two innocent explanations: (1) the FBI’s investigation of Russian meddling in the election and (2) the need to know, for purposes of understanding the communications of foreign intelligence targets, the identities of Americans incidentally intercepted or mentioned. The unmasking, Obama apologists insist, had nothing to do with targeting Trump or his people.

That won’t wash.

In general, it is the FBI that conducts investigations that bear on American citizens suspected of committing crimes or of acting as agents of foreign powers. In the matter of alleged Russian meddling, the investigative camp also includes the CIA and the NSA. All three agencies conducted a probe and issued a joint report in January. That was after Obama, despite having previously acknowledged that the Russian activity was inconsequential, suddenly made a great show of ordering an inquiry and issuing sanctions.

Consequently, if unmasking was relevant to the Russia investigation, it would have been done by those three agencies. And if it had been critical to know the identities of Americans caught up in other foreign intelligence efforts, the agencies that collect the information and conduct investigations would have unmasked it. Because they are the agencies that collect and refine intelligence “products” for the rest of the “intelligence community,” they are responsible for any unmasking; and they do it under “minimization” standards that FBI Director James Comey, in recent congressional testimony, described as “obsessive” in their determination to protect the identities and privacy of Americans.

Understand: There would have been no intelligence need for Susan Rice to ask for identities to be unmasked. If there had been a real need to reveal the identities — an intelligence need based on American interests — the unmasking would have been done by the investigating agencies.

The national-security adviser is not an investigator. She is a White House staffer. The president’s staff is a consumer of intelligence, not a generator or collector of it. If Susan Rice was unmasking Americans, it was not to fulfill an intelligence need based on American interests; it was to fulfill a political desire based on Democratic-party interests.

The FBI, CIA, and NSA generate or collect the intelligence in, essentially, three ways: conducting surveillance on suspected agents of foreign powers under the Foreign Intelligence Surveillance Act (FISA), and carrying out more-sweeping collections under two other authorities — a different provision of FISA, and a Reagan-era executive order that has been amended several times over the ensuing decades, EO 12,333. As Director Comey explained, in answering questions posed by Representative Trey Gowdy (R., S.C.), those three agencies do collection, investigation, and analysis. In general, they handle any necessary unmasking — which, due to the aforementioned privacy obsessiveness, is extremely rare. Unlike Democratic-party operatives whose obsession is vanquishing Republicans, the three agencies have to be concerned about the privacy rights of Americans. If they’re not, their legal authority to collect the intelligence — a vital national-security power — could be severely curtailed when it periodically comes up for review by Congress, as it will later this year.

As Director Comey explained, in answering questions posed by Representative Trey Gowdy (R., S.C.), those three agencies do collection, investigation, and analysis. In general, they handle any necessary unmasking — which, due to the aforementioned privacy obsessiveness, is extremely rare. Unlike Democratic-party operatives whose obsession is vanquishing Republicans, the three agencies have to be concerned about the privacy rights of Americans. If they’re not, their legal authority to collect the intelligence — a vital national-security power — could be severely curtailed when it periodically comes up for review by Congress, as it will later this year.

Those three collecting agencies — FBI, CIA, and NSA — must be distinguished from other components of the government, such as the White House. Those other components, Comey elaborated, “are consumers of our products.” That is, they do not collect raw intelligence and refine it into useful reports — i.e., reports that balance informational value and required privacy protections. They read those reports and make policy recommendations based on them. White House staffers are not supposed to be in the business of controlling the content of the reports; they merely act on the reports.

Thus, Comey added, these consumers “can ask the collectors to unmask.” But the unmasking authority “resides with those who collected the information.”

Of course, the consumer doing the asking in this case was not just any government official. We’re talking about Susan Rice.

This was Obama’s right hand doing the asking. If she made an unmasking “request,” do you suppose anyone at the FBI, CIA, or NSA was going to say no? That brings us to three interesting points.

The first involves political intrusion into law enforcement — something that the White House is supposed to avoid. (You may remember that Democrats ran Bush attorney general Alberto Gonzales out of town over suspicions about it.) As I have noted repeatedly, in publishing the illegally leaked classified information about former national-security adviser Michael Flynn’s communications with Russian ambassador Sergey Kislyak, the New York Times informs us that “Obama advisers” and “Obama officials” were up to their eyeballs in the investigation:

Obama advisers heard separately from the F.B.I. about Mr. Flynn’s conversation with Mr. Kislyak, whose calls were routinely monitored by American intelligence agencies that track Russian diplomats. The Obama advisers grew suspicious that perhaps there had been a secret deal between the incoming team and Moscow, which could violate the rarely enforced, two-century-old Logan Act barring private citizens from negotiating with foreign powers in disputes with the United States.

The Obama officials asked the F.B.I. if a quid pro quo had been discussed on the call, and the answer came back no, according to one of the officials, who like others asked not to be named discussing delicate communications. [Translation: “asked not to be named committing felony unauthorized disclosure of classified information.”] The topic of sanctions came up, they were told, but there was no deal. [Emphasis added.]

It appears very likely that Susan Rice was involved in the unmasking of Michael Flynn. Was she also monitoring the FBI’s investigation? Was she involved in the administration’s consideration of (bogus) criminal charges against Flynn? With the subsequent decision to have the FBI interrogate Flynn (or “grill” him, as the Times put it)?

The second point is that, while not a pillar of rectitude, Ms. Rice is not an idiot. Besides being shrewd, she was a highly involved, highly informed consumer of intelligence, and a key Obama political collaborator. Unlike the casual reader, she would have known who the Trump-team players were without needing to have their identities unmasked. Do you really think her purpose in demanding that names be revealed was to enhance her understanding of intelligence about the activities and intentions of foreign targets? Seriously? I’m betting it was so that others down the dissemination chain could see the names of Trump associates — names the investigating agencies that originally collected the information had determined not to unmask.

Third, and finally, let’s consider the dissemination chain Rice had in mind. The most telling remark that former Obama deputy defense secretary Evelyn Farkas made in her now-infamous MSNBC interview was the throw-away line at the end: “That’s why you have all the leaking.”

The most telling remark that former Obama deputy defense secretary Evelyn Farkas made in her now-infamous MSNBC interview was the throw-away line at the end: “That’s why you have all the leaking.”

To summarize: At a high level, officials like Susan Rice had names unmasked that would not ordinarily be unmasked. That information was then being pushed widely throughout the intelligence community in unmasked form . . . particularly after Obama, toward the end of his presidency, suddenly — and seemingly apropos of nothing — changed the rules so that all of the intelligence agencies (not just the collecting agencies) could have access to raw intelligence information.

As we know, the community of intelligence agencies leaks like a sieve, and the more access there is to juicy information, the more leaks there are. Meanwhile, former Obama officials and Clinton-campaign advisers, like Farkas, were pushing to get the information transferred from the intelligence community to members of Congress, geometrically increasing the likelihood of intelligence leaks.

By the way, have you noticed that there have been lots of intelligence leaks in the press?

There’s an old saying in the criminal law: The best evidence of a conspiracy is success.

The criminal law also has another good rule of thumb: Consciousness of guilt is best proved by false exculpatory statements. That’s a genre in which Susan Rice has rich experience.

Two weeks ago, she was asked in an interview about allegations by House Intelligence Committee Chairman Devin Nunes (R., Calif.) that the Obama administration had unmasked Trump-team members. “I know nothing about this,” Rice replied. “I was surprised to see reports from Chairman Nunes on that count today.” Well, at least she didn’t blame it on a video.

— Andrew C. McCarthy is a senior policy fellow at the National Review Institute and a contributing editor of National Review.

http://www.nationalreview.com/article/446415/susan-rice-unmasking-trump-campaign-members-obama-administration-fbi-cia-nsa

The Pronk Pops Show Podcasts Portfolio

Listen To Pronk Pops Podcast or Download Shows 864-867

Listen To Pronk Pops Podcast or Download Shows 857-863

Listen To Pronk Pops Podcast or Download Shows 850-856

Listen To Pronk Pops Podcast or Download Shows 845-849

Listen To Pronk Pops Podcast or Download Shows 840-844

Listen To Pronk Pops Podcast or Download Shows 833-839

Listen To Pronk Pops Podcast or Download Shows 827-832

Listen To Pronk Pops Podcast or Download Shows 821-826

Listen To Pronk Pops Podcast or Download Shows 815-820

Listen To Pronk Pops Podcast or Download Shows 806-814

Listen To Pronk Pops Podcast or Download Shows 800-805

Listen To Pronk Pops Podcast or Download Shows 793-799

Listen To Pronk Pops Podcast or Download Shows 785-792

Listen To Pronk Pops Podcast or Download Shows 777-784

Listen To Pronk Pops Podcast or Download Shows 769-776

Listen To Pronk Pops Podcast or Download Shows 759-768

Listen To Pronk Pops Podcast or Download Shows 751-758

Listen To Pronk Pops Podcast or Download Shows 745-750

Listen To Pronk Pops Podcast or Download Shows 738-744

Listen To Pronk Pops Podcast or Download Shows 732-737

Listen To Pronk Pops Podcast or Download Shows 727-731

Listen To Pronk Pops Podcast or Download Shows 720-726

Listen To Pronk Pops Podcast or DownloadShows 713-719

Listen To Pronk Pops Podcast or DownloadShows 705-712

Listen To Pronk Pops Podcast or Download Shows 695-704

Listen To Pronk Pops Podcast or Download Shows 685-694

Listen To Pronk Pops Podcast or Download Shows 675-684

Listen To Pronk Pops Podcast or Download Shows 668-674

Listen To Pronk Pops Podcast or Download Shows 660-667

Listen To Pronk Pops Podcast or Download Shows 651-659

Listen To Pronk Pops Podcast or Download Shows 644-650

Listen To Pronk Pops Podcast or Download Shows 637-643

Listen To Pronk Pops Podcast or Download Shows 629-636

Listen To Pronk Pops Podcast or Download Shows 617-628

Listen To Pronk Pops Podcast or Download Shows 608-616

Listen To Pronk Pops Podcast or Download Shows 599-607

Listen To Pronk Pops Podcast or Download Shows 590-598

Listen To Pronk Pops Podcast or Download Shows 585- 589

Listen To Pronk Pops Podcast or Download Shows 575-584

Listen To Pronk Pops Podcast or Download Shows 565-574

Listen To Pronk Pops Podcast or Download Shows 556-564

Listen To Pronk Pops Podcast or Download Shows 546-555

Listen To Pronk Pops Podcast or Download Shows 538-545

Listen To Pronk Pops Podcast or Download Shows 532-537

Listen To Pronk Pops Podcast or Download Shows 526-531

Listen To Pronk Pops Podcast or Download Shows 519-525

Listen To Pronk Pops Podcast or Download Shows 510-518

Listen To Pronk Pops Podcast or Download Shows 500-509

Listen To Pronk Pops Podcast or Download Shows 490-499

Listen To Pronk Pops Podcast or Download Shows 480-489

Listen To Pronk Pops Podcast or Download Shows 473-479

Listen To Pronk Pops Podcast or Download Shows 464-472

Listen To Pronk Pops Podcast or Download Shows 455-463

Listen To Pronk Pops Podcast or Download Shows 447-454

Listen To Pronk Pops Podcast or Download Shows 439-446

Listen To Pronk Pops Podcast or Download Shows 431-438

Listen To Pronk Pops Podcast or Download Shows 422-430

Listen To Pronk Pops Podcast or Download Shows 414-421

Listen To Pronk Pops Podcast or Download Shows 408-413

Listen To Pronk Pops Podcast or Download Shows 400-407

Listen To Pronk Pops Podcast or Download Shows 391-399

Listen To Pronk Pops Podcast or Download Shows 383-390

Listen To Pronk Pops Podcast or Download Shows 376-382

Listen To Pronk Pops Podcast or Download Shows 369-375

Listen To Pronk Pops Podcast or Download Shows 360-368

Listen To Pronk Pops Podcast or Download Shows 354-359

Listen To Pronk Pops Podcast or Download Shows 346-353

Listen To Pronk Pops Podcast or Download Shows 338-345

Listen To Pronk Pops Podcast or Download Shows 328-337

Listen To Pronk Pops Podcast or Download Shows 319-327

Listen To Pronk Pops Podcast or Download Shows 307-318

Listen To Pronk Pops Podcast or Download Shows 296-306

Listen To Pronk Pops Podcast or Download Shows 287-295

Listen To Pronk Pops Podcast or Download Shows 277-286

Listen To Pronk Pops Podcast or Download Shows 264-276

Listen To Pronk Pops Podcast or Download Shows 250-263

Listen To Pronk Pops Podcast or Download Shows 236-249

Listen To Pronk Pops Podcast or Download Shows 222-235

Listen To Pronk Pops Podcast or Download Shows 211-221

Listen To Pronk Pops Podcast or Download Shows 202-210

Listen To Pronk Pops Podcast or Download Shows 194-201

Listen To Pronk Pops Podcast or Download Shows 184-193

Listen To Pronk Pops Podcast or Download Shows 174-183

Listen To Pronk Pops Podcast or Download Shows 165-173

Listen To Pronk Pops Podcast or Download Shows 158-164

Listen To Pronk Pops Podcast or Download Shows151-157

Listen To Pronk Pops Podcast or Download Shows 143-150

Listen To Pronk Pops Podcast or Download Shows 135-142

Listen To Pronk Pops Podcast or Download Shows 131-134

Listen To Pronk Pops Podcast or Download Shows 124-130

Listen To Pronk Pops Podcast or Download Shows 121-123

Listen To Pronk Pops Podcast or Download Shows 118-120

Listen To Pronk Pops Podcast or Download Shows 113 -117

Listen To Pronk Pops Podcast or Download Show 112

Listen To Pronk Pops Podcast or Download Shows 108-111

Listen To Pronk Pops Podcast or Download Shows 106-108

Listen To Pronk Pops Podcast or Download Shows 104-105

Listen To Pronk Pops Podcast or Download Shows 101-103

Listen To Pronk Pops Podcast or Download Shows 98-100

Listen To Pronk Pops Podcast or Download Shows 94-97

Listen To Pronk Pops Podcast or Download Show 93

Listen To Pronk Pops Podcast or Download Show 92

Listen To Pronk Pops Podcast or Download Show 91

Listen To Pronk Pops Podcast or Download Shows 88-90

Listen To Pronk Pops Podcast or Download Shows 84-87

Listen To Pronk Pops Podcast or Download Shows 79-83

Listen To Pronk Pops Podcast or Download Shows 74-78

Listen To Pronk Pops Podcast or Download Shows 71-73

Listen To Pronk Pops Podcast or Download Shows 68-70

Listen To Pronk Pops Podcast or Download Shows 65-67

Listen To Pronk Pops Podcast or Download Shows 62-64

Listen To Pronk Pops Podcast or Download Shows 58-61

Listen To Pronk Pops Podcast or Download Shows 55-57

Listen To Pronk Pops Podcast or Download Shows 52-54

Listen To Pronk Pops Podcast or Download Shows 49-51

Listen To Pronk Pops Podcast or Download Shows 45-48

Listen To Pronk Pops Podcast or Download Shows 41-44

Listen To Pronk Pops Podcast or Download Shows 38-40

Listen To Pronk Pops Podcast or Download Shows 34-37

Listen To Pronk Pops Podcast or Download Shows 30-33

Listen To Pronk Pops Podcast or Download Shows 27-29

Listen To Pronk Pops Podcast or Download Shows 17-26

Listen To Pronk Pops Podcast or Download Shows 16-22

Listen To Pronk Pops Podcast or Download Shows 10-15

Listen To Pronk Pops Podcast or Download Shows 1-9

Read Full Post | Make a Comment ( None so far )

The Pronk Pops Show 856, March 20, 2017, Story 1: National Security Agency Director Admiral Mike Rogers and FBI Director James Comey Confirm There Is No Evidence That Russians Changed The Votes or Results of Presidential Election And No Collusion Between Russians and Trump Campaign –But FBI Is Still Investigating and Cannot Say More — Big Lie Media Lied Again — Videos — Story 2: National Security Agency (NSA) Collects And Stores All Communications Over The Internet Including Trump’s and Advisers — No Need For Warrants — Who Was The National Security Target? — Who Leaked The Content and Transcript of General Mike Flynn’s Conversations With Russian Ambassador? Time To Release The Full Transcripts of All Conversations — Videos

Posted on March 20, 2017. Filed under: 2016 Presidential Campaign, 2016 Presidential Candidates, American History, Blogroll, Breaking News, College, Communications, Congress, Constitutional Law, Corruption, Countries, Culture, Donald J. Trump, Donald J. Trump, Donald Trump, Donald Trump, Education, Elections, Federal Bureau of Investigation (FBI), Federal Government, Foreign Policy, Freedom of Speech, Government, Government Dependency, Government Spending, Great Britain, Hillary Clinton, Hillary Clinton, History, House of Representatives, Human, Impeachment, Independence, Law, Life, Media, National Security Agency, Obama, Philosophy, Photos, Politics, President Barack Obama, President Trump, Presidential Appointments, Radio, Raymond Thomas Pronk, Russia, Scandals, Security, Senate, Senator Jeff Sessions, Social Security, Spying, Success, Taxation, Taxes, Terrorism, United States Constitution, United States of America, United States Supreme Court, Videos, Violence, War, Wealth, Weapons, Wisdom | Tags: , , , , , |

Project_1

The Pronk Pops Show Podcasts

Pronk Pops Show 856: March 20, 2017

Pronk Pops Show 855: March 10, 2017

Pronk Pops Show 854: March 9, 2017

Pronk Pops Show 853: March 8, 2017

Pronk Pops Show 852: March 6, 2017

Pronk Pops Show 851: March 3, 2017

Pronk Pops Show 850: March 2, 2017

Pronk Pops Show 849: March 1, 2017

Pronk Pops Show 848: February 28, 2017

Pronk Pops Show 847: February 27, 2017

Pronk Pops Show 846: February 24, 2017

Pronk Pops Show 845: February 23, 2017

Pronk Pops Show 844: February 22, 2017

Pronk Pops Show 843: February 21, 2017

Pronk Pops Show 842: February 20, 2017

Pronk Pops Show 841: February 17, 2017

Pronk Pops Show 840: February 16, 2017

Pronk Pops Show 839: February 15, 2017

Pronk Pops Show 838: February 14, 2017

Pronk Pops Show 837: February 13, 2017

Pronk Pops Show 836: February 10, 2017

Pronk Pops Show 835: February 9, 2017

Pronk Pops Show 834: February 8, 2017

Pronk Pops Show 833: February 7, 2017

Pronk Pops Show 832: February 6, 2017

Pronk Pops Show 831: February 3, 2017

Pronk Pops Show 830: February 2, 2017

Pronk Pops Show 829: February 1, 2017

Pronk Pops Show 828: January 31, 2017

Pronk Pops Show 827: January 30, 2017

Pronk Pops Show 826: January 27, 2017

Pronk Pops Show 825: January 26, 2017

Pronk Pops Show 824: January 25, 2017

Pronk Pops Show 823: January 24, 2017

Pronk Pops Show 822: January 23, 2017

Pronk Pops Show 821: January 20, 2017

Pronk Pops Show 820: January 19, 2017

Pronk Pops Show 819: January 18, 2017

Pronk Pops Show 818: January 17, 2017

Pronk Pops Show 817: January 13, 2017

Pronk Pops Show 816: January 12, 2017

Pronk Pops Show 815: January 11, 2017

Pronk Pops Show 814: January 10, 2017

Pronk Pops Show 813: January 9, 2017

Pronk Pops Show 812: December 12, 2016

Pronk Pops Show 811: December 9, 2016

Pronk Pops Show 810: December 8, 2016

Pronk Pops Show 809: December 7, 2016

Pronk Pops Show 808: December 6, 2016

Pronk Pops Show 807: December 5, 2016

Pronk Pops Show 806: December 2, 2016

Pronk Pops Show 805: December 1, 2016

Story 1: National Security Agency Director Admiral Mike Rogers and FBI Director James Comey Confirm There Is No Evidence That Russians Changed The Votes or Results of Presidential Election And No Collusion Between Russians and Trump Campaign –But FBI Is Still Investigating and Cannot Say More —  Big Lie Media Lied Again — Videos — 

Image result for comey and gowdyImage result for comey and gowdyImage result for NSA CARTOONS SPYING ON tRUMPImage result for comey and rogers testmony todayImage result for NSA CARTOONS SPYING ON tRUMP

Image result for NSA CARTOONS SPYING ON tRUMP

FBI Director James Comey’s Testifies at House Intelligence Committee Hearing – Opening Statement

Comey: Putin hated Hillary Clinton | Comey, Rogers testify on Russia, wiretapping

Comey confirms FBI is investigating possible Russia/Trump camp collusion

James Comey Testifies On Trump Wiretapping Claims and Russian Interference 3/20/2017

Comey and Rogers Congressional Hearing: No Evidence of Russian Hacking or Stealing the 2016 Election

FBI and NSA give ONE Shocking Evidence about Russia Hacking Election

FBI COMEY: WE WIRE TAPPED THE PRESIDENT

Limbaugh on Comey Hearing: Message to Trump Is Stop the ‘Drain-the-Swamp Stuff’ or Face Impeachment

“It’s Okay For You To Cite Sources But Not Trump?” Sean Spicer Slams CBS Reporter

FBI Director On Trump’s Wiretap Allegations: No Info To Support That – Full Comments

Rep. Schiff previews FBI director’s House hearing on Russia probe

Sean Spicer HEATED press briefing on James Comey Trump Wiretap Claims Russian Interference 3/20/2017

FULL: James Comey Testifies On President Trump Wiretapping Claims & Russian Interference (3/20/2017)

FULL: James Comey Testifies On President Trump Wiretapping Claims & Russian Interference (3/20/2017)

While many Democrats frequently say Russia “hacked” the presidential election, National Security Administration Director Adm. Michael Rogers and FBI Director James Comey both confirmed today that Russian activities had no impact on tallying votes in states.

“On January 6, 2017, the intelligence community assessment assessing Russian activities and intentions in recent US elections stated that the types of systems Russians actors targeted or compromised were not involved in vote tallying,” House Intelligence Committee Chairman Devin Nunes said.

Going to Adm. Rogers, Nunes said, “Do you have any evidence that Russian actors changed vote tallies in the state of Michigan?” referring to a battleground state Hillary Clinton lost.

“No, I do not,” Rogers responded, before emphasizing the NSA is a foreign intelligence agency, and does not focus domestically.

“How about the state of Pennsylvania?” Nunes asked.

“No, sir,” Rogers responded.

“The state of Wisconsin?”

“No, sir,” Rogers said.

He gave similar answers when asked about vote tallying in Florida, North Carolina and Ohio.

Turning to Comey, Nunes said, “Do you have any evidence that the FBI that any votes were changed in the states I mentioned to Adm. Rogers?”

“No,” Comey responded

 

http://www.theamericanmirror.com/fbi-nsa-no-evidence-russia-manipulated-us-vote-tallying/

 

The Democrats’ Trump-Russia Conspiracy Campaign Collapses

Is sanity finally returning? After weeks of ranting and raving about Russian “interference” and Putin-Trump conspiracies, so-called ‘intelligence’ agencies and high-ranking Democrats are quietly walking back their rhetoric and managing their base’s expectations – simply put: there’s no ‘there’, there.

‘Moon of Alabama’ reminds us that a while ago Matt Taibbi in Rolling Stone warned: Why the Russia Story Is a Minefield for Democrats and the Media:

If we engage in Times-style gilding of every lily the leakers throw our way, and in doing so build up a fever of expectations for a bombshell reveal, but there turns out to be no conspiracy – Trump will be pre-inoculated against all criticism for the foreseeable future.

And now, as The Intercept’s Glenn Greenwald writes, key Democratic officials are now warning their base not to expect

From MSNBC politics shows to town hall meetings across the country, the overarching issue for the Democratic Party’s base since Trump’s victory has been Russia, often suffocating attention for other issues. This fixation has persisted even though it has no chance to sink the Trump presidency unless it is proven that high levels of the Trump campaign actively colluded with the Kremlin to manipulate the outcome of the U.S. election — a claim for which absolutely no evidence has thus far been presented.

The principal problem for Democrats is that so many media figures and online charlatans are personally benefiting from feeding the base increasingly unhinged, fact-free conspiracies — just as right-wing media polemicists did after both Bill Clinton and Obama were elected — that there are now millions of partisan soldiers absolutely convinced of a Trump/Russia conspiracy for which, at least as of now, there is no evidence. And they are all waiting for the day, which they regard as inevitable and imminent, when this theory will be proven and Trump will be removed.

Key Democratic officials are clearly worried about the expectations that have been purposely stoked and are now trying to tamp them down. Many of them have tried to signal that the beliefs the base has been led to adopt have no basis in reason or evidence.

The latest official to throw cold water on the MSNBC-led circus is President Obama’s former acting CIA chief Michael Morell. What makes him particularly notable in this context is that Morell was one of Clinton’s most vocal CIA surrogates. In August, he not only endorsed Clinton in the pages of the New York Times but also became the first high official to explicitly accuse Trump of disloyalty, claiming, “In the intelligence business, we would say that Mr. Putin had recruited Mr. Trump as an unwitting agent of the Russian Federation.”

But on Wednesday night, Morell appeared at an intelligence community forum to “cast doubt” on “allegations that members of the Trump campaign colluded with Russia.” “On the question of the Trump campaign conspiring with the Russians here, there is smoke, but there is no fire at all,” he said, adding, “There’s no little campfire, there’s no little candle, there’s no spark. And there’s a lot of people looking for it.”

Obama’s former CIA chief also cast serious doubt on the credibility of the infamous, explosive “dossier” originally published by BuzzFeed, saying that its author, Christopher Steele, paid intermediaries to talk to the sources for it. The dossier, he said, “doesn’t take you anywhere, I don’t think.”

Morell’s comments echo the categorical remarks by Obama’s top national security official, James Clapper, who told Meet the Press last week that during the time he was Obama’s DNI, he saw no evidence to support claims of a Trump/Russia conspiracy. “We had no evidence of such collusion,” Clapper stated unequivocally. Unlike Morell, who left his official CIA position in 2013 but remains very integrated into the intelligence community, Clapper was Obama’s DNI until just seven weeks ago, leaving on January 20.

Perhaps most revealing of all are the Democrats on the Senate Intelligence Committee — charged with investigating these matters — who recently told BuzzFeed how petrified they are of what the Democratic base will do if they do not find evidence of collusion, as they now suspect will likely be the case. “There’s a tangible frustration over what one official called ‘wildly inflated’ expectations surrounding the panel’s fledgling investigation,” BuzzFeed’s Ali Watkins wrote.

Moreover, “several committee sources grudgingly say, it feels as though the investigation will be seen as a sham if the Senate doesn’t find a silver bullet connecting Trump and Russian intelligence operatives.” One member told Watkins: “I don’t think the conclusions are going to meet people’s expectations.”

What makes all of this most significant is that officials like Clapper and Morell are trained disinformation agents; Clapper in particular has proven he will lie to advance his interests. Yet even with all the incentive to do so, they are refusing to claim there is evidence of such collusion; in fact, they are expressly urging people to stop thinking it exists. As even the law recognizes, statements that otherwise lack credibility become more believable when they are ones made “against interest.”

Media figures have similarly begun trying to tamp down expectations. Ben Smith, the editor-in-chief of BuzzFeed, which published the Steele dossier, published an article yesterday warning that the Democratic base’s expectation of a smoking gun “is so strong that Twitter and cable news are full of the theories of what my colleague Charlie Warzel calls the Blue Detectives — the left’s new version of Glenn Beck, digital blackboards full of lines and arrows.” Smith added: “It is also a simple fact that while news of Russian actions on Trump’s behalf is clear, hard details of coordination between his aides and Putin’s haven’t emerged.” And Smith’s core warning is this:

Trump’s critics last year were horrified at the rise of “fake news” and the specter of a politics shaped by alternative facts, predominantly on the right. They need to be careful now not to succumb to the same delusional temptations as their political adversaries, and not to sink into a filter bubble which, after all, draws its strength not from conservative or progressive politics but from human nature.

And those of us covering the story and the stew of real information, fantasy, and — now — forgery around it need to continue to report and think clearly about what we know and what we don’t, and to resist the sugar high that comes with telling people exactly what they want to hear.

For so long, Democrats demonized and smeared anyone trying to inject basic reason, rationality, and skepticism into this Trump/Russia discourse by labeling them all Kremlin agents and Putin lovers. Just this week, the Center for American Progress released a report using the language of treason to announce the existence of a “Fifth Column” in the U.S. that serves Russia (similar to Andrew Sullivan’s notorious 2001 decree that anyone opposing the war on terror composed an anti-American “Fifth Column”), while John McCain listened to Rand Paul express doubts about the wisdom of NATO further expanding to include Montenegro and then promptly announced: “Paul is working for Vladimir Putin.”

But with serious doubts — and fears — now emerging about what the Democratic base has been led to believe by self-interested carnival barkers and partisan hacks, there is a sudden, concerted effort to rein in the excesses of this story. With so many people now doing this, it will be increasingly difficult to smear them all as traitors and Russian loyalists, but it may be far too little, too late, given the pitched hysteria that has been deliberately cultivated around these issues for months. Many Democrats have reached the classic stage of deranged conspiracists where evidence that disproves the theory is viewed as further proof of its existence, and those pointing to it are instantly deemed suspect.

http://www.zerohedge.com/news/2017-03-17/democrats-trump-russia-conspiracy-campaign-collapses

FROM MSNBC POLITICS shows to town hall meetings across the country, the overarching issue for the Democratic Party’s base since Trump’s victory has been Russia, often suffocating attention for other issues. This fixation has persisted even though it has no chance to sink the Trump presidency unless it is proven that high levels of the Trump campaign actively colluded with the Kremlin to manipulate the outcome of the U.S. election — a claim for which absolutely no evidence has thus far been presented.

The principal problem for Democrats is that so many media figures and online charlatans are personally benefiting from feeding the base increasingly unhinged, fact-free conspiracies — just as right-wing media polemicists did after both Bill Clinton and Obama were elected — that there are now millions of partisan soldiers absolutely convinced of a Trump/Russia conspiracy for which, at least as of now, there is no evidence. And they are all waiting for the day, which they regard as inevitable and imminent, when this theory will be proven and Trump will be removed.

Key Democratic officials are clearly worried about the expectations that have been purposely stoked and are now trying to tamp them down. Many of them have tried to signal that the beliefs the base has been led to adopt have no basis in reason or evidence.

The latest official to throw cold water on the MSNBC-led circus is President Obama’s former acting CIA chief Michael Morell. What makes him particularly notable in this context is that Morell was one of Clinton’s most vocal CIA surrogates. In August, he not only endorsed Clinton in the pages of the New York Times but also became the first high official to explicitly accuse Trump of disloyalty, claiming, “In the intelligence business, we would say that Mr. Putin had recruited Mr. Trump as an unwitting agent of the Russian Federation.”

But on Wednesday night, Morell appeared at an intelligence community forum to “cast doubt” on “allegations that members of the Trump campaign colluded with Russia.” “On the question of the Trump campaign conspiring with the Russians here, there is smoke, but there is no fire at all,” he said, adding, “There’s no little campfire, there’s no little candle, there’s no spark. And there’s a lot of people looking for it.”

Obama’s former CIA chief also cast serious doubt on the credibility of the infamous, explosive “dossier” originally published by BuzzFeed, saying that its author, Christopher Steele, paid intermediaries to talk to the sources for it. The dossier, he said, “doesn’t take you anywhere, I don’t think.”

Morell’s comments echo the categorical remarks by Obama’s top national security official, James Clapper, who told Meet the Press last week that during the time he was Obama’s DNI, he saw no evidence to support claims of a Trump/Russia conspiracy. “We had no evidence of such collusion,” Clapper stated unequivocally. Unlike Morell, who left his official CIA position in 2013 but remains very integrated into the intelligence community, Clapper was Obama’s DNI until just seven weeks ago, leaving on January 20.

Perhaps most revealing of all are the Democrats on the Senate Intelligence Committee — charged with investigating these matters — who recently told BuzzFeed how petrified they are of what the Democratic base will do if they do not find evidence of collusion, as they now suspect will likely be the case. “There’s a tangible frustration over what one official called ‘wildly inflated’ expectations surrounding the panel’s fledgling investigation,” BuzzFeed’s Ali Watkins wrote.

Moreover, “several committee sources grudgingly say, it feels as though the investigation will be seen as a sham if the Senate doesn’t find a silver bullet connecting Trump and Russian intelligence operatives.” One member told Watkins: “I don’t think the conclusions are going to meet people’s expectations.”

What makes all of this most significant is that officials like Clapper and Morell are trained disinformation agents; Clapper in particular has proven he will lie to advance his interests. Yet even with all the incentive to do so, they are refusing to claim there is evidence of such collusion; in fact, they are expressly urging people to stop thinking it exists. As even the law recognizes, statements that otherwise lack credibility become more believable when they are ones made “against interest.”

Media figures have similarly begun trying to tamp down expectations. Ben Smith, the editor-in-chief of BuzzFeed, which published the Steele dossier, published an article yesterday warning that the Democratic base’s expectation of a smoking gun “is so strong that Twitter and cable news are full of the theories of what my colleague Charlie Warzel calls the Blue Detectives — the left’s new version of Glenn Beck, digital blackboards full of lines and arrows.” Smith added: “It is also a simple fact that while news of Russian actions on Trump’s behalf is clear, hard details of coordination between his aides and Putin’s haven’t emerged.” And Smith’s core warning is this:

Trump’s critics last year were horrified at the rise of “fake news” and the specter of a politics shaped by alternative facts, predominantly on the right. They need to be careful now not to succumb to the same delusional temptations as their political adversaries, and not to sink into a filter bubble which, after all, draws its strength not from conservative or progressive politics but from human nature.

And those of us covering the story and the stew of real information, fantasy, and — now — forgery around it need to continue to report and think clearly about what we know and what we don’t, and to resist the sugar high that comes with telling people exactly what they want to hear.

For so long, Democrats demonized and smeared anyone trying to inject basic reason, rationality, and skepticism into this Trump/Russia discourse by labeling them all Kremlin agents and Putin lovers. Just this week, the Center for American Progress released a report using the language of treason to announce the existence of a “Fifth Column” in the U.S. that serves Russia (similar to Andrew Sullivan’s notorious 2001 decree that anyone opposing the war on terror composed an anti-American “Fifth Column”), while John McCain listened to Rand Paul express doubts about the wisdom of NATO further expanding to include Montenegro and then promptly announced: “Paul is working for Vladimir Putin.”

But with serious doubts — and fears — now emerging about what the Democratic base has been led to believe by self-interested carnival barkers and partisan hacks, there is a sudden, concerted effort to rein in the excesses of this story. With so many people now doing this, it will be increasingly difficult to smear them all as traitors and Russian loyalists, but it may be far too little, too late, given the pitched hysteria that has been deliberately cultivated around these issues for months. Many Democrats have reached the classic stage of deranged conspiracists where evidence that disproves the theory is viewed as further proof of its existence, and those pointing to it are instantly deemed suspect.

https://theintercept.com/2017/03/16/key-democratic-officials-now-warning-base-not-to-expect-evidence-of-trumprussia-collusion/

ONE OF THE most bizarre aspects of the all-consuming Russia frenzy is the Democrats’ fixation on changes to the RNC platform concerning U.S. arming of Ukraine. The controversy began in July when the Washington Post reported that “the Trump campaign worked behind the scenes last week to make sure the new Republican platform won’t call for giving weapons to Ukraine to fight Russian and rebel forces.”

Ever since then, Democrats have used this language change as evidence that Trump and his key advisers have sinister connections to Russians and corruptly do their bidding at the expense of American interests. Democratic Senator Ben Cardin, the ranking member of the Senate Foreign Relations Committee, spoke for many in his party when he lambasted the RNC change in a July letter to the New York Times, castigating it as “dangerous thinking” that shows Trump is controlled, or at least manipulated, by the Kremlin. Democrats resurrected this line of attack this weekend when Trump advisers acknowledged that campaign officials were behind the platform change.

This attempt to equate Trump’s opposition to arming Ukraine with some sort of treasonous allegiance to Putin masks a rather critical fact: namely, that the refusal to arm Ukraine with lethal weapons was one of Barack Obama’s most steadfastly held policies. The original Post article that reported the RNC platform change noted this explicitly:

Of course, Trump is not the only politician to oppose sending lethal weapons to Ukraine. President Obama decided not to authorize it, despite recommendations to do so from his top Europe officials in the State Department and the military.

Early media reports about this controversy from outlets such as NPR also noted the irony at the heart of this debate: namely, that arming Ukraine was the long-time desire of hawks in the GOP such as John McCain, Lindsey Graham and Marco Rubio, but the Obama White House categorically resisted those pressures:

Republicans in Congress have approved providing arms to the Ukrainian government but the White House has resisted, saying that it would only encourage more bloodshed.

It’s a rare Obama administration policy that the Trump campaign seems to agree with.

Indeed, the GOP ultimately joined with the hawkish wing of the Democratic Party to demand that Obama provide Ukraine with lethal weapons to fight Russia, but Obama steadfastly refused. As the New York Times reported in March, 2015, “President Obama is coming under increasing pressure from both parties and more officials inside his own government to send arms to the country. But he remains unconvinced that they would help.” When Obama kept refusing, leaders of the two parties threatened to enact legislation forcing Obama to arm Ukraine.

The general Russia approach that Democrats now routinely depict as treasonous – avoiding confrontation with and even accommodating Russian interests, not just in Ukraine but also in Syria – was one of the defining traits of Obama’s foreign policy. This fact shouldn’t be overstated: Obama engaged in provocative acts such as moves to further expand NATO, non-lethal aid to Ukraine, and deploying “missile defense” weaponry in Romania. But he rejected most calls to confront Russia. That is one of the primary reasons the “foreign policy elite” – which, recall, Obama came into office denouncing and vowing to repudiate – was so dissatisfied with his presidency.

A new, long article by Politico foreign affairs correspondent Susan Glasser – on the war being waged against Trump by Washington’s “foreign policy elite” – makes this point very potently. Say what you will about Politico, but one thing they are very adept at doing is giving voice to cowardly Washington insiders by accommodating their cowardice and thus routinely granting them anonymity to express themselves. As journalistically dubious as it is to shield the world’s most powerful people with anonymity, this practice sometimes ends up revealing what careerist denizens of Washington power really think but are too scared to say. Glasser’s article, which largely consists of conveying the views of anonymous high-level Obama officials, contains this remarkable passage:

In other words, Democrats are now waging war on, and are depicting as treasonous, one of Barack Obama’s central and most steadfastly held foreign policy positions, one that he clung to despite attacks from leading members of both parties as well as the DC National Security Community. That’s not Noam Chomsky drawing that comparison; it’s an Obama appointee.

The destructive bipartisan Foreign Policy Community was furious with Obama for not confronting Russia more, and is now furious with Trump for the same reason (though they certainly loath and fear Trump for other reasons, including the threat they believe he poses to U.S. imperial management through a combination of ineptitude, instability, toxic PR, naked rather than prettified savagery, and ideology; Glasser writes: “‘Everything I’ve worked for for two decades is being destroyed,’ a senior Republican told me”).

 

ALL OF THIS demonstrates how fundamental a shift has taken place as a result of the Democrats’ election-related fixation on The Grave Russian Threat. To see how severe the shift is, just look at this new polling data from CNN this morning that shows Republicans and Democrats doing a complete reversal on Russia in the span of eight months:

The Democrats’ obsession with Russia has not just led them to want investigations into allegations of hacking and (thus far evidence-free) suspicions of Trump campaign collusion – investigations which everyone should want. It’s done far more than that: it’s turned them into increasingly maniacal and militaristic hawks – dangerous ones – when it comes to confronting the only nation with a larger nuclear stockpile than the U.S., an arsenal accompanied by a sense of fear, if not outright encirclement, from NATO expansion.

Put another way, establishment Democrats – with a largely political impetus but now as a matter of conviction – have completely abandoned Obama’s accommodationist approach to Russia and have fully embraced the belligerent, hawkish mentality of John McCain, Lindsey Graham, Bill Kristol, the CIA and Evan McMullin. It should thus come as no surprise that a bill proposed by supreme warmonger Lindsey Graham to bar Trump from removing sanctions against Russia has more Democratic co-sponsors than Republican ones.

This is why it’s so notable that Democrats, in the name of “resistance,” have aligned with neocons, CIA operatives and former Bush officials: not because coalitions should be avoided with the ideologically impure, but because it reveals much about the political and policy mindset they’ve adopted in the name of stopping Trump. They’re not “resisting” Trump from the left or with populist appeals – by, for instance, devoting themselves to protection of Wall Street and environmental regulations under attack, or supporting the revocation of jobs-killing free trade agreements, or demanding that Yemini civilians not be massacred.

Instead, they’re attacking him on the grounds of insufficient nationalism, militarism, and aggression: equating a desire to avoid confrontation with Moscow as a form of treason (just like they did when they were the leading Cold Warriors). This is why they’re finding such common cause with the nation’s most bloodthirsty militarists – not because it’s an alliance of convenience but rather one of shared convictions (indeed, long before Trump, neocons were planning a re-alignment with Democrats under a Clinton presidency). And the most ironic – and over-looked – aspect of this whole volatile spectacle is how much Democrats have to repudiate and demonize one of Obama’s core foreign policy legacies while pretending that they’re not doing that.

https://theintercept.com/2017/03/06/democrats-now-demonize-the-same-russia-policies-that-obama-long-championed/

Trump claims Democrats ‘made up’ reports about Russia’s election interference

President Trump on Monday dismissed widespread reports of Russia’s meddling in the presidential election as “FAKE NEWS.” In a series of tweets, Trump alleged Democrats “made up and pushed the Russian story,” seemingly referring to the FBI- and CIA-backed reports that Russia interfered in the election to dash Hillary Clinton’s chances, thus helping Trump.

Trump claimed Democrats fabricated the story “as an excuse for running a terrible campaign”:

The Democrats made up and pushed the Russian story as an excuse for running a terrible campaign. Big advantage in Electoral College & lost!

Trump then noted former Director of National Intelligence James Clapper’s remark earlier this month that a paper compiled by the DNI, NSA, FBI, and CIA included “no evidence” of Trump associates’ collusion with Russia. Clapper said neither he nor the agencies had uncovered any “evidence of such collusion.”

James Clapper and others stated that there is no evidence Potus colluded with Russia. This story is FAKE NEWS and everyone knows it!

Top House Intelligence Committee Democrat Rep. Adam Schiff (Calif.) later said he was “surprised” by Clapper’s comment because he did not think that claim could be made “categorically.” “I would characterize it this way: At the outset of the investigation, there was circumstantial evidence of collusion,” Schiff said. “There was direct evidence, I think, of deception.”

Later Monday, FBI Director James Comey and NSA chief Mike Rogers will testify before Congress about possible connections between Trump’s campaign and Russia. Becca Stanek

http://theweek.com/speedreads/687068/trump-claims-democrats-made-reports-about-russias-election-interference

Story 2: National Security Agency (NSA) Collects And Stores All Communications Over The Internet Including Trump and Advisers — No Need For Warrants — Who Was The National Security Target? — Who Leaked The Content and Transcript of General Mike Flynn’s Conservations With Russian Ambassador? — Time To Release The Full Transcripts of All Conservations — Videos

Image result for Hillary clinton national security not procecutedImage result for branco cartoons comey and rogers NSA FBIImage result for cartoons comey and rogers on russians and trumpImage result for NSA CARTOONS SPYING ON tRUMPImage result for NSA CARTOONS SPYING ON tRUMP

Rep. Gowdy questions Director Comey during Intelligence hearing – Part One

Rep. Gowdy questions Director Comey during Intelligence hearing – Part Two

Trey Gowdy grills FBI Comey on leaks about Michael Flynn

Obama launched TWO criminal investigations on Trump׃ no evidence found

The O’Reilly Factor March 18, 2017 Fox News Pres Trump March 18, 2017

Judge Napolitano – Trump is the Enemy of the Deep State, 1549

Edward Snowden Vault 7 ” Wikileaks” Obama Targeting Trump Tower Live from Russia Stream 14 03 2017

Former NSA Employee, Bill Binney, Breaks Silence Confirms Trump Wiretapping claims

NSA WHISTLEBLOWER SAYS TRUMP WAS WIRETAPPED AND MONITORED

NSA Whistleblower William Binney on The Laura Ingraham Show (3/10/2017)

Sean Hannity talks to Mark Levin , Jay Sekulow & Bill Binney about POTUS wiretapping claims

*BOMBSHELL* SEAN HANNITY, WILLIAM BINNEY and TONY SHAFFER (3/8/17) – TALK VAULT 7

Whistleblower: NSA Still Collecting Data On Every U.S. Citizen

william binney ex nsa intelligence agent discusses trump leaks with lou dobbs

Sharyl Attkisson: Presidents CAN authorize ILLEGAL surveillance and nobody would ever know!

Malzberg | Sharyl Attkisson to discuss her new book “Stonewalled” | Part 1

[youtube-https://www.youtube.com/watch?v=OjAoVEhlrPc]

Malzberg | Sharyl Attkisson to discuss her new book “Stonewalled” | Part 2

Wyden: No to warrantless searches by the FBI through National Security Letters

NSA Whistleblower: Everyone in US under virtual surveillance, all info stored, no matter the post

William Binney – The Government is Profiling You (The NSA is Spying on You)

NSA Surveillance and What To Do About It

Taking a Look at the NSA’s Massive Data Center

NSA’s Largest Spy Center Located in Utah (What you need to know)

NSA Whistleblower William Binney: The Future of FREEDOM

‘State of Surveillance’ with Edward Snowden and Shane Smith (FULL EPISODE)

Edward Snowden Full Interview on Trump, Petraeus, & Having ‘No Regrets’

DOCUMENTARY: Edward Snowden – Terminal F (2015)

NSA whistleblower Edward Snowden: ‘I don’t want to live in a society that does these sort of things’

NSA paying US Companies hundreds of millions of dollars for access to data

“You’re Being Watched”: Edward Snowden Emerges as Source Behind Explosive Revelations of NSA Spying

Does the NSA Record Phone Calls? Glenn Greenwald on Warrentless Domestic Surveillance (2007)

Enemy of the State (1998) Full Movies HD – Will Smith, Gene Hackman, Jon Voight

Comey won’t commit to investigating Obama officials over Flynn leaks

By JOEL GEHRKE (@JOELMENTUM) 3/20/17 12:47 PM

Autoplay: On | Off

FBI Director James Comey declined to say Monday whether his team has launched an investigation into the leaks that led to former White House national security advisor Mike Flynn’s ouster.

Comey was pressed by Rep. Trey Gowdy, R-S.C., to say whether he could confirm such an investigation is taking place, but Comey said he could not because it might confirm that classified information was leaked.

“I can’t, but I hope people watching know how seriously we take leaks of classified information,” he said during Monday’s hearing on Russia’s influence on the election. “But I don’t want to confirm it by saying that we’re investigating it.”

hile Democrats pushed Comey to discuss possible links between Trump’s campaign and the Russians, Republicans emphasized the impropriety of the leaks and worried that it would create opposition to the federal government’s surveillance authority.

Gowdy, a former federal prosecutor, pushed for information about who might have known about Flynn’s conversations with the Russian ambassador. Flynn refused to say if he briefed Obama on the phone calls, although he confirmed that former Attorney General Loretta Lynch and former acting Attorney General Sally Yates — whom Trump fired for refusing to enforce his immigration executive order — would have had access to the information.

“What I don’t ever want to do is compound what bad people have done and confirm something that’s in the newspaper,” Comey said. “Because sometimes the newspaper gets it right, [but] there’s a whole lot of wrong information allegedly about classified activities that’s in the newspaper — we don’t call them and correct them, either. That’s another big challenge. But we just don’t go anywhere near it because we don’t want to help and compound the offense that was committed.”

Gowdy argued that he was wrong to stand on such ceremony under the circumstances, particularly given that a major NSA surveillance program is scheduled to expire this year unless Congress reauthorizes the program. Comey emphasized that the program, known as Section 702, has nothing to do with the Flynn scandal, but Gowdy argued that the storyline is still a threat to that program.

“You are 100 percent correct and I am 100 percent correct that that is a distinction that doesn’t make a difference to most of the people watching television,” Gowdy said. “What we are reauthorizing this fall has nothing to do with what we are discussing, other than it is another government program where the people consent to allow government to pursue certain things with the explicit promise it will be protected. So, you’re right, they’re different, but in the eyes of people watching, it is the U.S. government officials leaking the name of a U.S. citizen … trust me, you and I both want to see it reauthorized. It is in jeopardy if we don’t get this resolved.”

http://www.washingtonexaminer.com/comey-wont-commit-to-investigating-obama-officials-over-flynn-leaks/article/2617870

Foreign Intelligence Surveillance Act

From Wikipedia, the free encyclopedia
“FISA” redirects here. For other uses, see FISA (disambiguation).
Foreign Intelligence Surveillance Act of 1978
Great Seal of the United States
Long title An Act to authorize electronic surveillance to obtain foreign intelligence information.
Acronyms(colloquial) FISA
Enacted by the 95th United States Congress
Effective October 25, 1978
Citations
Public law 95-511
Statutes at Large 92 Stat.1783
Codification
Titles amended 50 U.S.C.: War and National Defense
U.S.C. sections created 50 U.S.C.ch. 36 § 1801 et seq.
Legislative history
Major amendments

The Foreign Intelligence Surveillance Act of 1978 (“FISAPub.L. 95–511, 92 Stat.1783, 50 U.S.C.ch. 36) is a United States federal law which prescribes procedures for the physical and electronic surveillance and collection of “foreign intelligence information” between “foreign powers” and “agents of foreign powers” suspected of espionage or terrorism).[1] The Act created the Foreign Intelligence Surveillance Court (FISC) to oversee requests for surveillance warrants by federal law enforcement and intelligence agencies. It has been repeatedly amended since the September 11 attacks.

Contents

 [show] 

History

The Foreign Intelligence Surveillance Act (FISA) was introduced on May 18, 1977, by Senator Ted Kennedy and was signed into law by President Carter in 1978. The bill was cosponsored by nine Senators: Birch Bayh, James O. Eastland, Jake Garn, Walter Huddleston, Daniel Inouye, Charles Mathias, John L. McClellan, Gaylord Nelson, and Strom Thurmond.

The FISA resulted from extensive investigations by Senate Committees into the legality of domestic intelligence activities. These investigations were led separately by Sam Ervin and Frank Church in 1978 as a response to President Richard Nixon’s usage of federal resources to spy on political and activist groups.[2] The act was created to provide judicial and congressional oversight of the government’s covert surveillance activities of foreign entities and individuals in the United States, while maintaining the secrecy needed to protect national security.

Warrantless domestic wiretapping program

The Act came into public prominence in December 2005 following publication by the New York Times of an article[3] that described a program of warrantless domestic wiretapping ordered by the Bush administration and carried out by the National Security Agency since 2002; a subsequent Bloomberg article[4] suggested that this may have already begun by June 2000.

Provisions

The subchapters of FISA provide for:

Electronic surveillance

Generally, the statute permits electronic surveillance in two different scenarios.

Without a court order

The President may authorize, through the Attorney General, electronic surveillance without a court order for the period of one year, provided that it is only to acquire foreign intelligence information,[5] that it is solely directed at communications or property controlled exclusively by foreign powers,[6] that there is no substantial likelihood that it will acquire the contents of any communication to which a United States person is a party, and that it be conducted only in accordance with defined minimization procedures.[7]

The code defines “foreign intelligence information” to mean information necessary to protect the United States against actual or potential grave attack, sabotage or international terrorism.[5]

“Foreign powers” means a foreign government, any faction of a foreign nation not substantially composed of U.S. persons, and any entity directed or controlled by a foreign government.[8]The definition also includes groups engaged in international terrorism and foreign political organizations.[9] The sections of FISA authorizing electronic surveillance and physical searches without a court order specifically exclude their application to groups engaged in international terrorism.[10]

A “U.S. person” includes citizens, lawfully admitted permanent resident aliens, and corporations incorporated in the United States.

“Minimization procedures” is defined to mean procedures that minimize the acquisition of information concerning United States persons, allow the retention of information that is evidence of a crime, and require a court order be obtained in order to retain communication involving a United States person for longer than 72 hours.

The Attorney General is required to make a certification of these conditions under seal to the Foreign Intelligence Surveillance Court,[11] and report on their compliance to the House Permanent Select Committee on Intelligence and the Senate Select Committee on Intelligence.[12]

Since 50 U.S.C.§ 1802(a)(1)(A) of this Act specifically limits warrantless surveillance to foreign powers as defined by 50 U.S.C. §1801(a) (1),(2), (3) and omits the definitions contained in 50 U.S.C. §1801(a) (4),(5),(6) the act does not authorize the use of warrantless surveillance on: groups engaged in international terrorism or activities in preparation therefore; foreign-based political organizations, not substantially composed of United States persons; or entities that are directed and controlled by a foreign government or governments.[13] Under the FISA act, anyone who engages in electronic surveillance except as authorized by statute is subject to both criminal penalties[14] and civil liabilities.[15]

Under 50 U.S.C. § 1811, the President may also authorize warrantless surveillance at the beginning of a war. Specifically, he may authorize such surveillance “for a period not to exceed fifteen calendar days following a declaration of war by the Congress”.[16]

With a court order

Alternatively, the government may seek a court order permitting the surveillance using the FISA court.[17] Approval of a FISA application requires the court find probable cause that the target of the surveillance be a “foreign power” or an “agent of a foreign power”, and that the places at which surveillance is requested is used or will be used by that foreign power or its agent.[2][18] In addition, the court must find that the proposed surveillance meet certain “minimization requirements” for information pertaining to U.S. persons.[19] Depending on the type of surveillance, approved orders or extensions of orders may be active for 90 days, 120 days, or a year.[20]

FISA court

The Act created the Foreign Intelligence Surveillance Court (FISC) and enabled it to oversee requests for surveillance warrants by federal law enforcement and intelligence agencies (primarily the Federal Bureau of Investigation and the National Security Agency) against suspected foreign intelligence agents inside the U.S. The court is located within the E. Barrett Prettyman United States Courthouse in Washington, D.C. The court is staffed by eleven judges appointed by the Chief Justice of the United States to serve seven-year terms.

Proceedings before the FISA court are ex parte and non-adversarial. The court hears evidence presented solely by the Department of Justice. There is no provision for a release of information regarding such hearings, or for the record of information actually collected.

Denials of FISA applications by the FISC may be appealed to the Foreign Intelligence Surveillance Court of Review. The Court of Review is a three judge panel. Since its creation, the court has come into session twice: in 2002 and 2008.

FISC meets in secret, and approves or denies requests for search warrants. Only the number of warrants applied for, issued and denied, is reported. In 1980 (the first full year after its inception), it approved 322 warrants.[21]This number has steadily grown to 2,224 warrants in 2006.[22] In the period 1979–2006, a total of 22,990 applications for warrants were made to the Court of which 22,985 were approved (sometimes with modifications; or with the splitting up, or combining together, of warrants for legal purposes), and only 5 were definitively rejected.[23]

Physical searches

In addition to electronic surveillance, FISA permits the “physical search” of the “premises, information, material, or property used exclusively by” a foreign power. The requirements and procedures are nearly identical to those for electronic surveillance.

Remedies for violations

Both the subchapters covering physical searches and electronic surveillance provide for criminal and civil liability for violations of FISA.

Criminal sanctions follows violations of electronic surveillance by intentionally engaging in electronic surveillance under the color of law or through disclosing information known to have been obtained through unauthorized surveillance. The penalties for either act are fines up to US$10,000, up to five years in jail, or both.[14]

In addition, the statute creates a cause of action for private individuals whose communications were unlawfully monitored. The statute permits actual damages of not less than $1,000 or $100 per day. In addition, that statute authorizes punitive damages and an award of attorney’s fees.[15] Similar liability is found under the subchapter pertaining to physical searches. In both cases, the statute creates an affirmative defense for law enforcement personnel acting within their official duties and pursuant to a valid court order. Presumably, such a defense is not available to those operating exclusively under presidential authorization.

Lone wolf amendment

In 2004, FISA was amended to include a “lone wolf” provision. 50 U.S.C.§ 1801(b)(1)(C). A “lone wolf” is a non-U.S. person who engages in or prepares for international terrorism. The provision amended the definition of “foreign power” to permit the FISA courts to issue surveillance and physical search orders without having to find a connection between the “lone wolf” and a foreign government or terrorist group. However, “if the court authorizes such a surveillance or physical search using this new definition of ‘agent of a foreign power’, the FISC judge has to find, in pertinent part, that, based upon the information provided by the applicant for the order, the target had engaged in or was engaging in international terrorism or activities in preparation therefor”.[24]

Constitutionality

Before FISA

In 1967, the Supreme Court of the United States held that the requirements of the Fourth Amendment applied equally to electronic surveillance and to physical searches. Katz v. United States, 389 U.S. 347 (1967). The Court did not address whether such requirements apply to issues of national security. Shortly after, in 1972, the Court took up the issue again in United States v. United States District Court, Plamondon, where the court held that court approval was required in order for the domestic surveillance to satisfy the Fourth Amendment. 407 U.S. 297 (1972). Justice Powell wrote that the decision did not address this issue that “may be involved with respect to activities of foreign powers or their agents”.

In the time immediately preceding FISA, a number of courts squarely addressed the issue of “warrantless wiretaps”. In both United States v. Brown, 484 F.2d 418 (5th Cir. 1973), and United States v. Butenko, 494 F.2d 593 (3rd Cir. 1974), the courts upheld warrantless wiretaps. In Brown, a U.S. citizen’s conversation was captured by a wiretap authorized by the Attorney General for foreign intelligence purposes. In Butenko, the court held a wiretap valid if the primary purpose was for gathering foreign intelligence information.

A plurality opinion in Zweibon v. Mitchell, 516 F.2d 594 (D.C. Cir. 1975), held that a warrant was required for the domestic surveillance of a domestic organization. In this case, the court found that the domestic organization was not a “foreign power or their agent”, and “absent exigent circumstances, all warrantless electronic surveillance is unreasonable and therefore unconstitutional.”

Post-FISA

There have been very few cases involving the constitutionality of FISA. Two lower court decisions found FISA constitutional. In United States v. Duggan, the defendants were members of the Irish Republican Army. 743 F.2d 59 (2nd Cir., 1984). They were convicted for various violations regarding the shipment of explosives and firearms. The court held that there were compelling considerations of national security in the distinction between the treatment of U.S. citizens and non-resident aliens.

In the United States v. Nicholson, the defendant moved to suppress all evidence gathered under a FISA order. 955 F.Supp. 588 (Va. 1997). The court affirmed the denial of the motion. There the court flatly rejected claims that FISA violated Due process clause of the Fifth Amendment, Equal protection, Separation of powers, nor the Right to counsel provided by the Sixth Amendment.

However, in a third case, the special review court for FISA, the equivalent of a Circuit Court of Appeals, opined differently should FISA limit the President’s inherent authority for warrantless searches in the foreign intelligence area. In In re Sealed Case, 310 F.3d 717, 742 (Foreign Intel. Surv. Ct. of Rev. 2002) the special court stated “[A]ll the other courts to have decided the issue [have] held that the President did have inherent authority to conduct warrantless searches to obtain foreign intelligence information . … We take for granted that the President does have that authority and, assuming that is so, FISA could not encroach on the President’s constitutional power.”

Criticism

K. A. Taipale of the World Policy Institute, James Jay Carafano of the Heritage Foundation,[25] and Philip Bobbitt of Columbia Law School,[26] among others,[27] have argued that FISA may need to be amended to include, among other things, procedures for programmatic approvals, as it may no longer be adequate to address certain foreign intelligence needs and technology developments, including: the transition from circuit-based communications to packet-based communications; the globalization of telecommunication infrastructure; and the development of automated monitoring techniques, including data mining and traffic analysis.[28]

John R. Schmidt, associate attorney general (1994–1997) in the Justice Department under President Bill Clinton, expressed a need for programmatic approval of technology-enabled surveillance programs.[29] He recalled early arguments made by then-Attorney General Edward Levi to the Church Committee that foreign intelligence surveillance legislation should include provisions for programmatically authorizing surveillance programs because of the particular needs of foreign intelligence where “virtually continuous surveillance, which by its nature does not have specifically predetermined targets” may be required. In these situations, “the efficiency of a warrant requirement would be minimal.”

In a 2006 opinion, Judge Richard Posner wrote that FISA “retains value as a framework for monitoring the communications of known terrorists, but it is hopeless as a framework for detecting terrorists. [FISA] requires that surveillance be conducted pursuant to warrants based on probable cause to believe that the target of surveillance is a terrorist, when the desperate need is to find out who is a terrorist.”[30]

Subsequent amendments

The Act was amended in 2001 by the USA PATRIOT Act, primarily to include terrorism on behalf of groups that are not specifically backed by a foreign government.

An overhaul of the bill, the Protect America Act of 2007 was signed into law on August 5, 2007.[31] It expired on February 17, 2008.

The FISA Amendments Act of 2008 passed by the United States Congress on July 9, 2008.[32]

Amendments

Terrorist Surveillance Act of 2006

On March 16, 2006, Senators Mike DeWine (R-OH), Lindsey Graham (R-SC), Chuck Hagel (R-NE), and Olympia Snowe (R-ME) introduced the Terrorist Surveillance Act of 2006 (S.2455),[33][34] under which the President would be given certain additional limited statutory authority to conduct electronic surveillance of suspected terrorists in the United States subject to enhanced Congressional oversight. Also on March 16, 2006, Senator Arlen Specter (R-PA) introduced the National Security Surveillance Act of 2006 (S. 2453),[35][36] which would amend FISA to grant retroactive amnesty[37] for warrantless surveillance conducted under presidential authority and provide FISA court (FISC) jurisdiction to review, authorize, and oversight “electronic surveillance programs”. On May 24, 2006, Senator Specter and Senator Dianne Feinstein (D-CA) introduced the Foreign Intelligence Surveillance Improvement and Enhancement Act of 2006 (S. 3001) asserting FISA as the exclusive means to conduct foreign intelligence surveillance.

All three competing bills were the subject of Judiciary Committee hearings throughout the summer.[38] On September 13, 2006, the Senate Judiciary Committee voted to approve all three mutually exclusive bills, thus, leaving it to the full Senate to resolve.[39]

On July 18, 2006, U.S. Representative Heather Wilson (R-NM) introduced the Electronic Surveillance Modernization Act (H.R. 5825). Wilson’s bill would give the President the authority to authorize electronic surveillance of international phone calls and e-mail linked specifically to identified terrorist groups immediately following or in anticipation of an armed or terrorist attack on the United States. Surveillance beyond the initial authorized period would require a FISA warrant or a presidential certification to Congress. On September 28, 2006, the House of Representatives passed Wilson’s bill and it was referred to the Senate.[40]

Protect America Act of 2007

Main article: Protect America Act

On July 28, 2007, President Bush called on Congress to pass legislation to reform the FISA in order to ease restrictions on surveillance of terrorist suspects where one party (or both parties) to the communication are located overseas. He asked that Congress pass the legislation before its August 2007 recess. On August 3, 2007, the Senate passed a Republican-sponsored version of FISA (S. 1927) in a vote of 60 to 28. The House followed by passing the bill, 227–183. The Protect America Act of 2007 (Pub.L. 110–55, S. 1927) was then signed into law by George W. Bush on 2007-08-05.[41]

Under the Protect America Act of 2007, communications that begin or end in a foreign country may be wiretapped by the U.S. government without supervision by the FISA Court. The Act removes from the definition of “electronic surveillance” in FISA any surveillance directed at a person reasonably believed to be located outside the United States. As such, surveillance of these communications no longer requires a government application to, and order issuing from, the FISA Court.

The Act provides procedures for the government to “certify” the legality of an acquisition program, for the government to issue directives to providers to provide data or assistance under a particular program, and for the government and recipient of a directive to seek from the FISA Court, respectively, an order to compel provider compliance or relief from an unlawful directive. Providers receive costs and full immunity from civil suits for compliance with any directives issued pursuant to the Act.

A summary of key provisions follows. The Act empowers the Attorney General or Director of National Intelligence (“DNI”) to authorize, for up to one year, the acquisition of communications concerning “persons reasonably believed to be outside the United States” if the Attorney General and DNI determine that each of five criteria has been met:

  • There are reasonable procedures in place for determining that the acquisition concerns persons reasonably believed to be located outside the United States;
  • The acquisition does not constitute electronic surveillance (meaning it does not involve solely domestic communications);
  • The acquisition involves obtaining the communications data from or with the assistance of a communications service provider who has access to communications;
  • A significant purpose of the acquisition is to obtain foreign intelligence information; and
  • Minimization procedures outlined in the FISA will be used.

This determination by the Attorney General and DNI must be certified in writing, under oath, and supported by appropriate affidavit(s). If immediate action by the government is required and time does not permit the preparation of a certification, the Attorney General or DNI can direct the acquisition orally, with a certification to follow within 72 hours. The certification is then filed with the FISA Court.

Once the certification is filed with the FISA Court, the Attorney General or DNI can direct a provider to undertake or assist in the undertaking of the acquisition.

If a provider fails to comply with a directive issued by the Attorney General or DNI, the Attorney General may seek an order from the FISA Court compelling compliance with the directive. Failure to obey an order of the FISA Court may be punished as a contempt of court.

Likewise, a person receiving a directive may challenge the legality of that directive by filing a petition with the FISA Court. An initial review must be conducted within 48 hours of the filing to determine whether the petition is frivolous, and a final determination concerning any non-frivolous petitions must be made – in writing – within 72 hours of receipt of the petition.

Determinations of the FISA Court may be appealed to the Foreign Intelligence Court of Appeals, and a petition for a writ of certiorari of a decision from the FICA can be made to the U.S. Supreme Court.

All petitions must be filed under seal.

The Act allows providers to be compensated, at the prevailing rate, for providing assistance as directed by the Attorney General or DNI.

The Act provides explicit immunity from civil suit in any federal or state court for providing any information, facilities, or assistance in accordance with a directive under the Act.

Within 120 days, the Attorney General must submit to the FISA Court for its approval the procedures by which the government will determine that acquisitions authorized by the Act conform with the Act and do not involve purely domestic communications. The FISA Court then will determine whether the procedures comply with the Act. The FISA Court thereafter will enter an order either approving the procedures or directing the government to submit new procedures within 30 days or cease any acquisitions under the government procedures. The government may appeal a ruling of the FISA Court to the FICA and ultimately the Supreme Court.

On a semiannual basis, the Attorney General shall inform the Intelligence and Judiciary Committees of the House and Senate of incidents of noncompliance with a directive issued by the Attorney General or the DNI, incidents of noncompliance with FISA Court-approved procedures by the Intelligence Community, and the number of certifications and directives issued during the reporting period.

The amendments to FISA made by the Act expire 180 days after enactment, except that any order in effect on the date of enactment remains in effect until the date of expiration of such order and such orders can be reauthorized by the FISA Court.[42] The Act expired on February 17, 2008.

Subsequent developments

Legal experts experienced in national security issues are divided on how broadly the new law could be interpreted or applied. Some believe that due to subtle changes in the definitions of terms such as “electronic surveillance”, it could empower the government to conduct warrantless physical searches and even seizures of communications and computer devices and their data which belong to U.S. citizens while they are in the United States, if the government contended that those searches and potential seizures were related to its surveillance of parties outside the United States. Intelligence officials, while declining to comment directly on such possibilities, respond that such interpretations are overly broad readings of the act, and unlikely to actually occur.

In a September 10, 2007 address at a symposium on modernizing FISA held at Georgetown University Law Center‘s National Security Center, Kenneth L. Wainstein, Assistant Attorney General for National Security, argued against the current six-month sunset provision in the Protect America Act of 2007, saying that the broadened surveillance powers the act provides for should be made permanent. Wainstein proposed that internal audits by the Office of the Director of National Intelligence and the National Security Division of the Justice Department, with reporting to select groups of Congressmen, would ensure that the expanded capability would not be abused.[43]

Also on September 10, DNI Mike McConnell testified before the Senate Committee on Homeland Security and Governmental Affairs that the Protect America Act had helped foil a major terror plot in Germany. U.S. intelligence-community officials questioned the accuracy of McConnell’s testimony and urged his office to correct it, which he did in a statement issued September 12, 2007. Critics cited the incident as an example of the Bush administration’s exaggerated claims and contradictory statements about surveillance activities. Counterterrorism officials familiar with the background of McConnell’s testimony said they did not believe he made inaccurate statements intentionally as part of any strategy by the administration to persuade Congress to make the new eavesdropping law permanent. Those officials said they believed McConnell gave the wrong answer because he was overwhelmed with information and merely mixed up his facts.[44]

Speaking at National Security Agency headquarters in Fort Meade, Maryland on September 19, 2007, President George W. Bush urged Congress to make the provisions of the Protect America Act permanent. Bush also called for retroactive immunity for telecommunications companies who had cooperated with government surveillance efforts, saying, “It’s particularly important for Congress to provide meaningful liability protection to those companies now facing multibillion-dollar lawsuits only because they are believed to have assisted in efforts to defend our nation, following the 9/11 attacks”.[45]

On October 4, 2007, the bipartisan Liberty and Security Committee of the Constitution Project, co-chaired by David Keene and David D. Cole, issued its “Statement on the Protect America Act”.[46] The Statement urged Congress not to reauthorize the PAA, saying the language of the bill “runs contrary to the tripartite balance of power the Framers envisioned for our constitutional democracy, and poses a serious threat to the very notion of government of the people, by the people and for the people”. Some in the legal community have questioned the constitutionality of any legislation that would retroactively immunize telecommunications firms alleged to have cooperated with the government from civil liability for having potentially violated their customers’ privacy rights.[47]

In an article appearing in the January/February 2008 issue of the Institute of Electrical and Electronics Engineers journal of Security and Privacy, noted technology experts from academia and the computing industry found significant flaws in the technical implementation of the Protect America Act which they said created serious security risks, including the danger that such a surveillance system could be exploited by unauthorized users, criminally misused by trusted insiders, or abused by the government.[48]

On October 7, 2007, the Washington Post reported that House Democrats planned to introduce alternative legislation which would provide for one-year “umbrella” warrants, and would require the Justice Department inspector general to audit the use of those warrants and issue quarterly reports to a special FISA court and to Congress. The proposed bill would not include immunity for telecommunications firms facing lawsuits in connection with the administration’s NSA warrantless surveillance program. House Democrats said that as long as the administration withholds requested documents explaining the basis for the program that they cannot consider immunity for firms alleged to have facilitated it.[49] On October 10, 2007 comments on the White House South Lawn, President Bush said he would not sign any bill that did not provide retroactive immunity for telecommunications corporations.[50]

On October 18, 2007, the House Democratic leadership put off a vote on the proposed legislation by the full chamber to avoid consideration of a Republican measure that made specific references to Osama bin Laden. At the same time, the Senate Intelligence Committee reportedly reached a compromise with the White House on a different proposal that would give telephone carriers legal immunity for any role they played in the National Security Agency’s domestic eavesdropping program approved by President Bush after the Sept. 11 terrorist attacks.[51]

On November 15, 2007, the Senate Judiciary Committee voted 10–9 along party lines to send an alternative measure to the full Senate other than the one the intelligence committee had crafted with the White House. The proposal would leave to the full Senate whether or not to provide retroactive immunity to telecommunications firms that cooperated with the NSA. Judiciary Committee chairman Patrick Leahy said that granting such immunity would give the Bush administration a “blank check” to do what it wants without regard to the law. Arlen Specter of Pennsylvania, the top Republican on the committee, said that court cases may be the only way Congress can learn exactly how far outside the law the administration has gone in eavesdropping in the United States. When the full Senate takes up the bill, Specter is expected to offer a compromise that would shield the companies from financial ruin but allow lawsuits to go forward by having the federal government stand in for the companies at trial.[52][needs update]

On the same day, the House of Representatives voted 227–189 to approve a Democratic bill that would expand court oversight of government surveillance inside the United States while denying immunity to telecom companies. House Judiciary Committee chairman John Conyers left the door open to an immunity deal in the future, but said that the White House must first give Congress access to classified documents specifying what the companies did that requires legal immunity.[53]

In February 2008, the Senate passed the version of the new FISA that would allow telecom companies immunity. On March 13, 2008, the U.S. House of Representatives held a secret session to discuss related information. On March 14, the House voted 213–197 to approve a bill that would not grant telecom immunity – far short of the 2/3 majority required to override a Presidential veto.[54] The Senate and House bills are compared and contrasted in a June 12, 2008 report from the Congressional Research Service.[55]

On March 13, 2008, the House of Representatives held a secret, closed door meeting to debate changes to the FISA bill.[56]

Foreign Intelligence Surveillance Act of 1978 Amendments Act of 2008[edit]

The 2008 amendment of FISA gave telecoms immunity, increased the time allotted for warrantless surveillance, and adds provisions for emergency eavesdropping. On June 20, 2008, the House of Representatives passed the amendment with a vote of 293 to 129.[57][58] It passed in the Senate 69 to 28 on July 9, 2008[59] after a failed attempt to strike Title II from the bill by Senator Dodd.[60] On July 10, 2008, President Bush signed it into law.

2015 USA Freedom Act

On June 2, 2015, many provisions of the 1978 with the passage of the USA Freedom Act.[61] The 2015 law overhauled the powerful United States National Security Agency and required the US government to undergo standard court procedures in order to gather data regarding suspicious activities.[61] However, the law did not completely repeal the controversial Patriot Act and allowed some provisions to expire in later time.[61]

See also

https://en.wikipedia.org/wiki/Foreign_Intelligence_Surveillance_Act

National Security Agency

From Wikipedia, the free encyclopedia
“NSA” redirects here. For other uses, see NSA (disambiguation) and National Security Agency (disambiguation).
Not to be confused with NASA or National Security Council.
Yes
Seal of the U.S. National Security Agency.svg

Seal of the National Security Agency
Flag of the U.S. National Security Agency.svg

Flag of the National Security Agency
National Security Agency headquarters, Fort Meade, Maryland.jpg
NSA Headquarters, Fort Meade, Maryland
Agency overview
Formed November 4, 1952; 64 years ago[1]
Preceding agency
  • Armed Forces Security Agency
Headquarters Fort Meade, Maryland, U.S.
39°6′32″N 76°46′17″WCoordinates: 39°6′32″N 76°46′17″W
Motto “Defending Our Nation. Securing The Future.”
Employees Classified (30,000–40,000 estimate)[2][3][4][5]
Annual budget Classified (estimated $10.8 billion, 2013)[6][7]
Agency executives
Parent agency United States Department of Defense
Website www.nsa.gov

The National Security Agency (NSA) is an intelligence organization of the United States federal government responsible for global monitoring, collection, and processing of information and data for foreign intelligence and counterintelligence purposes, a discipline known as signals intelligence (SIGINT). NSA is concurrently charged with protection of U.S. government communications and information systems against penetration and network warfare.[8][9] Although many of NSA’s programs rely on “passive” electronic collection, the agency is authorized to accomplish its mission through active clandestine means,[10] among which are physically bugging electronic systems[11] and allegedly engaging in sabotage through subversive software.[12][13] Moreover, NSA maintains physical presence in a large number of countries across the globe, where its Special Collection Service (SCS) inserts eavesdropping devices in difficult-to-reach places. SCS collection tactics allegedly encompass “close surveillance, burglary, wiretapping, breaking and entering”.[14][15]

Unlike the Defense Intelligence Agency (DIA) and the Central Intelligence Agency (CIA), both of which specialize primarily in foreign human espionage, NSA does not unilaterally conduct human-source intelligence gathering, despite often being portrayed so in popular culture. Instead, NSA is entrusted with assistance to and coordination of SIGINT elements at other government organizations, which are prevented by law from engaging in such activities without the approval of the NSA via the Defense Secretary.[16] As part of these streamlining responsibilities, the agency has a co-located organization called the Central Security Service (CSS), which was created to facilitate cooperation between NSA and other U.S. military cryptanalysis components. Additionally, the NSA Director simultaneously serves as the Commander of the United States Cyber Command and as Chief of the Central Security Service.

Originating as a unit to decipher coded communications in World War II, it was officially formed as the NSA by President Harry S. Truman in 1952. Since then, it has become one of the largest U.S. intelligence organizations in terms of personnel and budget,[6][17] operating as part of the Department of Defense and simultaneously reporting to the Director of National Intelligence.

NSA surveillance has been a matter of political controversy on several occasions, such as its spying on anti-Vietnam-war leaders or economic espionage. In 2013, the extent of some of the NSA’s secret surveillance programs was revealed to the public by Edward Snowden. According to the leaked documents, the NSA intercepts the communications of over a billion people worldwide, many of whom are United States citizens, and tracks the movement of hundreds of millions of people using cellphones. Internationally, research has pointed to the NSA’s ability to surveil the domestic Internet traffic of foreign countries through “boomerang routing”.[18]

History

Army predecessor

The origins of the National Security Agency can be traced back to April 28, 1917, three weeks after the U.S. Congress declared war on Germany in World War I. A code and cipher decryption unit was established as the Cable and Telegraph Section which was also known as the Cipher Bureau. It was headquartered in Washington, D.C. and was part of the war effort under the executive branch without direct Congressional authorization. During the course of the war it was relocated in the army’s organizational chart several times. On July 5, 1917, Herbert O. Yardley was assigned to head the unit. At that point, the unit consisted of Yardley and two civilian clerks. It absorbed the navy’s cryptoanalysis functions in July 1918. World War I ended on November 11, 1918, and MI-8 moved to New York City on May 20, 1919, where it continued intelligence activities as the Code Compilation Company under the direction of Yardley.[19][20]

Black Chamber

Western Union allowed MI-8 to monitor telegraphic communications passing through the company’s wires until 1929.[21]

MI-8 also operated the so-called “Black Chamber“.[22] The Black Chamber was located on East 37th Street in Manhattan. Its purpose was to crack the communications codes of foreign governments. Jointly supported by the State Department and the War Department, the chamber persuaded Western Union, the largest U.S. telegram company, to allow government officials to monitor private communications passing through the company’s wires.[23]

Other “Black Chambers” were also found in Europe. They were established by the French and British governments to read the letters of targeted individuals, employing a variety of techniques to surreptitiously open, copy, and reseal correspondence before forwarding it to unsuspecting recipients.[24]

Despite the American Black Chamber’s initial successes, it was shut down in 1929 by U.S. Secretary of State Henry L. Stimson, who defended his decision by stating: “Gentlemen do not read each other’s mail”.[21]

World War II and its aftermath

During World War II, the Signal Security Agency (SSA) was created to intercept and decipher the communications of the Axis powers.[25] When the war ended, the SSA was reorganized as the Army Security Agency (ASA), and it was placed under the leadership of the Director of Military Intelligence.[25]

On May 20, 1949, all cryptologic activities were centralized under a national organization called the Armed Forces Security Agency (AFSA).[25] This organization was originally established within the U.S. Department of Defense under the command of the Joint Chiefs of Staff.[26] The AFSA was tasked to direct Department of Defense communications and electronic intelligence activities, except those of U.S. military intelligence units.[26] However, the AFSA was unable to centralize communications intelligence and failed to coordinate with civilian agencies that shared its interests such as the Department of State, Central Intelligence Agency (CIA) and the Federal Bureau of Investigation (FBI).[26] In December 1951, President Harry S. Truman ordered a panel to investigate how AFSA had failed to achieve its goals. The results of the investigation led to improvements and its redesignation as the National Security Agency.[27]

The agency was formally established by Truman in a memorandum of October 24, 1952, that revised National Security Council Intelligence Directive (NSCID) 9.[28] Since President Truman’s memo was a classified document,[28] the existence of the NSA was not known to the public at that time. Due to its ultra-secrecy the U.S. intelligence community referred to the NSA as “No Such Agency”.[29]

Vietnam War

In the 1960s, the NSA played a key role in expanding America’s commitment to the Vietnam War by providing evidence of a North Vietnamese attack on the American destroyer USS Maddox during the Gulf of Tonkin incident.[30]

A secret operation, code-named “MINARET“, was set up by the NSA to monitor the phone communications of Senators Frank Church and Howard Baker, as well as major civil rights leaders, including Martin Luther King, Jr., and prominent U.S. journalists and athletes who criticized the Vietnam War.[31] However, the project turned out to be controversial, and an internal review by the NSA concluded that its Minaret program was “disreputable if not outright illegal”.[31]

The NSA mounted a major effort to secure tactical communications among U.S. forces during the war with mixed success. The NESTOR family of compatible secure voice systems it developed was widely deployed during the Vietnam War, with about 30,000 NESTOR sets produced. However a variety of technical and operational problems limited their use, allowing the North Vietnamese to exploit intercepted U.S. communications.[32]:Vol I, p.79

Church Committee hearings

Further information: Watergate scandal and Church Committee

In the aftermath of the Watergate scandal, a congressional hearing in 1975 led by Sen. Frank Church[33] revealed that the NSA, in collaboration with Britain’s SIGINT intelligence agency Government Communications Headquarters (GCHQ), had routinely intercepted the international communications of prominent anti-Vietnam war leaders such as Jane Fonda and Dr. Benjamin Spock.[34] Following the resignation of President Richard Nixon, there were several investigations of suspected misuse of FBI, CIA and NSA facilities.[35] Senator Frank Church uncovered previously unknown activity,[35] such as a CIA plot (ordered by the administration of President John F. Kennedy) to assassinate Fidel Castro.[36] The investigation also uncovered NSA’s wiretaps on targeted American citizens.[37]

After the Church Committee hearings, the Foreign Intelligence Surveillance Act of 1978 was passed into law. This was designed to limit the practice of mass surveillance in the United States.[35]

From 1980s to 1990s

In 1986, the NSA intercepted the communications of the Libyan government during the immediate aftermath of the Berlin discotheque bombing. The White House asserted that the NSA interception had provided “irrefutable” evidence that Libya was behind the bombing, which U.S. President Ronald Reagan cited as a justification for the 1986 United States bombing of Libya.[38][39]

In 1999, a multi-year investigation by the European Parliament highlighted the NSA’s role in economic espionage in a report entitled ‘Development of Surveillance Technology and Risk of Abuse of Economic Information’.[40] That year, the NSA founded the NSA Hall of Honor, a memorial at the National Cryptologic Museum in Fort Meade, Maryland.[41] The memorial is a, “tribute to the pioneers and heroes who have made significant and long-lasting contributions to American cryptology”.[41] NSA employees must be retired for more than fifteen years to qualify for the memorial.[41]

NSA’s infrastructure deteriorated in the 1990s as defense budget cuts resulted in maintenance deferrals. On January 24, 2000, NSA headquarters suffered a total network outage for three days caused by an overloaded network. Incoming traffic was successfully stored on agency servers, but it could not be directed and processed. The agency carried out emergency repairs at a cost of $3 million to get the system running again. (Some incoming traffic was also directed instead to Britain’s GCHQ for the time being.) Director Michael Hayden called the outage a “wake-up call” for the need to invest in the agency’s infrastructure.[42]

War on Terror

After Osama bin Laden moved to Afghanistan in the 1980s, the NSA recorded all of his phone calls via satellite, logging over 2,000 minutes of conversation[43]

In the aftermath of the September 11 attacks, the NSA created new IT systems to deal with the flood of information from new technologies like the Internet and cellphones. ThinThread contained advanced data mining capabilities. It also had a “privacy mechanism”; surveillance was stored encrypted; decryption required a warrant. The research done under this program may have contributed to the technology used in later systems. ThinThread was cancelled when Michael Hayden chose Trailblazer, which did not include ThinThread’s privacy system.[44]

Trailblazer Project ramped up in 2002. SAIC, Boeing, CSC, IBM, and Litton worked on it. Some NSA whistleblowers complained internally about major problems surrounding Trailblazer. This led to investigations by Congress and the NSA and DoD Inspectors General. The project was cancelled in early 2004. Several whistleblowers were later arrested and charged with violating federal espionage laws.

Turbulence started in 2005. It was developed in small, inexpensive “test” pieces, rather than one grand plan like Trailblazer. It also included offensive cyber-warfare capabilities, like injecting malware into remote computers. Congress criticized Turbulence in 2007 for having similar bureaucratic problems as Trailblazer.[45] It was to be a realization of information processing at higher speeds in cyberspace.[46]

Global surveillance disclosures

The massive extent of the NSA’s spying, both foreign and domestic, was revealed to the public in a series of detailed disclosures of internal NSA documents beginning in June 2013. Most of the disclosures were leaked by former NSA contractor, Edward Snowden.

Scope of surveillance

It was revealed that the NSA intercepts telephone and Internet communications of over a billion people worldwide, seeking information on terrorism as well as foreign politics, economics[47] and “commercial secrets”.[48] In a declassified document it was revealed that 17,835 phone lines were on an improperly permitted “alert list” from 2006 to 2009 in breach of compliance, which tagged these phone lines for daily monitoring.[49][50][51] Eleven percent of these monitored phone lines met the agency’s legal standard for “reasonably articulable suspicion” (RAS).[49][52]

A dedicated unit of the NSA locates targets for the CIA for extrajudicial assassination in the Middle East.[53] The NSA has also spied extensively on the European Union, the United Nations and numerous governments including allies and trading partners in Europe, South America and Asia.[54][55]

The NSA tracks the locations of hundreds of millions of cellphones per day, allowing it to map people’s movements and relationships in detail.[56] It reportedly has access to all communications made via Google, Microsoft, Facebook, Yahoo, YouTube, AOL, Skype, Apple and Paltalk,[57] and collects hundreds of millions of contact lists from personal email and instant messaging accounts each year.[58] It has also managed to weaken much of the encryption used on the Internet (by collaborating with, coercing or otherwise infiltrating numerous technology companies), so that the majority of Internet privacy is now vulnerable to the NSA and other attackers.[59][60]

Domestically, the NSA collects and stores metadata records of phone calls,[61] including over 120 million US Verizon subscribers,[62] as well as Internet communications,[57] relying on a secret interpretation of the Patriot Act whereby the entirety of US communications may be considered “relevant” to a terrorism investigation if it is expected that even a tiny minority may relate to terrorism.[63] The NSA supplies foreign intercepts to the DEA, IRS and other law enforcement agencies, who use these to initiate criminal investigations. Federal agents are then instructed to “recreate” the investigative trail via parallel construction.[64]

The NSA also spies on influential Muslims to obtain information that could be used to discredit them, such as their use of pornography. The targets, both domestic and abroad, are not suspected of any crime but hold religious or political views deemed “radical” by the NSA.[65]

Although NSA’s surveillance activities are controversial, government agencies and private enterprises have common needs, and sometimes cooperate at subtle and complex technical levels. Big data is becoming more advantageous, justifying the cost of required computer hardware, and social media lead the trend. The interests of NSA and Silicon Valley began to converge as advances in computer storage technology drastically reduced the costs of storing enormous amounts of data and at the same time the value of the data for use in consumer marketing began to rise. On the other hand, social media sites are growing as voluntary data mining operations on a scale that rivals or exceeds anything the government could attempt on its own.[66]

According to a report in The Washington Post in July 2014, relying on information provided by Snowden, 90% of those placed under surveillance in the U.S. are ordinary Americans, and are not the intended targets. The newspaper said it had examined documents including emails, text messages, and online accounts that support the claim.[67]

Legal accountability

Despite President Obama’s claims that these programs have congressional oversight, members of Congress were unaware of the existence of these NSA programs or the secret interpretation of the Patriot Act, and have consistently been denied access to basic information about them.[68] Obama has also claimed that there are legal checks in place to prevent inappropriate access of data and that there have been no examples of abuse;[69] however, the secret FISC court charged with regulating the NSA’s activities is, according to its chief judge, incapable of investigating or verifying how often the NSA breaks even its own secret rules.[70] It has since been reported that the NSA violated its own rules on data access thousands of times a year, many of these violations involving large-scale data interceptions;[71] and that NSA officers have even used data intercepts to spy on love interests.[72] The NSA has “generally disregarded the special rules for disseminating United States person information” by illegally sharing its intercepts with other law enforcement agencies.[73] A March 2009 opinion of the FISC court, released by court order, states that protocols restricting data queries had been “so frequently and systemically violated that it can be fairly said that this critical element of the overall … regime has never functioned effectively.”[74][75] In 2011 the same court noted that the “volume and nature” of the NSA’s bulk foreign Internet intercepts was “fundamentally different from what the court had been led to believe”.[73] Email contact lists (including those of US citizens) are collected at numerous foreign locations to work around the illegality of doing so on US soil.[58]

Legal opinions on the NSA’s bulk collection program have differed. In mid-December 2013, U.S. District Court Judge Richard Leon ruled that the “almost-Orwellian” program likely violates the Constitution, and wrote, “I cannot imagine a more ‘indiscriminate’ and ‘arbitrary invasion’ than this systematic and high-tech collection and retention of personal data on virtually every single citizen for purposes of querying and analyzing it without prior judicial approval. Surely, such a program infringes on ‘that degree of privacy’ that the Founders enshrined in the Fourth Amendment. Indeed, I have little doubt that the author of our Constitution, James Madison, who cautioned us to beware ‘the abridgement of freedom of the people by gradual and silent encroachments by those in power,’ would be aghast.”[76]

Later that month, U.S. District Judge William Pauley ruled that the NSA’s collection of telephone records is legal and valuable in the fight against terrorism. In his opinion, he wrote, “a bulk telephony metadata collection program [is] a wide net that could find and isolate gossamer contacts among suspected terrorists in an ocean of seemingly disconnected data” and noted that a similar collection of data prior to 9/11 might have prevented the attack.[77]

An October 2014 United Nations report condemned mass surveillance by the United States and other countries as violating multiple international treaties and conventions that guarantee core privacy rights.[78]

Official responses

On March 20, 2013 the Director of National Intelligence, Lieutenant General James Clapper, testified before Congress that the NSA does not wittingly collect any kind of data on millions or hundreds of millions of Americans, but he retracted this in June after details of the PRISM program were published, and stated instead that meta-data of phone and Internet traffic are collected, but no actual message contents.[79] This was corroborated by the NSA Director, General Keith Alexander, before it was revealed that the XKeyscore program collects the contents of millions of emails from US citizens without warrant, as well as “nearly everything a user does on the Internet”. Alexander later admitted that “content” is collected, but stated that it is simply stored and never analyzed or searched unless there is “a nexus to al-Qaida or other terrorist groups”.[69]

Regarding the necessity of these NSA programs, Alexander stated on June 27 that the NSA’s bulk phone and Internet intercepts had been instrumental in preventing 54 terrorist “events”, including 13 in the US, and in all but one of these cases had provided the initial tip to “unravel the threat stream”.[80] On July 31 NSA Deputy Director John Inglis conceded to the Senate that these intercepts had not been vital in stopping any terrorist attacks, but were “close” to vital in identifying and convicting four San Diego men for sending US$8,930 to Al-Shabaab, a militia that conducts terrorism in Somalia.[81][82][83]

The U.S. government has aggressively sought to dismiss and challenge Fourth Amendment cases raised against it, and has granted retroactive immunity to ISPs and telecoms participating in domestic surveillance.[84][85] The U.S. military has acknowledged blocking access to parts of The Guardian website for thousands of defense personnel across the country,[86][87] and blocking the entire Guardian website for personnel stationed throughout Afghanistan, the Middle East, and South Asia.[88]

Organizational structure

Michael S. Rogers, the director of the NSA.

The NSA is led by the Director of the National Security Agency (DIRNSA), who also serves as Chief of the Central Security Service (CHCSS) and Commander of the United States Cyber Command (USCYBERCOM) and is the highest-ranking military official of these organizations. He is assisted by a Deputy Director, who is the highest-ranking civilian within the NSA/CSS.

NSA also has an Inspector General, head of the Office of the Inspector General (OIG), a General Counsel, head of the Office of the General Counsel (OGC) and a Director of Compliance, who is head of the Office of the Director of Compliance (ODOC).[89]

Unlike other intelligence organizations such as CIA or DIA, NSA has always been particularly reticent concerning its internal organizational structure.

As of the mid-1990s, the National Security Agency was organized into five Directorates:

  • The Operations Directorate, which was responsible for SIGINT collection and processing.
  • The Technology and Systems Directorate, which develops new technologies for SIGINT collection and processing.
  • The Information Systems Security Directorate, which was responsible for NSA’s communications and information security missions.
  • The Plans, Policy and Programs Directorate, which provided staff support and general direction for the Agency.
  • The Support Services Directorate, which provided logistical and administrative support activities.[90]

Each of these directorates consisted of several groups or elements, designated by a letter. There were for example the A Group, which was responsible for all SIGINT operations against the Soviet Union and Eastern Europe, and G Group, which was responsible for SIGINT related to all non-communist countries. These groups were divided in units designated by an additional number, like unit A5 for breaking Soviet codes, and G6, being the office for the Middle East, North Africa, Cuba, Central and South America.[91][92]

Structure

As of 2013, NSA has about a dozen directorates, which are designated by a letter, although not all of them are publicly known. The directorates are divided in divisions and units starting with the letter of the parent directorate, followed by a number for the division, the sub-unit or a sub-sub-unit.

The main elements of the organizational structure of the NSA are:[93]

  • F – Directorate only known from unit F6, the Special Collection Service (SCS), which is a joint program created by CIA and NSA in 1978 to facilitate clandestine activities such as bugging computers throughout the world, using the expertise of both agencies.[94]
  • G – Directorate only known from unit G112, the office that manages the Senior Span platform, attached to the U2 spy planes.[95]
  • I – Information Assurance Directorate (IAD), which ensures availability, integrity, authentication, confidentiality, and non-repudiation of national security and telecommunications and information systems (national security systems).
  • J – Directorate only known from unit J2, the Cryptologic Intelligence Unit
  • L – Installation and Logistics
  • M – Human Resources
  • Q – Security and Counterintelligence
  • R – Research Directorate, which conducts research on signals intelligence and on information assurance for the U.S. Government.[96]
  • S – Signals Intelligence Directorate (SID), which is responsible for the collection, analysis, production and dissemination of signals intelligence. This directorate is led by a director and a deputy director. The SID consists of the following divisions:
    • S1 – Customer Relations
    • S2 – Analysis and Production Centers, with the following so-called Product Lines:
      • S2A: South Asia, S2B: China and Korea, S2C: International Security, S2E: Middle East/Asia, S2F: International Crime, S2G: Counter-proliferation, S2H: Russia, S2I: Counter-terrorism, S2J: Weapons and Space, S2T: Current Threats
    • S3 – Data Acquisition, with these divisions for the main collection programs:
      • S31 – Cryptanalysis and Exploitation Services (CES)
      • S32 – Tailored Access Operations (TAO), which hacks into foreign computers to conduct cyber-espionage and reportedly is “the largest and arguably the most important component of the NSA’s huge Signal Intelligence (SIGINT) Directorate, consisting of over 1,000 military and civilian computer hackers, intelligence analysts, targeting specialists, computer hardware and software designers, and electrical engineers.”[97]
      • S33 – Global Access Operations (GAO), which is responsible for intercepts from satellites and other international SIGINT platforms.[98] A tool which details and maps the information collected by this unit is code-named Boundless Informant.
      • S34 – Collections Strategies and Requirements Center
      • S35 – Special Source Operations (SSO), which is responsible for domestic and compartmented collection programs, like for example the PRISM program.[98] Special Source Operations is also mentioned in connection to the FAIRVIEW collection program.[99]
  • T – Technical Directorate (TD)
  • Directorate for Education and Training
  • Directorate for Corporate Leadership
  • Foreign Affairs Directorate, which acts as liaison with foreign intelligence services, counter-intelligence centers and the UKUSA-partners.
  • Acquisitions and Procurement Directorate
  • Information Sharing Services (ISS), led by a chief and a deputy chief.[100]

In the year 2000, a leadership team was formed, consisting of the Director, the Deputy Director and the Directors of the Signals Intelligence (SID), the Information Assurance (IAD) and the Technical Directorate (TD). The chiefs of other main NSA divisions became associate directors of the senior leadership team.[101]

After president George W. Bush initiated the President’s Surveillance Program (PSP) in 2001, the NSA created a 24-hour Metadata Analysis Center (MAC), followed in 2004 by the Advanced Analysis Division (AAD), with the mission of analyzing content, Internet metadata and telephone metadata. Both units were part of the Signals Intelligence Directorate.[102]

A 2016 proposal would combine the Signals Intelligence Directorate with the Information Assurance Directorate into a Directorate of Operations.[103]

Watch centers

The NSA maintains at least two watch centers:

  • National Security Operations Center (NSOC), which is the NSA’s current operations center and focal point for time-sensitive SIGINT reporting for the United States SIGINT System (USSS). This center was established in 1968 as the National SIGINT Watch Center (NSWC) and renamed into National SIGINT Operations Center (NSOC) in 1973. This “nerve center of the NSA” got its current name in 1996.[104]
  • NSA/CSS Threat Operations Center (NTOC), which is the primary NSA/CSS partner for Department of Homeland Security response to cyber incidents. The NTOC establishes real-time network awareness and threat characterization capabilities to forecast, alert, and attribute malicious activity and enable the coordination of Computer Network Operations. The NTOC was established in 2004 as a joint Information Assurance and Signals Intelligence project.[105]

Employees

The number of NSA employees is officially classified[4] but there are several sources providing estimates. In 1961, NSA had 59,000 military and civilian employees, which grew to 93,067 in 1969, of which 19,300 worked at the headquarters at Fort Meade. In the early 1980s NSA had roughly 50,000 military and civilian personnel. By 1989 this number had grown again to 75,000, of which 25,000 worked at the NSA headquarters. Between 1990 and 1995 the NSA’s budget and workforce were cut by one third, which led to a substantial loss of experience.[106]

In 2012, the NSA said more than 30,000 employees worked at Fort Meade and other facilities.[2] In 2012, John C. Inglis, the deputy director, said that the total number of NSA employees is “somewhere between 37,000 and one billion” as a joke,[4] and stated that the agency is “probably the biggest employer of introverts.”[4] In 2013 Der Spiegel stated that the NSA had 40,000 employees.[5] More widely, it has been described as the world’s largest single employer of mathematicians.[107] Some NSA employees form part of the workforce of the National Reconnaissance Office (NRO), the agency that provides the NSA with satellite signals intelligence.

As of 2013 about 1,000 system administrators work for the NSA.[108]

Security issues

The NSA received criticism early on in 1960 after two agents had defected to the Soviet Union. Investigations by the House Un-American Activities Committee and a special subcommittee of the United States House Committee on Armed Services revealed severe cases of ignorance in personnel security regulations, prompting the former personnel director and the director of security to step down and leading to the adoption of stricter security practices.[109] Nonetheless, security breaches reoccurred only a year later when in an issue of Izvestia of July 23, 1963, a former NSA employee published several cryptologic secrets.

The very same day, an NSA clerk-messenger committed suicide as ongoing investigations disclosed that he had sold secret information to the Soviets on a regular basis. The reluctance of Congressional houses to look into these affairs had prompted a journalist to write, “If a similar series of tragic blunders occurred in any ordinary agency of Government an aroused public would insist that those responsible be officially censured, demoted, or fired.” David Kahn criticized the NSA’s tactics of concealing its doings as smug and the Congress’ blind faith in the agency’s right-doing as shortsighted, and pointed out the necessity of surveillance by the Congress to prevent abuse of power.[109]

Edward Snowden‘s leaking of the existence of PRISM in 2013 caused the NSA to institute a “two-man rule“, where two system administrators are required to be present when one accesses certain sensitive information.[108]Snowden claims he suggested such a rule in 2009.[110]

Polygraphing

Defense Security Service (DSS) polygraph brochure given to NSA applicants

The NSA conducts polygraph tests of employees. For new employees, the tests are meant to discover enemy spies who are applying to the NSA and to uncover any information that could make an applicant pliant to coercion.[111] As part of the latter, historically EPQs or “embarrassing personal questions” about sexual behavior had been included in the NSA polygraph.[111]The NSA also conducts five-year periodic reinvestigation polygraphs of employees, focusing on counterintelligence programs. In addition the NSA conducts periodic polygraph investigations in order to find spies and leakers; those who refuse to take them may receive “termination of employment”, according to a 1982 memorandum from the director of the NSA.[112]

File:NSApolygraphvideo.webm

NSA-produced video on the polygraph process

There are also “special access examination” polygraphs for employees who wish to work in highly sensitive areas, and those polygraphs cover counterintelligence questions and some questions about behavior.[112] NSA’s brochure states that the average test length is between two and four hours.[113] A 1983 report of the Office of Technology Assessment stated that “It appears that the NSA [National Security Agency] (and possibly CIA) use the polygraph not to determine deception or truthfulness per se, but as a technique of interrogation to encourage admissions.”[114] Sometimes applicants in the polygraph process confess to committing felonies such as murder, rape, and selling of illegal drugs. Between 1974 and 1979, of the 20,511 job applicants who took polygraph tests, 695 (3.4%) confessed to previous felony crimes; almost all of those crimes had been undetected.[111]

In 2010 the NSA produced a video explaining its polygraph process.[115] The video, ten minutes long, is titled “The Truth About the Polygraph” and was posted to the Web site of the Defense Security Service. Jeff Stein of The Washington Post said that the video portrays “various applicants, or actors playing them — it’s not clear — describing everything bad they had heard about the test, the implication being that none of it is true.”[116] AntiPolygraph.org argues that the NSA-produced video omits some information about the polygraph process; it produced a video responding to the NSA video.[115] George Maschke, the founder of the Web site, accused the NSA polygraph video of being “Orwellian“.[116]

After Edward Snowden revealed his identity in 2013, the NSA began requiring polygraphing of employees once per quarter.[117]

Arbitrary firing

The number of exemptions from legal requirements has been criticized. When in 1964 the Congress was hearing a bill giving the director of the NSA the power to fire at will any employee,The Washington Post wrote: “This is the very definition of arbitrariness. It means that an employee could be discharged and disgraced on the basis of anonymous allegations without the slightest opportunity to defend himself.” Yet, the bill was accepted by an overwhelming majority.[109]

Insignia and memorials

Seal of the U.S. National Security Agency.svg

The heraldic insignia of NSA consists of an eagle inside a circle, grasping a key in its talons.[118] The eagle represents the agency’s national mission.[118] Its breast features a shield with bands of red and white, taken from the Great Seal of the United States and representing Congress.[118] The key is taken from the emblem of Saint Peter and represents security.[118]

When the NSA was created, the agency had no emblem and used that of the Department of Defense.[119] The agency adopted its first of two emblems in 1963.[119] The current NSA insignia has been in use since 1965, when then-Director, LTG Marshall S. Carter (USA) ordered the creation of a device to represent the agency.[120]

The NSA’s flag consists of the agency’s seal on a light blue background.

National Cryptologic Memorial

Crews associated with NSA missions have been involved in a number of dangerous and deadly situations.[121] The USS Liberty incident in 1967 and USS Pueblo incident in 1968 are examples of the losses endured during the Cold War.[121]

The National Security Agency/Central Security Service Cryptologic Memorial honors and remembers the fallen personnel, both military and civilian, of these intelligence missions.[122] It is made of black granite, and has 171 names carved into it, as of 2013 .[122] It is located at NSA headquarters. A tradition of declassifying the stories of the fallen was begun in 2001.[122]

NSANet (NSA’s intranet)

Behind the Green Door – Secure communications room with separate computer terminals for access to SIPRNET, GWAN, NSANET, and JWICS

NSANet stands for National Security Agency Network and is the official NSA intranet.[123] It is a classified network,[124] for information up to the level of TS/SCI[125] to support the use and sharing of intelligence data between NSA and the signals intelligence agencies of the four other nations of the Five Eyes partnership. The management of NSANet has been delegated to the Central Security Service Texas (CSSTEXAS).[126]

NSANet is a highly secured computer network consisting of fiber-optic and satellite communication channels which are almost completely separated from the public Internet. The network allows NSA personnel and civilian and military intelligence analysts anywhere in the world to have access to the agency’s systems and databases. This access is tightly controlled and monitored. For example, every keystroke is logged, activities are audited at random and downloading and printing of documents from NSANet are recorded.[127]

In 1998, NSANet, along with NIPRNET and SIPRNET, had “significant problems with poor search capabilities, unorganized data and old information”.[128] In 2004, the network was reported to have used over twenty commercial off-the-shelf operating systems.[129] Some universities that do highly sensitive research are allowed to connect to it.[130]

The thousands of Top Secret internal NSA documents that were taken by Edward Snowden in 2013 were stored in “a file-sharing location on the NSA’s intranet site” so they could easily be read online by NSA personnel. Everyone with a TS/SCI-clearance had access to these documents and as a system administrator, Snowden was responsible for moving accidentally misplaced highly sensitive documents to more secure storage locations.[131]

National Computer Security Center

The DoD Computer Security Center was founded in 1981 and renamed the National Computer Security Center (NCSC) in 1985. NCSC was responsible for computer security throughout the federal government.[132] NCSC was part of NSA,[133] and during the late 1980s and the 1990s, NSA and NCSC published Trusted Computer System Evaluation Criteria in a six-foot high Rainbow Series of books that detailed trusted computing and network platform specifications.[134] The Rainbow books were replaced by the Common Criteria, however, in the early 2000s.[134]

Facilities

Headquarters

National Security Agency headquarters in Fort Meade, 2013

Headquarters for the National Security Agency is located at 39°6′32″N 76°46′17″W in Fort George G. Meade, Maryland, although it is separate from other compounds and agencies that are based within this same military installation. Ft. Meade is about 20 mi (32 km) southwest of Baltimore,[135] and 25 mi (40 km) northeast of Washington, DC.[136] The NSA has its own exit off Maryland Route 295 South labeled “NSA Employees Only”.[137][138] The exit may only be used by people with the proper clearances, and security vehicles parked along the road guard the entrance.[139]

NSA is the largest employer in the U.S. state of Maryland, and two-thirds of its personnel work at Ft. Meade.[140] Built on 350 acres (140 ha; 0.55 sq mi)[141] of Ft. Meade’s 5,000 acres (2,000 ha; 7.8 sq mi),[142] the site has 1,300 buildings and an estimated 18,000 parking spaces.[136][143]

NSA headquarters building in Fort Meade (left), NSOC (right)

The main NSA headquarters and operations building is what James Bamford, author of Body of Secrets, describes as “a modern boxy structure” that appears similar to “any stylish office building.”[144] The building is covered with one-way dark glass, which is lined with copper shielding in order to prevent espionage by trapping in signals and sounds.[144] It contains 3,000,000 square feet (280,000 m2), or more than 68 acres (28 ha), of floor space; Bamford said that the U.S. Capitol “could easily fit inside it four times over.”[144]

The facility has over 100 watchposts,[145] one of them being the visitor control center, a two-story area that serves as the entrance.[144] At the entrance, a white pentagonal structure,[146] visitor badges are issued to visitors and security clearances of employees are checked.[147] The visitor center includes a painting of the NSA seal.[146]

The OPS2A building, the tallest building in the NSA complex and the location of much of the agency’s operations directorate, is accessible from the visitor center. Bamford described it as a “dark glass Rubik’s Cube“.[148] The facility’s “red corridor” houses non-security operations such as concessions and the drug store. The name refers to the “red badge” which is worn by someone without a security clearance. The NSA headquarters includes a cafeteria, a credit union, ticket counters for airlines and entertainment, a barbershop, and a bank.[146] NSA headquarters has its own post office, fire department, and police force.[149][150][151]

The employees at the NSA headquarters reside in various places in the Baltimore-Washington area, including Annapolis, Baltimore, and Columbia in Maryland and the District of Columbia, including the Georgetown community.[152]

Power consumption

Due to massive amounts of data processing, NSA is the largest electricity consumer in Maryland.[140]

Following a major power outage in 2000, in 2003 and in follow-ups through 2007, The Baltimore Sun reported that the NSA was at risk of electrical overload because of insufficient internal electrical infrastructure at Fort Meade to support the amount of equipment being installed. This problem was apparently recognized in the 1990s but not made a priority, and “now the agency’s ability to keep its operations going is threatened.”[153]

Baltimore Gas & Electric (BGE, now Constellation Energy) provided NSA with 65 to 75 megawatts at Ft. Meade in 2007, and expected that an increase of 10 to 15 megawatts would be needed later that year.[154] In 2011, NSA at Ft. Meade was Maryland’s largest consumer of power.[140] In 2007, as BGE’s largest customer, NSA bought as much electricity as Annapolis, the capital city of Maryland.[153]

One estimate put the potential for power consumption by the new Utah Data Center at US$40 million per year.[155]

History of headquarters

Headquarters at Fort Meade circa 1950s

When the agency was established, its headquarters and cryptographic center were in the Naval Security Station in Washington, D.C. The COMINT functions were located in Arlington Hall in Northern Virginia, which served as the headquarters of the U.S. Army‘s cryptographic operations.[156] Because the Soviet Union had detonated a nuclear bomb and because the facilities were crowded, the federal government wanted to move several agencies, including the AFSA/NSA. A planning committee considered Fort Knox, but Fort Meade, Maryland, was ultimately chosen as NSA headquarters because it was far enough away from Washington, D.C. in case of a nuclear strike and was close enough so its employees would not have to move their families.[157]

Construction of additional buildings began after the agency occupied buildings at Ft. Meade in the late 1950s, which they soon outgrew.[157] In 1963 the new headquarters building, nine stories tall, opened. NSA workers referred to the building as the “Headquarters Building” and since the NSA management occupied the top floor, workers used “Ninth Floor” to refer to their leaders.[158] COMSEC remained in Washington, D.C., until its new building was completed in 1968.[157] In September 1986, the Operations 2A and 2B buildings, both copper-shielded to prevent eavesdropping, opened with a dedication by President Ronald Reagan.[159] The four NSA buildings became known as the “Big Four.”[159] The NSA director moved to 2B when it opened.[159]

Fort Meade shooting

On March 30, 2015, shortly before 9 am, a stolen sports utility vehicle approached an NSA police vehicle blocking the road near the gate of Fort Meade, after it was told to leave the area. NSA officers fired on the SUV, killing the 27-year-old driver, Ricky Hall (a transgender person also known as Mya), and seriously injuring his 20-year-old male passenger. An NSA officer’s arm was injured when Hall subsequently crashed into his vehicle.[160][161]

The two, dressed in women’s clothing after a night of partying at a motel with the man they’d stolen the SUV from that morning, “attempted to drive a vehicle into the National Security Agency portion of the installation without authorization”, according to an NSA statement.[162] FBI spokeswoman Amy Thoreson said the incident is not believed to be related to terrorism.[163] In June 2015 the FBI closed its investigation into the incident and federal prosecutors have declined to bring charges against anyone involved.[164]

An anonymous police official told The Washington Post, “This was not a deliberate attempt to breach the security of NSA. This was not a planned attack.” The two are believed to have made a wrong turn off the highway, while fleeing from the motel after stealing the vehicle. A small amount of cocaine was found in the SUV. A local CBS reporter initially said a gun was found,[165] but her later revision does not.[166] Dozens of journalists were corralled into a parking lot blocks away from the scene, and were barred from photographing the area.[167]

Computing

In 1995, The Baltimore Sun reported that the NSA is the owner of the single largest group of supercomputers.[168]

NSA held a groundbreaking ceremony at Ft. Meade in May 2013 for its High Performance Computing Center 2, expected to open in 2016.[169] Called Site M, the center has a 150 megawatt power substation, 14 administrative buildings and 10 parking garages.[149] It cost $3.2 billion and covers 227 acres (92 ha; 0.355 sq mi).[149] The center is 1,800,000 square feet (17 ha; 0.065 sq mi)[149] and initially uses 60 megawatts of electricity.[170]

Increments II and III are expected to be completed by 2030, and would quadruple the space, covering 5,800,000 square feet (54 ha; 0.21 sq mi) with 60 buildings and 40 parking garages.[149] Defense contractors are also establishing or expanding cybersecurity facilities near the NSA and around the Washington metropolitan area.[149]

Other U.S. facilities

Buckley Air Force Base in Colorado

Utah Data Center

As of 2012, NSA collected intelligence from four geostationary satellites.[155] Satellite receivers were at Roaring Creek Station in Catawissa, Pennsylvania and Salt Creek Station in Arbuckle, California.[155] It operated ten to twenty taps on U.S. telecom switches. NSA had installations in several U.S. states and from them observed intercepts from Europe, the Middle East, North Africa, Latin America, and Asia.[155]

NSA had facilities at Friendship Annex (FANX) in Linthicum, Maryland, which is a 20 to 25-minute drive from Ft. Meade;[171] the Aerospace Data Facility at Buckley Air Force Base in Aurora outside Denver, Colorado; NSA Texas in the Texas Cryptology Center at Lackland Air Force Base in San Antonio, Texas; NSA Georgia at Fort Gordon in Augusta, Georgia; NSA Hawaii in Honolulu; the Multiprogram Research Facility in Oak Ridge, Tennessee, and elsewhere.[152][155]

On January 6, 2011 a groundbreaking ceremony was held to begin construction on NSA’s first Comprehensive National Cyber-security Initiative (CNCI) Data Center, known as the “Utah Data Center” for short. The $1.5B data center is being built at Camp Williams, Utah, located 25 miles (40 km) south of Salt Lake City, and will help support the agency’s National Cyber-security Initiative.[172] It is expected to be operational by September 2013.[155]

In 2009, to protect its assets and to access more electricity, NSA sought to decentralize and expand its existing facilities in Ft. Meade and Menwith Hill,[173] the latter expansion expected to be completed by 2015.[174]

The Yakima Herald-Republic cited Bamford, saying that many of NSA’s bases for its Echelon program were a legacy system, using outdated, 1990s technology.[175] In 2004, NSA closed its operations at Bad Aibling Station (Field Station 81) in Bad Aibling, Germany.[176] In 2012, NSA began to move some of its operations at Yakima Research Station, Yakima Training Center, in Washington state to Colorado, planning to leave Yakima closed.[177] As of 2013, NSA also intended to close operations at Sugar Grove, West Virginia.[175]

International stations

RAF Menwith Hill has the largest NSA presence in the United Kingdom.[174]

Following the signing in 1946–1956[178] of the UKUSA Agreement between the United States, United Kingdom, Canada, Australia and New Zealand, who then cooperated on signals intelligence and ECHELON,[179] NSA stations were built at GCHQ Bude in Morwenstow, United Kingdom; Geraldton, Pine Gap and Shoal Bay, Australia; Leitrim and Ottawa, Canada; Misawa, Japan; and Waihopai and Tangimoana,[180] New Zealand.[181]

NSA operates RAF Menwith Hill in North Yorkshire, United Kingdom, which was, according to BBC News in 2007, the largest electronic monitoring station in the world.[182] Planned in 1954, and opened in 1960, the base covered 562 acres (227 ha; 0.878 sq mi) in 1999.[183]

The agency’s European Cryptologic Center (ECC), with 240 employees in 2011, is headquartered at a US military compound in Griesheim, near Frankfurt in Germany. A 2011 NSA report indicates that the ECC is responsible for the “largest analysis and productivity in Europe” and focusses on various priorities, including Africa, Europe, the Middle East and counterterrorism operations.[184]

In 2013, a new Consolidated Intelligence Center, also to be used by NSA, is being built at the headquarters of the United States Army Europe in Wiesbaden, Germany.[185] NSA’s partnership with Bundesnachrichtendienst (BND), the German foreign intelligence service, was confirmed by BND president Gerhard Schindler.[185]

Thailand

Thailand is a “3rd party partner” of the NSA along with nine other nations.[186] These are non-English-speaking countries that have made security agreements for the exchange of SIGINT raw material and end product reports.

Thailand is the site of at least two US SIGINT collection stations. One is at the US Embassy in Bangkok, a joint NSA-CIA Special Collection Service (SCS) unit. It presumably eavesdrops on foreign embassies, governmental communications, and other targets of opportunity.[187]

The second installation is a FORNSAT (foreign satellite interception) station in the Thai city of Khon Kaen. It is codenamed INDRA, but has also been referred to as LEMONWOOD.[187] The station is approximately 40 ha (100 acres) in size and consists of a large 3,700–4,600 m2 (40,000–50,000 ft2) operations building on the west side of the ops compound and four radome-enclosed parabolic antennas. Possibly two of the radome-enclosed antennas are used for SATCOM intercept and two antennas used for relaying the intercepted material back to NSA. There is also a PUSHER-type circularly-disposed antenna array (CDAA) array just north of the ops compound.[188][189]

NSA activated Khon Kaen in October 1979. Its mission was to eavesdrop on the radio traffic of Chinese army and air force units in southern China, especially in and around the city of Kunming in Yunnan Province. Back in the late 1970s the base consisted only of a small CDAA antenna array that was remote-controlled via satellite from the NSA listening post at Kunia, Hawaii, and a small force of civilian contractors from Bendix Field Engineering Corp. whose job it was to keep the antenna array and satellite relay facilities up and running 24/7.[188]

According to the papers of the late General William Odom, the INDRA facility was upgraded in 1986 with a new British-made PUSHER CDAA antenna as part of an overall upgrade of NSA and Thai SIGINT facilities whose objective was to spy on the neighboring communist nations of Vietnam, Laos, and Cambodia.[188]

The base apparently fell into disrepair in the 1990s as China and Vietnam became more friendly towards the US, and by 2002 archived satellite imagery showed that the PUSHER CDAA antenna had been torn down, perhaps indicating that the base had been closed. At some point in the period since 9/11, the Khon Kaen base was reactivated and expanded to include a sizeable SATCOM intercept mission. It is likely that the NSA presence at Khon Kaen is relatively small, and that most of the work is done by civilian contractors.[188]

Mission

NSA’s eavesdropping mission includes radio broadcasting, both from various organizations and individuals, the Internet, telephone calls, and other intercepted forms of communication. Its secure communications mission includes military, diplomatic, and all other sensitive, confidential or secret government communications.[190]

According to the Washington Post, “[e]very day, collection systems at the National Security Agency intercept and store 1.7 billion e-mails, phone calls and other types of communications. The NSA sorts a fraction of those into 70 separate databases.”[191]

Because of its listening task, NSA/CSS has been heavily involved in cryptanalytic research, continuing the work of predecessor agencies which had broken many World War II codes and ciphers (see, for instance, Purple, Venona project, and JN-25).

In 2004, NSA Central Security Service and the National Cyber Security Division of the Department of Homeland Security (DHS) agreed to expand NSA Centers of Academic Excellence in Information Assurance Education Program.[192]

As part of the National Security Presidential Directive 54/Homeland Security Presidential Directive 23 (NSPD 54), signed on January 8, 2008 by President Bush, the NSA became the lead agency to monitor and protect all of the federal government’s computer networks from cyber-terrorism.[9]

Operations

Operations by the National Security Agency can be divided in three types:

  • Collection overseas, which falls under the responsibility of the Global Access Operations (GAO) division.
  • Domestic collection, which falls under the responsibility of the Special Source Operations (SSO) division.
  • Hacking operations, which falls under the responsibility of the Tailored Access Operations (TAO) division.

Collection overseas

Echelon

Main article: ECHELON

Echelon was created in the incubator of the Cold War.[193] Today it is a legacy system, and several NSA stations are closing.[175]

NSA/CSS, in combination with the equivalent agencies in the United Kingdom (Government Communications Headquarters), Canada (Communications Security Establishment), Australia (Defence Signals Directorate), and New Zealand (Government Communications Security Bureau), otherwise known as the UKUSA group,[194] was reported to be in command of the operation of the so-called ECHELON system. Its capabilities were suspected to include the ability to monitor a large proportion of the world’s transmitted civilian telephone, fax and data traffic.[195]

During the early 1970s, the first of what became more than eight large satellite communications dishes were installed at Menwith Hill.[196] Investigative journalist Duncan Campbell reported in 1988 on the ECHELON surveillance program, an extension of the UKUSA Agreement on global signals intelligence SIGINT, and detailed how the eavesdropping operations worked.[197] In November 3, 1999 the BBC reported that they had confirmation from the Australian Government of the existence of a powerful “global spying network” code-named Echelon, that could “eavesdrop on every single phone call, fax or e-mail, anywhere on the planet” with Britain and the United States as the chief protagonists. They confirmed that Menwith Hill was “linked directly to the headquarters of the US National Security Agency (NSA) at Fort Meade in Maryland”.[198]

NSA’s United States Signals Intelligence Directive 18 (USSID 18) strictly prohibited the interception or collection of information about “… U.S. persons, entities, corporations or organizations….” without explicit written legal permission from the United States Attorney General when the subject is located abroad, or the Foreign Intelligence Surveillance Court when within U.S. borders. Alleged Echelon-related activities, including its use for motives other than national security, including political and industrial espionage, received criticism from countries outside the UKUSA alliance.[199][200]

Protesters against NSA data mining in Berlin wearing Chelsea Manning and Edward Snowden masks.

Other SIGINT operations overseas

The NSA is also involved in planning to blackmail people with “SEXINT“, intelligence gained about a potential target’s sexual activity and preferences. Those targeted had not committed any apparent crime nor were charged with one.[201]

In order to support its facial recognition program, the NSA is intercepting “millions of images per day”.[202]

The Real Time Regional Gateway is a data collection program introduced in 2005 in Iraq by NSA during the Iraq War that consisted of gathering all electronic communication, storing it, then searching and otherwise analyzing it. It was effective in providing information about Iraqi insurgents who had eluded less comprehensive techniques.[203] This “collect it all” strategy introduced by NSA director, Keith B. Alexander, is believed by Glenn Greenwald of The Guardian to be the model for the comprehensive worldwide mass archiving of communications which NSA is engaged in as of 2013.[204]

BoundlessInformant

Edward Snowden revealed in June 2013 that between February 8 and March 8, 2013, the NSA collected about 124.8 billion telephone data items and 97.1 billion computer data items throughout the world, as was displayed in charts from an internal NSA tool codenamed Boundless Informant. It was reported that some of these data reflected eavesdropping on citizens in countries like Germany, Spain and France.[205]

BoundlessInformant employs big data databases, cloud computing technology, and Free and Open Source Software (FOSS) to analyze data collected worldwide by the NSA.[206]

Bypassing encryption

In 2013, reporters uncovered a secret memo that claims the NSA created and pushed for the adoption of the Dual_EC_DRBG encryption standard that contained built-in vulnerabilities in 2006 to the United States National Institute of Standards and Technology (NIST), and the International Organization for Standardization (aka ISO).[207][208] This memo appears to give credence to previous speculation by cryptographers at Microsoft Research.[209]Edward Snowden claims that the NSA often bypasses encryption altogether by lifting information before it is encrypted or after it is decrypted.[208]

XKeyscore rules (as specified in a file xkeyscorerules100.txt, sourced by German TV stations NDR and WDR, who claim to have excerpts from its source code) reveal that the NSA tracks users of privacy-enhancing software tools, including Tor; an anonymous email service provided by the MIT Computer Science and Artificial Intelligence Laboratory (CSAIL) in Cambridge, Massachusetts; and readers of the Linux Journal.[210][211]

Domestic activity

NSA’s mission, as set forth in Executive Order 12333 in 1981, is to collect information that constitutes “foreign intelligence or counterintelligence” while not “acquiring information concerning the domestic activities of United States persons”. NSA has declared that it relies on the FBI to collect information on foreign intelligence activities within the borders of the United States, while confining its own activities within the United States to the embassies and missions of foreign nations.[212] The appearance of a ‘Domestic Surveillance Directorate’ of the NSA was soon exposed as a hoax in 2013.[213][214]

NSA’s domestic surveillance activities are limited by the requirements imposed by the Fourth Amendment to the U.S. Constitution. The Foreign Intelligence Surveillance Court for example held in October 2011, citing multiple Supreme Court precedents, that the Fourth Amendment prohibitions against unreasonable searches and seizures applies to the contents of all communications, whatever the means, because “a person’s private communications are akin to personal papers.”[215] However, these protections do not apply to non-U.S. persons located outside of U.S. borders, so the NSA’s foreign surveillance efforts are subject to far fewer limitations under U.S. law.[216] The specific requirements for domestic surveillance operations are contained in the Foreign Intelligence Surveillance Act of 1978 (FISA), which does not extend protection to non-U.S. citizens located outside of U.S. territory.[216]

George W. Bush administration

George W. Bush, president during the 9/11 terrorist attacks, approved the Patriot Act shortly after the attacks to take anti-terrorist security measures. Title 1, 2, and 9 specifically authorized measures that would be taken by the NSA. These titles granted enhanced domestic security against terrorism, surveillance procedures, and improved intelligence, respectively. On March 10, 2004, there was a debate between President Bush and White House Counsel Alberto Gonzales, Attorney General John Ashcroft, and Acting Attorney General James Comey. The Attorney Generals were unsure if the NSA’s programs could be considered constitutional. They threatened to resign over the matter, but ultimately the NSA’s programs continued.[217] On March 11, 2004, President Bush signed a new authorization for mass surveillance of Internet records, in addition to the surveillance of phone records.This allowed the president to be able to override laws such as the Foreign Intelligence Surveillance Act, which protected civilians from mass surveillance. In addition to this, President Bush also signed that the measures of mass surveillance were also retroactively in place.[218]

Warrantless wiretaps

On December 16, 2005, The New York Times reported that, under White House pressure and with an executive order from President George W. Bush, the National Security Agency, in an attempt to thwart terrorism, had been tapping phone calls made to persons outside the country, without obtaining warrants from the United States Foreign Intelligence Surveillance Court, a secret court created for that purpose under the Foreign Intelligence Surveillance Act (FISA).[219]

One such surveillance program, authorized by the U.S. Signals Intelligence Directive 18 of President George Bush, was the Highlander Project undertaken for the National Security Agency by the U.S. Army 513th Military Intelligence Brigade. NSA relayed telephone (including cell phone) conversations obtained from ground, airborne, and satellite monitoring stations to various U.S. Army Signal Intelligence Officers, including the 201st Military Intelligence Battalion. Conversations of citizens of the U.S. were intercepted, along with those of other nations.[220]

Proponents of the surveillance program claim that the President has executive authority to order such action, arguing that laws such as FISA are overridden by the President’s Constitutional powers. In addition, some argued that FISA was implicitly overridden by a subsequent statute, the Authorization for Use of Military Force, although the Supreme Court’s ruling in Hamdan v. Rumsfeld deprecates this view. In the August 2006 case ACLU v. NSA, U.S. District Court Judge Anna Diggs Taylor concluded that NSA’s warrantless surveillance program was both illegal and unconstitutional. On July 6, 2007 the 6th Circuit Court of Appeals vacated the decision on the grounds that the ACLU lacked standing to bring the suit.[221]

On January 17, 2006, the Center for Constitutional Rights filed a lawsuit, CCR v. Bush, against the George W. Bush Presidency. The lawsuit challenged the National Security Agency’s (NSA’s) surveillance of people within the U.S., including the interception of CCR emails without securing a warrant first.[222][223]

In September 2008, the Electronic Frontier Foundation (EFF) filed a class action lawsuit against the NSA and several high-ranking officials of the Bush administration,[224] charging an “illegal and unconstitutional program of dragnet communications surveillance,”[225] based on documentation provided by former AT&T technician Mark Klein.[226]

As a result of the USA Freedom Act passed by Congress in June 2015, the NSA had to shut down its bulk phone surveillance program on November 29 of the same year. The USA Freedom Act forbids the NSA to collect metadata and content of phone calls unless it has a warrant for terrorism investigation. In that case the agency has to ask the telecom companies for the record, which will only be kept for six months.

AT&T Internet monitoring

In May 2006, Mark Klein, a former AT&T employee, alleged that his company had cooperated with NSA in installing Narus hardware to replace the FBI Carnivore program, to monitor network communications including traffic between American citizens.[227]

Data mining

NSA was reported in 2008 to use its computing capability to analyze “transactional” data that it regularly acquires from other government agencies, which gather it under their own jurisdictional authorities. As part of this effort, NSA now monitors huge volumes of records of domestic email data, web addresses from Internet searches, bank transfers, credit-card transactions, travel records, and telephone data, according to current and former intelligence officials interviewed by The Wall Street Journal. The sender, recipient, and subject line of emails can be included, but the content of the messages or of phone calls are not.[228]

A 2013 advisory group for the Obama administration, seeking to reform NSA spying programs following the revelations of documents released by Edward J. Snowden.[229] mentioned in ‘Recommendation 30’ on page 37, “…that the National Security Council staff should manage an interagency process to review on a regular basis the activities of the US Government regarding attacks that exploit a previously unknown vulnerability in a computer application.” Retired cyber security expert Richard A. Clarke was a group member and stated on April 11 that NSA had no advance knowledge of Heartbleed.[230]

Illegally obtained evidence

In August 2013 it was revealed that a 2005 IRS training document showed that NSA intelligence intercepts and wiretaps, both foreign and domestic, were being supplied to the Drug Enforcement Administration (DEA) and Internal Revenue Service (IRS) and were illegally used to launch criminal investigations of US citizens. Law enforcement agents were directed to conceal how the investigations began and recreate an apparently legal investigative trail by re-obtaining the same evidence by other means.[231][232]

Barack Obama administration

In the months leading to April 2009, the NSA intercepted the communications of American citizens, including a Congressman, although the Justice Department believed that the interception was unintentional. The Justice Department then took action to correct the issues and bring the program into compliance with existing laws.[233] United States Attorney General Eric Holder resumed the program according to his understanding of the Foreign Intelligence Surveillance Act amendment of 2008, without explaining what had occurred.[234]

Polls conducted in June 2013 found divided results among Americans regarding NSA’s secret data collection.[235] Rasmussen Reports found that 59% of Americans disapprove,[236] Gallup found that 53% disapprove,[237] and Pew found that 56% are in favor of NSA data collection.[238]

Section 215 metadata collection

On April 25, 2013, the NSA obtained a court order requiring Verizon‘s Business Network Services to provide metadata on all calls in its system to the NSA “on an ongoing daily basis” for a three-month period, as reported by The Guardian on June 6, 2013. This information includes “the numbers of both parties on a call … location data, call duration, unique identifiers, and the time and duration of all calls” but not “[t]he contents of the conversation itself”. The order relies on the so-called “business records” provision of the Patriot Act.[239][240]

In August 2013, following the Snowden leaks, new details about the NSA’s data mining activity were revealed. Reportedly, the majority of emails into or out of the United States are captured at “selected communications links” and automatically analyzed for keywords or other “selectors”. Emails that do not match are deleted.[241]

The utility of such a massive metadata collection in preventing terrorist attacks is disputed. Many studies reveal the dragnet like system to be ineffective. One such report, released by the New America Foundation concluded that after an analysis of 225 terrorism cases, the NSA “had no discernible impact on preventing acts of terrorism.”[242]

Defenders of the program say that while metadata alone can’t provide all the information necessary to prevent an attack, it assures the ability to “connect the dots”[243] between suspect foreign numbers and domestic numbers with a speed only the NSA’s software is capable of. One benefit of this is quickly being able to determine the difference between suspicious activity and real threats.[citation needed] As an example, NSA director General Keith Alexander mentioned at the annual Cybersecurity Summit in 2013, that metadata analysis of domestic phone call records after the Boston Marathon bombing helped determine that[clarification needed] another attack in New York was baseless.[243]

In addition to doubts about its effectiveness, many people argue that the collection of metadata is an unconstitutional invasion of privacy. As of 2015, the collection process remains legal and grounded in the ruling from Smith v. Maryland (1979). A prominent opponent of the data collection and its legality is U.S. District Judge Richard J. Leon, who issued a report in 2013[244] in which he stated: “I cannot imagine a more ‘indiscriminate’ and ‘arbitrary invasion’ than this systematic and high tech collection and retention of personal data on virtually every single citizen for purposes of querying and analyzing it without prior judicial approval…Surely, such a program infringes on ‘that degree of privacy’ that the founders enshrined in the Fourth Amendment”.

The PRISM program

PRISM: a clandestine surveillance program under which the NSA collects user data from companies like Microsoft and Facebook.

Under the PRISM program, which started in 2007,[245][246] NSA gathers Internet communications from foreign targets from nine major U.S. Internet-based communication service providers: Microsoft,[247] Yahoo, Google, Facebook, PalTalk, AOL, Skype, YouTube and Apple. Data gathered include email, video and voice chat, videos, photos, VoIP chats such as Skype, and file transfers.

June 2015 – WikiLeaks: Industrial espionage[edit]

In June 2015, Wikileaks published documents, which showed that NSA spied on French companies.[248]

July 2015 – WikiLeaks: Espionage against German federal ministries[edit]

In July 2015, WikiLeaks published documents, which showed that NSA spied on federal German ministries since 1990s.[249][250] Even Germany’s Chancellor Angela Merkel‘s cellphones and phone of her predecessors had been intercepted.[251]

Claims of prevented terrorist attacks[edit]

Former NSA director General Keith Alexander claimed that in September 2009 the NSA prevented Najibullah Zazi and his friends from carrying out a terrorist attack.[252] However, this claim has been debunked and no evidence has been presented demonstrating that the NSA has ever been instrumental in preventing a terrorist attack.[253][254][255][256]

Hacking operations

Besides the more traditional ways of eavesdropping in order to collect signals intelligence, NSA is also engaged in hacking computers, smartphones and their networks. These operations are conducted by the Tailored Access Operations (TAO) division.

NSA’s China hacking group

According to the Foreign Policy magazine, “… the Office of Tailored Access Operations, or TAO, has successfully penetrated Chinese computer and telecommunications systems for almost 15 years, generating some of the best and most reliable intelligence information about what is going on inside the People’s Republic of China.”[257][258]

Syrian internet blackout

In an interview with Wired magazine, Edward Snowden said the Tailored Access Operations division accidentally caused Syria‘s internet blackout in 2012.[259]

Suspected responsibility for hacking operations by the Equation Group

The espionage group named the Equation Group, described by discoverers Kaspersky Labs as one of the most advanced (if not the most advanced) in the world as of 2015,[260]:31 and connected to over 500 malware infections in at least 42 countries over many years, is suspected of being a part of NSA.[261][262] The group’s known espionage methods have been documented to include interdiction (interception of legitimate CDs sent by a scientific conference organizer by mail),[260]:15 and the “unprecedented” ability to infect and be transmitted through the hard drive firmware of several of the major hard drive manufacturers, and create and use hidden disk areas and virtual disk systems for its purposes, a feat demanding access to the manufacturer’s source code of each to achieve.[260]:16–18 The methods used to deploy the tools demonstrated “surgical precision”, going so far as to exclude specific countries by IP and allow targeting of specific usernames on discussion forums.[260]:23–26 The techniques and knowledge used by the Equation Group are considered in summary to be “out of the reach of most advanced threat groups in the world except [this group].[260]:31

Software backdoors

Linux kernel

Linus Torvalds, the founder of Linux kernel, joked during a LinuxCon keynote on September 18, 2013 that the NSA, who are the founder of SELinux, wanted a backdoor in the kernel.[263] However, later, Linus’ father, a Member of the European Parliament (MEP), revealed that the NSA actually did this.[264]

When my oldest son [Linus Torvalds] was asked the same question: “Has he been approached by the NSA about backdoors?” he said “No”, but at the same time he nodded. Then he was sort of in the legal free. He had given the right answer, [but] everybody understood that the NSA had approached him.

— Nils Torvalds, LIBE Committee Inquiry on Electronic Mass Surveillance of EU Citizens – 11th Hearing, 11 November 2013[265]
Microsoft Windows
Main article: _NSAKEY

_NSAKEY was a variable name discovered in Microsoft‘s Windows NT 4 Service Pack 5 (which had been released unstripped of its symbolic debugging data) in August 1999 by Andrew D. Fernandes of Cryptonym Corporation. That variable contained a 1024-bit public key.

IBM Notes

IBM Notes was the first widely adopted software product to use public key cryptography for client–server and server–server authentication and for encryption of data. Until US laws regulating encryption were changed in 2000, IBM and Lotus were prohibited from exporting versions of Notes that supported symmetric encryption keys that were longer than 40 bits. In 1997, Lotus negotiated an agreement with the NSA that allowed export of a version that supported stronger keys with 64 bits, but 24 of the bits were encrypted with a special key and included in the message to provide a “workload reduction factor” for the NSA. This strengthened the protection for users of Notes outside the US against private-sector industrial espionage, but not against spying by the US government.[266][267]

Boomerang routing

While it is assumed that foreign transmissions terminating in the U.S. (such as a non-U.S. citizen accessing a U.S. website) subject non-U.S. citizens to NSA surveillance, recent research into boomerang routing has raised new concerns about the NSA’s ability to surveil the domestic Internet traffic of foreign countries.[18] Boomerang routing occurs when an Internet transmission that originates and terminates in a single country transits another. Research at the University of Toronto has suggested that approximately 25% of Canadian domestic traffic may be subject to NSA surveillance activities as a result of the boomerang routing of Canadian Internet service providers.[18]

Hardware implanting

Intercepted packages are opened carefully by NSA employees
A “load station” implanting a beacon

A document included in NSA files released with Glenn Greenwald‘s book No Place to Hide details how the agency’s Tailored Access Operations (TAO) and other NSA units gain access to hardware. They intercept routers, servers and other network hardware being shipped to organizations targeted for surveillance and install covert implant firmware onto them before they are delivered. This was described by an NSA manager as “some of the most productive operations in TAO because they preposition access points into hard target networks around the world.”[268]

Computers seized by the NSA due to interdiction are often modified with a physical device known as Cottonmouth.[269] Cottonmouth is a device that can be inserted in the USB port of a computer in order to establish remote access to the targeted machine. According to NSA’s Tailored Access Operations (TAO) group implant catalog, after implanting Cottonmouth, the NSA can establish Bridging (networking) “that allows the NSA to load exploit software onto modified computers as well as allowing the NSA to relay commands and data between hardware and software implants.”[270]

Role in scientific research and development

NSA has been involved in debates about public policy, both indirectly as a behind-the-scenes adviser to other departments, and directly during and after Vice Admiral Bobby Ray Inman‘s directorship. NSA was a major player in the debates of the 1990s regarding the export of cryptography in the United States. Restrictions on export were reduced but not eliminated in 1996.

Its secure government communications work has involved the NSA in numerous technology areas, including the design of specialized communications hardware and software, production of dedicated semiconductors (at the Ft. Meade chip fabrication plant), and advanced cryptography research. For 50 years, NSA designed and built most of its computer equipment in-house, but from the 1990s until about 2003 (when the U.S. Congress curtailed the practice), the agency contracted with the private sector in the fields of research and equipment.[271]

Data Encryption Standard

FROSTBURG was the NSA’s first supercomputer, used from 1991 to 1997

NSA was embroiled in some minor controversy concerning its involvement in the creation of the Data Encryption Standard (DES), a standard and public block cipher algorithm used by the U.S. government and banking community. During the development of DES by IBM in the 1970s, NSA recommended changes to some details of the design. There was suspicion that these changes had weakened the algorithm sufficiently to enable the agency to eavesdrop if required, including speculation that a critical component—the so-called S-boxes—had been altered to insert a “backdoor” and that the reduction in key length might have made it feasible for NSA to discover DES keys using massive computing power. It has since been observed that the S-boxes in DES are particularly resilient against differential cryptanalysis, a technique which was not publicly discovered until the late 1980s, but which was known to the IBM DES team.

The United States Senate Select Committee on Intelligence reviewed NSA’s involvement, and concluded that while the agency had provided some assistance, it had not tampered with the design.[272][273] In late 2009 NSA declassified information stating that “NSA worked closely with IBM to strengthen the algorithm against all except brute force attacks and to strengthen substitution tables, called S-boxes. Conversely, NSA tried to convince IBM to reduce the length of the key from 64 to 48 bits. Ultimately they compromised on a 56-bit key.”[274][275]

Advanced Encryption Standard

The involvement of NSA in the selection of a successor to Data Encryption Standard (DES), the Advanced Encryption Standard (AES), was limited to hardware performance testing (see AES competition).[276] NSA has subsequently certified AES for protection of classified information (for at most two levels, e.g. SECRET information in an unclassified environment[clarification needed]) when used in NSA-approved systems.[277]

NSA encryption systems

STU-III secure telephones on display at the National Cryptologic Museum

The NSA is responsible for the encryption-related components in these legacy systems:

  • FNBDT Future Narrow Band Digital Terminal[278]
  • KL-7 ADONIS off-line rotor encryption machine (post-WWII – 1980s)[279][280]
  • KW-26 ROMULUS electronic in-line teletypewriter encryptor (1960s–1980s)[281]
  • KW-37 JASON fleet broadcast encryptor (1960s–1990s)[280]
  • KY-57 VINSON tactical radio voice encryptor[281]
  • KG-84 Dedicated Data Encryption/Decryption[281]
  • STU-III secure telephone unit,[281] phased out by the STE[282]

The NSA oversees encryption in following systems which are in use today:

The NSA has specified Suite A and Suite B cryptographic algorithm suites to be used in U.S. government systems; the Suite B algorithms are a subset of those previously specified by NIST and are expected to serve for most information protection purposes, while the Suite A algorithms are secret and are intended for especially high levels of protection.[277]

SHA

The widely used SHA-1 and SHA-2 hash functions were designed by NSA. SHA-1 is a slight modification of the weaker SHA-0 algorithm, also designed by NSA in 1993. This small modification was suggested by NSA two years later, with no justification other than the fact that it provides additional security. An attack for SHA-0 that does not apply to the revised algorithm was indeed found between 1998 and 2005 by academic cryptographers. Because of weaknesses and key length restrictions in SHA-1, NIST deprecates its use for digital signatures, and approves only the newer SHA-2 algorithms for such applications from 2013 on.[287]

A new hash standard, SHA-3, has recently been selected through the competition concluded October 2, 2012 with the selection of Keccak as the algorithm. The process to select SHA-3 was similar to the one held in choosing the AES, but some doubts have been cast over it,[288][289] since fundamental modifications have been made to Keccak in order to turn it into a standard.[290] These changes potentially undermine the cryptanalysis performed during the competition and reduce the security levels of the algorithm.[288]

Dual_EC_DRBG random number generator

Main article: Dual_EC_DRBG

NSA promoted the inclusion of a random number generator called Dual_EC_DRBG in the U.S. National Institute of Standards and Technology‘s 2007 guidelines. This led to speculation of a backdoor which would allow NSA access to data encrypted by systems using that pseudo random number generator.[291]

This is now deemed to be plausible based on the fact that the output of the next iterations of the PRNG can provably be determined if the relation between two internal elliptic curve points is known.[292][293] Both NIST and RSA are now officially recommending against the use of this PRNG.[294][295]

Clipper chip

Main article: Clipper chip

Because of concerns that widespread use of strong cryptography would hamper government use of wiretaps, NSA proposed the concept of key escrow in 1993 and introduced the Clipper chip that would offer stronger protection than DES but would allow access to encrypted data by authorized law enforcement officials.[296] The proposal was strongly opposed and key escrow requirements ultimately went nowhere.[297] However, NSA’s Fortezza hardware-based encryption cards, created for the Clipper project, are still used within government, and NSA ultimately declassified and published the design of the Skipjack cipher used on the cards.[298][299]

Perfect Citizen

Main article: Perfect Citizen

Perfect Citizen is a program to perform vulnerability assessment by the NSA on U.S. critical infrastructure.[300][301] It was originally reported to be a program to develop a system of sensors to detect cyber attacks on critical infrastructure computer networks in both the private and public sector through a network monitoring system named Einstein.[302][303] It is funded by the Comprehensive National Cybersecurity Initiative and thus far Raytheon has received a contract for up to $100 million for the initial stage.

Academic research

NSA has invested many millions of dollars in academic research under grant code prefix MDA904, resulting in over 3,000 papers (as of 2007-10-11). NSA/CSS has, at times, attempted to restrict the publication of academic research into cryptography; for example, the Khufu and Khafre block ciphers were voluntarily withheld in response to an NSA request to do so. In response to a FOIA lawsuit, in 2013 the NSA released the 643-page research paper titled, “Untangling the Web: A Guide to Internet Research,[304] ” written and compiled by NSA employees to assist other NSA workers in searching for information of interest to the agency on the public Internet.[305]

Patents

NSA has the ability to file for a patent from the U.S. Patent and Trademark Office under gag order. Unlike normal patents, these are not revealed to the public and do not expire. However, if the Patent Office receives an application for an identical patent from a third party, they will reveal NSA’s patent and officially grant it to NSA for the full term on that date.[306]

One of NSA’s published patents describes a method of geographically locating an individual computer site in an Internet-like network, based on the latency of multiple network connections.[307] Although no public patent exists, NSA is reported to have used a similar locating technology called trilateralization that allows real-time tracking of an individual’s location, including altitude from ground level, using data obtained from cellphone towers.[308]

Legality

File:Ron Wyden and James Clapper - 12 March 2013.webm

Excerpt of James Clapper‘s false testimony to Congress on NSA surveillance programs

In the United States, at least since 2001,[309] there has been legal controversy over what signal intelligence can be used for and how much freedom the National Security Agency has to use signal intelligence.[310] The government has made, in 2015, slight changes in how it uses and collects certain types of data,[311] specifically phone records. President Barack Obama has asked lawyers and his national security team to look at the tactics that are being used by the NSA. President Obama made a speech on January 17, 2014 where he defended the national security measures, including the NSA, and their intentions for keeping the country safe through surveillance. He said that it is difficult to determine where the line should be drawn between what is too much surveillance and how much is needed for national security because technology is ever changing and evolving. Therefore, the laws cannot keep up with the rapid advancements.

President Obama did make some changes to national security regulations and how much data can be collected and surveyed.[citation needed] The first thing he added, was more presidential directive and oversight so that privacy and basic rights are not violated. The president would look over requests on behalf of American citizens to make sure that their personal privacy is not violated by the data that is being requested. Secondly, surveillance tactics and procedures are becoming more public, including over 40 rulings of the FISC that have been declassified.[citation needed] Thirdly, further protections are being placed on activities that are justified under Section 702, such as the ability to retain, search and use data collected in investigations, which allows the NSA to monitor and intercept interaction of targets overseas. Finally, national security letters, which are secret requests for information that the FBI uses in their investigations, are becoming less secretive. The secrecy of the information requested will not be indefinite and will terminate after a set time if future secrecy is not required.[citation needed] Concerning the bulk surveillance of American’s phone records, President Obama also ordered a transition from bulk surveillance under Section 215 to a new policy that will eliminate unnecessary bulk collection of metadata.

As of May 7, 2015, the U.S. Court of Appeals for the Second Circuit ruled that the interpretation of Section 215 of the Patriot Act was wrong and that the NSA program that has been collecting Americans’ phone records in bulk is illegal.[312] It stated that Section 215 cannot be clearly interpreted to allow government to collect national phone data and, as a result, expired on June 1, 2015. This ruling “is the first time a higher-level court in the regular judicial system has reviewed the N.S.A. phone records program.” [313] The new bill getting passed later in May taking its place is known as the U.S.A. Freedom Act, which will enable the NSA to continue hunting for terrorists by analyzing telephone links between callers but “keep the bulk phone records in the hands of phone companies.”[313] This would give phone companies the freedom to dispose the records in an 18-month period. The White House argued that this new ruling validated President Obama’s support of the government being extracted from bulk data collection and giving power to the telecommunications companies.

Previously, the NSA paid billions of dollars to telecommunications companies in order to collect data from them.[314] While companies such as Google and Yahoo! claim that they do not provide “direct access” from their servers to the NSA unless under a court order,[315] the NSA had access to emails, phone calls and cellular data users.[316] With this new ruling, telecommunications companies would not provide the NSA with bulk information. The companies would allow the disposal of data in every 18 months,[313] which is arguably putting the telecommunications companies at a higher advantage.

This ruling made the collecting of phone records illegal, but it did not rule on Section 215’s constitutionality. Senate Majority Leader Mitch McConnell has already put forth a new bill to re-authorize the Patriot Act.[317] Defenders of this surveillance program are claiming that judges who sit on the Foreign Intelligence Surveillance Court (FISC) had ruled 37 times that this kind of collection of data is, in fact, lawful.[317] The FISC is the court specifically mandated to grant surveillance orders in the name of foreign intelligence. The new ruling made by the Second District Court of Appeals now retroactively dismisses the findings of the FISC on this program.

See also

https://en.wikipedia.org/wiki/National_Security_Agency

The Pronk Pops Show Podcasts Portfolio

Listen To Pronk Pops Podcast or Download Shows 857

Listen To Pronk Pops Podcast or Download Shows 850-856

Listen To Pronk Pops Podcast or Download Shows 845-849

Listen To Pronk Pops Podcast or Download Shows 840-844

Listen To Pronk Pops Podcast or Download Shows 833-839

Listen To Pronk Pops Podcast or Download Shows 827-832

Listen To Pronk Pops Podcast or Download Shows 821-826

Listen To Pronk Pops Podcast or Download Shows 815-820

Listen To Pronk Pops Podcast or Download Shows 806-814

Listen To Pronk Pops Podcast or Download Shows 800-805

Listen To Pronk Pops Podcast or Download Shows 793-799

Listen To Pronk Pops Podcast or Download Shows 785-792

Listen To Pronk Pops Podcast or Download Shows 777-784

Listen To Pronk Pops Podcast or Download Shows 769-776

Listen To Pronk Pops Podcast or Download Shows 759-768

Listen To Pronk Pops Podcast or Download Shows 751-758

Listen To Pronk Pops Podcast or Download Shows 745-750

Listen To Pronk Pops Podcast or Download Shows 738-744

Listen To Pronk Pops Podcast or Download Shows 732-737

Listen To Pronk Pops Podcast or Download Shows 727-731

Listen To Pronk Pops Podcast or Download Shows 720-726

Listen To Pronk Pops Podcast or DownloadShows 713-719

Listen To Pronk Pops Podcast or DownloadShows 705-712

Listen To Pronk Pops Podcast or Download Shows 695-704

Listen To Pronk Pops Podcast or Download Shows 685-694

Listen To Pronk Pops Podcast or Download Shows 675-684

Listen To Pronk Pops Podcast or Download Shows 668-674

Listen To Pronk Pops Podcast or Download Shows 660-667

Listen To Pronk Pops Podcast or Download Shows 651-659

Listen To Pronk Pops Podcast or Download Shows 644-650

Listen To Pronk Pops Podcast or Download Shows 637-643

Listen To Pronk Pops Podcast or Download Shows 629-636

Listen To Pronk Pops Podcast or Download Shows 617-628

Listen To Pronk Pops Podcast or Download Shows 608-616

Listen To Pronk Pops Podcast or Download Shows 599-607

Listen To Pronk Pops Podcast or Download Shows 590-598

Listen To Pronk Pops Podcast or Download Shows 585- 589

Listen To Pronk Pops Podcast or Download Shows 575-584

Listen To Pronk Pops Podcast or Download Shows 565-574

Listen To Pronk Pops Podcast or Download Shows 556-564

Listen To Pronk Pops Podcast or Download Shows 546-555

Listen To Pronk Pops Podcast or Download Shows 538-545

Listen To Pronk Pops Podcast or Download Shows 532-537

Listen To Pronk Pops Podcast or Download Shows 526-531

Listen To Pronk Pops Podcast or Download Shows 519-525

Listen To Pronk Pops Podcast or Download Shows 510-518

Listen To Pronk Pops Podcast or Download Shows 500-509

Listen To Pronk Pops Podcast or Download Shows 490-499

Listen To Pronk Pops Podcast or Download Shows 480-489

Listen To Pronk Pops Podcast or Download Shows 473-479

Listen To Pronk Pops Podcast or Download Shows 464-472

Listen To Pronk Pops Podcast or Download Shows 455-463

Listen To Pronk Pops Podcast or Download Shows 447-454

Listen To Pronk Pops Podcast or Download Shows 439-446

Listen To Pronk Pops Podcast or Download Shows 431-438

Listen To Pronk Pops Podcast or Download Shows 422-430

Listen To Pronk Pops Podcast or Download Shows 414-421

Listen To Pronk Pops Podcast or Download Shows 408-413

Listen To Pronk Pops Podcast or Download Shows 400-407

Listen To Pronk Pops Podcast or Download Shows 391-399

Listen To Pronk Pops Podcast or Download Shows 383-390

Listen To Pronk Pops Podcast or Download Shows 376-382

Listen To Pronk Pops Podcast or Download Shows 369-375

Listen To Pronk Pops Podcast or Download Shows 360-368

Listen To Pronk Pops Podcast or Download Shows 354-359

Listen To Pronk Pops Podcast or Download Shows 346-353

Listen To Pronk Pops Podcast or Download Shows 338-345

Listen To Pronk Pops Podcast or Download Shows 328-337

Listen To Pronk Pops Podcast or Download Shows 319-327

Listen To Pronk Pops Podcast or Download Shows 307-318

Listen To Pronk Pops Podcast or Download Shows 296-306

Listen To Pronk Pops Podcast or Download Shows 287-295

Listen To Pronk Pops Podcast or Download Shows 277-286

Listen To Pronk Pops Podcast or Download Shows 264-276

Listen To Pronk Pops Podcast or Download Shows 250-263

Listen To Pronk Pops Podcast or Download Shows 236-249

Listen To Pronk Pops Podcast or Download Shows 222-235

Listen To Pronk Pops Podcast or Download Shows 211-221

Listen To Pronk Pops Podcast or Download Shows 202-210

Listen To Pronk Pops Podcast or Download Shows 194-201

Listen To Pronk Pops Podcast or Download Shows 184-193

Listen To Pronk Pops Podcast or Download Shows 174-183

Listen To Pronk Pops Podcast or Download Shows 165-173

Listen To Pronk Pops Podcast or Download Shows 158-164

Listen To Pronk Pops Podcast or Download Shows151-157

Listen To Pronk Pops Podcast or Download Shows 143-150

Listen To Pronk Pops Podcast or Download Shows 135-142

Listen To Pronk Pops Podcast or Download Shows 131-134

Listen To Pronk Pops Podcast or Download Shows 124-130

Listen To Pronk Pops Podcast or Download Shows 121-123

Listen To Pronk Pops Podcast or Download Shows 118-120

Listen To Pronk Pops Podcast or Download Shows 113 -117

Listen To Pronk Pops Podcast or Download Show 112

Listen To Pronk Pops Podcast or Download Shows 108-111

Listen To Pronk Pops Podcast or Download Shows 106-108

Listen To Pronk Pops Podcast or Download Shows 104-105

Listen To Pronk Pops Podcast or Download Shows 101-103

Listen To Pronk Pops Podcast or Download Shows 98-100

Listen To Pronk Pops Podcast or Download Shows 94-97

Listen To Pronk Pops Podcast or Download Show 93

Listen To Pronk Pops Podcast or Download Show 92

Listen To Pronk Pops Podcast or Download Show 91

Listen To Pronk Pops Podcast or Download Shows 88-90

Listen To Pronk Pops Podcast or Download Shows 84-87

Listen To Pronk Pops Podcast or Download Shows 79-83

Listen To Pronk Pops Podcast or Download Shows 74-78

Listen To Pronk Pops Podcast or Download Shows 71-73

Listen To Pronk Pops Podcast or Download Shows 68-70

Listen To Pronk Pops Podcast or Download Shows 65-67

Listen To Pronk Pops Podcast or Download Shows 62-64

Listen To Pronk Pops Podcast or Download Shows 58-61

Listen To Pronk Pops Podcast or Download Shows 55-57

Listen To Pronk Pops Podcast or Download Shows 52-54

Listen To Pronk Pops Podcast or Download Shows 49-51

Listen To Pronk Pops Podcast or Download Shows 45-48

Listen To Pronk Pops Podcast or Download Shows 41-44

Listen To Pronk Pops Podcast or Download Shows 38-40

Listen To Pronk Pops Podcast or Download Shows 34-37

Listen To Pronk Pops Podcast or Download Shows 30-33

Listen To Pronk Pops Podcast or Download Shows 27-29

Listen To Pronk Pops Podcast or Download Shows 17-26

Listen To Pronk Pops Podcast or Download Shows 16-22

Listen To Pronk Pops Podcast or Download Shows 10-15

Listen To Pronk Pops Podcast or Download Shows 1-9

Read Full Post | Make a Comment ( None so far )

The Pronk Pops Show 840, February 16, 2017, Story 1: President Trump’s First Press Conference Part 1: President Trump Speaks Directly To The American People — Videos — Story 2: President Trump Educates The Big Lie Media (Democratic Newspapers and Television Networks) with Fake News Spinning Propaganda — Videos

Posted on February 16, 2017. Filed under: American History, Benghazi, Blogroll, Bombs, Breaking News, British Pound, Budgetary Policy, Business, City, College, Communications, Constitutional Law, Corruption, Countries, Crime, Cruise Missiles, Currencies, Defense Spending, Donald J. Trump, Donald Trump, Donald Trump, Drones, Drugs, Economics, Education, Elections, Empires, Employment, Energy, Environment, Euro, Federal Government, Fiscal Policy, Foreign Policy, Free Trade, Freedom of Speech, Gangs, Government, Government Dependency, Government Spending, Health, Health Care, Health Care Insurance, High Crimes, Hillary Clinton, Hillary Clinton, Hillary Clinton, History, Housing, Human, Human Behavior, Illegal Drugs, Illegal Immigration, Illegal Immigration, Immigration, Impeachment, Independence, Insurance, Investments, Iran Nuclear Weapons Deal, IRS, Israel, Labor Economics, Language, Law, Legal Drugs, Legal Immigration, Life, Lying, Media, Medicare, Medicine, Monetary Policy, Networking, News, Obama, Philosophy, Photos, Politics, Polls, President Barack Obama, President Trump, Presidential Appointments, Prime Minister, Private Sector Unions, Progressives, Public Sector Unions, Radio, Raymond Thomas Pronk, Regulation, Resources, Scandals, Security, Senator Jeff Sessions, Social Science, Social Security, Spying, Success, Tax Policy, Taxation, Taxes, Technology, Terror, Terrorism, Trade Policy, Transportation, U.S. Dollar, Unemployment, Unions, United States of America, Videos, Violence, War, Wealth, Weapons, Weather, Welfare Spending, Wisdom | Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , |

Project_1

The Pronk Pops Show Podcasts

Pronk Pops Show 840: February 16, 2017

Pronk Pops Show 839: February 15, 2017

Pronk Pops Show 838: February 14, 2017

Pronk Pops Show 837: February 13, 2017

Pronk Pops Show 836: February 10, 2017

Pronk Pops Show 835: February 9, 2017

Pronk Pops Show 834: February 8, 2017

Pronk Pops Show 833: February 7, 2017

Pronk Pops Show 832: February 6, 2017

Pronk Pops Show 831: February 3, 2017

Pronk Pops Show 830: February 2, 2017

Pronk Pops Show 829: February 1, 2017

Pronk Pops Show 828: January 31, 2017

Pronk Pops Show 827: January 30, 2017

Pronk Pops Show 826: January 27, 2017 

Pronk Pops Show 825: January 26, 2017

Pronk Pops Show 824: January 25, 2017 

Pronk Pops Show 823: January 24, 2017

Pronk Pops Show 822: January 23, 2017

Pronk Pops Show 821: January 20, 2017

Pronk Pops Show 820: January 19, 2017

Pronk Pops Show 819: January 18, 2017

Pronk Pops Show 818: January 17, 2017

Pronk Pops Show 817: January 13, 2017

Pronk Pops Show 816: January 12, 2017

Pronk Pops Show 815: January 11, 2017

Pronk Pops Show 814: January 10,  2017

Pronk Pops Show 813: January 9, 2017

Pronk Pops Show 812: December 12, 2016

Pronk Pops Show 811: December 9, 2016

Pronk Pops Show 810: December 8, 2016

Pronk Pops Show 809: December 7, 2016

Pronk Pops Show 808: December 6, 2016

Pronk Pops Show 807: December 5, 2016

Pronk Pops Show 806: December 2, 2016

Pronk Pops Show 805: December 1, 2016

Pronk Pops Show 804: November 30, 2016

Pronk Pops Show 803: November 29, 2016

Pronk Pops Show 802: November 28, 2016

Pronk Pops Show 801: November 22, 2016

Pronk Pops Show 800: November 21, 2016

Pronk Pops Show 799: November 18, 2016

Pronk Pops Show 798: November 17, 2016

Pronk Pops Show 797: November 16, 2016

Pronk Pops Show 796: November 15, 2016

Pronk Pops Show 795: November 14, 2016

Pronk Pops Show 794: November 10, 2016

Pronk Pops Show 793: November 9, 2016

Pronk Pops Show 792: November 8, 2016

Pronk Pops Show 791: November 7, 2016

Pronk Pops Show 790: November 4, 2016

Pronk Pops Show 789: November 3, 2016

Pronk Pops Show 788: November 2, 2016

 Story 1: President Trump’s First Press Conference Part 1: President Trump Speaks Directly To The American People — Videos — 

Image result for cartoons president trump press conference

Image result for cartoons president trump press conference

Image result for cartoons president trump press conference

Image result for cartoons 2017 branco president trump press conference

Image result for cartoons president trump press conference

Image result for cartoons 2017 branco president trump press conference

Image result for cartoons 2017 branco president trump press conference

President Donald Trump Full Press Conference Addresses Ties to Russia, Leaks, and “Fake News” 2/16

President Trump scolds media at news conference

Trump to news media: The public doesn’t believe you anymore

President dismisses negative reporting in a media massacre

Rush Limbaugh Podcast 2/16/17 | Trump blasts ‘out of control’ media, defends agenda, administration

Laura Ingraham Show 2/16/17 | Media freaks out as some come to the conclusion that Flynn

Trump Says General Flynn Did Nothing Wrong

Tucker Carlson Tonight & Hannity Special – 2/16/2017 Donald Trump, Paul Ryan, Netanyahu Interview

Scott Pelley: Trump’s “bluster, bravado, exaggeration” on display at news conference

John Dickerson on Beltway’s reaction to Trump’s press conference

Is The Intelligence Community At War With Trump?

Roger Stone Panicked Left Launching Civil War

Story 2: President Trump Educates The Big Lie Media (Democratic Newspapers and Television Networks) with Fake News Spinning Propaganda — Videos

Trump boasts approval rating, attacks media

President Trump scolds media at news conference

President Trump criticizes administration coverage

Sorry media — this press conference played very different with Trump’s supporters

February 16, 2017 | 6:55pm |

 Far from dead, he was positively exuberant. His performance at a marathon press conference was a must-see-tv spectacle as he mixed serious policy talk with stand-up comedy and took repeated pleasure in whacking his favorite pinata, the “dishonest media.”

“Russia is a ruse,” he insisted, before finally saying under questioning he was not aware of anyone on his campaign having contact with Russian officials.

Trump’s detractors immediately panned the show as madness, but they missed the method behind it and proved they still don’t understand his appeal. Facing his first crisis in the Oval Office, he was unbowed in demonstrating his bare-knuckled intention to fight back.

He did it his way. Certainly no other president, and few politicians at any level in any time, would dare put on a show like that.

In front of cameras, and using the assembled press corps as props, he conducted a televised revival meeting to remind his supporters that he is still the man they elected. Ticking off a lengthy list of executive orders and other actions he has taken, he displayed serious fealty to his campaign promises.

Trump goes on marathon rant against the media

Sure, sentences didn’t always end on the same topic they started with, and his claim to have won the election by the largest electoral college margin since Ronald Reagan wasn’t close to true.

Fair points, but so what? Fact-checkers didn’t elect him, nor did voters who were happy with the status quo.

Trump, first, last and always, matches the mood of the discontented. Like them, he is a bull looking for a china shop. That’s his ace in the hole and he played it almost to perfection.

The immediate impact of his performance is likely to calm some of the jitters among Republicans in congress and supporters elsewhere, especially after the beating he took in the last few days.

On Monday night, Trump suddenly removed Gen. Michael Flynn, his national security adviser, over circumstances that still are not entirely clear. And on Wednesday, his nominee for Secretary of Labor, Andrew Puzder, withdrew after Republicans said he didn’t have the votes to be confirmed.

Combined with courts blocking his immigration and refugee order, unflattering leaks of confidential material from intelligence agencies and numerous demands for investigations into any Russian connections, Trump’s fast start suddenly hit a wall.

Just three weeks into his term, Democrats, in and out of the media, smelled blood. Many already were going for the kill.

They won’t get it, at least now. Trump bought himself time yesterday.

Yet those determined to bring him down won’t give up, and the insidious leaks of secret material suggest some opponents are members of the permanent government who are willing to use their position and the media to undermine him.

Indeed, the most serious leaks seem to vindicate a warning that Democratic Sen. Chuck Schumer made in early January after Trump criticized leaders of the spook agencies.

“Let me tell you, you take on the intelligence community, they have six ways from Sunday at getting back at you,” Schumer told an interviewer. “So even for a practical, supposedly hard-nosed businessman, he’s being really dumb to do this.”

That incredible statement reflects what a dangerous game rogue agents are playing. The world is on fire yet the president is the target of partisan revenge in his own government. It’s a scandal and it’s outrageous, but it’s a fact that Trump must confront.

Finding the leakers and prosecuting them, which he promises to do, is part of the solution.

rAnother part comes Saturday, when Trump takes his solo act to Florida for a massive public rally. It’s smart for him to get out of Washington and soak in the enthusiasm of the populist movement he leads.

He should do it regularly, and also hold smaller, town-hall style forums where ordinary citizens can ask him questions in more intimate settings. Any way he can speak directly to the American people and hear from them democratizes his presidency and reduces the power of big biased media and the Washington establishment.

Yet the only sure and lasting way to keep ahead of the lynch mob is by producing results. Success will be Trump’s savior.

And nothing says success like jobs, jobs, jobs. Getting the economy to reach lift-off speed is essential so it can deliver the good-paying jobs and prosperity that he promised and the nation needs.

While Republican honchos in congress say they’re getting ready to move on tax cuts and replacing ObamaCare, nothing will happen without presidential leadership. That means Trump’s fate is in his own hands and he must keep himself and his White House team focused on delivering an economic revival.

If he does that, the lynch mob will be left holding an empty rope.

http://nypost.com/2017/02/16/sorry-media-this-press-conference-played-very-different-with-trumps-supporters/

The Pronk Pops Show Podcasts Portfolio

Listen To Pronk Pops Podcast or Download Shows 840

Listen To Pronk Pops Podcast or Download Shows 833-839

Listen To Pronk Pops Podcast or Download Shows 827-832

Listen To Pronk Pops Podcast or Download Shows 821-826

Listen To Pronk Pops Podcast or Download Shows 815-820

Listen To Pronk Pops Podcast or Download Shows 806-814

Listen To Pronk Pops Podcast or Download Shows 800-805

Listen To Pronk Pops Podcast or Download Shows 793-799

Listen To Pronk Pops Podcast or Download Shows 785-792

Listen To Pronk Pops Podcast or Download Shows 777-784

Listen To Pronk Pops Podcast or Download Shows 769-776

Listen To Pronk Pops Podcast or Download Shows 759-768

Listen To Pronk Pops Podcast or Download Shows 751-758

Listen To Pronk Pops Podcast or Download Shows 745-750

Listen To Pronk Pops Podcast or Download Shows 738-744

Listen To Pronk Pops Podcast or Download Shows 732-737

Listen To Pronk Pops Podcast or Download Shows 727-731

Listen To Pronk Pops Podcast or Download Shows 720-726

Listen To Pronk Pops Podcast or DownloadShows 713-719

Listen To Pronk Pops Podcast or DownloadShows 705-712

Listen To Pronk Pops Podcast or Download Shows 695-704

Listen To Pronk Pops Podcast or Download Shows 685-694

Listen To Pronk Pops Podcast or Download Shows 675-684

Listen To Pronk Pops Podcast or Download Shows 668-674

Listen To Pronk Pops Podcast or Download Shows 660-667

Listen To Pronk Pops Podcast or Download Shows 651-659

Listen To Pronk Pops Podcast or Download Shows 644-650

Listen To Pronk Pops Podcast or Download Shows 637-643

Listen To Pronk Pops Podcast or Download Shows 629-636

Listen To Pronk Pops Podcast or Download Shows 617-628

Listen To Pronk Pops Podcast or Download Shows 608-616

Listen To Pronk Pops Podcast or Download Shows 599-607

Listen To Pronk Pops Podcast or Download Shows 590-598

Listen To Pronk Pops Podcast or Download Shows 585- 589

Listen To Pronk Pops Podcast or Download Shows 575-584

Listen To Pronk Pops Podcast or Download Shows 565-574

Listen To Pronk Pops Podcast or Download Shows 556-564

Listen To Pronk Pops Podcast or Download Shows 546-555

Listen To Pronk Pops Podcast or Download Shows 538-545

Listen To Pronk Pops Podcast or Download Shows 532-537

Listen To Pronk Pops Podcast or Download Shows 526-531

Listen To Pronk Pops Podcast or Download Shows 519-525

Listen To Pronk Pops Podcast or Download Shows 510-518

Listen To Pronk Pops Podcast or Download Shows 500-509

Listen To Pronk Pops Podcast or Download Shows 490-499

Listen To Pronk Pops Podcast or Download Shows 480-489

Listen To Pronk Pops Podcast or Download Shows 473-479

Listen To Pronk Pops Podcast or Download Shows 464-472

Listen To Pronk Pops Podcast or Download Shows 455-463

Listen To Pronk Pops Podcast or Download Shows 447-454

Listen To Pronk Pops Podcast or Download Shows 439-446

Listen To Pronk Pops Podcast or Download Shows 431-438

Listen To Pronk Pops Podcast or Download Shows 422-430

Listen To Pronk Pops Podcast or Download Shows 414-421

Listen To Pronk Pops Podcast or Download Shows 408-413

Listen To Pronk Pops Podcast or Download Shows 400-407

Listen To Pronk Pops Podcast or Download Shows 391-399

Listen To Pronk Pops Podcast or Download Shows 383-390

Listen To Pronk Pops Podcast or Download Shows 376-382

Listen To Pronk Pops Podcast or Download Shows 369-375

Listen To Pronk Pops Podcast or Download Shows 360-368

Listen To Pronk Pops Podcast or Download Shows 354-359

Listen To Pronk Pops Podcast or Download Shows 346-353

Listen To Pronk Pops Podcast or Download Shows 338-345

Listen To Pronk Pops Podcast or Download Shows 328-337

Listen To Pronk Pops Podcast or Download Shows 319-327

Listen To Pronk Pops Podcast or Download Shows 307-318

Listen To Pronk Pops Podcast or Download Shows 296-306

Listen To Pronk Pops Podcast or Download Shows 287-295

Listen To Pronk Pops Podcast or Download Shows 277-286

Listen To Pronk Pops Podcast or Download Shows 264-276

Listen To Pronk Pops Podcast or Download Shows 250-263

Listen To Pronk Pops Podcast or Download Shows 236-249

Listen To Pronk Pops Podcast or Download Shows 222-235

Listen To Pronk Pops Podcast or Download Shows 211-221

Listen To Pronk Pops Podcast or Download Shows 202-210

Listen To Pronk Pops Podcast or Download Shows 194-201

Listen To Pronk Pops Podcast or Download Shows 184-193

Listen To Pronk Pops Podcast or Download Shows 174-183

Listen To Pronk Pops Podcast or Download Shows 165-173

Listen To Pronk Pops Podcast or Download Shows 158-164

Listen To Pronk Pops Podcast or Download Shows151-157

Listen To Pronk Pops Podcast or Download Shows 143-150

Listen To Pronk Pops Podcast or Download Shows 135-142

Listen To Pronk Pops Podcast or Download Shows 131-134

Listen To Pronk Pops Podcast or Download Shows 124-130

Listen To Pronk Pops Podcast or Download Shows 121-123

Listen To Pronk Pops Podcast or Download Shows 118-120

Listen To Pronk Pops Podcast or Download Shows 113 -117

Listen To Pronk Pops Podcast or Download Show 112

Listen To Pronk Pops Podcast or Download Shows 108-111

Listen To Pronk Pops Podcast or Download Shows 106-108

Listen To Pronk Pops Podcast or Download Shows 104-105

Listen To Pronk Pops Podcast or Download Shows 101-103

Listen To Pronk Pops Podcast or Download Shows 98-100

Listen To Pronk Pops Podcast or Download Shows 94-97

Listen To Pronk Pops Podcast or Download Show 93

Listen To Pronk Pops Podcast or Download Show 92

Listen To Pronk Pops Podcast or Download Show 91

Listen To Pronk Pops Podcast or Download Shows 88-90

Listen To Pronk Pops Podcast or Download Shows 84-87

Listen To Pronk Pops Podcast or Download Shows 79-83

Listen To Pronk Pops Podcast or Download Shows 74-78

Listen To Pronk Pops Podcast or Download Shows 71-73

Listen To Pronk Pops Podcast or Download Shows 68-70

Listen To Pronk Pops Podcast or Download Shows 65-67

Listen To Pronk Pops Podcast or Download Shows 62-64

Listen To Pronk Pops Podcast or Download Shows 58-61

Listen To Pronk Pops Podcast or Download Shows 55-57

Listen To Pronk Pops Podcast or Download Shows 52-54

Listen To Pronk Pops Podcast or Download Shows 49-51

Listen To Pronk Pops Podcast or Download Shows 45-48

Listen To Pronk Pops Podcast or Download Shows 41-44

Listen To Pronk Pops Podcast or Download Shows 38-40

Listen To Pronk Pops Podcast or Download Shows 34-37

Listen To Pronk Pops Podcast or Download Shows 30-33

Listen To Pronk Pops Podcast or Download Shows 27-29

Listen To Pronk Pops Podcast or Download Shows 17-26

Listen To Pronk Pops Podcast or Download Shows 16-22

Listen To Pronk Pops Podcast or Download Shows 10-15

Listen To Pronk Pops Podcast or Download Shows 1-9

Read Full Post | Make a Comment ( None so far )

The Pronk Pops Show 839, February 15, 2017, Story 1: Time To Stop Leaking by Government Employees By Setting A Example That Nobody Is Above The Law — Appoint A Special Prosecutor For The Many National Security and Public Corruption Crimes of Hillary Clinton and Staff — Trump Supporters Waiting For President Trump To Keep His Promise — Videos — Story 2: Eli Lake on The Political Assassination of NSA Mike Flynn and FBI Questioned Former National Security Advisory Mike Flynn — Videos — Story 3: President Trump Likes Whatever Israel and Palestine Want Regarding a Two State Solution

Posted on February 15, 2017. Filed under: American History, Benghazi, Blogroll, Breaking News, Bribery, Budgetary Policy, Coal, Coal, Communications, Congress, Constitutional Law, Corruption, Countries, Crime, Culture, Disasters, Donald J. Trump, Donald J. Trump, Donald Trump, Donald Trump, Economics, Empires, Energy, Fiscal Policy, Foreign Policy, Fourth Amendment, Free Trade, Freedom of Speech, Government, Government Spending, High Crimes, Hillary Clinton, Hillary Clinton, History, Homicide, House of Representatives, Human, Human Behavior, Impeachment, Islamic Republic of Iran, Islamic State, Israel, Labor Economics, Language, Law, Life, Lying, Media, Monetary Policy, National Security Agency, Natural Gas, Natural Gas, News, Nuclear, Nuclear Weapons, Obama, Oil, Oil, Philosophy, Photos, Politics, Polls, President Barack Obama, President Trump, Presidential Appointments, Prime Minister, Progressives, Radio, Raymond Thomas Pronk, Regulation, Resources, Rule of Law, Scandals, Security, Senate, Senator Jeff Sessions, Tax Policy, Taxation, Taxes, Terror, Terrorism, Trade Policy, United States Constitution, United States of America, Videos, Violence, War, Wealth, Weapons, Welfare Spending, Wisdom | Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , |

Project_1

The Pronk Pops Show Podcasts

Pronk Pops Show 839: February 15, 2017

Pronk Pops Show 838: February 14, 2017

Pronk Pops Show 837: February 13, 2017

Pronk Pops Show 836: February 10, 2017

Pronk Pops Show 835: February 9, 2017

Pronk Pops Show 834: February 8, 2017

Pronk Pops Show 833: February 7, 2017

Pronk Pops Show 832: February 6, 2017

Pronk Pops Show 831: February 3, 2017

Pronk Pops Show 830: February 2, 2017

Pronk Pops Show 829: February 1, 2017

Pronk Pops Show 828: January 31, 2017

Pronk Pops Show 827: January 30, 2017

Pronk Pops Show 826: January 27, 2017 

Pronk Pops Show 825: January 26, 2017

Pronk Pops Show 824: January 25, 2017 

Pronk Pops Show 823: January 24, 2017

Pronk Pops Show 822: January 23, 2017

Pronk Pops Show 821: January 20, 2017

Pronk Pops Show 820: January 19, 2017

Pronk Pops Show 819: January 18, 2017

Pronk Pops Show 818: January 17, 2017

Pronk Pops Show 817: January 13, 2017

Pronk Pops Show 816: January 12, 2017

Pronk Pops Show 815: January 11, 2017

Pronk Pops Show 814: January 10,  2017

Pronk Pops Show 813: January 9, 2017

Pronk Pops Show 812: December 12, 2016

Pronk Pops Show 811: December 9, 2016

Pronk Pops Show 810: December 8, 2016

Pronk Pops Show 809: December 7, 2016

Pronk Pops Show 808: December 6, 2016

Pronk Pops Show 807: December 5, 2016

Pronk Pops Show 806: December 2, 2016

Pronk Pops Show 805: December 1, 2016

Pronk Pops Show 804: November 30, 2016

Pronk Pops Show 803: November 29, 2016

Pronk Pops Show 802: November 28, 2016

Pronk Pops Show 801: November 22, 2016

Pronk Pops Show 800: November 21, 2016

Pronk Pops Show 799: November 18, 2016

Pronk Pops Show 798: November 17, 2016

Pronk Pops Show 797: November 16, 2016

Pronk Pops Show 796: November 15, 2016

Pronk Pops Show 795: November 14, 2016

Pronk Pops Show 794: November 10, 2016

Pronk Pops Show 793: November 9, 2016

Pronk Pops Show 792: November 8, 2016

Pronk Pops Show 791: November 7, 2016

Pronk Pops Show 790: November 4, 2016

Pronk Pops Show 789: November 3, 2016

Pronk Pops Show 788: November 2, 2016

 

Story 1: Time To Stop Leaking by Government Employees By Setting An Example That Nobody Is Above The Law — Appoint A Special Prosecutor For The Many National Security and Public Corruption Crimes of Hillary Clinton and Other Government Employees — Videos —

Trump vows to get special prosecutor to investigate Clinton

Donald Trump “You have a Point” to Crowd Chanting Hillary Clinton “Lock Her Up” (8-13-16)

Trump Decides He Won’t Pursue Criminal E-mail Investigation Case Against Clinton

Clinton’s Pay to Play State Department Not a Partisan Issue – It is a Criminal One

Donald Trump: Hillary Clinton has a lot to hide (CNN interview with Anderson Cooper)

Anonymous – Bill & Hillary Clinton: The Untold Story “Clinton Cash” Full Documentary

Anonymous – Hillary Clinton: The Hillary Files Full Documentary

 

Story 2:  Eli Lake on The Political Assassination of NSA Mike Flynn and FBI Questioned Former National Security Advisory Mike Flynn — Videos —

Trump Blasts Leaks, ‘Unfair’ Treatment of Flynn 

Was Michael Flynn Politically Assassinated?

Columnist: Flynn’s ouster will embolden Trump’s opponents

Hannity: The DC swamp is rising to take down Trump | Breaking News Today

The Political Assassination of Michael Flynn

FEB 14, 2017 10:09 AM EST

By Eli Lake

If we are to believe the Trump White House, National Security Adviser Michael Flynn just resigned because he lied about his conversations with Russia’s ambassador to the vice president. As White House senior counselor Kellyanne Conway told NBC’s “Today Show” on Tuesday: “Misleading the vice president really was the key here.”

That sounds about as credible as when the president told CIA employees that the media had invented the story about his enmity toward the spy agency, not even two weeks after he had taken to Twitter to compare the CIA to Nazis. It’s about as credible as President Donald Trump’s insistence that it didn’t rain during his inauguration. Or that millions of people had voted illegally in the election he just won.

The point here is that for a White House that has such a casual and opportunistic relationship with the truth, it’s strange that Flynn’s “lie” to Pence would get him fired. It doesn’t add up.

It’s not even clear that Flynn lied. He says in his resignation letter that he did not deliberately leave out elements of his conversations with Ambassador Sergey Kislyak when he recounted them to Vice President Mike Pence. The New York Times and Washington Post reported that the transcript of the phone call reviewed over the weekend by the White House could be read different ways. One White House official with knowledge of the conversations told me that the Russian ambassador raised the sanctions to Flynn and that Flynn responded that the Trump team would be taking office in a few weeks and would review Russia policy and sanctions. That’s neither illegal nor improper.

What’s more, the Washington Post reported Monday night that last month Sally Yates, then the acting attorney general, had informed the White House that Flynn discussed sanctions with Kislyak and that he could be susceptible to blackmail because he misled Pence about it. If it was the lie to Pence that sunk Flynn, why was he not fired at the end of January?

A better explanation here is that Flynn was just thrown under the bus. His tenure as national security adviser, the briefest in U.S. history, was rocky from the start. When Flynn was attacked in the media for his ties to Russia, he was not allowed by the White House to defend himself. Over the weekend, he was instructed not to speak to the press when he was in the fight for his political life. His staff was not even allowed to review the transcripts of his call to the Russian ambassador.

There is another component to this story as well — as Trump himself just tweeted. It’s very rare that reporters are ever told about government-monitored communications of U.S. citizens, let alone senior U.S. officials. The last story like this to hit Washington was in 2009 when Jeff Stein, then of CQ, reported on intercepted phone calls between a senior Aipac lobbyist and Jane Harman, who at the time was a Democratic member of Congress.

Normally intercepts of U.S. officials and citizens are some of the most tightly held government secrets. This is for good reason. Selectively disclosing details of private conversations monitored by the FBI or NSA gives the permanent state the power to destroy reputations from the cloak of anonymity. This is what police states do.

In the past it was considered scandalous for senior U.S. officials to even request the identities of U.S. officials incidentally monitored by the government (normally they are redacted from intelligence reports). John Bolton’s nomination to be U.S. ambassador to the United Nations was derailed in 2006 after the NSA confirmed he had made 10 such requests when he was Undersecretary of State for Arms Control in George W. Bush’s first term. The fact that the intercepts of Flynn’s conversations with Kislyak appear to have been widely distributed inside the government is a red flag.

Representative Devin Nunes, the Republican chairman of the House Permanent Select Committee on Intelligence, told me Monday that he saw the leaks about Flynn’s conversations with Kislyak as part of a pattern. “There does appear to be a well orchestrated effort to attack Flynn and others in the administration,” he said. “From the leaking of phone calls between the president and foreign leaders to what appears to be high-level FISA Court information, to the leaking of American citizens being denied security clearances, it looks like a pattern.”

Nunes said he was going to bring this up with the FBI, and ask the agency to investigate the leak and find out whether Flynn himself is a target of a law enforcement investigation. The Washington Post reported last month that Flynn was not the target of an FBI probe.

The background here is important. Three people once affiliated with Trump’s presidential campaign — Carter Page, Paul Manafort and Roger Stone — are being investigated by the FBI and the intelligence community for their contacts with the Russian government. This is part of a wider inquiry into Russia’s role in hacking and distributing emails of leading Democrats before the election.

Flynn himself traveled in 2015 to Russia to attend a conference put on by the country’s propaganda network, RT. He has acknowledged he was paid through his speaker’s bureau for his appearance. That doesn’t look good, but it’s also not illegal in and of itself. All of this is to say there are many unanswered questions about Trump’s and his administration’s ties to Russia.

But that’s all these allegations are at this point: unanswered questions. It’s possible that Flynn has more ties to Russia that he had kept from the public and his colleagues. It’s also possible that a group of national security bureaucrats and former Obama officials are selectively leaking highly sensitive law enforcement information to undermine the elected government.

Flynn was a fat target for the national security state. He has cultivated a reputation as a reformer and a fierce critic of the intelligence community leaders he once served with when he was the director the Defense Intelligence Agency under President Barack Obama. Flynn was working to reform the intelligence-industrial complex, something that threatened the bureaucratic prerogatives of his rivals.

He was also a fat target for Democrats. Remember Flynn’s breakout national moment last summer was when he joined the crowd at the Republican National Convention from the dais calling for Hillary Clinton to be jailed.

In normal times, the idea that U.S. officials entrusted with our most sensitive secrets would selectively disclose them to undermine the White House would alarm those worried about creeping authoritarianism. Imagine if intercepts of a call between Obama’s incoming national security adviser and Iran’s foreign minister leaked to the press before the nuclear negotiations began? The howls of indignation would be deafening.

In the end, it was Trump’s decision to cut Flynn loose. In doing this he caved in to his political and bureaucratic opposition. Nunes told me Monday night that this will not end well. “First it’s Flynn, next it will be Kellyanne Conway, then it will be Steve Bannon, then it will be Reince Priebus,” he said. Put another way, Flynn is only the appetizer. Trump is the entree.

https://www.bloomberg.com/view/articles/2017-02-14/the-political-assassination-of-michael-flynn

Former Obama Officials, Loyalists Waged Secret Campaign to Oust Flynn

Sources: Former Obama officials, loyalists planted series of stories to discredit Flynn, bolster Iran deal

Michael Flynn

Michael Flynn / AP

BY: Adam Kredo
February 14, 2017 3:26 pm

The abrupt resignation Monday evening of White House national security adviser Michael Flynn is the culmination of a secret, months-long campaign by former Obama administration confidantes to handicap President Donald Trump’s national security apparatus and preserve the nuclear deal with Iran, according to multiple sources in and out of the White House who described to the Washington Free Beacon a behind-the-scenes effort by these officials to plant a series of damaging stories about Flynn in the national media.

The effort, said to include former Obama administration adviser Ben Rhodes—the architect of a separate White House effort to create what he described as a pro-Iran echo chamber—included a small task force of Obama loyalists who deluged media outlets with stories aimed at eroding Flynn’s credibility, multiple sources revealed.

The operation primarily focused on discrediting Flynn, an opponent of the Iran nuclear deal, in order to handicap the Trump administration’s efforts to disclose secret details of the nuclear deal with Iran that had been long hidden by the Obama administration.

Insiders familiar with the anti-Flynn campaign told the Free Beacon that these Obama loyalists plotted in the months before Trump’s inauguration to establish a set of roadblocks before Trump’s national security team, which includes several prominent opponents of diplomacy with Iran. The Free Beacon first reported on this effort in January.

Sources who spoke to the Free Beacon requested anonymity in order to speak freely about the situation and avoid interfering with the White House’s official narrative about Flynn, which centers on his failure to adequately inform the president about a series of phone calls with Russian officials.

Flynn took credit for his missteps regarding these phone calls in a brief statement released late Monday evening. Trump administration officials subsequently stated that Flynn’s efforts to mislead the president and vice president about his contacts with Russia could not be tolerated.

However, multiple sources closely involved in the situation pointed to a larger, more secretive campaign aimed at discrediting Flynn and undermining the Trump White House.

“It’s undeniable that the campaign to discredit Flynn was well underway before Inauguration Day, with a very troublesome and politicized series of leaks designed to undermine him,” said one veteran national security adviser with close ties to the White House team. “This pattern reminds me of the lead up to the Iran deal, and probably features the same cast of characters.”

The Free Beacon first reported in January that, until its final days in office, the Obama administration hosted several pro-Iran voices who were critical in helping to mislead the American public about the terms of the nuclear agreement. This included a former Iranian government official and the head of the National Iranian American Council, or NIAC, which has been accused of serving as Iran’s mouthpiece in Washington, D.C.

Since then, top members of the Obama administration’s national security team have launched a communications infrastructure after they left the White House, and have told reporters they are using that infrastructure to undermine Trump’s foreign policy.

“It’s actually Ben Rhodes, NIAC, and the Iranian mullahs who are celebrating today,” said one veteran foreign policy insider who is close to Flynn and the White House. “They know that the number one target is Iran … [and] they all knew their little sacred agreement with Iran was going to go off the books. So they got rid of Flynn before any of the [secret] agreements even surfaced.”

Flynn had been preparing to publicize many of the details about the nuclear deal that had been intentionally hidden by the Obama administration as part of its effort to garner support for the deal, these sources said.

Flynn is now “gone before anybody can see what happened” with these secret agreements, said the second insider close to Flynn and the White House.

Sources in and out of the White House are concerned that the campaign against Flynn will be extended to other prominent figures in the Trump administration.

One senior White House official told the Free Beacon that leaks targeting the former official were “not the result of a series of random events.”

“The drumbeat of leaks of sensitive material related to General Flynn has been building since he was named to his position,” said the official, who is a member of the White House’s National Security Council. “Last night was not the result of a series of random events. The president has lost a valuable adviser and we need to make sure this sort of thing does not happen again.”

Other sources expressed concern that public trust in the intelligence community would be eroded by the actions of employees with anti-Trump agendas.

“The larger issue that should trouble the American people is the far-reaching power of unknown, unelected apparatchiks in the Intelligence Community deciding for themselves both who serves in government and what is an acceptable policy they will allow the elected representatives of the people to pursue,” said the national security adviser quoted above.

“Put aside the issue of Flynn himself; that nameless, faceless bureaucrats were able to take out a president’s national security adviser based on a campaign of innuendo without evidence should worry every American,” the source explained.

Eli Lake, a Bloomberg View columnist and veteran national security reporter well sourced in the White House, told the Free Beacon that Flynn earned a reputation in the Obama administration as one of its top detractors.

“Michael Flynn was one of the Obama administration’s fiercest critics after he was forced out of the Defense Intelligence Agency,” said Lake, who described “the political assassination of Michael Flynn” in his column published early Tuesday.

“[Flynn] was a withering critic of Obama’s biggest foreign policy initiative, the Iran deal,” Lake said. “He also publicly accused the administration of keeping classified documents found in the Osama bin Laden raid that showed Iran’s close relationship with al Qaeda. He was a thorn in their side.”

Lake noted in his column that he does not buy fully the White House’s official spin on Flynn’s resignation.

“For a White House that has such a casual and opportunistic relationship with the truth, it’s strange that Flynn’s ‘lie’ to Pence would get him fired,” Lake wrote. “It doesn’t add up.”

White House Press Secretary Sean Spicer stated in his daily briefing that “the evolving and eroding level of trust as a result of this situation and a series of other questionable incidents is what led the president to ask General Flynn for his resignation.”

A third source who serves as a congressional adviser and was involved in the 2015 fight over the Iran deal told the Free Beacon that the Obama administration feared that Flynn would expose the secret agreements with Iran.

“The Obama administration knew that Flynn was going to release the secret documents around the Iran deal, which would blow up their myth that it was a good deal that rolled back Iran,” the source said. “So in December the Obama NSC started going to work with their favorite reporters, selectively leaking damaging and incomplete information about Flynn.”

“After Trump was inaugurated some of those people stayed in and some began working from the outside, and they cooperated to keep undermining Trump,” the source said, detailing a series of leaks from within the White House in the past weeks targeting Flynn. “Last night’s resignation was their first major win, but unless the Trump people get serious about cleaning house, it won’t be the last.”

http://freebeacon.com/national-security/former-obama-officials-loyalists-waged-campaign-oust-flynn/

Michael T. Flynn stepped down as national security adviser amid a scandal surrounding his contacts with Russia before President Trump took office.

 

WASHINGTON — Just days into his new position as President Trump’s national security adviser, Michael T. Flynn found himself in a meeting that any White House official would dread. Face to face with F.B.I. agents, he was grilled about a phone call he had had with Russia’s ambassador.

What exactly Mr. Flynn said has not been disclosed, but current and former government officials said on Tuesday that investigators had come away believing that he was not entirely forthcoming. Soon after, the acting attorney general decided to notify the White House, setting in motion a chain of events that cost Mr. Flynn his job and thrust Mr. Trump’s fledgling administration into a fresh crisis.

Mr. Flynn’s rise and fall followed familiar patterns in Washington, where ambitious figures secure positions of great authority only to lose them in a blizzard of contradictions, recriminations and scandal. But rarely has an official at such a high level risen and fallen in such a dizzyingly short time, in this case just 24 days after Mr. Flynn arrived in the West Wing to take his corner office.

Given his short stay at the top, Mr. Flynn’s case might be quickly forgotten as an isolated episode if it did not raise other questions, particularly about what the president knew and when. Even more broadly, it underscores lingering uncertainty about the relationship between the Trump administration and Vladimir V. Putin’s Russia, a subject of great interest given American intelligence reports of Moscow’s intervention in last year’s elections in the United States.

C

As leaders of both parties said on Tuesday that they expected the Senate to investigate and probably even summon Mr. Flynn to testify, more details emerged about a drama that played out largely in secret inside a White House riven by competing power centers. Sean Spicer, the White House press secretary, revealed that Mr. Trump had known about concerns that Mr. Flynn lied for more than two weeks before demanding his resignation on Monday night. But Vice President Mike Pence was kept in the dark and did not learn that Mr. Flynn had misled him about his Russia contacts until reading news accounts late last week.

Photo

Michael T. Flynn, right, stepped down as national security adviser on Monday night after President Trump demanded his resignation. He held the job for 24 days. CreditKevin Hagen for The New York Times

Mr. Spicer described a deliberative process in which a new president took his time deciding what to do with Mr. Flynn, a retired three-star general who played a major role in his campaign. The issue, Mr. Spicer said, was not about legality but credibility.

“The evolving and eroding level of trust as a result of this situation and a series of other questionable instances is what led the president to ask for General Flynn’s resignation,” he said.

But other aides privately said that Mr. Trump, while annoyed at Mr. Flynn, might not have pushed him out had the situation not attracted such attention from the news media. Instead, according to three people close to Mr. Trump, the president made the decision to cast aside Mr. Flynn in a flash, the catalyst being a news alert of a coming article about the matter.

“Yeah, it’s time,” Mr. Trump told one of his advisers.

Until around that point, Mr. Flynn seemed to think he was going to keep his job. He told The Daily Caller, a conservative news site, on Monday that he had not violated the law. “If I did, believe me, the F.B.I. would be down my throat, my clearances would be pulled,” he said. “There were no lines crossed.”

But by that evening, he was writing a resignation letter, admitting no deception, only that he had “inadvertently” passed along “incomplete information.”

The issue traced back to a call last December between Mr. Flynn, then on tap to become Mr. Trump’s national security adviser, and Sergey I. Kislyak, the Russian ambassador to the United States. President Barack Obama was imposing new sanctions on Russia and expelling 35 diplomats after the election meddling.

The day after the sanctions were announced, Mr. Putin said Russia would not retaliate in kind, as has been the custom in the long, tortured history of Russian-American relations, instead waiting for a new administration that he assumed would be friendlier.

Inside the Obama administration, officials were stunned. Mr. Trump publicly welcomed the decision. “Great move on delay (by V. Putin),” he wrote on Twitter. “I always knew he was very smart!”

Around the same time, Obama advisers heard separately from the F.B.I. about Mr. Flynn’s conversation with Mr. Kislyak, whose calls were routinely monitored by American intelligence agencies that track Russian diplomats. The Obama advisers grew suspicious that perhaps there had been a secret deal between the incoming team and Moscow, which could violate the rarely enforced, two-century-old Logan Act barring private citizens from negotiating with foreign powers in disputes with the United States.

The Obama officials asked the F.B.I. if a quid pro quo had been discussed on the call, and the answer came back no, according to one of the officials, who like others asked not to be named discussing delicate communications. The topic of sanctions came up, they were told, but there was no deal.

 

The events that led to Michael T. Flynn’s abrupt resignation as national security adviser stretch back to before President Trump’s inauguration.

On Jan. 12, David Ignatius, a columnist for The Washington Post, reported that Mr. Flynn had called Mr. Kislyak, setting off news media interest in what was said. Mr. Spicer, then the spokesman for Mr. Trump’s transition team, went to Mr. Flynn, who he said told him that sanctions had not come up during the call. Briefing reporters the next day, Mr. Spicer repeated the misinformation, saying that the conversation had “never touched on the sanctions.”

Mr. Flynn told the same thing to Mr. Pence and Reince Priebus, the incoming White House chief of staff, who were scheduled to go on the Sunday talk shows and expected that they would be asked about the matter, according to the two men. On Jan. 15, Mr. Pence went on “Face the Nation” on CBS and on “Fox News Sunday” and repeated that sanctions had not been discussed, while Mr. Priebus said much the same on “Meet the Press” on NBC.

The topic came up again after Mr. Trump and his team moved into the White House. At his first full briefing on Jan. 23, Mr. Spicer said that Mr. Flynn’s conversation had touched on only four subjects, none of them sanctions. That caught the attention of the F.B.I. and the Justice Department.

Sally Q. Yates, an Obama appointee held over as acting attorney general until Mr. Trump’s choice was confirmed, concluded that the disparity between what was said on the call and what Mr. Flynn had evidently told the vice president and others about it might make the new national security adviser vulnerable to blackmail. When foreign governments hold information that could prove embarrassing, it is considered a potential leverage point.

Soon after the Jan. 23 briefing, James B. Comey, the F.B.I. director, sent agents to interview Mr. Flynn. If he told the agents what he said publicly for more than a week after that interview — that his conversations with the ambassador had been innocuous and did not involve sanctions — then he could face legal trouble. If the authorities concluded that he knowingly lied to the F.B.I., it could expose him to a felony charge.

Document: Michael Flynn’s Resignation Letter

It was not clear whether Mr. Flynn had a lawyer for his interview or whether anyone at the White House knew the interview was happening. But they knew afterward because Ms. Yates, with the support of Mr. Comey, reached out to Donald F. McGahn II, the new White House counsel, on Jan. 26 to give him what Mr. Spicer called a “heads up” about the discrepancy.

Mr. Trump was told “immediately,” Mr. Spicer said, and directed Mr. McGahn to look into the matter. After an “extensive review” that lasted several days, Mr. McGahn concluded that nothing in the conversation had violated federal law, Mr. Spicer said.

But the president then set out to determine whether he could still trust Mr. Flynn. Mr. Spicer said Mr. Flynn stuck to his original account, making matters worse.

“We got to a point not based on a legal issue, but based on a trust issue, with the level of trust between the president and General Flynn had eroded to the point where he felt he had to make a change,” Mr. Spicer said. “The president was very concerned that General Flynn had misled the vice president and others.”

Asked if Mr. Trump had instructed Mr. Flynn to talk about sanctions with Mr. Kislyak, Mr. Spicer said, “No, absolutely not.” Asked if Mr. Trump knew that the issue had come up before the Justice Department told the White House, Mr. Spicer said, “No, he was not aware.”

Vice President Mike Pence, left, learned that Mr. Flynn had misled him about a call to the Russian ambassador after reading news media reports last week. CreditGabriella Demczuk for The New York Times

Mr. Spicer emphasized that there was “nothing wrong” with Mr. Flynn’s talking with representatives of other countries to prepare for the new president taking office, and that, in fact, Mr. Trump wanted him to.

By that point, Mr. Trump’s relationship with Mr. Flynn had grown more awkward. One person close to the president, who asked to remain anonymous to describe private discussions, said Mr. Trump had been “uncomfortable” with Mr. Flynn for weeks. Jared Kushner, the president’s son-in-law and senior adviser, had expressed concern about Mr. Flynn’s appointment even before the inauguration, according to another person briefed on the discussions.

Mr. Trump’s views were coming around to the same point. “What he knew was that Flynn was too much about Flynn, versus Mattis,” the person close to the president said. Defense Secretary Jim Mattis was seen as deferential to the chain of command. “He loves Mattis because Mattis is respectful and self-confident.”

Another key figure with growing concerns about Mr. Flynn was Stephen K. Bannon, the president’s chief strategist whom Mr. Flynn perceived as a rival for control over national security. Mr. Trump began asking Mr. Mattis about two weeks ago for suggestions of possible replacements for Mr. Flynn. The defense secretary recommended retired Vice Adm. Robert S. Harward. Mr. Bannon reached out to Mr. Harward last week, two senior officials said.

The situation escalated late Thursday when word reached the White House that The Washington Post was reporting that the transcript of Mr. Flynn’s call showed that he had discussed sanctions, contrary to his assurances to Mr. Pence and others.

White House officials confronted Mr. Flynn, who only then said that it was possible they had come up, but that he did not remember. “His story remained the same until that night,” Mr. Spicer said. “That’s when his response changed.”

That was also when Mr. Pence first learned that the Justice Department had proof that Mr. Flynn had not told the truth and had warned the White House two weeks earlier, according to Marc Lotter, his spokesman. “He did an inquiry based on those media accounts,” Mr. Lotter added, without elaborating.

Another person who speaks frequently with him said Mr. Pence went “ballistic,” or at least what qualifies as ballistic for the coolheaded vice president.

Mr. Pence, Mr. Priebus and Mr. Bannon urged Mr. Trump to fire the national security adviser, according to officials, but the president could not bring himself to do it, in part for fear of losing face. When a reporter on Air Force One heading to Florida on Friday asked him about The Post’s report, Mr. Trump said he had not read it. “I don’t know about that,” he said. “I haven’t seen it.”

As late as Monday, he was sticking by Mr. Flynn. He sent his counselor, Kellyanne Conway, to tell a television interviewer that he had “full confidence” in Mr. Flynn. And Mr. Flynn phoned a reporter for The Daily Caller on Monday to say the president had “expressed confidence” in him and urged him to “go out and talk more.”

In that interview, posted on Tuesday, Mr. Flynn said he had discussed the Russian diplomats’ expulsion with Mr. Kislyak. “It wasn’t about sanctions,” he said. “It was about the 35 guys who were thrown out.” Mr. Flynn added: “It was basically, ‘Look, I know this happened. We’ll review everything.’ I never said anything such as, ‘We’re going to review sanctions,’ or anything like that.”

Either way, it was too late. When the matter came to overshadow the president’s glitch-free meeting with Prime Minister Justin Trudeau of Canada and word arrived of another Post article on Ms. Yates’s warning to the White House, Mr. Trump ordered an end to the situation. “He made a determination late in the day,” Mr. Spicer said, “and he executed on it.”

 

Story 3: President Trump Likes Whatever Israel and Palestine Want Regarding a Two State Solution — Videos

Trump Says Separate States Not Needed in Mideast Deal

Trump Netanyahu joint press conference full event

The Pronk Pops Show Podcasts Portfolio

Listen To Pronk Pops Podcast or Download Shows 833-839

Listen To Pronk Pops Podcast or Download Shows 827-832

Listen To Pronk Pops Podcast or Download Shows 821-826

Listen To Pronk Pops Podcast or Download Shows 815-820

Listen To Pronk Pops Podcast or Download Shows 806-814

Listen To Pronk Pops Podcast or Download Shows 800-805

Listen To Pronk Pops Podcast or Download Shows 793-799

Listen To Pronk Pops Podcast or Download Shows 785-792

Listen To Pronk Pops Podcast or Download Shows 777-784

Listen To Pronk Pops Podcast or Download Shows 769-776

Listen To Pronk Pops Podcast or Download Shows 759-768

Listen To Pronk Pops Podcast or Download Shows 751-758

Listen To Pronk Pops Podcast or Download Shows 745-750

Listen To Pronk Pops Podcast or Download Shows 738-744

Listen To Pronk Pops Podcast or Download Shows 732-737

Listen To Pronk Pops Podcast or Download Shows 727-731

Listen To Pronk Pops Podcast or Download Shows 720-726

Listen To Pronk Pops Podcast or DownloadShows 713-719

Listen To Pronk Pops Podcast or DownloadShows 705-712

Listen To Pronk Pops Podcast or Download Shows 695-704

Listen To Pronk Pops Podcast or Download Shows 685-694

Listen To Pronk Pops Podcast or Download Shows 675-684

Listen To Pronk Pops Podcast or Download Shows 668-674

Listen To Pronk Pops Podcast or Download Shows 660-667

Listen To Pronk Pops Podcast or Download Shows 651-659

Listen To Pronk Pops Podcast or Download Shows 644-650

Listen To Pronk Pops Podcast or Download Shows 637-643

Listen To Pronk Pops Podcast or Download Shows 629-636

Listen To Pronk Pops Podcast or Download Shows 617-628

Listen To Pronk Pops Podcast or Download Shows 608-616

Listen To Pronk Pops Podcast or Download Shows 599-607

Listen To Pronk Pops Podcast or Download Shows 590-598

Listen To Pronk Pops Podcast or Download Shows 585- 589

Listen To Pronk Pops Podcast or Download Shows 575-584

Listen To Pronk Pops Podcast or Download Shows 565-574

Listen To Pronk Pops Podcast or Download Shows 556-564

Listen To Pronk Pops Podcast or Download Shows 546-555

Listen To Pronk Pops Podcast or Download Shows 538-545

Listen To Pronk Pops Podcast or Download Shows 532-537

Listen To Pronk Pops Podcast or Download Shows 526-531

Listen To Pronk Pops Podcast or Download Shows 519-525

Listen To Pronk Pops Podcast or Download Shows 510-518

Listen To Pronk Pops Podcast or Download Shows 500-509

Listen To Pronk Pops Podcast or Download Shows 490-499

Listen To Pronk Pops Podcast or Download Shows 480-489

Listen To Pronk Pops Podcast or Download Shows 473-479

Listen To Pronk Pops Podcast or Download Shows 464-472

Listen To Pronk Pops Podcast or Download Shows 455-463

Listen To Pronk Pops Podcast or Download Shows 447-454

Listen To Pronk Pops Podcast or Download Shows 439-446

Listen To Pronk Pops Podcast or Download Shows 431-438

Listen To Pronk Pops Podcast or Download Shows 422-430

Listen To Pronk Pops Podcast or Download Shows 414-421

Listen To Pronk Pops Podcast or Download Shows 408-413

Listen To Pronk Pops Podcast or Download Shows 400-407

Listen To Pronk Pops Podcast or Download Shows 391-399

Listen To Pronk Pops Podcast or Download Shows 383-390

Listen To Pronk Pops Podcast or Download Shows 376-382

Listen To Pronk Pops Podcast or Download Shows 369-375

Listen To Pronk Pops Podcast or Download Shows 360-368

Listen To Pronk Pops Podcast or Download Shows 354-359

Listen To Pronk Pops Podcast or Download Shows 346-353

Listen To Pronk Pops Podcast or Download Shows 338-345

Listen To Pronk Pops Podcast or Download Shows 328-337

Listen To Pronk Pops Podcast or Download Shows 319-327

Listen To Pronk Pops Podcast or Download Shows 307-318

Listen To Pronk Pops Podcast or Download Shows 296-306

Listen To Pronk Pops Podcast or Download Shows 287-295

Listen To Pronk Pops Podcast or Download Shows 277-286

Listen To Pronk Pops Podcast or Download Shows 264-276

Listen To Pronk Pops Podcast or Download Shows 250-263

Listen To Pronk Pops Podcast or Download Shows 236-249

Listen To Pronk Pops Podcast or Download Shows 222-235

Listen To Pronk Pops Podcast or Download Shows 211-221

Listen To Pronk Pops Podcast or Download Shows 202-210

Listen To Pronk Pops Podcast or Download Shows 194-201

Listen To Pronk Pops Podcast or Download Shows 184-193

Listen To Pronk Pops Podcast or Download Shows 174-183

Listen To Pronk Pops Podcast or Download Shows 165-173

Listen To Pronk Pops Podcast or Download Shows 158-164

Listen To Pronk Pops Podcast or Download Shows151-157

Listen To Pronk Pops Podcast or Download Shows 143-150

Listen To Pronk Pops Podcast or Download Shows 135-142

Listen To Pronk Pops Podcast or Download Shows 131-134

Listen To Pronk Pops Podcast or Download Shows 124-130

Listen To Pronk Pops Podcast or Download Shows 121-123

Listen To Pronk Pops Podcast or Download Shows 118-120

Listen To Pronk Pops Podcast or Download Shows 113 -117

Listen To Pronk Pops Podcast or Download Show 112

Listen To Pronk Pops Podcast or Download Shows 108-111

Listen To Pronk Pops Podcast or Download Shows 106-108

Listen To Pronk Pops Podcast or Download Shows 104-105

Listen To Pronk Pops Podcast or Download Shows 101-103

Listen To Pronk Pops Podcast or Download Shows 98-100

Listen To Pronk Pops Podcast or Download Shows 94-97

Listen To Pronk Pops Podcast or Download Show 93

Listen To Pronk Pops Podcast or Download Show 92

Listen To Pronk Pops Podcast or Download Show 91

Listen To Pronk Pops Podcast or Download Shows 88-90

Listen To Pronk Pops Podcast or Download Shows 84-87

Listen To Pronk Pops Podcast or Download Shows 79-83

Listen To Pronk Pops Podcast or Download Shows 74-78

Listen To Pronk Pops Podcast or Download Shows 71-73

Listen To Pronk Pops Podcast or Download Shows 68-70

Listen To Pronk Pops Podcast or Download Shows 65-67

Listen To Pronk Pops Podcast or Download Shows 62-64

Listen To Pronk Pops Podcast or Download Shows 58-61

Listen To Pronk Pops Podcast or Download Shows 55-57

Listen To Pronk Pops Podcast or Download Shows 52-54

Listen To Pronk Pops Podcast or Download Shows 49-51

Listen To Pronk Pops Podcast or Download Shows 45-48

Listen To Pronk Pops Podcast or Download Shows 41-44

Listen To Pronk Pops Podcast or Download Shows 38-40

Listen To Pronk Pops Podcast or Download Shows 34-37

Listen To Pronk Pops Podcast or Download Shows 30-33

Listen To Pronk Pops Podcast or Download Shows 27-29

Listen To Pronk Pops Podcast or Download Shows 17-26

Listen To Pronk Pops Podcast or Download Shows 16-22

Listen To Pronk Pops Podcast or Download Shows 10-15

Listen To Pronk Pops Podcast or Download Shows 1-9

Read Full Post | Make a Comment ( None so far )

The Pronk Pops Show 838, February 14, 2017, Story 1: St. Valentines Day Massacre of Trump’s National Security Adviser Flynn By Political Elitist Establishment’s Turnkey Tyranny — State Secret Spying & Surveillance — National Security Agency’s and Justice Department Leakers Broke The Law — Videos

Posted on February 14, 2017. Filed under: American History, Blogroll, Breaking News, College, Communications, Computers, Congress, Corruption, Countries, Crime, Culture, Donald J. Trump, Donald Trump, Elections, Foreign Policy, Freedom of Speech, Government Spending, Hillary Clinton, Hillary Clinton, History, House of Representatives, Human, Language, Law, Life, News, Philosophy, Photos, Politics, Raymond Thomas Pronk, Rule of Law, Scandals, Security, Senate, Taxation, Taxes, Terror, Terrorism, United States of America, Videos, Violence, Wealth, Wisdom | Tags: , , , , , , , , , , |

Project_1

The Pronk Pops Show Podcasts

Pronk Pops Show 838: February 14, 2017

Pronk Pops Show 837: February 13, 2017

Pronk Pops Show 836: February 10, 2017

Pronk Pops Show 835: February 9, 2017

Pronk Pops Show 834: February 8, 2017

Pronk Pops Show 833: February 7, 2017

Pronk Pops Show 832: February 6, 2017

Pronk Pops Show 831: February 3, 2017

Pronk Pops Show 830: February 2, 2017

Pronk Pops Show 829: February 1, 2017

Pronk Pops Show 828: January 31, 2017

Pronk Pops Show 827: January 30, 2017

Pronk Pops Show 826: January 27, 2017 

Pronk Pops Show 825: January 26, 2017

Pronk Pops Show 824: January 25, 2017 

Pronk Pops Show 823: January 24, 2017

Pronk Pops Show 822: January 23, 2017

Pronk Pops Show 821: January 20, 2017

Pronk Pops Show 820: January 19, 2017

Pronk Pops Show 819: January 18, 2017

Pronk Pops Show 818: January 17, 2017

Pronk Pops Show 817: January 13, 2017

Pronk Pops Show 816: January 12, 2017

Pronk Pops Show 815: January 11, 2017

Pronk Pops Show 814: January 10,  2017

Pronk Pops Show 813: January 9, 2017

Pronk Pops Show 812: December 12, 2016

Pronk Pops Show 811: December 9, 2016

Pronk Pops Show 810: December 8, 2016

Pronk Pops Show 809: December 7, 2016

Pronk Pops Show 808: December 6, 2016

Pronk Pops Show 807: December 5, 2016

Pronk Pops Show 806: December 2, 2016

Pronk Pops Show 805: December 1, 2016

Pronk Pops Show 804: November 30, 2016

Pronk Pops Show 803: November 29, 2016

Pronk Pops Show 802: November 28, 2016

Pronk Pops Show 801: November 22, 2016

Pronk Pops Show 800: November 21, 2016

Pronk Pops Show 799: November 18, 2016

Pronk Pops Show 798: November 17, 2016

Pronk Pops Show 797: November 16, 2016

Pronk Pops Show 796: November 15, 2016

Pronk Pops Show 795: November 14, 2016

Pronk Pops Show 794: November 10, 2016

Pronk Pops Show 793: November 9, 2016

Pronk Pops Show 792: November 8, 2016

Pronk Pops Show 791: November 7, 2016

Pronk Pops Show 790: November 4, 2016

Pronk Pops Show 789: November 3, 2016

Pronk Pops Show 788: November 2, 2016

Story 1: St. Valentines Day Massacre of Trump’s National Security Adviser Flynn By Political Elitist Establishment’s Turnkey Tyranny —  State Secret Spying & Surveillance — National Security Agency’s and Justice Department Leakers Broke The Law — Videos 

Image result for branco obama russian sanctionsImage result for flynn out resignedImage result for flynn out resignedImage result for flynn out resigned

Spicer Grilled On Flynn Resignation – White House Press Conference Q & A

Lawmakers Ask Why Info Was Leaked To Media – Attack On Trump Admin? – America’s Newsroom

Panel Discuss Did Flynn Violate The Logan Act? @AlanDersh @NormEisen

Trump’s Team Violates the Logan Act

Trump Advisor “Micheal Flynn” Resigns after breaking the Logan Act!

Mike Flynn Caught Lying About Secret Calls To Russia

Rush Limbaugh Show February 14,2017 Podcast Hour 1

Laura Ingraham Show 2/14/17 | Michael Flynn resigns as Trump’s National Security Advisor

Levin 2/14/17 – Mark Levin Show February 14,2017 Full Podcast

Lt. Gen. McInerney: Michael Flynn does not lie

Breaking down Flynn backlash

Pence on Flynn-Russia talks: It’s a problem

Charles Krauthammer: Donald Trump Loses Either Way No Matter What He Decides on Michael Flynn

“Trump is mentally ill” Psychologist analyses Donald Trump on CNN

Psychologists warn that Trump is displaying classic signs of being mentally ill

Michael Flynn Must Now Be Arrested | The Resistance with Keith Olbermann | GQ

Paul Ryan on Michael Flynn: The President Made the Right Decision to Ask for His Resignation

How deep will the Senate delve into Flynn investigation?

Mika Brzezinski Unloads on Flynn Resignation & White House Rus Contact: Troubling on a Global Level

US 2016 Presidential Election Was Indeed Hacked & It Was NOT Russia Who Did It

Corporate Media Draws Opposite Conclusion from CIA Vets on Leaked Russia Document

On Obama expanding NSA powers right before Trump & Waging Right Fight

Lieutenant General Michael T. Flynn

Published on Nov 14, 2016

LT Flynn spoke to a packed crowd of Young America’s Foundation’s students and supporters at the Trump Hotel in Washington, D.C. to celebrate freedom.

Donald Trump foreign policy by General Flynn

Gen. Michael Flynn wants the truth about what is going on in Afghanistan and Iraq

Top US general defends Donald Trump – UpFront

Former DIA Director Michael Flynn: It was a decision to fund, arm ISIS

Mehdi Hasan goes Head to Head with Michael T Flynn

Questions raised about Michael Flynn’s talks with Russia

Published on Feb 10, 2017

A Washington Post report claims National Security Advisor Michael Flynn spoke with the Russian ambassador about U.S. sanctions before Trump’s election and may have misled Vice President Mike Pence about the calls. The Washington Post’s James Hohmann joins CBSN with more.

CBSN is the first digital streaming news network that will allow Internet-connected consumers to watch live, anchored news coverage on their connected TV and other devices. At launch, the network is available 24/7 and makes all of the resources of CBS News available directly on digital platforms with live, anchored coverage 15 hours each weekday. CBSN. Always On.

DEVELOPING! Lt. Gen. Michael T. Flynn will be National Security Adviser

Published on Nov 19, 2016

Michael Thomas “Mike” Flynn (born December 1958) is a retired United States Army lieutenant general who served as the director of the Defense Intelligence Agency, commander of the Joint Functional Component Command for Intelligence, Surveillance and Reconnaissance, and chair of the Military Intelligence Board from July 24, 2012, to August 2, 2014. Prior to that, he served as Assistant Director of National Intelligence. Flynn co-authored a report in January 2010 through the Center for a New American Security entitled Fixing Intel: A Blueprint for Making Intelligence Relevant in Afghanistan

Flynn’s military career was primarily operational, with numerous combat arms, conventional and special operations senior intelligence assignments. He also served as the senior intelligence officer for the Joint Special Operations Command. Flynn is a published author, with articles appearing in Small Wars Journal, Military Review, Joint Forces Quarterly and other military and intelligence publications.

In May 2016, he emerged as one of several leading possibilities to be the vice presidential running mate for Republican nominee Donald Trump. Flynn was not chosen as Trump’s running mate; the vice presidential pick was ultimately Indiana Governor Mike Pence. At the 2016 Republican National Convention in Cleveland, Ohio, Flynn delivered what the Los Angeles Times called a “fiery speech”.

On November 18, 2016, the Transition announced via press release that President-elect Donald Trump had named General Flynn his National Security Advisor.

Meet General Flynn: Why the tough-talking general riles the media

Trump’s Military Adviser on US-Russia Cooperation

Why guard against China, Iran, & Russia? Lt.Gen Michael Flynn, fmr US Defense Intel Agency chief

‘Bully game between Russia, US will lead to more conflicts’ – fmr US Defense Intel Chief

Fox News Exclusive: Lt. Gen. Michael Flynn (Ret.) Interviewed by Chris Wallace on Fox News Sunday

Published on Feb 8, 2015

Our enemy has doubled or even more over the past decade; and we don’t have a coherent strategy in place to combat Islamic Extremism says Lt. General Michael Flynn to Chris Wallace in a Fox News Sunday Exclusive Interview

The use of media materials is protected by the Fair Use Clause of the U.S. Copyright Act of 1976 which allows for the rebroadcast of copyrighted materials for the purpose of commentary, criticism, and education.

The Global Threat Picture as the Defense Intelligence Agency Sees It

Fallout Grows Over Trump’s Pick for National Security Adviser

What Was The St. Valentines Day Massacre of 1929?

The St. Valentines Day Massacre

Enemy of the State (1998) Full Movie

NSA Whistleblower William Binney: The Future of FREEDOM

America’s Surveillance State (Full, Pt. 1-6)

The Silent Order NSA Sees Everything Hears Everything Documentary HD

Secret Surveillance Of Americans – Intel Chief Defends Spying Program – Wake Up America!!

The Political Assassination of Michael Flynn

FEB 14, 2017 10:09 AM EST

By Eli Lake

If we are to believe the Trump White House, National Security Adviser Michael Flynn just resigned because he lied about his conversations with Russia’s ambassador to the vice president. As White House senior counselor Kellyanne Conway told NBC’s “Today Show” on Tuesday: “Misleading the vice president really was the key here.”

That sounds about as credible as when the president told CIA employees that the media had invented the story about his enmity toward the spy agency, not even two weeks after he had taken to Twitter to compare the CIA to Nazis. It’s about as credible as President Donald Trump’s insistence that it didn’t rain during his inauguration. Or that millions of people had voted illegally in the election he just won.

The point here is that for a White House that has such a casual and opportunistic relationship with the truth, it’s strange that Flynn’s “lie” to Pence would get him fired. It doesn’t add up.

It’s not even clear that Flynn lied. He says in his resignation letter that he did not deliberately leave out elements of his conversations with Ambassador Sergey Kislyak when he recounted them to Vice President Mike Pence. The New York Times and Washington Post reported that the transcript of the phone call reviewed over the weekend by the White House could be read different ways. One White House official with knowledge of the conversations told me that the Russian ambassador raised the sanctions to Flynn and that Flynn responded that the Trump team would be taking office in a few weeks and would review Russia policy and sanctions. That’s neither illegal nor improper.

What’s more, the Washington Post reported Monday night that last month Sally Yates, then the acting attorney general, had informed the White House that Flynn discussed sanctions with Kislyak and that he could be susceptible to blackmail because he misled Pence about it. If it was the lie to Pence that sunk Flynn, why was he not fired at the end of January?

A better explanation here is that Flynn was just thrown under the bus. His tenure as national security adviser, the briefest in U.S. history, was rocky from the start. When Flynn was attacked in the media for his ties to Russia, he was not allowed by the White House to defend himself. Over the weekend, he was instructed not to speak to the press when he was in the fight for his political life. His staff was not even allowed to review the transcripts of his call to the Russian ambassador.

There is another component to this story as well — as Trump himself just tweeted. It’s very rare that reporters are ever told about government-monitored communications of U.S. citizens, let alone senior U.S. officials. The last story like this to hit Washington was in 2009 when Jeff Stein, then of CQ, reported on intercepted phone calls between a senior Aipac lobbyist and Jane Harman, who at the time was a Democratic member of Congress.

Normally intercepts of U.S. officials and citizens are some of the most tightly held government secrets. This is for good reason. Selectively disclosing details of private conversations monitored by the FBI or NSA gives the permanent state the power to destroy reputations from the cloak of anonymity. This is what police states do.

In the past it was considered scandalous for senior U.S. officials to even request the identities of U.S. officials incidentally monitored by the government (normally they are redacted from intelligence reports). John Bolton’s nomination to be U.S. ambassador to the United Nations was derailed in 2006 after the NSA confirmed he had made 10 such requests when he was Undersecretary of State for Arms Control in George W. Bush’s first term. The fact that the intercepts of Flynn’s conversations with Kislyak appear to have been widely distributed inside the government is a red flag.

Representative Devin Nunes, the Republican chairman of the House Permanent Select Committee on Intelligence, told me Monday that he saw the leaks about Flynn’s conversations with Kislyak as part of a pattern. “There does appear to be a well orchestrated effort to attack Flynn and others in the administration,” he said. “From the leaking of phone calls between the president and foreign leaders to what appears to be high-level FISA Court information, to the leaking of American citizens being denied security clearances, it looks like a pattern.”

Nunes said he was going to bring this up with the FBI, and ask the agency to investigate the leak and find out whether Flynn himself is a target of a law enforcement investigation. The Washington Post reported last month that Flynn was not the target of an FBI probe.

The background here is important. Three people once affiliated with Trump’s presidential campaign — Carter Page, Paul Manafort and Roger Stone — are being investigated by the FBI and the intelligence community for their contacts with the Russian government. This is part of a wider inquiry into Russia’s role in hacking and distributing emails of leading Democrats before the election.

Flynn himself traveled in 2015 to Russia to attend a conference put on by the country’s propaganda network, RT. He has acknowledged he was paid through his speaker’s bureau for his appearance. That doesn’t look good, but it’s also not illegal in and of itself. All of this is to say there are many unanswered questions about Trump’s and his administration’s ties to Russia.

But that’s all these allegations are at this point: unanswered questions. It’s possible that Flynn has more ties to Russia that he had kept from the public and his colleagues. It’s also possible that a group of national security bureaucrats and former Obama officials are selectively leaking highly sensitive law enforcement information to undermine the elected government.

Flynn was a fat target for the national security state. He has cultivated a reputation as a reformer and a fierce critic of the intelligence community leaders he once served with when he was the director the Defense Intelligence Agency under President Barack Obama. Flynn was working to reform the intelligence-industrial complex, something that threatened the bureaucratic prerogatives of his rivals.

He was also a fat target for Democrats. Remember Flynn’s breakout national moment last summer was when he joined the crowd at the Republican National Convention from the dais calling for Hillary Clinton to be jailed.

In normal times, the idea that U.S. officials entrusted with our most sensitive secrets would selectively disclose them to undermine the White House would alarm those worried about creeping authoritarianism. Imagine if intercepts of a call between Obama’s incoming national security adviser and Iran’s foreign minister leaked to the press before the nuclear negotiations began? The howls of indignation would be deafening.

In the end, it was Trump’s decision to cut Flynn loose. In doing this he caved in to his political and bureaucratic opposition. Nunes told me Monday night that this will not end well. “First it’s Flynn, next it will be Kellyanne Conway, then it will be Steve Bannon, then it will be Reince Priebus,” he said. Put another way, Flynn is only the appetizer. Trump is the entree.

https://www.bloomberg.com/view/articles/2017-02-14/the-political-assassination-of-michael-flynn

Former Obama Officials, Loyalists Waged Secret Campaign to Oust Flynn

Sources: Former Obama officials, loyalists planted series of stories to discredit Flynn, bolster Iran deal

Michael Flynn

Michael Flynn / AP

BY: Adam Kredo
February 14, 2017 3:26 pm

The abrupt resignation Monday evening of White House national security adviser Michael Flynn is the culmination of a secret, months-long campaign by former Obama administration confidantes to handicap President Donald Trump’s national security apparatus and preserve the nuclear deal with Iran, according to multiple sources in and out of the White House who described to the Washington Free Beacon a behind-the-scenes effort by these officials to plant a series of damaging stories about Flynn in the national media.

The effort, said to include former Obama administration adviser Ben Rhodes—the architect of a separate White House effort to create what he described as a pro-Iran echo chamber—included a small task force of Obama loyalists who deluged media outlets with stories aimed at eroding Flynn’s credibility, multiple sources revealed.

The operation primarily focused on discrediting Flynn, an opponent of the Iran nuclear deal, in order to handicap the Trump administration’s efforts to disclose secret details of the nuclear deal with Iran that had been long hidden by the Obama administration.

Insiders familiar with the anti-Flynn campaign told the Free Beacon that these Obama loyalists plotted in the months before Trump’s inauguration to establish a set of roadblocks before Trump’s national security team, which includes several prominent opponents of diplomacy with Iran. The Free Beacon first reported on this effort in January.

Sources who spoke to the Free Beacon requested anonymity in order to speak freely about the situation and avoid interfering with the White House’s official narrative about Flynn, which centers on his failure to adequately inform the president about a series of phone calls with Russian officials.

Flynn took credit for his missteps regarding these phone calls in a brief statement released late Monday evening. Trump administration officials subsequently stated that Flynn’s efforts to mislead the president and vice president about his contacts with Russia could not be tolerated.

However, multiple sources closely involved in the situation pointed to a larger, more secretive campaign aimed at discrediting Flynn and undermining the Trump White House.

“It’s undeniable that the campaign to discredit Flynn was well underway before Inauguration Day, with a very troublesome and politicized series of leaks designed to undermine him,” said one veteran national security adviser with close ties to the White House team. “This pattern reminds me of the lead up to the Iran deal, and probably features the same cast of characters.”

The Free Beacon first reported in January that, until its final days in office, the Obama administration hosted several pro-Iran voices who were critical in helping to mislead the American public about the terms of the nuclear agreement. This included a former Iranian government official and the head of the National Iranian American Council, or NIAC, which has been accused of serving as Iran’s mouthpiece in Washington, D.C.

Since then, top members of the Obama administration’s national security team have launched a communications infrastructure after they left the White House, and have told reporters they are using that infrastructure to undermine Trump’s foreign policy.

“It’s actually Ben Rhodes, NIAC, and the Iranian mullahs who are celebrating today,” said one veteran foreign policy insider who is close to Flynn and the White House. “They know that the number one target is Iran … [and] they all knew their little sacred agreement with Iran was going to go off the books. So they got rid of Flynn before any of the [secret] agreements even surfaced.”

Flynn had been preparing to publicize many of the details about the nuclear deal that had been intentionally hidden by the Obama administration as part of its effort to garner support for the deal, these sources said.

Flynn is now “gone before anybody can see what happened” with these secret agreements, said the second insider close to Flynn and the White House.

Sources in and out of the White House are concerned that the campaign against Flynn will be extended to other prominent figures in the Trump administration.

One senior White House official told the Free Beacon that leaks targeting the former official were “not the result of a series of random events.”

“The drumbeat of leaks of sensitive material related to General Flynn has been building since he was named to his position,” said the official, who is a member of the White House’s National Security Council. “Last night was not the result of a series of random events. The president has lost a valuable adviser and we need to make sure this sort of thing does not happen again.”

Other sources expressed concern that public trust in the intelligence community would be eroded by the actions of employees with anti-Trump agendas.

“The larger issue that should trouble the American people is the far-reaching power of unknown, unelected apparatchiks in the Intelligence Community deciding for themselves both who serves in government and what is an acceptable policy they will allow the elected representatives of the people to pursue,” said the national security adviser quoted above.

“Put aside the issue of Flynn himself; that nameless, faceless bureaucrats were able to take out a president’s national security adviser based on a campaign of innuendo without evidence should worry every American,” the source explained.

Eli Lake, a Bloomberg View columnist and veteran national security reporter well sourced in the White House, told the Free Beacon that Flynn earned a reputation in the Obama administration as one of its top detractors.

“Michael Flynn was one of the Obama administration’s fiercest critics after he was forced out of the Defense Intelligence Agency,” said Lake, who described “the political assassination of Michael Flynn” in his column published early Tuesday.

“[Flynn] was a withering critic of Obama’s biggest foreign policy initiative, the Iran deal,” Lake said. “He also publicly accused the administration of keeping classified documents found in the Osama bin Laden raid that showed Iran’s close relationship with al Qaeda. He was a thorn in their side.”

Lake noted in his column that he does not buy fully the White House’s official spin on Flynn’s resignation.

“For a White House that has such a casual and opportunistic relationship with the truth, it’s strange that Flynn’s ‘lie’ to Pence would get him fired,” Lake wrote. “It doesn’t add up.”

White House Press Secretary Sean Spicer stated in his daily briefing that “the evolving and eroding level of trust as a result of this situation and a series of other questionable incidents is what led the president to ask General Flynn for his resignation.”

A third source who serves as a congressional adviser and was involved in the 2015 fight over the Iran deal told the Free Beacon that the Obama administration feared that Flynn would expose the secret agreements with Iran.

“The Obama administration knew that Flynn was going to release the secret documents around the Iran deal, which would blow up their myth that it was a good deal that rolled back Iran,” the source said. “So in December the Obama NSC started going to work with their favorite reporters, selectively leaking damaging and incomplete information about Flynn.”

“After Trump was inaugurated some of those people stayed in and some began working from the outside, and they cooperated to keep undermining Trump,” the source said, detailing a series of leaks from within the White House in the past weeks targeting Flynn. “Last night’s resignation was their first major win, but unless the Trump people get serious about cleaning house, it won’t be the last.”

http://freebeacon.com/national-security/former-obama-officials-loyalists-waged-campaign-oust-flynn/

 

TRUMP: The ‘real story’ to emerge from Flynn resignation is ‘illegal leaks’ to media

GettyImages 632763746

US President Donald J. Trump. Drew Angerer/Getty Images

President Donald Trump on Tuesday morning assailed government officials who anonymously leaked information about Michael Flynn to the media, his first public comments since the embattled national security adviser resigned from his post on Monday.

“The real story here is why are there so many illegal leaks coming out of Washington? Will these leaks be happening as I deal on N.Korea etc?” Trump said on Twitter.

Flynn resigned as national security adviser on Monday night after just 24 days on the job, the shortest tenure anyone has ever served in the role. The resignation came amid an uproar over talks he had had with a Russian diplomat, the content of which he didn’t fully disclose to the administration, and followed a Washington Post report that said the White House was warned that he could be vulnerable to blackmail.

Newspapers such as The Post and The New York Times relied on unnamed government sources to shed light on what was taking place behind the scenes in the Trump White House, reportedly angering Trump and prompting him to lash out on Twitter against leakers.

The president’s sentiment about leakers echoed a narrative that has started to play out in media outlets friendly to him.

The website Breitbart, whose former chairman, Steve Bannon, now serves as the White House chief strategist, credited leakers in part for the resignation and said it “suggests that someone with access to that information also has a political axe to grind.”

“Every story about Flynn published over the weekend, or on Monday, contains multiple anonymous sources, some of which flatly contradict other anonymous sources,” another Breitbart story said. “That state of affairs will itself become an enduring narrative about the Trump White House if it doesn’t bring the leaks under control.”

The narrative was similar on Fox News. The outlet ran a story questioning why information was leaked to the media, and Laura Ingraham, a conservative talk-show host and Trump supporter,said on the network that Flynn’s resignation “really was the death by a thousand leaks.”

The Post reported on Monday that Trump ordered an internal investigation to determine who was leaking information to the media.

http://www.businessinsider.com/trump-leaks-white-house-administration-2017-2

Mike Flynn Is First Casualty of Turmoil in Trump Administration

Senior ranks of the administration are creating headlines of their own as they jockey for power and influence with the president

Former National Security Adviser Mike Flynn, shown last week, resigned on Monday.

Former National Security Adviser Mike Flynn, shown last week, resigned on Monday. PHOTO: CARLOS BARRIA/REUTERS

WASHINGTON—Dining at his oceanside resort in Florida on Friday, President Donald Trump was surprised to learn that national security adviser Mike Flynn was sitting at a nearby table, a person familiar with the event said.

“What is he doing here?” the president said, describing the man who was once at the center of his political orbit as “very controversial.”

After National Security Adviser Michael Flynn resigned on Monday, questions remain about his discussion of sanctions with Russia’s ambassador. What are some of the unknowns? WSJ’s Jason Bellini reports. Photo: AP

The moment epitomizes how quickly fortunes can change amid the chaos that has defined the opening act of Mr. Trump’s presidency. In just a few weeks, the nascent administration is being weighed down from within, sidetracked by dishonesty and potential ethical lapses as well as attacks from his own supporters and fellow Republicans.

Mr. Flynn on Monday became the first casualty of that chaos, resigning as head of the National Security Council after he lost the president’s trust by failing to fully disclose his conversations with Russian officials to senior White House officials, including Vice President Mike Pence.

“It’s a dysfunctional White House, and nobody knows who’s in charge,” Sen. John McCain (R., Ariz.) told reporters on Tuesday.

Several congressional committees are investigating the possible role that Russia played in the 2016 elections. In addition, the Republican-run House Oversight Committee has begun examining issues related to conflicts of interest and protection of classified information in the new White House.

The administration’s senior ranks are creating headlines of their own as they jockey for power and influence with the president.

Kellyanne Conway, a senior adviser, faces calls for an ethics investigation and possible disciplinary action. The Office of Government Ethics wrote to the White House on Tuesday that there was “strong reason” to believe Ms. Conway violated ethics rules for endorsing the product line of Mr. Trump’s daughter during a television interview.

Ms. Conway also appeared to be out of the loop, going on television Monday to declare that the president had “full confidence” in Mr. Flynn only to be contradicted within the hour by press secretary Sean Spicer, who said the president was still evaluating the national security adviser’s status.

Chief of Staff Reince Priebus also found himself with unwanted attention when Newsmax Chief Executive Christopher Ruddy, one of the president’s friends and a member of the Mar-a-lago oceanside resort, on Sunday talk shows expressed frustration with Mr. Priebus’s performance. Messrs. Priebus and Jared Kushner, the president’s son-in-law and top adviser, later called Mr. Ruddy and briefed him on plans to improve communications going forward. The media executive now has reversed his opinion of the White House team.

Still, Mr. Priebus has other detractors.

“Reince Priebus walked Mike Flynn to the gallows,” Roger Stone, a former political adviser for Mr. Trump, said on Tuesday, calling it a “Pearl Harbor moment” for Trump supporters. “Trump loyalists are fed up with Reince Priebus and Sean Spicer whose loyalties are to the Republican National Committee, and not to the president.”

But even for a White House that has been in nearly constant damage control, Mr. Flynn was a consistent flashpoint.

Reince Priebus walked Mike Flynn to the gallows.

—Roger Stone, a former political adviser for Donald Trump

Two days before Mr. Trump’s inauguration, Mr. Kushner and senior adviser Steve Bannon took a red-eye flight from New York to Washington to ease concerns about Mr. Flynn from incoming cabinet members, including eventual Secretary of State Rex Tillerson and Defense Secretary Jim Mattis.

The administration later installed Keith Kellogg as Mr. Flynn’s staff chief and elevated the role of homeland security adviser, Tom Bossert, to give him equal sway inside the White House as Mr. Flynn.

On Tuesday, Mr. Kellogg, who was named interim national security adviser following Mr. Flynn’s resignation, led an all-hands meeting of National Security Council staff. The message was direct and simple, said one attendee: Keep working hard, and please, don’t quit.

Mr. Flynn’s resignation surprised Japanese officials, who said the adviser was key in orchestrating the Trump administration’s fledgling relationship with Tokyo. Mr. Flynn had attended “nearly all of the events” during Prime Minister Shinzo Abe’s visit to Washington and Florida last week, officials said.

He sat in on the meeting between Messrs. Trump and Abe at the White House on Friday, and, at Mar-a-Lago, was involved in drafting statements to condemn North Korea’s launching of a ballistic missile into the Sea of Japan over the weekend.

Mr. Flynn loomed large in the country’s bilateral interactions with Japan, due in part to the fact that Mr. Tillerson hadn’t yet been confirmed, officials said. Mr. Flynn visited Tokyo and was the only attendee at Mr. Trump’s November meeting with Mr. Abe at Trump Tower, after an initial greeting session with a bigger group.

“We tried to help him succeed,” one senior administration official said. “It was absolute dysfunction.”

The intrigue is likely to continue.

Senior White House advisers have suggested to cabinet secretaries or nominees that they need to be consulted on all personnel and policy decisions, creating friction between the agencies and the White House officials who have been permanently stationed inside their buildings.

Many of the U.S. ambassadorships remain unfilled, a result of a standoff between Mr. Tillerson and Mr. Priebus, the chief of staff, said people familiar with the process.

Mr. Trump had told Mr. Tillerson he would have a say in appointing some key ambassadorships, including Canada and Switzerland, those people said. Mr. Priebus subsequently got the president to approve names for those positions—including several top donors to the RNC—without consulting the secretary of state, which angered Mr. Tillerson.

Spokesmen for the State Department and Mr. Priebus didn’t respond to requests for comment.

The infighting has sown growing insecurity among Mr. Priebus and his top aides.

When Mr. Trump called Mr. Bossert, the homeland security adviser, into his office earlier this month, deputy chief of staff Katie Walsh spotted him entering the Oval Office and sprinted down the hallway to alert her boss, Mr. Priebus, according to a person familiar with the events. Mr. Priebus subsequently dashed into the office, where he reprimanded Mr. Bossert—in front of Mr. Trump—for trying to meet with the president without him.

“Reince is doing a great job,” Mr. Trump told reporters at the White House on Monday. “Not a good job. A great job.”

Mr. Trump avoided questions about Mr. Flynn Monday during a news conference with Canadian Prime Minister Justin Trudeau. Consequently, reporters lined up and spent three hours waiting outside Mr. Spicer’s office to get an update.

When Mr. Trump walked by on his way to the Oval Office, they shouted questions about him about his national security adviser.

Mr. Trump ignored them, and turned to a picture on the wall of the audience that witnessed his inaugural speech on Jan. 20. Mr. Trump ignited the first controversy of his presidency by ordering Mr. Spicer to push back on widely reported data that showed that the crowd witnessing his inauguration was smaller than his predecessor’s audience.

“Where did all these people come from? Ohhh,” Mr. Trump said, feigning surprise as he leaned over the picture and pointed to individual people in the crowd.

https://www.wsj.com/articles/mike-flynn-is-first-casualty-of-turmoil-in-trump-administration-1487121454

Michael Flynn resigns as Trump’s national security adviser

President Trump’s national security adviser, Michael Flynn, resigned late Monday night amid mounting accusations that he had illicit communications with the Russian ambassador to the United States that positioned him as a potential target for blackmail.

Flynn submitted his letter of resignation to the president just three weeks into the administration, saying he “inadvertently” gave Vice President Mike Pence “incomplete information” on phone calls he had with Russian Ambassador Sergey Kislyak in which he allegedly discussed lifting sanctions against Moscow.

“I have sincerely apologized to the President and the Vice President,” the letter stated, “and they have accepted my apology.”

Flynn, who was fired by then-President Barack Obama as head of the Defense Intelligence Agency, said he was honored to serve with Trump and believed in the mission to “make America great again.”

Retired Army Gen. Keith Kellogg will take over on an interim basis.

The swift resignation came just hours after The Washington Post reported that weeks ago, then-acting Attorney General Sally Yates had warned the White House that Flynn had misled Pence about the nature of his conversations with Kislyak.

Yates told the White House counsel that the Justice Department was concerned Flynn might be vulnerable to blackmail after he insisted to Pence and others that he had not discussed Obama’s sanctions against Russia during a call with Kislyak, the paper reported.

Obama levied the sanctions after it was revealed that Russia was all but certainly involved in hacking and interference in the US presidential election.

Flynn’s contact with the Russian ambassador before Trump was sworn in could violate the Logan Act, which bans unauthorized US citizens from “communicating with a foreign government.”

The national security adviser made conflicting public statements on the communications as more information came to light.

US intelligence agencies regularly monitor calls by Russian diplomats, and reports claim there is a transcript of the Dec. 29 phone call as the sanctions were levied against Vladimir Putin.

Flynn appeared to be in the president’s good graces just hours before his resignation Monday as he sat in the front row of Trump’s news conference with Canadian Prime Minister Justin Trudeau.

Later Monday evening, the White House press secretary, Sean Spicer, said that Trump was “evaluating the situation.”

The New York Times also reported that the US Army has been investigating Flynn’s ties to Russia and whether he was paid by that country during a trip he took to Moscow in 2015.

During an interview with The Washington Post last year, Flynn admitted that he had been paid by the Russian state-run television station RT.

Trump’s 36-year-old son-in-law, Jared Kushner, has been assisting in the search to replace Flynn.

One of the names being considered was disgraced former Gen. David Petraeus, according to Politico.

Petraeus, a former head of the CIA for Obama, was himself caught in a scandal when it was revealed that he had leaked classified information to his mistress and biographer, Paula Broadwell. He resigned in 2012 and served two years’ probation as part of a plea deal.

Other possible picks for the high-level position include: Stephen Hadley, former national security adviser to President George W. Bush; Tom Bossert, who also served as a national security aide under Bush; Adm. James Stavridis; and Department of Homeland Security head John Kelly.

 

View image on Twitter

 

http://nypost.com/2017/02/13/michael-flynn-resigns-as-trumps-national-security-adviser/Opinions

Why did Obama dawdle on Russia’s hacking?

President Obama meets with President-elect Donald Trump in the Oval Office. (Pablo Martinez Monsivais/Associated Press)

Opinion writer January 12

This column has been updated below.

“Something is rotten in the state of Denmark,” mutters Marcellus as ghosts and mad spirits haunt Elsinore castle in the first act of Shakespeare’s “Hamlet.”

After this past week of salacious leaks about foreign espionage plots and indignant denials, people must be wondering if something is rotten in the state of our democracy. How can we dispel the dark rumors that, as Hamlet says, “shake our disposition”?

I’d suggest four questions to clear the haze of allegation and recrimination that surrounds President-elect Donald Trump and our intelligence agencies a week before his inauguration. Getting answers may take months — but that’s the best way to avoid a Shakespearean tragic ending.

Question 1: Did Trump’s campaign encourage Russia’s alleged hacking to hurt his rival Hillary Clinton and help him, and does Russia have any leverage over him? Trump finally conceded at his news conference Wednesday that “as far as hacking, I think it was Russia,” but he insisted he has “no dealings with Russia” and “no loans with Russia.” He didn’t answer a question about whether he or anyone from his staff had contact with Russia during the campaign.

These are the measures Obama is taking to punish Russia over election interference

 

The announcement culminates months of vigorous internal debate over whether and how to respond to Russia’s unprecedented election-year provocations, ranging from the hacks of the Democratic National Committee to the targeting of state electoral systems.(The Washington Post)

The country needs to know what’s true and what’s false. The Post and other news organizations spent months trying to check out a dossier about possible Russia-Trump contacts prepared by a former British intelligence officer. The press couldn’t confirm alleged meetings during the campaign. The FBI and other intelligence agencies have had the dossier, too, since late summer. Their investigation remains open, it appears.

A full investigation could establish who did what, and when. In a case where a foreign intelligence service allegedly ran a covert action against the United States’ political system, aborting the inquiry would be scandalous.

Question 2: Why did the Obama administration wait so long to deal with Russia’s apparent hacking? This is the Hamlet puzzle in our drama. Like the prince of Denmark, President Obama delayed taking action even as evidence mounted of dastardly deeds. The first stories about Russian hacking broke in the summer. In September, the “Gang of Eight” — the top congressional leadership on intelligence — was getting detailed briefings on the hacking. The FBI by then had obtained the British ex-spy’s dossier.

The intelligence community issued a statement Oct. 7 charging that “Russia’s senior-most officials” had sought to “interfere with the U.S. election process.” Given that, why didn’t Obama do more?

The White House probably feared that further action might trigger a process of escalation that could bring even worse election turmoil. Trump was barnstorming the country claiming that the election was rigged and warning he might not accept the outcome. Did the administration worry that the Russians would take additional steps to hurt Clinton and help Trump, and might disrupt balloting itself? We need to know.

Question 3: What discussions has the Trump team had with Russian officials about future relations? Trump said Wednesday that his relationship with President Vladimir Putin is “an asset, not a liability.” Fair enough, but until he’s president, Trump needs to let Obama manage U.S.-Russia policy.

Retired Lt. Gen. Michael T. Flynn, Trump’s choice for national security adviser, cultivates close Russian contacts. He has appeared on Russia Today and received a speaking fee from the cable network, which was described in last week’s unclassified intelligence briefing on Russian hacking as “the Kremlin’s principal international propaganda outlet.”

According to a senior U.S. government official, Flynn phoned Russian Ambassador Sergey Kislyak several times on Dec. 29, the day the Obama administration announced the expulsion of 35 Russian officials as well as other measures in retaliation for the hacking. What did Flynn say, and did it undercut the U.S. sanctions? The Logan Act (though never enforced) bars U.S. citizens from correspondence intending to influence a foreign government about “disputes” with the United States. Was its spirit violated? The Trump campaign didn’t immediately respond to a request for comment.

If the Trump team’s contacts helped discourage the Russians from a counter-retaliation, maybe that’s a good thing. But we ought to know the facts.

Question 4: Finally, what’s the chance that Russian intelligence has gamed its covert action more subtly than we realize? Applying a counter-intelligence lens, it’s worth asking whether the Russians hoped to be discovered, and whether Russian operatives fed the former MI6 officer’s controversial dossier deliberately, to sow further chaos.

These questions need to be answered — not to undermine Trump, but to provide a factual base to help the country recover from an attack on its political system. As Trump rightly says, “fake news” threatens our democracy. Truth will protect it.

UPDATE: The Trump transition team did not respond Thursday night to a request for comment. But two team members called with information Friday morning. A first Trump official confirmed that Flynn had spoken with Kislyak by phone, but said the calls were before sanctions were announced and didn’t cover that topic. This official later added that Flynn’s initial call was to express condolences to Kislyak after the terrorist killing of the Russian ambassador to Ankara Dec. 19, and that Flynn made a second call Dec. 28 to express condolences for the shoot-down of a Russian plane carrying a choir to Syria. In that second call, Flynn also discussed plans for a Trump-Putin conversation sometime after the inauguration. In addition, a second Trump official said the Dec. 28 call included an invitation from Kislyak for a Trump administration official to visit Kazakhstan for a conference in late January.

https://www.washingtonpost.com/opinions/why-did-obama-dawdle-on-russias-hacking/2017/01/12/75f878a0-d90c-11e6-9a36-1d296534b31e_story.html?utm_term=.cf778a68dd78

The timeline of Michael Flynn’s resignation just looks bad for the Trump White House

February 14 at 3:40 PM

 

The timeline below has been updated with more details from White House press secretary Sean Spicer’s daily briefing.

Perhaps the most striking thing about Michael Flynn’s resignation as national security adviser is that it didn’t come sooner.

As The Washington Post reported late Monday, just hours before Flynn resigned, the White House was told weeks ago that Flynn had misled them about his talks with Russia’s ambassador to the United States.

Yet the situation didn’t come to a head until the public disclosure last week of what Flynn says was his faulty recollection of the call — and specifically, the fact that it included talk about sanctions, which Flynn and Vice President Pence had both denied.

Which leads to the question: Was the White House concerned that Flynn had apparently lied to them — or at least done something he shouldn’t have and failed to disclose it? Would it ever have taken corrective action if the situation hadn’t been made public?

Here’s why Trump’s national security adviser Michael Flynn resigned after just 24 days

Embed Share

Play Video2:36
President Trump’s national security adviser Michael Flynn resigned Feb. 13 after revelations that he had discussed sanctions on Russia with the Russian ambassador to the U.S. prior to Trump taking office. Here’s what you need to know. (Deirdra O’Regan/The Washington Post)

These are all fair questions, especially since the administration had, until late Monday, given no indication that Flynn’s job was in jeopardy. Appearing on MSNBC early Monday evening, Trump counselor Kellyanne Conway even said the administration had “full confidence” in Flynn. Yet just minutes later, White House press secretary Sean Spicer said Trump was “evaluating the situation.” Hours later, Flynn resigned.

It’s a bit of a complex situation. So it’s worth deconstructing with a timeline:

  • Dec. 29: Flynn, a former lieutenant general who had been selected as Trump’s national security adviser, speaks to Russia’s ambassador to the United States, Sergey Kislyak. Despite Flynn’s later denial and the White House’s later comments, he and Kislyak discuss sanctions and the possibility of relieving them once Trump is president — even as the Obama administration was announcing new sanctions for Russia’s alleged meddling in the 2016 election.
  • Jan. 12: For the first time, Flynn’s talks with the Russian ambassador are reported by Post columnist David Ignatius. Few details are known, but Ignatius notes that if the two discussed the sanctions, this could violate an obscure law known as the Logan Act, which prohibits unauthorized citizens from dealing in disputes with foreign governments.
  • Jan. 13: In his first comments on the matter, Spicer says Flynn told him that he had exchanged text messages with Kislyak before they spoke on Dec. 28. (The date was later corrected to Dec. 29.) But Spicer said it was only to discuss logistics for a call between Russian President Vladimir Putin and Trump after Trump was sworn in as president. “That was it, plain and simple,” Spicer said.
  • Jan. 14: Flynn assures Pence, who was then the vice president-elect, that the two of them didn’t discuss sanctions, according to Pence.
  • Jan. 15: Pence says on the Sunday shows that Flynn and Kislyak didn’t discuss sanctions. “I talked to General Flynn yesterday, and the conversations that took place at that time were not in any way related to the new U.S. sanctions against Russia or the expulsion of diplomats,” Pence says on “Fox News Sunday.”
  • Jan. 26: The Justice Department, then headed by acting attorney general Sally Yates (whom Trump would later dismiss for not defending his travel ban), informs White House counsel Don McGahn of Flynn’s misleading statements. It also warns that they were so egregious that he could open himself up to Russian blackmail, given Russia knew he had mischaracterized the call to his superiors, according to Washington Post reporting. Spicer confirmed the specific date on Tuesday. “The first day that the Department of Justice … sought to notify White House counsel was January 26,” Spicer said. “The president was immediately informed of the situation.” Spicer said the White House didn’t believe Flynn had violated the law. None of this was disclosed publicly at the time.
  • Feb. 8: In an interview with The Post that would be published the following day, Flynn categorically denies having discussed sanctions with the Russian ambassador.
  • Feb. 9: The Post reports that Flynn did, in fact, discuss sanctions with the Russian ambassador. In response, a spokesperson amends Flynn’s denial, saying that he “indicated that while he had no recollection of discussing sanctions, he couldn’t be certain that the topic never came up.”
  • Feb. 10: Trump says in brief comments aboard Air Force One that he is unaware of The Post’s report but that he will “look into” it.
  • Around 5 p.m. Monday: Conway says the White House has “full confidence” in Flynn and seems to excuse him for having forgotten that he discussed sanctions with the Russian ambassador.
  • Also around 5 p.m. Monday: Spicer issues a contradictory statement. “The president is evaluating the situation,” he said. “He’s speaking to the vice president relative to the conversation the vice president had with Gen. Flynn, and also speaking to various other people about what he considers the single most important subject there is: our national security.”
  • 8 p.m. Monday: The Post reports that the Justice Department had told the White House last month “that Flynn had so mischaracterized his communications with the Russian diplomat that he might be vulnerable to blackmail by Moscow.”
  • Shortly before 11 p.m. Monday: Flynn resigns.
  • Tuesday morning: Conway says Flynn resigned voluntarily.
  • Tuesday afternoon: Spicer, again contradicting Conway, says Trump requested the resignation: “Whether or not he actually misled the vice president was the issue, and that was ultimately what led to the president asking for and accepting the resignation of General Flynn. That’s it. Pure and simple, it was a matter of trust.”

A few questions on this:

  1. Was the administration planning to take any action based on the Justice Department’s late-January news of Flynn having misled them?
  2. Trump said he hadn’t heard about The Post story on Flynn having misled his administration as recently as Feb. 10. Did the White House counsel really not inform the president about what the Justice Department had said? Or was it perhaps disregarded once Yates, an Obama appointee, was dismissed in a separate matter?
  3. Do White House officials truly accept Flynn’s contention that he simply forgot about discussing sanctions? Conway’s comments Monday suggest they do. But Russian sanctions were one of the biggest stories in U.S. foreign policy at the time.
  4. Even if Flynn did truly forget, would it be okay that he discussed something he wasn’t supposed to during the phone call?

Much will play out in the hours ahead. For now, though, Flynn’s resignation probably won’t do anything to tamp down questions about what the White House knew when and just how seriously it was taking the matter.

https://www.washingtonpost.com/news/the-fix/wp/2017/02/14/the-timeline-of-michael-flynns-resignation-is-troubling-for-the-trump-white-house/?utm_term=.04909a8a7a41

DEEP STATE LEAK CAMPAIGN BRINGS DOWN NATIONAL SECURITY ADVISOR MICHAEL FLYNN

After one of the most blatant leak campaigns by national security officials in recent memory, former General Michael Flynn resigned from office as national security advisor Monday evening. The official reason for the resignation was giving “incomplete information” to the vice president and others about a call between himself and the Russian Ambassador to the United States Sergey Kislyak in December.

Today, White House Press Secretary Sean Spicer said President Trump lost confidence in Flynn related to his memory and honesty, particularly in reference to what Flynn told the vice president. Spicer also said a legal review was performed by the White House Counsel’s Office which found no legal issues with Flynn’s conduct. Spicer said the fundamental issue was trust.

According to The New York Times, the White House reviewed a transcript of the call—retained from a longstanding wire tape of Kislyak—and found it to be “ambiguous enough that Mr. Trump could have justified either firing or retaining Mr. Flynn.”

So what led President Trump to go with firing? Probably the torrent of stories smashing down on the White House that were part of a clearly coordinated campaign that reached crescendo on Sunday when stories from The New York Times, The Washington Post, The Wall Street Journal, and Politico hit within a 30-minute period.

All the stories claimed to be predicated on information from national security officials and other insiders.

If that’s what “full confidence” looks like…

A small group of current and former national security officials just leaked Mike Flynn out of a job. Does anyone think they’ll stop there?

The Washington Post has been the biggest repository of leaks and started the campaign when intelligence officials told David Ignatius (and eventually other Washington Post reporters) that Flynn had talked to Russian Ambassador Sergey Kislyak about sanctions in a phone call after the election, but before taking office.

This would be a completely benign event by any standard outside the fevered dreams of partisans. Talking to an ambassador about sanctions or any issue of foreign policy is well within an incoming national security advisor’s purview. The Logan Act, a law forbidding non-U.S. officials from engaging in foreign policy, is a dead letter and likely unconstitutional.

If the Logan Act were actually enforced, many U.S. citizens, including members of Congress and former presidents, would face indictment. Only one person has ever been indicted under the act and no one has ever been prosecuted since its enactment in 1799.

Adding to the circumstantial evidence were stories on Monday by The Washington Post framing a conversation between now-fired acting Attorney General Sally Yates, intelligence officials James Clapper and John Brennan, and President Donald Trump as a concern about Flynn being compromised by Russia.

The theory of being compromised here is that because Flynn denied he talked about sanctions, the Russians could blackmail him into doing their bidding by exposing that he had talked—in benign terms—about sanctions. If that sounds like strained logic, that’s because it is.

While there is no doubt Flynn’s troubled relationship with Vice President Pence was a factor, it is downright irresponsible to not note that Flynn had many enemies within the deep state, including those in a position to leak information to the press to take him down.

That the Russian call is not a coincidence. Former intelligence officers like John Schindler have claimed (without evidence) that Flynn is a Kremlin agent. The New York Times reported there was an investigation into Flynn’s trip to Russia in 2015 by the Department of Defense.

Some of the leaks almost certainly came from the CIA, which has had a long running feud with Flynn that goes back to the Obama Administration and Flynn’s time as head of the Defense Intelligence Agency (DIA). Flynn was ultimately fired by President Obama, but not before DIA created a now notorious 2012 memo that blamed the CIA for the rise of ISIS.

The memo became a major point of conflict with Flynn, who affirmed it, while former CIA Director Mike Morell attempted to discredit it:

Soon after it was written, the 2012 IIR (Intelligence Information Report) landed on the desks of Congressional Intelligence Committee members, but more importantly would be used to argue policy at the White House—this according to the Defense Department’s chief of military intelligence at the time the memo was produced.

Director of the DIA at the time of the memo’s drafting and former Senior Intelligence Officer for the Joint Special Operations Command (JSOC), Michael Flynn, has repeatedly affirmed the report’s accuracy in public statements. But now, for the first time, a CIA perspective has been offered: former CIA Deputy Director Michael Morell recently took to Politico to weigh in on controversy surrounding the now declassified 2012 memo, which further warned that “the Salafists, the Muslim Brotherhood, and AQI are the major forces driving the insurgency in Syria” and that “the West, Gulf countries, and Turkey support the opposition.”

As Shadowproof discussed with former CIA officer John Kiriakou recently, there is a raging power struggle going on between the CIA and President Trump. Flynn was certainly one of the CIA’s major targets, but hardly their only one.

What is relevant and noteworthy is that Trump blinked. The deep state leaked information to the press and, instead of shrugging off the charges, he forced Flynn to resign. For a man who came to power using the press as his chief foil, it’s a strange move and, for a press clearly at war with the White House, a now proven method for undermining the presidency.

https://shadowproof.com/2017/02/14/deep-state-leak-campaign-brings-down-nsa-flynn/

Michael T. Flynn

From Wikipedia, the free encyclopedia
For other people named Michael Flynn, see Michael Flynn (disambiguation).
Michael T. Flynn
Michael T Flynn.jpg
25th National Security Advisor
In office
January 20, 2017 – February 13, 2017
President Donald Trump
Deputy K. T. McFarland
Preceded by Susan Rice
Succeeded by Keith Kellogg (Acting)
Director of the Defense Intelligence Agency
In office
July 24, 2012 – August 7, 2014
President Barack Obama
Preceded by Ronald Burgess
Succeeded by David Shedd (Acting)
Personal details
Born Michael Thomas Flynn
December 1958 (age 58)
Middletown, Rhode Island, U.S.
Political party Democratic
Education University of Rhode Island, Kingston (BS)
Golden Gate University (MBA)
United States Army Command and General Staff College (MMAS)
Naval War College (MA)
Website Official website
Military service
Allegiance  United States
Service/branch  United States Army
Years of service 1981–2014
Rank US-O9 insignia.svg Lieutenant General
Unit Defense Intelligence Agency
Joint Functional Component Command for Intelligence, Surveillance and Reconnaissance
Battles/wars Operation Urgent Fury
Operation Uphold Democracy
Operation Enduring Freedom
Operation Iraqi Freedom
Awards Defense Meritorious Service Medal
Defense Superior Service Medal (4)
Legion of Merit (2)
Bronze Star Medal (4)
Meritorious Service Medal (6)
Joint Service Commendation Medal
Army Commendation Medal (6)

Michael ThomasMikeFlynn (born December 1958) is a retired United States Army Lieutenant General who was the 18th Director of the Defense Intelligence Agency, and was the 25th National Security Advisor, serving President Donald Trump for 24 days, from January 20 to February 13, 2017,[1][2] before resigning amid controversy over his contacts with Russian officials. Flynn’s tenure as National Security Advisor is the shortest in history.[3][4]

Flynn’s military career was primarily operational, with numerous combat arms, conventional and special operations senior intelligence assignments. He co-authored a report in January 2010 through the Center for a New American Security entitled Fixing Intel: A Blueprint for Making Intelligence Relevant in Afghanistan.[5] In addition, Flynn served as the commander of the Joint Functional Component Command for Intelligence, Surveillance and Reconnaissance, chair of the Military Intelligence Board, Assistant Director of National Intelligence,[6][7] and the senior intelligence officer for the Joint Special Operations Command. He retired with 33 years service in the Army, a year before he was scheduled to leave his position.

On November 18, 2016, President-elect Donald Trump announced that Flynn would serve as National Security Advisor in his coming administration. As a member of the Executive Office of the President, Flynn did not require confirmation by the United States Senate.[8]

Even prior to his appointment as National Security Advisor, Flynn had already drawn criticism for what sources including The Washington Post and Associated Press have described as his close relations with Russia,[9][10][11][12] and for his promotion and popularization of anti-Clinton conspiracy theories and fake news stories during the 2016 presidential campaign.[13][14] On January 22, 2017, The Wall Street Journal reported that Flynn was under investigation by U.S. counterintelligence agents for his communications with Russian officials.[15] Flynn resigned on February 13, 2017.[16]

Early life and education

Flynn was born in December 1958 in Middletown, Rhode Island,[7] the son of Helen Frances (Andrews), who worked in real estate, and Charles Francis Flynn, a banker.[17][18][19][20]

Michael Flynn graduated from the University of Rhode Island with a Bachelor of Science degree in management science in 1981 and was a Distinguished Military Graduate of the Reserve Officers’ Training Corps. He also earned a Master of Business Administration in Telecommunications from Golden Gate University, a Master of Military Art and Science from the United States Army Command and General Staff College, and a Master of Arts in National Security and Strategic Studies from the Naval War College.[1]

Flynn is a graduate of the Military Intelligence Officer Basic Course, Military Intelligence Officer Advanced Course, Army Command and General Staff College, the School of Advanced Military Studies, and Naval War College.[1]

Military career

U.S. Army

General Stanley McChrystal and Flynn in Afghanistan, 2010

Flynn was commissioned in the U.S. Army as a second lieutenant in military intelligence, in 1981.[1] His military assignments included multiple tours at Fort Bragg, North Carolina, with the 82nd Airborne Division, XVIII Airborne Corps, and Joint Special Operations Command, where he deployed for the invasion of Grenada in Grenada and Operation Uphold Democracy in Haiti.[21] He also served with the 25th Infantry Division at Schofield Barracks, Hawaii, and at the Joint Readiness Training Center at Fort Polk, Louisiana, and the Army Intelligence Center at Fort Huachuca, Arizona.[1]

Flynn served as the assistant chief of staff, G2, XVIII Airborne Corps at Fort Bragg, North Carolina, from June 2001 and the director of intelligence, Joint Task Force 180 in Afghanistan until July 2002. He commanded the 111th Military Intelligence Brigade from June 2002 to June 2004.[1] He was the director of intelligence for Joint Special Operations Command from July 2004 to June 2007, with service in Afghanistan (Operation Enduring Freedom) and Iraq (Operation Iraqi Freedom). He served as the director of intelligence, United States Central Command from June 2007 to July 2008, as the director of intelligence, Joint Staff from July 2008 to June 2009, then the director of intelligence, International Security Assistance Force in Afghanistan from June 2009 to October 2010.[1][22]

Defense Intelligence Agency, Director

Flynn speaks during the change of directorship for the Defense Intelligence Agency on Joint Base Anacostia-Bolling in Washington, D.C.

In September 2011, Flynn was promoted to Lieutenant General and assigned to the Office of the Director of National Intelligence. On April 17, 2012, President Barack Obama nominated Flynn to be the 18th director of the Defense Intelligence Agency.[23][24] Flynn took command of the DIA in July 2012.[25] In October 2012, Flynn announced plans to release his paper “VISION2020: Accelerating Change Through Integration”, a broad look at how the Defense Intelligence Agency must transform to meet the national security challenges for the 21st Century.[26] It was meant to emphasize “integration, interagency teamwork and innovation of the whole workforce, not just the technology but the people”. [27]

Retirement

On April 30, 2014, Flynn announced his retirement effective later in 2014, about a year earlier than he had been scheduled to leave his position. He was reportedly effectively forced out of the DIA after clashing with superiors over his allegedly chaotic management style and vision for the agency.[28][29][30][31] In a private e-mail that was leaked online, Colin Powell said that he had heard in the DIA (apparently from later DIA director Vincent R. Stewart) that Flynn got fired because he was “Abusive with staff, didn’t listen, worked against policy, bad management, etc.”[30] According to The New York Times, Flynn exhibited a loose relationship with facts, leading his subordinates to refer to Flynn’s repeated dubious assertions as “Flynn facts”.[32]

According to what Flynn had told in one final interview as DIA director, he felt like a lone voice in thinking that the United States was less safe from the threat of Islamic terrorism in 2014 than it was prior to the 9/11 attacks; he went on to believe that he was pressed into retirement for questioning the Obama administration’s public narrative that Al Qaeda was close to defeat.[33] Journalist Seymour Hersh wrote that “Flynn confirmed [to Hersh] that his agency had sent a constant stream of classified warnings … about the dire consequences of toppling [Syrian President] Assad.” Flynn recounted that his agency was producing intelligence reports indicating that radical Islamists were the main force in the Syrian insurgency and “that Turkey was looking the other way when it came to the growth of the Islamic State inside Syria”. According to Flynn, these reports “got enormous pushback from the Obama administration,” who he felt “did not want to hear the truth”. According to former DIA official W. Patrick Lang: “Flynn incurred the wrath of the White House by insisting on telling the truth about Syria … they shoved him out. He wouldn’t shut up.”[34] In an interview with Al Jazeera, Flynn criticized the Obama administration for its delay in supporting the opposition in Syria, thereby allowing for the growth of Al Nusra and other extremist forces: “when you don’t get in and help somebody, they’re gonna find other means to achieve their goals” and that “we should have done more earlier on in this effort, you know, than we did.”[35]

Flynn retired from the U.S. Army with 33 years of service on August 7, 2014.[36]

Post-retirement

Consulting firm

Main article: Flynn Intel Group

Flynn, along with son Michael G. Flynn, runs Flynn Intel Group that provides intelligence services for business and governments.[37] Several sources, including Politico, have written that Flynn’s consulting company is allegedly lobbying for Turkey. A company tied to Recep Tayyip Erdoğan‘s government, which supports Muslim Brotherhood, is known to have hired Flynn’s lobbying firm.[38][39][40][41][42][43] On election day 2016, Flynn wrote an op-ed calling for U.S. backing for Erdoğan’s government and criticized the regime’s opponent, Fethullah Gulen; Flynn did not disclose that Flynn’s consulting firm had received funds from a company with ties to Erdoğan’s government.[44] In July 2016, Flynn said that the coup attempt against Erdoğan was something “worth clapping for”, but two months later, when a company tied to Erdoğan’s government hired Flynn’s firm, Flynn hailed Erdoğan as a critical U.S. ally.[45]

Flynn sat in on classified national security briefings with then-candidate Trump at the same time that Flynn was working for foreign clients, which raises ethical concerns and conflicts of interest.[46]

Attendance of RT Gala Dinner

2015 RT gala dinner in Moscow. Jill Stein sits across from Vladimir Putin. Flynn sits next to Putin.

In 2015, Flynn attended a gala dinner in Moscow in honor of RT (formerly “Russia Today”), a Russian government-owned English-language media outlet on which he made semi-regular appearances as an analyst after he retired from U.S. government service. Before the gala, Flynn gave a paid talk on world affairs.[11][12] Flynn defended the Russian payment in an interview with Michael Isikoff.[12] Journalist Michael Crowley of Politico reported that “at a moment of semi-hostility between the U.S. and Russia, the presence of such an important figure at Putin’s table startled” U.S. officials, in reference to president Vladimir Putin‘s attendance of the dinner as the guest of honor.[11]

On February 1, 2017, the ranking Democratic members on six House committees sent a letter to Secretary of Defense James Mattis, requesting a Department of Defense investigation into Flynn’s connection to RT.[47] The legislators expressed concern that Flynn had violated the anti-bribery Foreign Emoluments Clause of the Constitution by accepted money from RT,[47] a state-run Russian propaganda agency.[48]

2016 U.S. presidential election

Flynn at a campaign rally for then-Republican Presidential nominee Donald Trump, in October 2016.

During one of the debates in the 2015 GOP primaries, presidential candidate Carly Fiorina promised that, if elected, she would bring back into the government “the warrior class” of generals, including David Petraeus, Jack Keane, James Mattis, Stanley McChrystal and Flynn.

Having already been consulted regarding national security by Fiorina as well as other candidates, including Scott Walker, Ben Carson, Ted Cruz, and Donald Trump,[49] Flynn was asked in February 2016 to serve as an adviser to the Trump campaign.[50] In July 2016, it was reported he was being considered as Trump’s running mate; Flynn later confirmed that he had submitted vetting documents to the campaign and was willing to accept the Republican vice-presidential nomination if chosen.[51][52] Trump instead selected Indiana Governor Mike Pence.

As one of the keynote speakers during the first night of the 2016 Republican National Convention Flynn gave what the Los Angeles Times described as a “fiery” speech, in which he stated: “We are tired of Obama’s empty speeches and his misguided rhetoric. This, this has caused the world to have no respect for America’s word, nor does it fear our might”;[53] he also accused Obama of choosing to conceal the actions of Osama bin Laden and ISIS.[54] Flynn went on to critically address political correctness and joined the crowd in a chant of “U-S-A! U-S-A!”. During the chants he told those in the audience, “Get fired up! This is about our country.”[53][55] During the speech, Flynn launched a blistering attack on Democratic nominee Hillary Clinton. He led the crowd in chants of “Lock her up!” and called for her to withdraw from the race, saying that “if I did a tenth of what she did, I’d be in jail today.”[56][57] He repeated in subsequent interviews that she should be “locked up”.[58] While campaigning for Trump, Flynn also referred to Clinton as the “enemy camp”.[56] Six days after the speech Flynn stirred up a controversy by retweeting antisemitic remarks, which he later apologized for and claimed was unintentional.[59] During the election campaign, Flynn used Twitter to post links to negative stories about Clinton, including fake news.[13]

Flynn was once opposed to waterboarding and other extreme interrogation techniques that have now been banned; however, according to an August 2016 Washington Post article, he said at one point, in the context of Trump’s apparent openness to reinstating such techniques, that “he would be reluctant to take options off the table.”[56] In May 2016, Flynn was asked by an Al Jazeera reporter if he would support Trump’s stated plan to “take out [the] families”[60][61] of suspected terrorists. In response, Flynn stated, “I would have to see the circumstances of that situation.”[56] In an interview with Al Jazeera, Flynn criticized the reliance on drones as a “failed strategy”, stating that “what we have is this continued investment in conflict. The more weapons we give, the more bombs we drop, that just … fuels the conflict.”[62][35]

National Security Advisor

On November 18, 2016, Flynn accepted president-elect Donald Trump’s offer of the position of National Security Advisor.[63]

In December 2016, after the election of Donald Trump, Flynn met with Heinz-Christian Strache, leader of the far-right Freedom Party of Austria, at Trump Tower in New York.[64] The meeting attracted attention because the Freedom Party was founded by ex-Nazis in the 1950s, and because Strache had recently signed a cooperation agreement with Vladimir Putin’s ruling United Russia party. The Trump campaign refused to comment on the meeting.[64]

Michael T. Flynn Resignation Letter

On December 29, 2016, Flynn spoke with Russian ambassador Sergey Kislyak, the same day the Obama administration announced retaliatory measures in response to Russia’s interference in the 2016 presidential campaign; if there was intent to interfere with or defeat said measures, this may constitute a felony under the Logan act. Trump’s incoming press secretary, Sean Spicer, said he doubted that Flynn and Kislyak discussed the retaliatory measures.[65]

The Wall Street Journal reported on January 22, 2017, that Flynn was under investigation by U.S. counterintelligence agents for his communications with Russian officials.[66] On February 8, 2017, Flynn flatly denied having spoken to Kislyak in December 2016 about the sanctions placed on Russia by the Obama administration; however, the next day, U.S. intelligence officials shared an account indicating that such discussions did in fact take place.[67] Following this revelation, Flynn’s spokesman released a statement that Flynn “indicated that while he had no recollection of discussing sanctions, he couldn’t be certain that the topic never came up”.[68]

In addition to the FBI investigation, The New York Times reported that, according to two defense officials, the Army is separately investigating whether Flynn “received money from the Russian government during a trip he took to Moscow in 2015”.[16] According to the officials, there was no record that Flynn has “filed the required paperwork for the trip”.[16]

On February 13, 2017, Flynn resigned as National Security Advisor, following reporting on his communications with Russian officials.[16] The Washington Post reported that Acting Attorney General Sally Yates had warned the Trump White House in late January that Flynn had not been truthful about his contacts with Russia related to sanctions and that he was vulnerable to blackmail by Russian intelligence.[69][9]

Flynn’s 24-day tenure as National Security Advisor was by far the shortest ever, with the average tenure being 2.6 years.[4]

Political views

Flynn is a registered Democrat, having grown up in a “very strong Democratic family”.[70] However, he was a keynote speaker during the first night of the 2016 Republican National Convention,[53] and he was a surrogate and top national security adviser for President Donald Trump.

During a July 10, 2016, interview on ABC News’ This Week, when asked by host Martha Raddatz about the issue of abortion, Flynn stated, “women have to be able to choose.”[70][71] The next day, Flynn said on Fox News that he is a “pro-life Democrat”.[72]

Flynn has been a board member of ACT! for America,[63] and sees the Muslim faith as one of the root causes of Islamist terrorism.[32] He has described Islam as a political ideology and a cancer.[32][73] He stated in a Twitter post that “fear of Muslims is RATIONAL”[63] and included a video link claiming that Islam wants “80% of people enslaved or exterminated”.[74] Initially supportive of Trump’s proposal to ban Muslims from entering the US, Flynn later told Al Jazeera that a blanket ban was unworkable and has called instead for “vetting” of entrants from countries like Syria.[63] Flynn has stated the U.S. “should extradite Fethullah Gülen” to Turkey and “work constructively with Russia” in Syria.[34][75] In 2016, he said that he had personally seen photos of signs in the Southwest border area that were in Arabic to help Muslims entering the United States illegally. An officer of the National Border Patrol Council responded that he had never seen any signs delineating smuggling routes, let alone any in Arabic.[76]

Books

Flynn is the author of The Field of Fight: How We Can Win the Global War Against Radical Islam and Its Allies, co-authored with Michael Ledeen, which was published by St. Martin’s Press in 2016.[77] In reviewing the book, Will McCants of the Brookings Institution described Flynn’s worldview as a confused combination of neoconservatism (an insistence on destroying what he sees as an alliance of tyranny, dictatorships, and radical Islamist regimes) and realism (support for working with “friendly tyrants”), although he acknowledged that this could be due to the book having two authors.[78]

Awards and decorations

Lieutenant General Flynn’s decorations, medals and badges include: [1][79]

US Army Airborne master parachutist badge.gif
Bronze oak leaf cluster
Bronze oak leaf cluster
Bronze oak leaf cluster

|

Bronze oak leaf cluster

Bronze oak leaf cluster
Bronze oak leaf cluster
Bronze oak leaf cluster

Silver oak leaf cluster

Bronze oak leaf cluster
Bronze oak leaf cluster
Bronze oak leaf cluster
Bronze oak leaf cluster

Bronze oak leaf cluster

Bronze star

Bronze star
Bronze star

Joint Chiefs of Staff seal.svg
Ranger Tab.svg
Other U.S. Agency Decorations
US Intelligence Community’s Gold Seal Medallion[79]
National Intelligence Distinguished Service Medal[79]
National Security Agency Director’s Distinguished Service Medal[79]
US Coast Guard Distinguished Public Service Award[80]

Other awards and recognitions

https://en.wikipedia.org/wiki/Michael_T._Flynn

The Pronk Pops Show Podcasts Portfolio

Listen To Pronk Pops Podcast or Download Shows 833-838

Listen To Pronk Pops Podcast or Download Shows 827-832

Listen To Pronk Pops Podcast or Download Shows 821-826

Listen To Pronk Pops Podcast or Download Shows 815-820

Listen To Pronk Pops Podcast or Download Shows 806-814

Listen To Pronk Pops Podcast or Download Shows 800-805

Listen To Pronk Pops Podcast or Download Shows 793-799

Listen To Pronk Pops Podcast or Download Shows 785-792

Listen To Pronk Pops Podcast or Download Shows 777-784

Listen To Pronk Pops Podcast or Download Shows 769-776

Listen To Pronk Pops Podcast or Download Shows 759-768

Listen To Pronk Pops Podcast or Download Shows 751-758

Listen To Pronk Pops Podcast or Download Shows 745-750

Listen To Pronk Pops Podcast or Download Shows 738-744

Listen To Pronk Pops Podcast or Download Shows 732-737

Listen To Pronk Pops Podcast or Download Shows 727-731

Listen To Pronk Pops Podcast or Download Shows 720-726

Listen To Pronk Pops Podcast or DownloadShows 713-719

Listen To Pronk Pops Podcast or DownloadShows 705-712

Listen To Pronk Pops Podcast or Download Shows 695-704

Listen To Pronk Pops Podcast or Download Shows 685-694

Listen To Pronk Pops Podcast or Download Shows 675-684

Listen To Pronk Pops Podcast or Download Shows 668-674

Listen To Pronk Pops Podcast or Download Shows 660-667

Listen To Pronk Pops Podcast or Download Shows 651-659

Listen To Pronk Pops Podcast or Download Shows 644-650

Listen To Pronk Pops Podcast or Download Shows 637-643

Listen To Pronk Pops Podcast or Download Shows 629-636

Listen To Pronk Pops Podcast or Download Shows 617-628

Listen To Pronk Pops Podcast or Download Shows 608-616

Listen To Pronk Pops Podcast or Download Shows 599-607

Listen To Pronk Pops Podcast or Download Shows 590-598

Listen To Pronk Pops Podcast or Download Shows 585- 589

Listen To Pronk Pops Podcast or Download Shows 575-584

Listen To Pronk Pops Podcast or Download Shows 565-574

Listen To Pronk Pops Podcast or Download Shows 556-564

Listen To Pronk Pops Podcast or Download Shows 546-555

Listen To Pronk Pops Podcast or Download Shows 538-545

Listen To Pronk Pops Podcast or Download Shows 532-537

Listen To Pronk Pops Podcast or Download Shows 526-531

Listen To Pronk Pops Podcast or Download Shows 519-525

Listen To Pronk Pops Podcast or Download Shows 510-518

Listen To Pronk Pops Podcast or Download Shows 500-509

Listen To Pronk Pops Podcast or Download Shows 490-499

Listen To Pronk Pops Podcast or Download Shows 480-489

Listen To Pronk Pops Podcast or Download Shows 473-479

Listen To Pronk Pops Podcast or Download Shows 464-472

Listen To Pronk Pops Podcast or Download Shows 455-463

Listen To Pronk Pops Podcast or Download Shows 447-454

Listen To Pronk Pops Podcast or Download Shows 439-446

Listen To Pronk Pops Podcast or Download Shows 431-438

Listen To Pronk Pops Podcast or Download Shows 422-430

Listen To Pronk Pops Podcast or Download Shows 414-421

Listen To Pronk Pops Podcast or Download Shows 408-413

Listen To Pronk Pops Podcast or Download Shows 400-407

Listen To Pronk Pops Podcast or Download Shows 391-399

Listen To Pronk Pops Podcast or Download Shows 383-390

Listen To Pronk Pops Podcast or Download Shows 376-382

Listen To Pronk Pops Podcast or Download Shows 369-375

Listen To Pronk Pops Podcast or Download Shows 360-368

Listen To Pronk Pops Podcast or Download Shows 354-359

Listen To Pronk Pops Podcast or Download Shows 346-353

Listen To Pronk Pops Podcast or Download Shows 338-345

Listen To Pronk Pops Podcast or Download Shows 328-337

Listen To Pronk Pops Podcast or Download Shows 319-327

Listen To Pronk Pops Podcast or Download Shows 307-318

Listen To Pronk Pops Podcast or Download Shows 296-306

Listen To Pronk Pops Podcast or Download Shows 287-295

Listen To Pronk Pops Podcast or Download Shows 277-286

Listen To Pronk Pops Podcast or Download Shows 264-276

Listen To Pronk Pops Podcast or Download Shows 250-263

Listen To Pronk Pops Podcast or Download Shows 236-249

Listen To Pronk Pops Podcast or Download Shows 222-235

Listen To Pronk Pops Podcast or Download Shows 211-221

Listen To Pronk Pops Podcast or Download Shows 202-210

Listen To Pronk Pops Podcast or Download Shows 194-201

Listen To Pronk Pops Podcast or Download Shows 184-193

Listen To Pronk Pops Podcast or Download Shows 174-183

Listen To Pronk Pops Podcast or Download Shows 165-173

Listen To Pronk Pops Podcast or Download Shows 158-164

Listen To Pronk Pops Podcast or Download Shows151-157

Listen To Pronk Pops Podcast or Download Shows 143-150

Listen To Pronk Pops Podcast or Download Shows 135-142

Listen To Pronk Pops Podcast or Download Shows 131-134

Listen To Pronk Pops Podcast or Download Shows 124-130

Listen To Pronk Pops Podcast or Download Shows 121-123

Listen To Pronk Pops Podcast or Download Shows 118-120

Listen To Pronk Pops Podcast or Download Shows 113 -117

Listen To Pronk Pops Podcast or Download Show 112

Listen To Pronk Pops Podcast or Download Shows 108-111

Listen To Pronk Pops Podcast or Download Shows 106-108

Listen To Pronk Pops Podcast or Download Shows 104-105

Listen To Pronk Pops Podcast or Download Shows 101-103

Listen To Pronk Pops Podcast or Download Shows 98-100

Listen To Pronk Pops Podcast or Download Shows 94-97

Listen To Pronk Pops Podcast or Download Show 93

Listen To Pronk Pops Podcast or Download Show 92

Listen To Pronk Pops Podcast or Download Show 91

Listen To Pronk Pops Podcast or Download Shows 88-90

Listen To Pronk Pops Podcast or Download Shows 84-87

Listen To Pronk Pops Podcast or Download Shows 79-83

Listen To Pronk Pops Podcast or Download Shows 74-78

Listen To Pronk Pops Podcast or Download Shows 71-73

Listen To Pronk Pops Podcast or Download Shows 68-70

Listen To Pronk Pops Podcast or Download Shows 65-67

Listen To Pronk Pops Podcast or Download Shows 62-64

Listen To Pronk Pops Podcast or Download Shows 58-61

Listen To Pronk Pops Podcast or Download Shows 55-57

Listen To Pronk Pops Podcast or Download Shows 52-54

Listen To Pronk Pops Podcast or Download Shows 49-51

Listen To Pronk Pops Podcast or Download Shows 45-48

Listen To Pronk Pops Podcast or Download Shows 41-44

Listen To Pronk Pops Podcast or Download Shows 38-40

Listen To Pronk Pops Podcast or Download Shows 34-37

Listen To Pronk Pops Podcast or Download Shows 30-33

Listen To Pronk Pops Podcast or Download Shows 27-29

Listen To Pronk Pops Podcast or Download Shows 17-26

Listen To Pronk Pops Podcast or Download Shows 16-22

Listen To Pronk Pops Podcast or Download Shows 10-15

Listen To Pronk Pops Podcast or Download Shows 1-9

Read Full Post | Make a Comment ( None so far )

The Pronk Pops Show 820, January 19, 2017, Story 1: CNN Should Change Their Name To CFF — Collectivist Fanatic Fantasies — Trump and Cabinet Assassinated At Inauguration — Big Lie Media of The Lying Lunatic Left — Videos — Story 2: Will President Obama Pardon Hillary Clinton and Co-conspirators? Will President Trump Call For A Independent Special Prosecutor? — Videos

Posted on January 20, 2017. Filed under: Blogroll, Breaking News, Bribery, College, Constitutional Law, Countries, Crime, Culture, Donald J. Trump, Donald J. Trump, Donald Trump, Donald Trump, Economics, Education, Foreign Policy, Fourth Amendment, Free Trade, Freedom of Speech, Government Spending, High Crimes, Hillary Clinton, Hillary Clinton, Law, Life, Second Amendment, Terror, Terrorism, United States Constitution, United States of America, United States Supreme Court, Videos, Violence, Wall Street Journal, War, Wealth, Wisdom | Tags: , , , , , , , |

Project_1

The Pronk Pops Show Podcasts

Pronk Pops Show 820: January 19, 2017

Pronk Pops Show 819: January 18, 2017

Pronk Pops Show 818: January 17, 2017

Pronk Pops Show 817: January 13, 2017

Pronk Pops Show 816: January 12, 2017

Pronk Pops Show 815: January 11, 2017

Pronk Pops Show 814: January 10, 2017

Pronk Pops Show 813: January 9, 2017

Pronk Pops Show 812: December 12, 2016

Pronk Pops Show 811: December 9, 2016

Pronk Pops Show 810: December 8, 2016

Pronk Pops Show 809: December 7, 2016

Pronk Pops Show 808: December 6, 2016

Pronk Pops Show 807: December 5, 2016

Pronk Pops Show 806: December 2, 2016

Pronk Pops Show 805: December 1, 2016

Pronk Pops Show 804: November 30, 2016

Pronk Pops Show 803: November 29, 2016

Pronk Pops Show 802: November 28, 2016

Pronk Pops Show 801: November 22, 2016

Pronk Pops Show 800: November 21, 2016

Pronk Pops Show 799: November 18, 2016

Pronk Pops Show 798: November 17, 2016

Pronk Pops Show 797: November 16, 2016

Pronk Pops Show 796: November 15, 2016

Pronk Pops Show 795: November 14, 2016

Pronk Pops Show 794: November 10, 2016

Pronk Pops Show 793: November 9, 2016

Pronk Pops Show 792: November 8, 2016

Pronk Pops Show 791: November 7, 2016

Pronk Pops Show 790: November 4, 2016

Pronk Pops Show 789: November 3, 2016

Pronk Pops Show 788: November 2, 2016

Pronk Pops Show 787: October 31, 2016

Pronk Pops Show 786: October 28, 2016

Pronk Pops Show 785: October 27, 2016

Pronk Pops Show 784: October 26, 2016 

Pronk Pops Show 783: October 25, 2016

Pronk Pops Show 782: October 24, 2016

Pronk Pops Show 781: October 21, 2016

Pronk Pops Show 780: October 20, 2016

Pronk Pops Show 779: October 19, 2016

Pronk Pops Show 778: October 18, 2016

Pronk Pops Show 777: October 17, 2016

Pronk Pops Show 776: October 14, 2016

Pronk Pops Show 775: October 13, 2016

Pronk Pops Show 774: October 12, 2016

Pronk Pops Show 773: October 11, 2016

Pronk Pops Show 772: October 10, 2016

Pronk Pops Show 771: October 7, 2016

Pronk Pops Show 770: October 6, 2016

Pronk Pops Show 769: October 5, 2016 

Pronk Pops Show 768: October 3, 2016

Story 1: CNN Should Change Their Name To CFF — Collectivist Fanatic Fantasies — Trump and Cabinet Assassinated At Inauguration — Big Lie Media of The Lying Lunatic Left — WHAT IS CONTINUITY OF GOVERNMENT? —  Videos

Image result for cartoons CNN designated survivorImage result for cartoons CNN designated survivor

CNN Speculates What Would Happen If Trump Is Assassinated

Who is ‘designated survivor’ at inauguration?

WHAT IS CONTINUITY OF GOVERNMENT?

Designated Survivor – Official Trailer

Real-Life ‘Designated Survivor’ Stories Behind New ABC Show | ABC News

Continuity of Government- That’s classified

Classified? What is CONTINUITY OF GOVERNMENT (COG)?

CNN Slammed for Report on Who Would Take Power If Trump Were Assassinated

If Trump is Killed During Inauguration, Obama Appointee Would Be President

RUSH: CNN Report On Trump Assassination ‘An Act Of Total DERANGEMENT, IRRESPONSIBILITY, And DANGER’

CNN Tries To Assassinate Trump

CNN has been slammed for a “what if” report on what would happen if President-elect Donald Trump was assassinated during Inauguration Day on Friday.

The report, titled “Disaster could put Obama cabinet member in Oval Office,” drew the ire of some conservative news outlets and many commentators, but it did not specifically mention a threat targeting the inauguration.

The report goes on to speculate on “who would be in charge if an attack hit the incoming president” as the transfer of power takes place. It explained that an Obama administration official would be taking power—if the entire top-level of the presidential line of succession is wiped out.

CNN noted that if Trump, Vice President-elect Mike Pence, House Speaker Paul Ryan, and president pro tempore are killed, then the line of succession is turned over to the cabinet, starting with the Secretary of State John Kerry. Since Trump’s cabinet wouldn’t have yet been confirmed, Under Secretary for Political Affairs Tom Shannon—an Obama appointee—would be in line to take Kerry’s place.

The U.S. Secret Service has said there’s no credible threat against Trump’s inauguration, although possibly thousands of demonstrators are heading to Washington, D.C., to protest Trump.

After it was posted on CNN’s YouTube channel, the video saw an incredible number of “thumbs-down” ratings. Some 96.6 percent of people (or 5,443 out of 5,633) downvoted the video as of press time.

And the comments were overwhelmingly critical of CNN. “Flagged for inciting violence,” wrote one person. “This is really morbid, something we need to know,” wrote another sarcastically. “Totally not suggesting anything here, huh CNN?” asked another.

http://www.theepochtimes.com/n3/2212216-cnn-slammed-for-report-on-who-would-take-power-if-trump-were-assassinated/

CNN: Assassinating Trump Could Keep Obama Administration in Power

As the nation prepares for the peaceful transfer of power on Inauguration Day, CNN is dreaming up scenarios whereby the Obama administration can keep power if President-elect Donald Trump and Vice President-elect Mike Pence were blown up as they prepared to take to oath of office.

On the Wednesday, January 18 broadcast of CNN’s The Situation Room, host Wolf Blitzer aired a segment with a chyron featuring the headline “Developing Now.” During that “developing” segment, Blitzer and correspondent Brian Todd discussed what would happen if the unthinkable occurred on January 20.

Blitzer introduced the segment, saying, “What if an incoming president and his immediate successors were wiped out on day one?” and from there, CNN contributor Brian Todd took over to outline the line of succession if an attack blew up the inaugural dais, killing both Trump and Pence.

The upshot was that in the case of both heads of state being killed, the Secretary of State would take over. Currently that man is Secretary of State John Kerry, But in case some objected because his office would also end as of noon on Inauguration Day, then it would be the Speaker of the House — Republican Paul Ryan — or even Obama’s Under Secretary for Political Affairs Tom Shannon.

The report also noted that the designated survivor appointed by the Obama administration could also become president in the case of a disaster. So, in CNN’s analysis, most of the people who would take over in the worst-case scenario would keep the Obama administration in power, at least indirectly.

So while most of the country is looking to enjoy the day’s events and waiting expectantly to hear what our new president will have to say for his first address as our leader, CNN is wondering what will happen if he is assassinated.

Perhaps CNN is still stuck in anger, the second stage of grief.

http://www.breitbart.com/big-government/2017/01/18/cnn-airs-segment-saying-obama-admin-keep-power-trump-pence-blown-inauguration-day/

Continuity of Operations

From Wikipedia, the free encyclopedia
  (Redirected from Continuity of Operations Plan)
For other uses, see Continuity of government.

Continuity of Operations (COOP) is a United States federal government initiative, required by U.S. presidential directive, to ensure that agencies are able to continue performance of essential functions under a broad range of circumstances.

The National Security Presidential Directive-51 (NSPD-51), the Homeland Security Presidential Directive-20 (HSPD-20), and the National Continuity Policy specify certain requirements for continuity plan development, including the requirement that all federal executive branch departments and agencies develop an integrated, overlapping continuity capability.

The Federal Continuity Directive 1 (FCD 1) is a 2012 directive that applies to all federal organizations and which they must follow when planning their continuity program. FCD 1 also serves as guidance to state, local, and tribal governments.

The Federal Continuity Directive 2 (FCD 2) of July 2013 is a directive to assist federal Executive Branch organizations in identifying their Mission Essential Functions (MEFs) and candidate Primary Mission Essential Functions (PMEFs).[1]

The Department of Homeland Security (DHS) together with the Federal Emergency Management Agency (FEMA), and in coordination with other non-federal partners in July 2013, developed the Continuity Guidance Circular 1 (CGC 1) and CGC 2.

The preamble of the CGC 1 states that its function is to provide “direction to the non-Federal Governments (NFGs) for developing continuity plans and programs. Continuity planning facilitates the performance of essential functions during all-hazards emergencies or other situations that may disrupt normal operations. By continuing the performance of essential functions through a catastrophic emergency, the State, territorial, tribal, and local governments, and the private sector support the ability of the Federal Government to perform National Essential Functions (NEFs).”

CGC 1 parallels the information in FCD 1 closely, but is geared to states, territories, tribal and local governments, and private-sector organizations.

The purpose of Continuity Guidance Circular 2 (CGC 2) is to provide “non-Federal Governments (NFGs) with guidance on how to implement CGC 1, Annex D: ESSENTIAL FUNCTIONS. It provides them with guidance, a methodology, and checklists to identify, assess, and validate their essential functions. This CGC includes guidance for conducting a continuity Business Process Analysis (BPA), Business Impact Analysis (BIA), and a risk assessment that will identify essential function relationships, interdependencies, time sensitivities, threats and vulnerabilities, and mitigation strategies.” [2] [3]

FEMA provides guidance to the private sector for business continuity planning purposes.[4] FEMA realizes that when business is disrupted, it can cost money, so a continuity plan is essential to help identify critical functions and develop preventative measures to continue functions should disruption occur.[5]

History

A Continuity of Operations Plan (or Continuity of Government Plan) has been a part of U.S. government operations since at least the Cold War,[citation needed] when President Dwight D. Eisenhower provided (via executive order) various measures designed to ensure that the government of the United States would be able to continue operating after a nuclear war.

These measures included construction of underground facilities such as “Mount Weather“, a hollowed-out putatively nuclear-weapon-proof mountain in western Virginia with a mailing address in Berryville, Virginia. The public can now tour one such facility, intended to house the entire United States Congress, on the grounds of the Greenbrier Resort in White Sulphur Springs, West Virginia. (See also Project Greek Island) Other provisions of the plans included executive orders designating certain government officials to assume Cabinet and other executive-branch positions and carry out the responsibilities of the position if the primary officeholders are killed.

There has been a formal line of succession to the presidency since 1792 (currently found in the Presidential Succession Act of 1947, 3 U.S.C. § 19). This runs from the Vice President to the Speaker of the House of Representatives, President pro tempore of the Senate, and then through the Cabinet secretaries in a sequence specified by Congress.

Continuity of government plans are not limited to the federal government. The majority of states have constitutional provisions that provide for the succession of government in the event of an “enemy attack”.[6]

National-level continuity exercises under DHS

Date Name Scenario (If any) Emphasis (If any)
2004 June 12–13 Exercise Forward Challenge – TOP OFF
2005 June 20–24 Exercise PINNACLE / Forward Challenge – TOP OFF 2 Terrorism
2006 June 19–22 Exercise PINNACLE / Forward Challenge – TOP OFF 3
2007 May 25 Exercise PINNACLE / TOP OFF 4
2008 May 7–8 Exercise Eagle Horizon (EH 08)[7]
2009 June 17 Exercise Eagle Horizon (EH 09) [8]
2010 May 23 Exercise Eagle Horizon (EH 10) [9] “Dirty Bomb”
2011 June 23 Exercise Eagle Horizon (EH 11) “Dirty Bomb” Devolution
2012 June 18 Exercise Eagle Horizon (EH 12) [10] Cyber Attack
2013 April 18 Exercise Eagle Horizon (EH 13) [11] Pandemic Alt. Emergency Response Group (ERG)
2014 April 1–2 Exercise Eagle Horizon (EH 14) TBD
2015 TBD Exercise Eagle Horizon (EH 15) TBD

COG activated

The George W. Bush administration put the Continuity of Operations plan into effect for the first time directly following the September 11 attacks.[12] Their implementation involved a rotating staff of 75 to 150 senior officials and other government workers from every federal executive department and other parts of the executive branch in two secure bunkers on the East Coast. Friends, family, and co-workers were only able to reach them through a toll-free number and personal extensions. The Bush administration did not acknowledge the implementation of the COG plan until March 1, 2002.[13]