Benghazi

The Pronk Pops Show 897, May 22, 2017, Story 1: President Trump’s Landmark Historic Speech To 50 majority-Muslim countries attending the Arab-Islamic-American Summit in Riyadh. — President Trump: “… A better future is only possible if your nations drive out the terrorists and extremists. Drive. Them. Out.” — Videos — Story 2: President Trump Arrives In Israel — Iran Must Not Have Nuclear Weapons — Videos — Breaking — Story 3: Explosions in England’s Manchester Arena At Completion of Ariana Grande Concert With Several Killed and Injured — Videos

Posted on May 22, 2017. Filed under: American History, Barack H. Obama, Benghazi, Blogroll, Breaking News, Coal, Communications, Countries, Donald J. Trump, Donald J. Trump, Donald Trump, Education, Elections, Empires, Employment, Energy, Fast and Furious, Former President Barack Obama, Free Trade, Freedom of Speech, Government, Government Spending, Health, Hillary Clinton, Hillary Clinton, History, Human, Human Behavior, Illegal Immigration, Illegal Immigration, Immigration, Independence, Investments, Iran Nuclear Weapons Deal, Iraq, IRS, Islam, Islamic Republic of Iran, Law, Legal Immigration, Life, Media, National Interest, Natural Gas, Natural Gas, News, Nuclear Weapons, Obama, Oil, Oil, People, Philosophy, Photos, Politics, Polls, President Barack Obama, President Trump, Progressives, Radio, Raymond Thomas Pronk, Regulation, Religion, Resources, Rule of Law, Saudi Arabia, Scandals, Security, Spying, Success, Surveillance and Spying On American People, Surveillance/Spying, Syria, Terror, Terrorism, Trump Surveillance/Spying, U.S. Negotiations with Islamic Republic of Iran, United States of America, Videos, Violence, Wealth, Wisdom | Tags: , , , , , , , , , , , , , , , |

Project_1

The Pronk Pops Show Podcasts

Pronk Pops Show 897,  May 22, 2017

Pronk Pops Show 896,  May 18, 2017

Pronk Pops Show 895,  May 17, 2017

Pronk Pops Show 894,  May 16, 2017

Pronk Pops Show 893,  May 15, 2017

Pronk Pops Show 892,  May 12, 2017

Pronk Pops Show 891,  May 11, 2017

Pronk Pops Show 890,  May 10, 2017

Pronk Pops Show 889,  May 9, 2017

Pronk Pops Show 888,  May 8, 2017

Pronk Pops Show 887,  May 5, 2017

Pronk Pops Show 886,  May 4, 2017

Pronk Pops Show 885,  May 3, 2017

Pronk Pops Show 884,  May 1, 2017

Pronk Pops Show 883 April 28, 2017

Pronk Pops Show 882: April 27, 2017

Pronk Pops Show 881: April 26, 2017

Pronk Pops Show 880: April 25, 2017

Pronk Pops Show 879: April 24, 2017

Pronk Pops Show 878: April 21, 2017

Pronk Pops Show 877: April 20, 2017

Pronk Pops Show 876: April 19, 2017

Pronk Pops Show 875: April 18, 2017

Pronk Pops Show 874: April 17, 2017

Pronk Pops Show 873: April 13, 2017

Pronk Pops Show 872: April 12, 2017

Pronk Pops Show 871: April 11, 2017

Pronk Pops Show 870: April 10, 2017

Pronk Pops Show 869: April 7, 2017

Pronk Pops Show 868: April 6, 2017

Pronk Pops Show 867: April 5, 2017

Pronk Pops Show 866: April 3, 2017

Pronk Pops Show 865: March 31, 2017

Pronk Pops Show 864: March 30, 2017

Pronk Pops Show 863: March 29, 2017

Pronk Pops Show 862: March 28, 2017

Pronk Pops Show 861: March 27, 2017

Pronk Pops Show 860: March 24, 2017

Pronk Pops Show 859: March 23, 2017

Pronk Pops Show 858: March 22, 2017

Pronk Pops Show 857: March 21, 2017

Pronk Pops Show 856: March 20, 2017

Pronk Pops Show 855: March 10, 2017

Pronk Pops Show 854: March 9, 2017

Pronk Pops Show 853: March 8, 2017

Pronk Pops Show 852: March 6, 2017

Pronk Pops Show 851: March 3, 2017

Pronk Pops Show 850: March 2, 2017

Pronk Pops Show 849: March 1, 2017

Pronk Pops Show 848: February 28, 2017

Pronk Pops Show 847: February 27, 2017

Pronk Pops Show 846: February 24, 2017

Pronk Pops Show 845: February 23, 2017

Pronk Pops Show 844: February 22, 2017

Pronk Pops Show 843: February 21, 2017

Pronk Pops Show 842: February 20, 2017

Pronk Pops Show 841: February 17, 2017

Pronk Pops Show 840: February 16, 2017

Pronk Pops Show 839: February 15, 2017

Pronk Pops Show 838: February 14, 2017

Pronk Pops Show 837: February 13, 2017

Pronk Pops Show 836: February 10, 2017

Pronk Pops Show 835: February 9, 2017

Pronk Pops Show 834: February 8, 2017

Pronk Pops Show 833: February 7, 2017

Pronk Pops Show 832: February 6, 2017

Pronk Pops Show 831: February 3, 2017

Pronk Pops Show 830: February 2, 2017

Image result for trump speach to 50 plus islamic countries in saudi arabiaImage result for trump speach to 50 plus islamic countries in saudi arabiaImage result for trump leaves saudi arabia may 22, 2017Image result for trump leaves saudi arabia for israel may 22, 2017 trump wife and king

Image result for explosion manchester arena

Story 1: President Trump’s Landmark Historic Speech To 50 majority-Muslim countries attending the Arab-Islamic-American Summit in Riyadh. —  President Trump:  “… A better future is only possible if your nations drive out the terrorists and extremists. Drive. Them. Out.” — Videos —

It is a choice between two futures — and it is a choice America CANNOT make for you.
A better future is only possible if your nations drive out the terrorists and extremists. Drive. Them. Out.
DRIVE THEM OUT of your places of worship.
DRIVE THEM OUT of your communities.
DRIVE THEM OUT of your holy land, and
DRIVE THEM OUT OF THIS EARTH.

Image result for trump arrives in saudi arabiaImage result for trump arrives in saudi arabiaImage result for trump arrives in saudi arabiaImage result for trump arrives in saudi arabiaImage result for trump arrives in saudi arabiaImage result for trump arrives in saudi arabiaImage result for trump arrives in saudi arabiaImage result for trump speach to 50 plus islamic countries in saudi arabiaImage result for trump speach to 50 plus islamic countries in saudi arabiaImage result for trump speach to 50 plus islamic countries in saudi arabiaImage result for trump speach to 50 plus islamic countries in saudi arabia

Trump’s speech in Saudi Arabia, in 3 minutes

Published on May 22, 2017

President Trump spoke to leaders of countries in the Gulf Cooperation Council on May 21 in Riyadh, Saudi Arabia. Here’s what he said, in three minutes.

Full Speech: President Trump’s Speech at Arab Islamic American Summit in Saudi Arabia – 5/21/17

Streamed live on May 21, 2017

LIVE Coverage of President Trump’s Islam Speech in Saudi Arabia at the Arab Islamic American Summit – 5/21/17

President Trump receives Saudi royal welcome

Keys to the Kingdom: Trump visits Saudi Arabia first, signs $380bn deal

WATCH: President Trump departs for Saudi Arabia – First Foreign Trip 5/19/2017

President Trump Lands in Saudi Arabia And Meets King Salman (FULL)

TRUMP ARRIVES TO ROYALTY IN SAUDI ARABIA

Trump arrives in Riyadh, Saudi Arabia, for his first foreign trip as president

President Donald Trump Welcome Ceremony in Saudi Arabia at Al Yamamh Palace #2

President Trump Welcome Reception Ceremony in Saudi Arabia with King Salman

President Trump and Melania in Saudi Arabia Meet King Salman

President Trump & King Salman Dancing During Ceremony in Saudi Arabia (FULL)

President Trump Welcome Reception Ceremony in Saudi Arabia with King Salman

President Trump and Cabinet At meeting in Saudi Arabia

Who Are The Salafis and Wahhabis Yusuf Estes Islam?

What’s the Difference Between Sunni and Shiite Muslims?

What Does Jihad Actually Mean?

What Do ISIS & Saudi Arabia Have In Common?

How Saudi Arabia Exports Ultra-Conservative Islam

Why Do Saudi Arabia And Iran Hate Each Other?

Middle East Explained – The Religions, Languages, and Ethnic Groups

What a difference an election can make for the respect American leaders have for our country.

There were two very different outcomes when two American presidents greeted the king of Saudi Arabia.

All eyes were on President Trump today as he arrived in the country for his first foreign trip.

Video shows the president stepping off the plane and greeting King Salman:

Trump stood up straight as Salman appeared to bow slightly.

Trump’s posture stands in stark difference to President Obama’s in the early days of his presidency.

Cameras captured Obama bowing to King Abdullah, contorting nearly to a 90-degree angle in what many called a moment of American weakness:

Trump’s behavior was refreshingly noticeable, as several Twitter users contrasted the two reactions.

View image on Twitter

LOOK CAREFULLY at these two photos. The one on the RIGHT is a lesson in American exceptionalism: @FLOTUS no hijab, @POTUS no kowtow. 🇺🇸❤️-VJ

“Look carefully at these two photos,” recording artist Vinnie James wrote. “The one on the RIGHT is a lesson in American exceptionalism: @FLOTUS no hijab, @POTUS no kowtow.”

http://www.theamericanmirror.com/great-unlike-obama-trump-doesnt-bow-saudi-king/

#LionelNation YouTube Live Stream: Trump Mania Saudi Sword Dancing, Bibi Hobnobbing & Media Syncope

Trump Triumphant in Saudi Arabia, Mainstream Media Meltdown and Geopolitical Reconfiguring

Transcript of Trump’s speech in Saudi Arabia

Trump’s visit to Saudi a ‘turning point’: King Salman

© Saudi Royal Palace/AFP | A handout picture provided by the Saudi Royal Palace on May 22, 2017, shows US President Donald Trump and First Lady Melania Trump waving as they board Air Force One before leaving Riyadh for Israel

Saudi King Salman on Monday described US President Donald Trump’s visit to the Muslim kingdom in the Gulf as a “turning point” in relations between the two countries.Trump on Monday concluded his landmark visit to Saudi Arabia, which he chose for his first foreign trip since taking office in January, during which the allies announced arms deals and investments worth hundreds of billions of dollars.

“This is a turning point in relations between the two countries,” Salman told his council of ministers, according to state news agency SPA.

He said relations between the two countries will advance from a partnership to the “level of strengthening consultations, cooperation and coordination on all fronts”.

The king also praised an “historic agreement” between Gulf monarchies and Washington “to take firm measures to target the financing of terrorism” and the setting up of a Riyadh-based centre for this task, SPA said.

The ministers also hailed the launch of the Global Center for Combating Extremist Ideology in Riyadh on Sunday.

Dubbed “Etital”, Arabic for moderation, the centre “embodies the kingdom’s great efforts and its ongoing fight against terrorism”, SPA reported.

In his first foreign speech, Trump on Sunday urged Muslim leaders to take a stand against violence committed in the name of religion, describing the struggle against extremism as a “battle between good and evil”.

http://www.france24.com/en/20170522-trumps-visit-saudi-turning-point-king-salman

‘A lot of money! Big dollars!’ and ‘Jobs, jobs, jobs!’ Trump team delivers $350 BILLION in new long-term business for U.S. companies as Saudis snap up defense equipment

  • Deals inked Saturday during signing ceremony will drive $110 billion in immediate new business for defense companies in the U.S. 
  • Longer-term value will be $350 billion over 10 years 
  • White House chief economic adviser said the Saudis are ‘going to hire US companies’ for ‘a bunch of infrastructure related things’
  • He boasted that the deal is worth ‘a lot of money. Big dollars. Big dollars’
  • Military hardware going to Saudi Arabia:  ‘aerostats, tanks, artillery, counter-mortar radars, armored personnel carriers [and] helicopters’
  • State Department also says the Saudis will acquire and missile-defense systems ‘such as Patriot and THAAD’ 

American military defense companies have agreed to immediately sell nearly $110 billion in equipment and services to the Saudi Arabian government as part of a long-term agreement inked Saturday by the Trump administration and the Arab kingdom.

The deal, formalized in a signing ceremony in the capital city of Riyadh, also calls for an expanded deal worth a total of $350 billion over ten years.

‘That was a tremendous day,’ President Donald Trump said at the top of a bilateral meeting with Saudi Crown Prince Mohammed bin Nayef.

‘Tremendous investments in the United States. Hundreds of billions of dollars of investments into the United States and jobs, jobs, jobs.’

The State Department released a fact sheet that described the military hardware Saudi Arabia will buy as ‘aerostats, tanks, artillery, counter-mortar radars, armored personnel carriers [and] helicopters.’

President Donald Trump (L) was welcomed Saturday by Saudi Arabia’s King Salman bin Abdulaziz Al Saud (R), the first stop of Trump’s first foreign trip since taking office in January

Trump and King Salman had a welcome ceremony inside the Royal Terminal of King Khalid International Airport after Air Force One landed

Trump and King Salman had a welcome ceremony inside the Royal Terminal of King Khalid International Airport after Air Force One landed

White House chief economic adviser Gary Cohn (right) told reporters that a series of defense contracts inked Saturday would mean 'a lot of money, big dollars' for American companies

White House chief economic adviser Gary Cohn (right) told reporters that a series of defense contracts inked Saturday would mean ‘a lot of money, big dollars’ for American companies

President Donald Trump and the Saudi King gesture during a signing ceremony at the Saudi Royal Court in Riyadh on May 20

President Donald Trump and the Saudi King gesture during a signing ceremony at the Saudi Royal Court in Riyadh on May 20

Separately, U.S. companies in the oil center stand to gain $22 billion in new deals with the state-owned oil company Saudi Aramco. And pacts with other companies could balloon that number as high as $50 billion.

House chief economic adviser Gary Cohn told reporters that the kingdom is ‘going to hire US companies’ for ‘a bunch of infrastructure related things,’ boasting that the deal is worth ‘a lot of money. Big dollars. Big dollars.’

Saudi Arabia will ‘invest a lot of money in the U.S. and have a lot of U.S. companies invest and build things over here,’ Cohn said.

White House press secretary Sean Spicer claimed on Twitter that the $110 billion in immediate defense contracts represents the ‘largest single arms deal in US history.’

Commerce Secretary Gary Cohn told reporters that U.S. companies would gain ’23 new licenses, and then all of these contracts.’

‘I can’t imagine another business day that’s been as good for the United States and the kingdom,’ he said.

Donald Trump is in Saudi Arabia on the first of five stops during his inaugural foreign trip as president, getting chummy with King Salman bin Abdulaziz al-Saud and preparing to deliver a speech on Sunday that promises to frame his administration’s relationship with the Muslim world.

Ivanka Trump and Jared Kushner arrive to attend the presentation of the Order of Abdulaziz al-Saud medal at the Saudi Royal Court

Ivanka Trump and Jared Kushner arrive to attend the presentation of the Order of Abdulaziz al-Saud medal at the Saudi Royal Court

US President Donald Trump receives the Order of Abdulaziz al-Saud medal at the Saudi Royal Court in Riyadh on May 20

US President Donald Trump receives the Order of Abdulaziz al-Saud medal at the Saudi Royal Court in Riyadh on May 20

US President Donald Trump receives the Order of Abdulaziz al-Saud medal at the Saudi Royal Court in Riyadh on May 20

Ivanka Trump participates in a presentation ceremony of the kingdom's top civilian honor, the gold King Abdulaziz medal, to President Donald Trump

Ivanka Trump participates in a presentation ceremony of the kingdom’s top civilian honor, the gold King Abdulaziz medal, to President Donald Trump

Donald Trump and First Lady Melania Trump make their way to a luncheon after Trump received the gold King Abdulaziz medal

Donald Trump and First Lady Melania Trump make their way to a luncheon after Trump received the gold King Abdulaziz medal

The new defense deals are part of Trump’s strategy to hold both the ISIS terror army and Iran’s nuclear ambitions in check through the intervention of Middle Eastern partners instead of expensive American military deployments.

A White House official said Saturday that the purchases are meant to accomplish just that, for the sake of Saudi and regional security.

The official also said a strengthened Saudi military will be better equipped to contribute to counterterrorism operations across the region.

Trump and Salman signed a joint vision statement, nine separate defense cooperation pacts – including eight that are finalized – and a separate set of ‘private sector agreements,’ according to White House spokeswoman Sarah Sanders.

White House press secretary Sean Spicer claimed Saturday on Twitter that the agreements signed by the US. and Saudi Arabia constitute the 'largest single arms deal in US history'

White House press secretary Sean Spicer claimed Saturday on Twitter that the agreements signed by the US. and Saudi Arabia constitute the ‘largest single arms deal in US history’

Saudi Aramco will be relying on U.S. companies to build new oil rigs like this one in the Persian Gulf

Saudi Aramco will be relying on U.S. companies to build new oil rigs like this one in the Persian Gulf

The White House said the military equipment and services contracts will support ‘tens of thousands of new jobs in the U.S. defense industrial base.’

Separately, a CEO forum being held on the margins of the Trump-Salman meeting resulted in $22 billion in new deals in the oil and gas sector, according to the event’s organizers.

Saudi Aramco announced agreements with U.S. companies including Weatherford, Jacobs, Honeywell, McDermott, and Nabors.

The agreements will result in an unspecified number of new offshore Persian Gulf drilling rigs, at a time when the kingdom is pumping less oil to stabilize global prices.

Aramco appears to be planning for a future that will require greater crude production by gearing up to produce materials and equipment that had previously been imported.

Saudi Arabia's King Salman bin Abdulaziz Al Saud (right) welcomes DonaldTrump and first lady Melania Trump at the airport

Saudi Arabia’s King Salman bin Abdulaziz Al Saud (right) welcomes DonaldTrump and first lady Melania Trump at the airport

Jared Kushner and Ivanka Trump were both seen arriving in the Middle East on Trump's first foreign tour since taking office

Jared Kushner and Ivanka Trump were both seen arriving in the Middle East on Trump’s first foreign tour since taking office

Donald Trump and wife Melania, dressed in a black jumpsuit with statement belt, sip a drink as they are welcomed by the Saudi king 

Donald Trump and wife Melania, dressed in a black jumpsuit with statement belt, sip a drink as they are welcomed by the Saudi king

http://www.dailymail.co.uk/news/article-4525224/Trump-delivers-350B-new-biz-U-S-defense-companies.html#ixzz4hqYp7HAD

 

Story 2: President Trump Arrives In Israel — Videos

Image result for trump leaves saudi arabia for israel may 22, 2017 trump wife and kingImage result for trump leaves saudi arabia for israel may 22, 2017 trump wife and king

Trump to Israel: We are with you

Trump meets with Israeli PM Netanyahu (full speech)

President Trump and President Rivilin Joint Statements: Jerusalem

Donald Trump Lands In Israel – Complete [HD] 720p

TRUMP CEREMONY AT TEL AVIV AIRPORT IN ISRAEL (FULL)

Video Footage of Mr. and Mrs. Trump in Israel

President Trump in Israel with Sebastian Gorka Commentary

President Trump Arrives In Tel Aviv, Urges Peace In Middle East | TODAY

President Trump Arrives in Jerusalem as part of his Foreign Trip

President Trump Prays at the Western Wall in Jerusalem 5/22/17

Trump in Israel: US President visits Church of the Holy Sepulchre

Trump visits Jerusalem’s Church of the Holy Sepulchre

Isreal raises concerns about U.S. Saudi arms deal

FULL DAY COVERAGE: ALL President Donald Trump Speeches & Appearances in Israel 5/22/2017

Breaking — Story 3: Explosions in England’s Manchester Arena At Completion of Ariana Grande Concert With Several Killed and Injured — Videos

Image result for explosion manchester arena

Breaking News: Terror and Panic at Manchester Arena – Explosion After Ariana Grande Concert

BREAKING UK EXPLOSION!!! Deaths confirmed after Manchester Arena blast reports

 

 

BREAKING NEWS: Several people killed and many injured after two explosions in Manchester Arena at the end of Ariana Grande gig as bloodied concertgoers flee in terror

  • Several people killed after explosions rang out at the end of an Ariana Grande gig in Manchester Arena
  • Video footage showed people fleeing in tears from the venue after bangs ran out when the concert finished

Several people have been killed after two explosions inside Manchester Arena at the end of an Ariana Grande gig tonight.

Video footage showed people fleeing in tears from the venue after bangs rang out immediately after the concert finished.

Bloodied concertgoers were pictured being helped by emergency services outside the gig and armed police were seen patrolling the arena.

Evie Brewster, who attended the concert, told MailOnline: ‘Ariana Grange had just finished her last song and left the stage when a huge explosion sounded.

‘Suddenly everybody started screaming and running for the exit.

Bloodied concertgoers were pictured being helped by armed police outside the arena after explosions rang out at the gig

Bloodied concertgoers were pictured being helped by armed police outside the arena after explosions rang out at the gig

Concert-goers helped injured people make their way from the gig in Manchester tonight

Concert-goers helped injured people make their way from the gig in Manchester tonight

Video footage showed people fleeing in tears from the venue after reports of explosions at the end of an Ariana Grande concert (pictured tonight)

Video footage showed people fleeing in tears from the venue after reports of explosions at the end of an Ariana Grande concert (pictured tonight)

People attending the concert by Ariana Grande fled in panic on hearing the noises - some in tears

‘We could hear the police and ambulance sirens. It was terrifying.

‘There were thousands of people trying to get out at once. They were all screaming and crying. The whole place smelt smokey and burnt.

‘The explosion sounded like it was inside the building somewhere.’

Manchester Victoria train station, next door to the arena, is currently closed and trains are currently unable to run to or from the station.

Greater Manchester Police said emergency services had responded to a ‘serious incident’ at the arena.

 

Jonathan Yates, 24, from the Wirral, who attended the gig, told MailOnline: ‘The concert had finished and the lights came on almost instantly. There was a bang, a weird bang. There were lots of balloons but I thought to myself that can’t be a balloon, that’s not normal.

‘We were sat on the floor level and it came from the higher seats, people were running and screaming. Everyone stopped and I turned to my friend and said ‘we need to run’. Everyone was running and screaming and then when we got out it felt a bit more OK.

‘I heard five or six bangs that sounded like gunshots. When we got outside people were outside, crying and on their phones.

‘You don’t think it’s something that’s going to happen when you go…it was such a nice, fun concert.’

Nick Schurok, 28, from Manchester, told MailOnline: ‘Ariana Grande had just finished the concert and the lights came on. Everyone started leaving. I was on the floor and at the back of the arena people started exiting through the tunnels.

‘There was a bang in the left tunnel and everyone went to the middle tunnel. Then about two minutes later, there was another bang. The bang was so loud and crowds of people were running. There were lots of children and families there.’

Another witness Jenny Brewster told MailOnline: ‘We were exiting the building when it happened. We’d headed towards the main doors as Ariana was performing the last song because we wanted to beat the crowds, but – as we made our way there – a wall of security men blocked it and told us to go the other way.

‘Seconds later they shouted ‘RUN!’ and the explosion happened right behind them. Hundreds of people were running and screaming. Those men saved our lives.’

Catherine Macfarlane told Reuters: ‘We were making our way out and when we were right by the door there was a massive explosion and everybody was screaming.

‘It was a huge explosion – you could feel it in your chest. It was chaotic. Everybody was running and screaming and just trying to get out of the area.’

One witness wrote on Twitter: ‘Just ran from an explosion, genuinely thought we were gonna die.’

Another said: ‘Explosion at Manchester Arena, we were evacuated, a LOT of police here.’

Former Manchester United footballer Rio Ferdinand said: ‘Just heard the news what’s happening in Manchester.. hope everyone safe and sound!’

A spokesman for Greater Manchester Police said: ‘Emergency services responding to serious incident at Manchester Arena. Avoid the area. More details will follow as soon as available.’

A British Transport Police spokesman said: ‘We are aware of an incident at Manchester Arena. We have officers at the scene and will provide further updates as soon as possible.’

http://www.dailymail.co.uk/news/article-4531940/Emergency-services-rush-Manchester-Arena.html#ixzz4hqs2mmOV

The Pronk Pops Show Podcasts Portfolio

Listen To Pronk Pops Podcast or Download Shows 897

Listen To Pronk Pops Podcast or Download Shows 889-896

Listen To Pronk Pops Podcast or Download Shows 884-888

Listen To Pronk Pops Podcast or Download Shows 878-883

Listen To Pronk Pops Podcast or Download Shows 870-877

Listen To Pronk Pops Podcast or Download Shows 864-869

Listen To Pronk Pops Podcast or Download Shows 857-863

Listen To Pronk Pops Podcast or Download Shows 850-856

Listen To Pronk Pops Podcast or Download Shows 845-849

Listen To Pronk Pops Podcast or Download Shows 840-844

Listen To Pronk Pops Podcast or Download Shows 833-839

Listen To Pronk Pops Podcast or Download Shows 827-832

Listen To Pronk Pops Podcast or Download Shows 821-826

Listen To Pronk Pops Podcast or Download Shows 815-820

Listen To Pronk Pops Podcast or Download Shows 806-814

Listen To Pronk Pops Podcast or Download Shows 800-805

Listen To Pronk Pops Podcast or Download Shows 793-799

Listen To Pronk Pops Podcast or Download Shows 785-792

Listen To Pronk Pops Podcast or Download Shows 777-784

Listen To Pronk Pops Podcast or Download Shows 769-776

Listen To Pronk Pops Podcast or Download Shows 759-768

Listen To Pronk Pops Podcast or Download Shows 751-758

Listen To Pronk Pops Podcast or Download Shows 745-750

Listen To Pronk Pops Podcast or Download Shows 738-744

Listen To Pronk Pops Podcast or Download Shows 732-737

Listen To Pronk Pops Podcast or Download Shows 727-731

Listen To Pronk Pops Podcast or Download Shows 720-726

Listen To Pronk Pops Podcast or DownloadShows 713-719

Listen To Pronk Pops Podcast or DownloadShows 705-712

Listen To Pronk Pops Podcast or Download Shows 695-704

Listen To Pronk Pops Podcast or Download Shows 685-694

Listen To Pronk Pops Podcast or Download Shows 675-684

Listen To Pronk Pops Podcast or Download Shows 668-674

Listen To Pronk Pops Podcast or Download Shows 660-667

Listen To Pronk Pops Podcast or Download Shows 651-659

Listen To Pronk Pops Podcast or Download Shows 644-650

Listen To Pronk Pops Podcast or Download Shows 637-643

Listen To Pronk Pops Podcast or Download Shows 629-636

Listen To Pronk Pops Podcast or Download Shows 617-628

Listen To Pronk Pops Podcast or Download Shows 608-616

Listen To Pronk Pops Podcast or Download Shows 599-607

Listen To Pronk Pops Podcast or Download Shows 590-598

Listen To Pronk Pops Podcast or Download Shows 585- 589

Listen To Pronk Pops Podcast or Download Shows 575-584

Listen To Pronk Pops Podcast or Download Shows 565-574

Listen To Pronk Pops Podcast or Download Shows 556-564

Listen To Pronk Pops Podcast or Download Shows 546-555

Listen To Pronk Pops Podcast or Download Shows 538-545

Listen To Pronk Pops Podcast or Download Shows 532-537

Listen To Pronk Pops Podcast or Download Shows 526-531

Listen To Pronk Pops Podcast or Download Shows 519-525

Listen To Pronk Pops Podcast or Download Shows 510-518

Listen To Pronk Pops Podcast or Download Shows 500-509

Listen To Pronk Pops Podcast or Download Shows 490-499

Listen To Pronk Pops Podcast or Download Shows 480-489

Listen To Pronk Pops Podcast or Download Shows 473-479

Listen To Pronk Pops Podcast or Download Shows 464-472

Listen To Pronk Pops Podcast or Download Shows 455-463

Listen To Pronk Pops Podcast or Download Shows 447-454

Listen To Pronk Pops Podcast or Download Shows 439-446

Listen To Pronk Pops Podcast or Download Shows 431-438

Listen To Pronk Pops Podcast or Download Shows 422-430

Listen To Pronk Pops Podcast or Download Shows 414-421

Listen To Pronk Pops Podcast or Download Shows 408-413

Listen To Pronk Pops Podcast or Download Shows 400-407

Listen To Pronk Pops Podcast or Download Shows 391-399

Listen To Pronk Pops Podcast or Download Shows 383-390

Listen To Pronk Pops Podcast or Download Shows 376-382

Listen To Pronk Pops Podcast or Download Shows 369-375

Listen To Pronk Pops Podcast or Download Shows 360-368

Listen To Pronk Pops Podcast or Download Shows 354-359

Listen To Pronk Pops Podcast or Download Shows 346-353

Listen To Pronk Pops Podcast or Download Shows 338-345

Listen To Pronk Pops Podcast or Download Shows 328-337

Listen To Pronk Pops Podcast or Download Shows 319-327

Listen To Pronk Pops Podcast or Download Shows 307-318

Listen To Pronk Pops Podcast or Download Shows 296-306

Listen To Pronk Pops Podcast or Download Shows 287-295

Listen To Pronk Pops Podcast or Download Shows 277-286

Listen To Pronk Pops Podcast or Download Shows 264-276

Listen To Pronk Pops Podcast or Download Shows 250-263

Listen To Pronk Pops Podcast or Download Shows 236-249

Listen To Pronk Pops Podcast or Download Shows 222-235

Listen To Pronk Pops Podcast or Download Shows 211-221

Listen To Pronk Pops Podcast or Download Shows 202-210

Listen To Pronk Pops Podcast or Download Shows 194-201

Listen To Pronk Pops Podcast or Download Shows 184-193

Listen To Pronk Pops Podcast or Download Shows 174-183

Listen To Pronk Pops Podcast or Download Shows 165-173

Listen To Pronk Pops Podcast or Download Shows 158-164

Listen To Pronk Pops Podcast or Download Shows151-157

Listen To Pronk Pops Podcast or Download Shows 143-150

Listen To Pronk Pops Podcast or Download Shows 135-142

Listen To Pronk Pops Podcast or Download Shows 131-134

Listen To Pronk Pops Podcast or Download Shows 124-130

Listen To Pronk Pops Podcast or Download Shows 121-123

Listen To Pronk Pops Podcast or Download Shows 118-120

Listen To Pronk Pops Podcast or Download Shows 113 -117

Listen To Pronk Pops Podcast or Download Show 112

Listen To Pronk Pops Podcast or Download Shows 108-111

Listen To Pronk Pops Podcast or Download Shows 106-108

Listen To Pronk Pops Podcast or Download Shows 104-105

Listen To Pronk Pops Podcast or Download Shows 101-103

Listen To Pronk Pops Podcast or Download Shows 98-100

Listen To Pronk Pops Podcast or Download Shows 94-97

Listen To Pronk Pops Podcast or Download Show 93

Listen To Pronk Pops Podcast or Download Show 92

Listen To Pronk Pops Podcast or Download Show 91

Listen To Pronk Pops Podcast or Download Shows 88-90

Listen To Pronk Pops Podcast or Download Shows 84-87

Listen To Pronk Pops Podcast or Download Shows 79-83

Listen To Pronk Pops Podcast or Download Shows 74-78

Listen To Pronk Pops Podcast or Download Shows 71-73

Listen To Pronk Pops Podcast or Download Shows 68-70

Listen To Pronk Pops Podcast or Download Shows 65-67

Listen To Pronk Pops Podcast or Download Shows 62-64

Listen To Pronk Pops Podcast or Download Shows 58-61

Listen To Pronk Pops Podcast or Download Shows 55-57

Listen To Pronk Pops Podcast or Download Shows 52-54

Listen To Pronk Pops Podcast or Download Shows 49-51

Listen To Pronk Pops Podcast or Download Shows 45-48

Listen To Pronk Pops Podcast or Download Shows 41-44

Listen To Pronk Pops Podcast or Download Shows 38-40

Listen To Pronk Pops Podcast or Download Shows 34-37

Listen To Pronk Pops Podcast or Download Shows 30-33

Listen To Pronk Pops Podcast or Download Shows 27-29

Listen To Pronk Pops Podcast or Download Shows 17-26

Listen To Pronk Pops Podcast or Download Shows 16-22

Listen To Pronk Pops Podcast or Download Shows 10-15

Listen To Pronk Pops Podcast or Download Shows 1-9

Read Full Post | Make a Comment ( None so far )

The Pronk Pops Show 896, May 18, 2017, Story 1: A Broadcasting Legend, Roger Ailes, Dies at Age 77, Rest in Peace — Videos — Story 2: President Trump Tweets: “The is The Single Greatest Witch Hunt of A Politician in American History” — Special Counsel: Bad Idea — Robert Mueller: Good Choice — Videos

Posted on May 18, 2017. Filed under: American History, Barack H. Obama, Benghazi, Bill Clinton, Blogroll, Breaking News, Budgetary Policy, Congress, Countries, Donald J. Trump, Donald J. Trump, Donald J. Trump, Donald Trump, Donald Trump, Education, Employment, Fast and Furious, Federal Bureau of Investigation (FBI), Federal Government, Fiscal Policy, Foreign Policy, Former President Barack Obama, Fourth Amendment, Freedom of Speech, Government, Government Spending, Hate Speech, Hillary Clinton, Hillary Clinton, Hillary Clinton, Hillary Clinton, Hillary Clinton, History, House of Representatives, Illegal Immigration, Iran Nuclear Weapons Deal, IRS, Law, Media, News, Obama, People, Philosophy, Photos, Politics, President Trump, Presidential Appointments, Raymond Thomas Pronk, Regulation, Robert S. Mueller III, Scandals, Second Amendment, Security, Senate, Senator Jeff Sessions, Spying, Success, Surveillance and Spying On American People, Surveillance/Spying, Tax Policy, Technology, Terror, Terrorism, Trump Surveillance/Spying, Unemployment, United States Constitution, United States of America, United States Supreme Court, Videos, Wealth, Wisdom | Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , |

Project_1

The Pronk Pops Show Podcasts

Pronk Pops Show 896,  May 18, 2017

Pronk Pops Show 895,  May 17, 2017

Pronk Pops Show 894,  May 16, 2017

Pronk Pops Show 893,  May 15, 2017

Pronk Pops Show 892,  May 12, 2017

Pronk Pops Show 891,  May 11, 2017

Pronk Pops Show 890,  May 10, 2017

Pronk Pops Show 889,  May 9, 2017

Pronk Pops Show 888,  May 8, 2017

Pronk Pops Show 887,  May 5, 2017

Pronk Pops Show 886,  May 4, 2017

Pronk Pops Show 885,  May 3, 2017

Pronk Pops Show 884,  May 1, 2017

Pronk Pops Show 883 April 28, 2017

Pronk Pops Show 882: April 27, 2017

Pronk Pops Show 881: April 26, 2017

Pronk Pops Show 880: April 25, 2017

Pronk Pops Show 879: April 24, 2017

Pronk Pops Show 878: April 21, 2017

Pronk Pops Show 877: April 20, 2017

Pronk Pops Show 876: April 19, 2017

Pronk Pops Show 875: April 18, 2017

Pronk Pops Show 874: April 17, 2017

Pronk Pops Show 873: April 13, 2017

Pronk Pops Show 872: April 12, 2017

Pronk Pops Show 871: April 11, 2017

Pronk Pops Show 870: April 10, 2017

Pronk Pops Show 869: April 7, 2017

Pronk Pops Show 868: April 6, 2017

Pronk Pops Show 867: April 5, 2017

Pronk Pops Show 866: April 3, 2017

Pronk Pops Show 865: March 31, 2017

Pronk Pops Show 864: March 30, 2017

Pronk Pops Show 863: March 29, 2017

Pronk Pops Show 862: March 28, 2017

Pronk Pops Show 861: March 27, 2017

Pronk Pops Show 860: March 24, 2017

Pronk Pops Show 859: March 23, 2017

Pronk Pops Show 858: March 22, 2017

Pronk Pops Show 857: March 21, 2017

Pronk Pops Show 856: March 20, 2017

Pronk Pops Show 855: March 10, 2017

Pronk Pops Show 854: March 9, 2017

Pronk Pops Show 853: March 8, 2017

Pronk Pops Show 852: March 6, 2017

Pronk Pops Show 851: March 3, 2017

Pronk Pops Show 850: March 2, 2017

Pronk Pops Show 849: March 1, 2017

Pronk Pops Show 848: February 28, 2017

Pronk Pops Show 847: February 27, 2017

Pronk Pops Show 846: February 24, 2017

Pronk Pops Show 845: February 23, 2017

Pronk Pops Show 844: February 22, 2017

Pronk Pops Show 843: February 21, 2017

Pronk Pops Show 842: February 20, 2017

Pronk Pops Show 841: February 17, 2017

Pronk Pops Show 840: February 16, 2017

Pronk Pops Show 839: February 15, 2017

Pronk Pops Show 838: February 14, 2017

Pronk Pops Show 837: February 13, 2017

Pronk Pops Show 836: February 10, 2017

Pronk Pops Show 835: February 9, 2017

Pronk Pops Show 834: February 8, 2017

Pronk Pops Show 833: February 7, 2017

Pronk Pops Show 832: February 6, 2017

Pronk Pops Show 831: February 3, 2017

Pronk Pops Show 830: February 2, 2017

Pronk Pops Show 829: February 1, 2017

Image result for roger ailes dead at 77Image result for roger ailes and familyImage result for cartoons branco trump witch huntImage result for trump russian investigation a witch hunt

Story 1: A Broadcasting Legend, Roger Ailes, Dies at Age 77, Rest in Peace — Videos

Image result for roger ailes and familyImage result for roger ailes and family

Rupert Murdoch statement on Roger Ailes’ passing

Brit Hume on the life and legacy of Roger Ailes

Sean Hannity: I am forever grateful for Roger Ailes

Martha MacCallum remembers Roger Ailes

Rush Limbaugh Remembers Roger Ailes: “Roger And I Were Passengers In History”

Neil Cavuto remembers Roger Ailes

Gutfeld remembers Roger Ailes

The Sean Hannity Show May 18, 2017 || Remembering Roger Ailes

Laura Ingraham Show 5/18/17 – (FULL) Roger Ailes Built Success By Out Thinking His Competitors

Mark Levin Show: Tribute to Roger Ailes (audio from 05-18-2017)

Glenn & Bill React To Roger Aile’s Death | Bill O’Reilly’s First Interview Since Fox News Exit

Bill O’Reilly No Spin News: Paying Respects To Roger Ailes(RIP) & Hysterical Press (5/18/2017)

Rachel Maddow On The Passing Of Roger Ailes: ‘I Considered Him To Be A Friend’

Kimberly Guilfoyle pays tribute to Roger Ailes

Shepard Smith pays tribute to Roger Ailes

Roger Ailes, Who Built Fox News Into an Empire, Dies at 77

Former Fox News chairman and CEO Roger Ailes dead at 77

Remembering Roger Ailes

World reacts to the death of Roger Ailes

Former Fox News CEO Roger Ailes dead at 77

Roger Ailes leaves behind complicated legacy

Lionel Nation YouTube Live Stream: Roger Ailes Eulogium, Mueller the DNC Nightmare & Comey the Clown

Fox News anchors learned of the death of former chairman and CEO Roger Ailes from Drudge

  • Fox News anchors learned of death of former chairman and CEO from Drudge
  • Fox published a breaking news segment on Twitter following Roger Ailes’ death
  • Steve Doocy said: ‘They have published, Drudge has, a statement from his wife’
  • Ainsley Earhardt added: ‘Beth you are in our thoughts and our prayers, and so is Zachary, their beautiful son. Roger, rest in peace.’
  • Ailes died aged 77, according to his wife, who released statement to Matt Drudge
Roger Ailes has died at the age of 77, his wife Elizabeth revealed in a statement on Thursday

Roger Ailes has died at the age of 77, his wife Elizabeth revealed in a statement on Thursday

Fox News anchors only learned of the death of its former chairman and CEO from Drudge Report.

Roger Ailes died aged 77, according to his wife Elizabeth, who released a statement to Matt Drudge.

In a breaking news segment tweeted by the network on Thursday morning, Fox & Friends’ Steve Doocy reported: ‘Roger Ailes, one of the founders of the Fox News channel has died.

‘They have published, Drudge has, a statement from his wife Elizabeth.’

The statement was then read out before Ainsley Earhardt added: ‘Beth you are in our thoughts and our prayers, and so is Zachary, their beautiful son. Roger, rest in peace.’

His death comes less than a year after he resigned from the company over allegations of sexual harassment.

His wife Elizabeth, with whom he has one son, said: ‘I am profoundly sad and heartbroken to report that my husband, Roger Ailes, passed away this morning. Roger was a loving husband to me, to his son Zachary, and a loyal friend to many.

‘He was also a patriot, profoundly grateful to live in a country that gave him so much opportunity to work hard, to rise — and to give back.

‘During a career that stretched over more than five decades, his work in entertainment, in politics, and in news affected the lives of many millions.

‘And so even as we mourn his death, we celebrate his life,’ the statement reads.

Steve Doocy (left) reported: ‘Roger Ailes, one of the founders of the Fox News channel has died'

Steve Doocy (left) reported: ‘Roger Ailes, one of the founders of the Fox News channel has died’

There was no further information on the cause of Ailes’ death. He celebrated his 77th birthday on Monday.

Ailes had struggled with his health. He had hemophilia, multiple surgeries to replace his joints and a secret prostate surgery a few years ago that put him on an extended leave from the network, according to New York magazine reporter Gabriel Sherman.

Last year, Sherman reported that Ailes was still having trouble walking and rarely left his executive suite.

A friend who ran into Ailes in Palm Beach over the 2015-2016 holidays told the magazine that he was using a walker at the time.

In an excerpt from the 2013 biography Roger Ailes Off Camera, Ailes said he knew he didn’t have long left to live.

‘My doctor told me that I’m old, fat, and ugly, but none of those things is going to kill me immediately,’ he told the author, Zev Chafets, shortly before his 72nd birthday. ‘The actuaries say I have six to eight years. The best tables give me 10. Three thousand days, more or less.’

He added: ‘I’d give anything for another 10 years.’

http://www.dailymail.co.uk/news/article-4518872/Fox-News-learned-Roger-Ailes-death-Drudge.html#ixzz4hSwIC0Lw

Michael Wolff on Roger Ailes’ Final Days and a Complicated Murdoch Relationship

Matt Furman
Roger Ailes in his Fox News office in 2014.

The Fox News exec understood the intensity of the unhappiness and anger in another America that liberal media people are only now waking up to with Donald Trump.

I made a mental note last night to call Roger in the morning and get his take on the Trump events of the last few days. There are few conversations more entertaining and insightful than Roger Ailes on Republican politics, where he’s known all the players, their strengths and particularly their weaknesses. While the bet noir to liberals, his most scathing and often hilarious critiques have often been reserved for conservatives. His 50 years among the kahunas of GOP politics — as one of the creators of modern Republican politics — made him, among his other political claims to fame, among his party’s sharpest observers. On his friend Donald Trump, no one has been keener. But at 8:30 this morning, his wife Beth texted me that he had died a few minutes ago at age 77.

It was a particular cruelty of the anti-Ailes press that it often focused on Beth, with rumors of a breakdown in their marriage and impending divorce. In fact, she was fierce in her devotion to him, and his most implacable defender. In the 10 months since he had been forced out as chairman of Fox News Channel, the network —arguably, the most significant political force in American life for a generation — that he launched, built and ran for 20 years, she carried him. This past autumn, after their hard summer of accusations and media conviction, she had flown down to Palm Beach and bought for themselves a waterfront mansion, where she hoped he would retire and where living well would at least be some revenge.

Retirement was more Beth’s idea than his. Roger and I spoke a week ago, just after the last ouster at Fox — Bill Shine, his lieutenant who had taken over his job, following by a week the ouster of Bill O’Reilly — and, invariably, the subject was Fox’s quickly eroding fortunes and the possibilities for a new conservative network. Roger, yet proscribed by the non-compete provisions of his separation agreement, nevertheless had a plan in his head, and was taking calls. “I can’t call. But I can’t stop people from calling me,” he said. As we spoke, Beth texted pictures of their view and of a newly svelte Roger lying lazily in the sun.

All things considered, it was a happy winter. Or, anyway, he was certainly weighing the benefits of being out of the office and out of the fray. Still, clearly, both he and Beth could only get so far from the bitterness they felt about his end at Fox. Worse still, the terms of his departure from Fox put draconian limits on what he could say and how he might defend himself. The payout that he believed he had earned — having created a $30 billion asset and 21st Century Fox’s most profitable business — was the price of his silence. The most voluble and pugnacious man in American media was forced to keep still.

But privately, angrily, he couldn’t wait to settle scores.

In his view, the political showdown that was always bound to happen — which, to me, he had predicted several years before — had finally happened, albeit uglier, and with more finality, than he had ever expected. “They got the memo,” he said, with some forbearance. “If you strike the king, you better kill him.”

James Murdoch

Michael Wolff: It’s James Murdoch’s Fox News Now

By “they,” he meant Rupert Murdoch’s sons. And most particularly James Murdoch, who, two years ago, was elevated to CEO of his father’s company, who Ailes regarded as an impetuous, grandiose, self-satisfied rich kid. Wryly, he admitted bringing this feud on himself. “I made the money those kids spent. So, no, I wasn’t going to suck up to them.”

Indeed, not long before his ouster, Ailes had enraged James by going around his back and helping to convince his father to squelch a plan for a new, temple-like 21st Century Fox headquarters that James wanted to build.

The relationship of Ailes to Murdoch senior, often his loyal patron but frequently just a boss stuck having to indulge his highest earner, was also always a fraught one. When I wrote my Murdoch biography in 2009, one of the few stipulations of my access to Murdoch was that I not interview Ailes, who, I gathered, Rupert felt got too much credit for the company’s success.

In July, over a two week period of press leaks after former Fox anchor Gretchen Carlson filed a sexual harassment lawsuit, Ailes was ousted without opportunity to defend himself. Even when James hired the law firm Paul, Weiss, to investigate the charges against Ailes, Ailes himself wasn’t called. In effect, in order to get his payout, he had to accept his disgrace — and it was enough money that he agreed to what he surely considered a devil’s bargain.

It is, of course, impossible to know what might be true or not. And now it can never entirely be known. Surely, his political enemies, the legions of them, were concerned much less for the truth than that he be gone. As surely, less is true than what the various lawsuits allege, because that is the nature of lawsuits. All of us who know what Roger reflexively talks like, irascibly, caustically and with retrograde vividness, give him, at least privately, the benefit of the doubt.

In the end, the larger story is about someone who, from Nixon’s “silent majority” to Reagan’s “Reagan Democrats” to Fox News, understood the intensity of the unhappiness and anger in another America that we liberal media people are only now waking up to with Donald Trump.

More personally, when you’re in the media business, what you look for is someone who is at the top of his craft, who understands the real score, who knows how to gossip and who has stories to tell. If you missed knowing Roger, you missed out.

http://www.hollywoodreporter.com/news/michael-wolff-roger-ailes-final-days-a-complicated-murdoch-relationship-1005194

Image result for cartoons department of justice special couselor

Image result for trump tweet with all the illegal acts

Image result for cartoons branco trump witch hunt

Image result for cartoons branco trump witch hunt

 

Image result for cartoons branco hillary clinton public corruption

Image result for cartoons branco hillary clinton public corruption

Image result for cartoons branco hillary clinton public corruptionImage result for cartoons branco hillary clinton public corruption

Robert Meuller Named Special Prosecutor in Trump-Russia Probe. Tucker and Jason Chaffetz Weigh In.

Trump Blasts Russia Investigation as a ‘Witch Hunt’ on Twitter

Explaining Robert Mueller’s New Role as Special Counsel

While Most Sing Mueller’s Praises, Louie Gohmert Says He’s a Big Problem!

Bill Bennett talks pros and cons of Russia special counsel

Ingraham: Left has been trying to impeach since Election Day

What does special counsel mean for the Russia probe?

As special counsel, Mueller to have significant power in Russia probe

Brit Hume: Mueller is the grownup needed for Russia probe

Remarks from Robert Mueller III

Ding Dong The Witch Is Dead

Ding Dong! The Witch Is Dead lyrics

Play “Ding Dong! The Witc…”
on Amazon Music
Munchkins
Ding Dong! The Witch is dead. Which old Witch? The Wicked Witch!
Ding Dong! The Wicked Witch is dead.
Wake up – sleepy head, rub your eyes, get out of bed.
Wake up, the Wicked Witch is dead. She’s gone where the goblins go,
Below – below – below. Yo-ho, let’s open up and sing and ring the bells out.
Ding Dong’ the merry-oh, sing it high, sing it low.
Let them know
The Wicked Witch is dead!
Mayor
As Mayor of the Munchkin City, In the County of the Land of Oz, I welcome you most regally.
Barrister
But we’ve got to verify it legally, to see
Mayor
To see?
Barrister
If she
Mayor
If she?
Barrister
Is morally, ethic’lly
Father No.1
Spiritually, physically
Father No. 2
Positively, absolutely
Munchkins
Undeniably and reliably Dead
Coroner
As Coroner I must aver, I thoroughly examined her.
And she’s not only merely dead, she’s really most sincerely dead.
Mayor
Then this is a day of Independence For all the Munchkins and their descendants
Barrister
If any.
Mayor
Yes, let the joyous news be spread The wicked Old Witch at last is dead!

A Special Enemy

Former FBI Director Robert Mueller was born and bred to torment Donald Trump.

Donald Trump went to sleep Wednesday night with a new enemy outside his window: former FBI Director Robert S. Mueller III.

LEON NEYFAKH

Leon Neyfakh is a Slate staff writer.

Mueller, a 72-year-old former prosecutor who left the FBI in 2013, has been called upon by the Justice Department to serve as a special counsel to investigate Trump and his associates. In accordance with an order issued Wednesday by the deputy attorney general, it will be up to Mueller—whose last name is pronounced Muh-lur—to decide whether anyone involved in the Trump campaign should be charged with a crime. “I accept this responsibility and will discharge it to the best of my ability,” Mueller said in a statement Wednesday.

Even if Mueller’s investigation doesn’t result in any charges being brought, it’s almost certain Mueller and his team will end up asking Trump questions he doesn’t want to answer and demanding to see documents he doesn’t want to provide. Barring a drastic change in Trump’s disposition, the president will respond to these affronts by publishing angry tweets about Mueller and snarling about him in interviews. Maybe he’ll even compare him to a “dog,” as he did recently when talking about former Acting Attorney General Sally Yates. Or perhaps he could threaten Mueller, as he did last week in a tweet directed at former FBI Director James Comey.

While Trump loathes a lot of people, his hatred of Mueller is likely to be particularly intense. That’s because Mueller is exactly the kind of guy Trump always hates. He’s also exactly the kind of law enforcement official Trump doesn’t understand.

Raised in a wealthy suburb of Philadelphia, Mueller has Roman numerals in his name and attended a New Hampshire boarding school alongside John Kerry. Later, he followed in his father’s footsteps to Princeton, where he played lacrosse, and received a master’s from New York University and a J.D. from the University of Virginia School of Law. According to NPR, former CIA Director George Tenet described Mueller in 2013 as a “high Protestant with a locked jaw [and a] blue blazer, khaki pants, penny loafers, maybe a little Vitalis and Old Spice to boot.”

Mueller was an oddity at the FBI, said Tim Weiner, author of Enemies: A History of the FBI. “There are not a lot of people named Robert Swan Mueller III in the directory of the FBI,” he told me. “Bobby is very patrician. He’s very well-bred.”

It helped that Mueller was also a Marine who fought in Vietnam, having served as the leader of a rifle platoon and been awarded the Bronze Star and the Purple Heart. Journalists who’ve profiled him invariably note that Mueller’s time in the Marines shaped him profoundly and informed his demanding leadership style. When David Margolis showed up to his first day of work as Mueller’s deputy at the FBI, on the Monday after George W. Bush’s inauguration in 2001, he discovered an unsigned note on his desk that was unmistakably from Mueller: “It’s 0700. Where are you?”

Sworn in exactly one week before 9/11, Mueller found himself in charge of fixing a broken FBI that had failed to make sense of crucial clues before the attacks. Writing in Time in 2011, Barton Gellman described the state of the bureau before Mueller’s arrival: “The labor force—heavily white and male, with a blue collar culture that prized physical courage over book smarts lacked the language and technical skills to adapt.” Gellman explained that in the aftermath of 9/11, questions arose as to whether the FBI “was irreparably broken, ill equipped to collect intelligence and disinclined to share it anyway.”

Over the course of 12 years, Mueller worked to transform the agency into an organization that could both hold people responsible for past crimes and suss out malfeasance that hadn’t yet been committed—terrorist plots in particular. Mueller, Gellman wrote, “remade the bureau in his image,” as “[o]utsiders displaced agents with badges and guns as assistant directors in charge of finance, human resources, information technology and the directorate of weapons of mass destruction.” In his office, according to a Washingtonian piece by Garrett Graff, Mueller kept shelves lined with “counterterrorism books, manuals on IT and computers, and business books on such topics as ‘change management’ by corporate thinkers like Jack Welch.” Only a “tiny section,” Graff wrote, was “devoted to crime.”

Mueller, who is not an imposing street soldier who wears a cool uniform, doesn’t fit Trump’s image of a law enforcement official. As evidenced by the fact that villainous Milwaukee Sheriff David Clarke appears to have landed a job in the Department of Homeland Security, Trump prefers guys who are cartoonishly “tough on crime.” He also tends to focus his political attention on rank-and-file members of police unions, presenting himself as a friend to regular cops while ignoring the senior “brass” who tell them what to do.  Trump has refused to even acknowledge the memo he was sent in February in which a raft of high-profile police chiefs—including Bill Bratton from the NYPD and David Brown, who was head of the Dallas Police Department at the time of the deadly sniper attack that killed five officers—urged him to reconsider his preferred crime-reduction strategy of putting as many people as possible in prison for as long as the law allows.

It’s possible, though unlikely, that under different circumstances Trump would be impressed by a fancy, smart guy like Mueller and would try to impress him back. But there’s one more thing about Mueller that’s going to make it impossible for Trump to show him any respect: The former FBI director is practically blood brothers with James Comey.

The bond between the two men was forged in early 2004—years before Comey succeeded Mueller as FBI director. Comey, who was then serving as the deputy attorney general under John Ashcroft, was locked in a high-stakes dispute with George W. Bush, who wanted to overrule the Justice Department’s conclusion that an NSA domestic surveillance program was illegal. As Graff tells it in his Washingtonian piece, Ashcroft was in a hospital room recovering from surgery when he was ambushed by a pair of White House aides. Here’s Graff:

Comey was driving home on Constitution Avenue with his security escort of U.S. marshals the night of Tuesday, March 10, 2004, when he got a call. … White House chief of staff Andy Card and White House counsel [Alberto] Gonzales were on their way to see Ashcroft in the hospital.

Comey told his driver to turn on the emergency lights and head to the hospital. Then he began calling other Justice officials to rally them at George Washington University Hospital.

Mueller was at dinner with his wife and daughter when he got the call from Comey at 7:20 pm. “I’ll be right there,” he said.

In 2007, Comey testified before the Senate Judiciary Committee that he believed Card and Gonzales intended to use Ashcroft’s semiconscious state to get the attorney general to sign off on the surveillance program he had previously opposed. By intercepting them in Ashcroft’s hospital room, Comey and Mueller may have prevented the Bush administration officials from getting the attorney general’s signature. (Comey said in his testimony that Ashcroft made the ultimate decision to rebuff Card and Gonzales.) They also helped put the White House and the Justice Department on course for an epic confrontation. Not long after the incident at the hospital, Mueller told Bush he would resign if the surveillance program continued. Bush, realizing he faced a situation on par with Nixon’s “Saturday Night Massacre,” backed down. Afterward, Graff wrote, Mueller and Comey “shared a dark laugh” before going back to work.

“I think that experience, of having to stand together and say, ‘No, Mr. President, you can’t do this,’ really mind-melded them,” said Weiner. “It was a moment of brotherhood.”

At this point, no friend of Jim Comey is ever going to be a friend of Donald Trump, especially when he’s leading the same investigation that Comey led before his ouster. Odds are good, in fact, that Trump will use Mueller’s closeness with Comey to accuse him of bias and question the legitimacy of his inquiry.

If and when Trump does go after Mueller—he dipped his toe in the water Thursday morning by tweeting about how it was unfair that a special counsel had been appointed to conduct the “witch hunt” against him—their showdown will be marked by a pleasing irony. In one corner will be the patrician and brainy Mueller, who has little in common with the “real cops” the president so admires. In the other will be Trump, who will soon find out what being ”tough on crime” really means. …

THE SCOPE OF THE SPECIAL COUNSEL APPOINTMENT IS TOTALLY INADEQUATE

Rod Rosenstein just appointed former FBI Director (and, before that, US Attorney) Robert Mueller as Special Counsel to take over the investigation into Trump and his associates.

I’m agnostic about the selection of Mueller. He has the benefit of credibility among FBI Agents, so will be able to make up for some of what was lost with Jim Comey’s firing. He will be regarded by those who care about such things as non-partisan. With Jim Comey, Mueller stood up to Dick Cheney on Stellar Wind in 2004 (though I think in reality his willingness to withstand Cheney’s demands has been overstated).

But Mueller has helped cover up certain things in the past, most notably with the Amerithrax investigation.

My bigger concern is with the scope, which I believe to be totally inadequate.

Here’s how the order describes the scope:

(b) The Special Counsel is authorized to conduct the investigation confirmed by then-FBI Director James 8. Comey in testimony before the House Permanent Select Committee on Intelligence on March 20, 2017, including:

(i) any links and/or coordination between the Russian government and individuals associated with the campaign of President Donald Trump; and

(ii) any matters that arose or may arise directly from the investigation; and

(iii) any other matters within the scope of 28 C.F.R. § 600.4(a).

As I read this, it covers just the investigation into ties between the Russian government and people associated with Trump’s campaign. Presumably, that includes Mike Flynn, Paul Manafort, and Carter Page, among others.

But there are other aspects of the great swamp that is the Trump and Russia orbit that might not be included here. For example, would Manafort’s corrupt deals with Ukrainian oligarchs be included? Would Flynn’s discussions with Turkish officials, or Rudy Giuliani’s attempt to excuse Turkey’s violation of Iran sanctions? Would the garden variety money laundering on behalf of non-governmental Russian mobbed up businessmen be included, something that might affect Manafort, Jared Kushner, or Trump himself?

And remember there are at least two other aspects of the Russian hacking investigation. Back in February, Reuters reported that San Francisco’s office was investigating Guccifer 2.0 and Pittsburgh was investigating the actual hackers.  Somewhere (San Francisco would be the most logical spot), they’re presumably investigating whoever it is that has been dumping NSA’s hacking tools everywhere. I’ve learned that that geography has either changed, or there are other aspects tied to those issues in other corners of the country.

Plus, there’s the Wikileaks investigation in EDVA, the same district where the Mueller-led investigation might reside, but a distinct investigation.

Any one of those investigations might present strings that can be pulled, any one of which might lead to the unraveling of the central question: did Trump’s associates coordinate with the Russian government to become President. Unless Mueller can serve to protect those other corners of the investigation from Trump’s tampering, it would be easy to shut down any of them as they become productive.

Yet, as far as I understand the scope of this, Mueller will only oversee the central question, leaving those disparate ends susceptible to Trump’s tampering.

Update: In its statement on the appointment, ACLU raises concerns about whether this would include the investigation into Trump’s attempt to obstruct this investigation.

Update: WaPo’s Philip Rucker reminds that Mueller is law firm partners with Jamie Gorelick, who has been representing both Ivanka and Kushner in this issue.

Update: Mueller is quitting WilmberHale to take this gig. He’s also taking two WilmerHale former FBI people with him. Still, that’s a close tie to the lawyer of someone representing key subjects of this investigation.

Update: One addition to the ACLU concern about investigating the Comey firing. In the most directly relevant precedent, the Plame investigation, when Pat Fitzgerald expanded his investigation from the leak of Plame’s identity to the obstruction of the investigation, he asked for approval to do so from the Acting Attorney General overseeing the investigation — in that case, Jim Comey.

The Acting Attorney General in this case is Rod Rosenstein. So if Mueller were as diligent as Fitzgerald was, he would have to ask the guy who provided the fig leaf for Comey’s firing to approve the expansion of the investigation to cover his own fig leaf.

Update: Petey noted to me that Jeff Sessions’ narrow recusal may limit how broadly Rosenstein’s order may be drawn. It’s a really interesting observation. Here’s what I said about Sessions’ recusal (which is very similar to what I tried to address in this post).

There are two areas of concern regarding Trump’s ties that would not definitively be included in this recusal: Trump’s long-term ties to mobbed up businessmen with ties to Russia (a matter not known to be under investigation but which could raise concerns about compromise of Trump going forward), and discussions about policy that may involve quid pro quos (such as the unproven allegation, made in the Trump dossier, that Carter Page might take 19% in Rosneft in exchange for ending sanctions against Russia), that didn’t involve a pay-off in terms of the hacking. There are further allegations of Trump involvement in the hacking (a weak one against Paul Manafort and a much stronger one against Michael Cohen, both in the dossier), but that’s in no way the only concern raised about Trump’s ties with Russians.

The Pronk Pops Show Podcasts Portfolio

Listen To Pronk Pops Podcast or Download Shows 889-896

Listen To Pronk Pops Podcast or Download Shows 884-888

Listen To Pronk Pops Podcast or Download Shows 878-883

Listen To Pronk Pops Podcast or Download Shows 870-877

Listen To Pronk Pops Podcast or Download Shows 864-869

Listen To Pronk Pops Podcast or Download Shows 857-863

Listen To Pronk Pops Podcast or Download Shows 850-856

Listen To Pronk Pops Podcast or Download Shows 845-849

Listen To Pronk Pops Podcast or Download Shows 840-844

Listen To Pronk Pops Podcast or Download Shows 833-839

Listen To Pronk Pops Podcast or Download Shows 827-832

Listen To Pronk Pops Podcast or Download Shows 821-826

Listen To Pronk Pops Podcast or Download Shows 815-820

Listen To Pronk Pops Podcast or Download Shows 806-814

Listen To Pronk Pops Podcast or Download Shows 800-805

Listen To Pronk Pops Podcast or Download Shows 793-799

Listen To Pronk Pops Podcast or Download Shows 785-792

Listen To Pronk Pops Podcast or Download Shows 777-784

Listen To Pronk Pops Podcast or Download Shows 769-776

Listen To Pronk Pops Podcast or Download Shows 759-768

Listen To Pronk Pops Podcast or Download Shows 751-758

Listen To Pronk Pops Podcast or Download Shows 745-750

Listen To Pronk Pops Podcast or Download Shows 738-744

Listen To Pronk Pops Podcast or Download Shows 732-737

Listen To Pronk Pops Podcast or Download Shows 727-731

Listen To Pronk Pops Podcast or Download Shows 720-726

Listen To Pronk Pops Podcast or DownloadShows 713-719

Listen To Pronk Pops Podcast or DownloadShows 705-712

Listen To Pronk Pops Podcast or Download Shows 695-704

Listen To Pronk Pops Podcast or Download Shows 685-694

Listen To Pronk Pops Podcast or Download Shows 675-684

Listen To Pronk Pops Podcast or Download Shows 668-674

Listen To Pronk Pops Podcast or Download Shows 660-667

Listen To Pronk Pops Podcast or Download Shows 651-659

Listen To Pronk Pops Podcast or Download Shows 644-650

Listen To Pronk Pops Podcast or Download Shows 637-643

Listen To Pronk Pops Podcast or Download Shows 629-636

Listen To Pronk Pops Podcast or Download Shows 617-628

Listen To Pronk Pops Podcast or Download Shows 608-616

Listen To Pronk Pops Podcast or Download Shows 599-607

Listen To Pronk Pops Podcast or Download Shows 590-598

Listen To Pronk Pops Podcast or Download Shows 585- 589

Listen To Pronk Pops Podcast or Download Shows 575-584

Listen To Pronk Pops Podcast or Download Shows 565-574

Listen To Pronk Pops Podcast or Download Shows 556-564

Listen To Pronk Pops Podcast or Download Shows 546-555

Listen To Pronk Pops Podcast or Download Shows 538-545

Listen To Pronk Pops Podcast or Download Shows 532-537

Listen To Pronk Pops Podcast or Download Shows 526-531

Listen To Pronk Pops Podcast or Download Shows 519-525

Listen To Pronk Pops Podcast or Download Shows 510-518

Listen To Pronk Pops Podcast or Download Shows 500-509

Listen To Pronk Pops Podcast or Download Shows 490-499

Listen To Pronk Pops Podcast or Download Shows 480-489

Listen To Pronk Pops Podcast or Download Shows 473-479

Listen To Pronk Pops Podcast or Download Shows 464-472

Listen To Pronk Pops Podcast or Download Shows 455-463

Listen To Pronk Pops Podcast or Download Shows 447-454

Listen To Pronk Pops Podcast or Download Shows 439-446

Listen To Pronk Pops Podcast or Download Shows 431-438

Listen To Pronk Pops Podcast or Download Shows 422-430

Listen To Pronk Pops Podcast or Download Shows 414-421

Listen To Pronk Pops Podcast or Download Shows 408-413

Listen To Pronk Pops Podcast or Download Shows 400-407

Listen To Pronk Pops Podcast or Download Shows 391-399

Listen To Pronk Pops Podcast or Download Shows 383-390

Listen To Pronk Pops Podcast or Download Shows 376-382

Listen To Pronk Pops Podcast or Download Shows 369-375

Listen To Pronk Pops Podcast or Download Shows 360-368

Listen To Pronk Pops Podcast or Download Shows 354-359

Listen To Pronk Pops Podcast or Download Shows 346-353

Listen To Pronk Pops Podcast or Download Shows 338-345

Listen To Pronk Pops Podcast or Download Shows 328-337

Listen To Pronk Pops Podcast or Download Shows 319-327

Listen To Pronk Pops Podcast or Download Shows 307-318

Listen To Pronk Pops Podcast or Download Shows 296-306

Listen To Pronk Pops Podcast or Download Shows 287-295

Listen To Pronk Pops Podcast or Download Shows 277-286

Listen To Pronk Pops Podcast or Download Shows 264-276

Listen To Pronk Pops Podcast or Download Shows 250-263

Listen To Pronk Pops Podcast or Download Shows 236-249

Listen To Pronk Pops Podcast or Download Shows 222-235

Listen To Pronk Pops Podcast or Download Shows 211-221

Listen To Pronk Pops Podcast or Download Shows 202-210

Listen To Pronk Pops Podcast or Download Shows 194-201

Listen To Pronk Pops Podcast or Download Shows 184-193

Listen To Pronk Pops Podcast or Download Shows 174-183

Listen To Pronk Pops Podcast or Download Shows 165-173

Listen To Pronk Pops Podcast or Download Shows 158-164

Listen To Pronk Pops Podcast or Download Shows151-157

Listen To Pronk Pops Podcast or Download Shows 143-150

Listen To Pronk Pops Podcast or Download Shows 135-142

Listen To Pronk Pops Podcast or Download Shows 131-134

Listen To Pronk Pops Podcast or Download Shows 124-130

Listen To Pronk Pops Podcast or Download Shows 121-123

Listen To Pronk Pops Podcast or Download Shows 118-120

Listen To Pronk Pops Podcast or Download Shows 113 -117

Listen To Pronk Pops Podcast or Download Show 112

Listen To Pronk Pops Podcast or Download Shows 108-111

Listen To Pronk Pops Podcast or Download Shows 106-108

Listen To Pronk Pops Podcast or Download Shows 104-105

Listen To Pronk Pops Podcast or Download Shows 101-103

Listen To Pronk Pops Podcast or Download Shows 98-100

Listen To Pronk Pops Podcast or Download Shows 94-97

Listen To Pronk Pops Podcast or Download Show 93

Listen To Pronk Pops Podcast or Download Show 92

Listen To Pronk Pops Podcast or Download Show 91

Listen To Pronk Pops Podcast or Download Shows 88-90

Listen To Pronk Pops Podcast or Download Shows 84-87

Listen To Pronk Pops Podcast or Download Shows 79-83

Listen To Pronk Pops Podcast or Download Shows 74-78

Listen To Pronk Pops Podcast or Download Shows 71-73

Listen To Pronk Pops Podcast or Download Shows 68-70

Listen To Pronk Pops Podcast or Download Shows 65-67

Listen To Pronk Pops Podcast or Download Shows 62-64

Listen To Pronk Pops Podcast or Download Shows 58-61

Listen To Pronk Pops Podcast or Download Shows 55-57

Listen To Pronk Pops Podcast or Download Shows 52-54

Listen To Pronk Pops Podcast or Download Shows 49-51

Listen To Pronk Pops Podcast or Download Shows 45-48

Listen To Pronk Pops Podcast or Download Shows 41-44

Listen To Pronk Pops Podcast or Download Shows 38-40

Listen To Pronk Pops Podcast or Download Shows 34-37

Listen To Pronk Pops Podcast or Download Shows 30-33

Listen To Pronk Pops Podcast or Download Shows 27-29

Listen To Pronk Pops Podcast or Download Shows 17-26

Listen To Pronk Pops Podcast or Download Shows 16-22

Listen To Pronk Pops Podcast or Download Shows 10-15

Listen To Pronk Pops Podcast or Download Shows 1-9

Read Full Post | Make a Comment ( None so far )

The Pronk Pops Show 895, June 17, 2017, Breaking: Story 1: Deputy Attorney General Rod Rosenstein Appoints Former FBI Director Robert Mueller Special Counsel To Investigate Russia’s Influence in U.S. Presidential 2016 Election — Videos — Story 2: The President of United States Is The FBI Director’s Boss — Absolutely No Obstruction of Justice — Former FBI Director Went Along With President Obama and Let Hillary Clinton Off — A Real Case of Obstruction of Justice By Obama and Comey — Prosecute Clinton, Obama, and Comey — Videos — Story 3: President Trump Goes On Offense — “But you have to put your head down and fight, fight, fight. Never, ever, ever give up. Things will work out just fine.” — Videos —

Posted on May 17, 2017. Filed under: American History, Benghazi, Blogroll, Breaking News, Bribery, Central Intelligence Agency, Communications, Computers, Congress, Constitutional Law, Corruption, Countries, Crime, Deep State, Donald J. Trump, Donald J. Trump, Donald Trump, Donald Trump, Education, Elections, Empires, Fast and Furious, Federal Bureau of Investigation (FBI), Federal Government, Foreign Policy, Former President Barack Obama, Freedom of Speech, Government, Government Dependency, Government Spending, Hate Speech, High Crimes, Hillary Clinton, Hillary Clinton, Hillary Clinton, History, House of Representatives, Human, Illegal Immigration, Impeachment, Iran Nuclear Weapons Deal, Language, Law, Life, Lying, Medicare, National Security Agency, News, Obama, Philosophy, Photos, Politics, Polls, President Trump, Privacy, Progressives, Radio, Raymond Thomas Pronk, Rule of Law, Scandals, Senate, Social Security, Spying, Success, Taxation, Taxes, Terror, Terrorism, Unemployment, United Kingdom, United States Constitution, Videos, War, Wealth, Welfare Spending, Wisdom | Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , |

Project_1

The Pronk Pops Show Podcasts

Pronk Pops Show 895,  May 17, 2017

Pronk Pops Show 894,  May 16, 2017

Pronk Pops Show 893,  May 15, 2017

Pronk Pops Show 892,  May 12, 2017

Pronk Pops Show 891,  May 11, 2017

Pronk Pops Show 890,  May 10, 2017

Pronk Pops Show 889,  May 9, 2017

Pronk Pops Show 888,  May 8, 2017

Pronk Pops Show 887,  May 5, 2017

Pronk Pops Show 886,  May 4, 2017

Pronk Pops Show 885,  May 3, 2017

Pronk Pops Show 884,  May 1, 2017

Pronk Pops Show 883 April 28, 2017

Pronk Pops Show 882: April 27, 2017

Pronk Pops Show 881: April 26, 2017

Pronk Pops Show 880: April 25, 2017

Pronk Pops Show 879: April 24, 2017

Pronk Pops Show 878: April 21, 2017

Pronk Pops Show 877: April 20, 2017

Pronk Pops Show 876: April 19, 2017

Pronk Pops Show 875: April 18, 2017

Pronk Pops Show 874: April 17, 2017

Pronk Pops Show 873: April 13, 2017

Pronk Pops Show 872: April 12, 2017

Pronk Pops Show 871: April 11, 2017

Pronk Pops Show 870: April 10, 2017

Pronk Pops Show 869: April 7, 2017

Pronk Pops Show 868: April 6, 2017

Pronk Pops Show 867: April 5, 2017

Pronk Pops Show 866: April 3, 2017

Pronk Pops Show 865: March 31, 2017

Pronk Pops Show 864: March 30, 2017

Pronk Pops Show 863: March 29, 2017

Pronk Pops Show 862: March 28, 2017

Pronk Pops Show 861: March 27, 2017

Pronk Pops Show 860: March 24, 2017

Pronk Pops Show 859: March 23, 2017

Pronk Pops Show 858: March 22, 2017

Pronk Pops Show 857: March 21, 2017

Pronk Pops Show 856: March 20, 2017

Pronk Pops Show 855: March 10, 2017

Pronk Pops Show 854: March 9, 2017

Pronk Pops Show 853: March 8, 2017

Pronk Pops Show 852: March 6, 2017

Pronk Pops Show 851: March 3, 2017

Pronk Pops Show 850: March 2, 2017

Pronk Pops Show 849: March 1, 2017

Pronk Pops Show 848: February 28, 2017

Pronk Pops Show 847: February 27, 2017

Pronk Pops Show 846: February 24, 2017

Pronk Pops Show 845: February 23, 2017

Pronk Pops Show 844: February 22, 2017

Pronk Pops Show 843: February 21, 2017

Pronk Pops Show 842: February 20, 2017

Pronk Pops Show 841: February 17, 2017

Pronk Pops Show 840: February 16, 2017

Pronk Pops Show 839: February 15, 2017

Pronk Pops Show 838: February 14, 2017

Pronk Pops Show 837: February 13, 2017

Pronk Pops Show 836: February 10, 2017

Pronk Pops Show 835: February 9, 2017

Pronk Pops Show 834: February 8, 2017

Pronk Pops Show 833: February 7, 2017

Pronk Pops Show 832: February 6, 2017

Pronk Pops Show 831: February 3, 2017

Pronk Pops Show 830: February 2, 2017

Pronk Pops Show 829: February 1, 2017

 

Image result for Former FBI Director Mueller Appointed Special ProsecutorImage result for cartoon trump comey obstruction of justice

Image result for Former FBI Director Mueller Appointed Special counsel

Image result for president trump at coast guard academy

 

Breaking: Story 1: Deputy Attorney General Rod Rosenstein Appoints Former FBI Director Robert Mueller  Special Counsel To Investigate Russia’s Influence in U.S. Presidential 2016 Election — Videos — 

 

Robert Mueller named special counsel for FBI Russia probe– 

FBI Director Meuller to lead Trump-Russia probe

Robert Mueller Former FBI Director Named Special Counsel for Russia Investigation

FBI Director Mueller Reflects on His 12-Year Term

Published on Aug 30, 2013

On the eve of his departure from the FBI after 12 years as Director, Robert S. Mueller reflects on the important role of the Bureau’s personnel and partners in the FBI mission.

Leadership in Context: Transforming the FBI in an Uncertain World

Uploaded on Oct 13, 2009

FBI Director Robert Mueller assumed his role on September 4, 2001, only a week before the 9/11 attack. In his talk, he discussed efforts to radically change the focus and mindset at the FBI following the attacks, shifting from a reactive stance to one that prevents such events from occurring in the future. He discussed the shift in priorities immediately following 9/11, as well as leadership efforts in the years since to solidify and improve upon those initial changes. He talks about the challenges of running a large government agency, and some leadership lessons he has found to be useful for those managing in any large organization. The event was sponsored by the Stanford Law School. (Recorded: October 8, 2009)

 

Robert Mueller appointed special counsel

Last Updated May 17, 2017 6:10 PM EDT

Deputy Attorney General Rod Rosenstein has appointed former FBI Director Robert Mueller to serve as special counsel to oversee the previously confirmed investigation of Russian efforts to influential the 2016 Presidential election and related matters.

“I have determined that a Special Counsel is necessary in order for the American people to have full confidence in the outcome,” Rosenstein said in a statement.

The appointment comes as numerous Democratic lawmakers have called for a special counsel, colloquially known as a special prosecutor. Such calls increased in recent days after Mr. Trump fired FBI Director James Comey. On Tuesday, it was revealed the Comey had written a memo alleging that Mr. Trump had asked him to back off from investigation former National Security Adviser Michael Flynn.

Rosenstein’s letter announcing the appointment of Mueller says, “If the Special Counsel believes it is necessary and appropriate, the special counsel is authorized to prosecute federal crimes arising from the investigation of these matters.”

Mueller was appointed FBI director in 2001 and served in the position until 2013. FBI directors are appointed to ten-year terms, but President Barack Obama added two years to his tenure.

A career prosecutor and veteran of the Marine Corps during the Vietnam War, Mueller is a widely respected figure in Washington.

http://www.cbsnews.com/news/doj-appoints-special-counsel-in-wake-of-comey-developments/

WASHINGTON — The Justice Department has appointed Robert S. Mueller III, the former F.B.I. director, to serve as a special counsel to oversee its investigation into Russian meddling in the election, Deputy Attorney General Rod J. Rosenstein announced on Wednesday.

The appointment of Mr. Mueller dramatically raises the stakes for President Trump in the multiple investigations into his campaign’s ties to the Russians. It follows a swiftly moving series of developments that have roiled Washington, including Mr. Trump’s abrupt dismissal of the F.B.I. director, James B. Comey, and the disclosure that the president urged Mr. Comey to drop the bureau’s investigation into his former national security adviser, Michael T. Flynn.

Graphic: Why It’s So Hard to Have an Independent Russia Investigation

“I determined that it is in the public interest for me to exercise my authorities and appoint a special counsel to assume responsibility for this matter,” Mr. Rosenstein said in a statement. “My decision is not a finding that crimes have been committed or that any prosecution is warranted. I have made no such determination.”

While a special counsel would remain ultimately answerable to Mr. Rosenstein — and by extension, the president — he would have greater autonomy to run an investigation than a United States attorney.

Mr. Mueller is expected to announce his resignation from the law firm WilmerHale.

Robert Mueller

From Wikipedia, the free encyclopedia
Robert Mueller
Director Robert S. Mueller- III.jpg
6th Director of the Federal Bureau of Investigation
In office
September 4, 2001 – September 4, 2013
President George W. Bush
Barack Obama
Deputy Bruce Gebhardt
John Pistole
Timothy Murphy
Sean Joyce
Preceded by Thomas Pickard (Acting)
Succeeded by James Comey
United States Deputy Attorney General
Acting
In office
January 20, 2001 – May 10, 2001
President George W. Bush
Preceded by Eric Holder
Succeeded by Larry Thompson
United States Attorney for the Northern District of California
In office
1998–2001
President Bill Clinton
George W. Bush
Preceded by Michael Yamaguchi
Succeeded by Kevin Ryan
United States Assistant Attorney General for the Criminal Division
In office
1990–1993
President George H.W. Bush
Bill Clinton
Preceded by Edward Dennis
Succeeded by Jo Ann Harris
United States Attorney for the District of Massachusetts
Acting
In office
1986–1987
President Ronald Reagan
Preceded by William Weld
Succeeded by Frank L. McNamara
Personal details
Born Robert Swan Mueller III
August 7, 1944 (age 72)
New York City, New York, U.S.
Education Princeton University (BA)
New York University (MA)
University of Virginia (JD)
Military service
Allegiance  United States
Service/branch  United States Marine Corps
Unit 3RDMARDIV.png 3rd Marine Division
Battles/wars Vietnam War
Awards Bronze Star Medal ribbon.svg Bronze Star Medal
Purple Heart ribbon.svg Purple Heart
Vietnam gallantry cross-w-palm-3d.svg Gallantry Cross

Robert Swan Mueller III (born August 7, 1944) is an American lawyer who was the sixth Director of the Federal Bureau of Investigation (FBI) for 12 years, between September 4, 2001 and September 4, 2013.

On May 17 2017, the US Department of Justice announced that Mueller would serve as special counsel to oversee investigation into allegations of Russian meddling in the 2016 President Election and ties between President Trump’s campaign and Russia.

Early life and education

Mueller was born on August 7, 1944, in New York City, New York, the son of Alice C. (née Truesdale) and Robert Swan Mueller.[1] His maternal great-grandfather was railroad executive William Truesdale; his ancestry includes German, Scottish, and English.[2] Mueller grew up outside of Philadelphia, Pennsylvania. A 1962 graduate of St. Paul’s School, he went on to receive an A.B. from Princeton University in 1966, where he played lacrosse, an M.A. in international relations from New York University in 1967, and a Juris Doctor from the University of Virginia School of Law in 1973.

Military service

Mueller joined the United States Marine Corps, where he served as an officer for three years, leading a rifle platoon of the 3rd Marine Division during the Vietnam War. He is a recipient of the Bronze Star, two Navy Commendation Medals, the Purple Heart and the Vietnamese Cross of Gallantry.

Career

Following his military service, Mueller continued his studies at the University of Virginia Law School, eventually serving on the Law Review. After receiving his Juris Doctor degree, Mueller worked as a litigator in San Francisco until 1976.

He then served for 12 years in United States Attorney offices. He first worked in the office of the U.S. Attorney for the Northern District of California in San Francisco, where he rose to be chief of the criminal division, and in 1982, he moved to Boston to work in the office of the U.S. Attorney’s Office for the District of Massachusetts as Assistant United States Attorney, where he investigated and prosecuted major financial fraud, terrorism and public corruption cases, as well as narcotics conspiracies and international money launderers.

After serving as a partner at the Boston law firm of Hill and Barlow, Mueller returned to government service. In 1989, he served in the United States Department of Justice as an assistant to Attorney General Dick Thornburgh. The following year he took charge of its criminal division. During his tenure, he oversaw prosecutions that included Panamanian leader Manuel Noriega, the Pan Am Flight 103 (Lockerbie bombing) case, and the Gambino crime family boss John Gotti. In 1991, he was elected a fellow of the American College of Trial Lawyers.

In 1993, Mueller became a partner at Boston’s Hale and Dorr, specializing in white-collar crime litigation. He returned to public service in 1995 as senior litigator in the homicide section of the District of Columbia United States Attorney’s Office. In 1998, Mueller was named U.S. Attorney for the Northern District of California and held that position until 2001.

Federal Bureau of Investigation

Official portrait, circa 2001

At the memorial event of Giovanni Falcone, Mueller told the audience of American and Italian law enforcement that the relationships forged years ago between the Italian National Police and the FBI “have borne tremendous fruit in this age of international crime and terrorism. Those friendships have set the standard for global cooperation among law enforcement”.

Mueller was nominated for the position of FBI Director on July 5, 2001.[3] He and two other candidates were up for the job at the time, but he was always considered the front runner.[4] Washington lawyer George J. Terwilliger III and veteran Chicago prosecutor and white-collar defense lawyer Dan Webb were up for the job but both pulled out from consideration around mid-June. Confirmation hearings for Mueller, in front of the Senate Judiciary Committee, were quickly set for July 30, only three days before his prostate cancer surgery.[5][6] The vote on the Senate floor on August 2, 2001, passed unanimously, 98–0.[7] He served as Acting Deputy Attorney General of the United States Department of Justice for several months, before officially becoming the FBI Director on September 4, 2001, just one week before the September 11 attacks against the United States.

On May 12, 2011, it was reported that President Obama had asked Director Mueller to continue at the helm of the FBI for another 2 years beyond his normal term, expiring on September 4, 2013.[8] The Senate approved this request on July 27, 2011.[9] On September 4, 2013, Mueller was replaced by James Comey.[10]

Domestic wiretapping investigation

Director Mueller, along with Deputy Attorney General James B. Comey, offered to resign from office in March 2004 if the White House overruled a Department of Justice finding that domestic wiretapping without a court warrant was unconstitutional.[11] Attorney General John D. Ashcroft denied his consent to attempts by White House Chief of Staff Andrew Card and White House Counsel Alberto R. Gonzales to waive the Justice Department ruling and permit the domestic warrantless eavesdropping program to proceed. On March 12, 2004, President George W. Bush gave his support to changes in the program sufficient to satisfy the concerns of Mueller, Ashcroft and Comey.[11] The extent of the National Security Agency‘s domestic warrantless eavesdropping under the President’s Surveillance Program is still largely unknown.

Post-FBI Career

After leaving the FBI in 2013, Mueller became a visiting professor at Stanford University where his focus is on issues related to cyber-security.[12] In addition to his teaching position, Mueller also joined the law firm WilmerHale as a partner in their Washington, D.C. Office.[13]

On May 17, 2017, Deputy Attorney General Rod Rosenstein appointed Mueller as Special Counsel in connection with the FBI’s investigation of alleged Russian interference in the 2016 US Presidential election.[14]

Bibliography

See also

References

  1. Jump up^ “Robert Swan Mueller III”. Chicago Sun-Times. July 30, 2001. Retrieved 2007-12-02.[dead link]
  2. Jump up^ “Ancestry of Robert Mueller”. Freepages.genealogy.rootsweb.ancestry.com. Retrieved 2013-03-05.
  3. Jump up^ “Remarks by the President in Nominating Robert S. Mueller as Director of the FBI”. The White House. 2001-07-05. Retrieved 2007-09-28.
  4. Jump up^ “Bush Names Mueller FBI Director”. United Press. 2001-06-06. Archived from the original on 2013-01-29. Retrieved 2006-06-10.
  5. Jump up^ “Senate hearing set July 30 for FBI choice Mueller”. CNN. 2001-06-18. Retrieved 2006-06-10.
  6. Jump up^ “FBI director-designate has prostate cancer”. CNN. 2001-06-13. Retrieved 2006-06-10.
  7. Jump up^ “Robert S. Mueller, III, to be Director of the Federal Bureau of Investigation” (Plain Text). United States Senate. 2001-08-02. Retrieved 2006-06-10.
  8. Jump up^ “FBI Director to stay in post for another 2 years”. CNN. 2011-05-12. Retrieved 2011-05-12.
  9. Jump up^ “Senate Extends Term of F.B.I. Director”. New York Times. 2011-07-27. Retrieved 2011-09-13.
  10. Jump up^ “FBI — James B. Comey Sworn in as FBI Director”. FBI. Retrieved 14 June 2015.
  11. ^ Jump up to:a b Eggen, Dan; Kane, Paul (2007-05-16). “Gonzales Hospital Episode Detailed”. Washington Post. Retrieved 2007-09-28.
  12. Jump up^ Gorlick, Adam (2013-11-05). “Former FBI director to bolster security research at Stanford.” (Press release). Stanford, California: Stanford University. Retrieved 2016-04-22.
  13. Jump up^ “Former Director of the FBI Robert Mueller III Joins WilmerHale” (Press release). Wilmer Hale. 2014-03-24. Retrieved 2016-04-22.
  14. Jump up^ http://www.cnn.com/2017/05/17/politics/special-counsel-robert-mueller/index.html?sr=twCNN051717special-counsel-robert-mueller1002PMStoryPhoto&linkId=37706257

External links

Legal offices
Preceded by
Eric Holder
United States Deputy Attorney General
Acting

2001
Succeeded by
Larry Thompson
Government offices
Preceded by
Thomas Pickard
Acting
Director of the Federal Bureau of Investigation
2001–2013
Succeeded by
James Comey

 

Story 2: President Trump is FBI Director’s Boss — Absolutely No Obstruction of Justice — Former FBI Director Went Along With President Obama and Let Hillary Clinton Off For Numerous Felonies — A Real Case of Obstruction of Justice By Both Obama and Comey — Prosecute Clinton, Obama, and Comey — Videos

Image result for branco cartoon trump obstruction of justiceImage result for cartoon trump comey obstruction of justice

 

About That James Comey Memo. Let’s Dig Into It a Little!

Trey Gowdy on NYT Story that Trump Asked James Comey to Lay off Mike Flynn!

Krauthammer on Flynn: This is a cover-up without a crime

Lionel Nation Live Stream: J. Edgar Comey the Clown Exacts His Revenge While Fake News Revels

What qualifies as obstruction of justice?

Obama: Clinton Careless In Managing Emails

FBI director calls Clinton, her aides ‘extremely careless’

Exclusive: President Obama On FBI Reviewing Hillary Clinton Emails

Gregg Jarrett: Comey’s revenge is a gun without powder

Gregg Jarrett

James Comey was lying in wait.

His gun was cocked, he took aim and fired.  But his weapon was empty.

Three months ago, the then-FBI Director met with President Trump.  Following their private conversation, Comey did what he always does –he wrote a memorandum to himself memorializing the conversation.  Good lawyers do that routinely.

Now, only after Comey was fired, the memo magically surfaces in an inflammatory New York Times report which alleges that Mr. Trump asked Comey to end the Michael Flynn investigation.    

Those who don’t know the first thing about the law immediately began hurling words like “obstruction of justice”, “high crimes and misdemeanors” and “impeachment“.   Typically, these people don’t know what they don’t know. 

Here is what we do know.

Under the law, Comey is required to immediately inform the Department of Justice of any attempt to obstruct justice by any person, even the President of the United States.  Failure to do so would result in criminal charges against Comey.  (18 USC 4 and 28 USC 1361)  He would also, upon sufficient proof, lose his license to practice law. 

So, if Comey believed Trump attempted to obstruct justice, did he comply with the law by reporting it to the DOJ?  If not, it calls into question whether the events occurred as the Times reported it.

Obstruction requires what’s called “specific intent” to interfere with a criminal case.  If Comey concluded, however, that Trump’s language was vague, ambiguous or elliptical, then he has no duty under the law to report it because it does not rise to the level of specific intent.  Thus, no crime.

There is no evidence Comey ever alerted officials at the Justice Department, as he is duty-bound to do.  Surely if he had, that incriminating information would have made its way to the public either by an indictment or, more likely, an investigation that could hardly be kept confidential in the intervening months.

Comey’s memo is being treated as a “smoking gun” only because the media and Democrats, likely prompted by Comey himself, are now peddling it that way.

Comey will soon testify before Congress about this and other matters.  His memo will likely be produced pursuant to a subpoena.  The words and the context will matter.

But by writing a memo, Comey has put himself in a box.  If he now accuses the President of obstruction, he places himself in legal jeopardy for failing to promptly and properly report it.  If he says it was merely an uncomfortable conversation, he clears the president of wrongdoing and sullies his own image as a guy who attempted to smear the man who fired him.

Either way, James Comey comes out a loser.  No matter.  The media will hail him a hero.

After all, he gave them a good story that was better than the truth.

Gregg Jarrett is a Fox News Anchor and former defense attorney.

http://www.foxnews.com/opinion/2017/05/16/gregg-jarrett-comeys-revenge-is-gun-without-powder.html

MAY 17, 2017 1:59PM

Obstruction of Justice

President Trump is being accused of “obstruction of justice” because of a conversation that he may have had with former FBI Director James Comey.  According to the news stories, Trump may have asked Comey to lay off his former National Security advisor, Michael Flynn.  In this post I want to briefly examine the legal doctrine of obstruction of justice.

To begin, a basic principle of American criminal law is that the line between what’s lawful and what’s unlawful needs to be clear so we will know, in advance, what conduct might land us in a prison cell.  That’s the gist behind the constitutional prohibition of ex post facto laws.  Laws with vague terms raise the same danger.  When laws are vague, police and prosecutors can abuse their power and trap people.  And that’s the danger with a catch-all doctrine such as “obstruction of justice.”

“Obstruction” has sometimes been defined by the authorities as almost any action that “impedes” an investigation.  Invoking your constitutional right to silence, your right to speak with an attorney, or the attorney-client privilege are sometimes deemed “obstruction.”  Don’t the courts restrain those abuses?  Yes, sometimes they do.  I’m presently editing a book of Judge Alex Kozinski’s legal opinions.  One case, United States v. Caldwell, touches on this subject.  Here is Judge Kozinski:

Under the government’s theory, a husband who asks his wife to buy him a radar detector would be a felon — punishable by up to five years in prison and a fine of $10,000 — because their actions would obstruct the government function of catching speeders. So would a person who witnesses a crime and suggests to another witness (with no hint of threat) that they not tell the police anything unless specifically asked about it.So would the executives of a business that competes with a government-run enterprise and lowers its prices to siphon off the government’s customers. So would co-owners of land who refuse to sell it for use as a military base, forcing the government to go to the extra trouble of condemning it. So would have Elliot Richardson and William Ruckelshaus, had they agreed with each other to quit if asked by President Nixon to fire Archibald Cox. The federal government does lots of things, more and more every year, and many things private parties do can get in the government’s way. It can’t be that each such action is automatically a felony.

I should note that when James Comey served as a prosecutor in New York, he pursued Martha Stewart and went so far as to say that her assertion of innocence was itself a violation of the law!  When Comey worked as assistant attorney general, he also took a dangerously expansive view of what he considered “uncooperative” conduct by business firms.  He expected lawyers for business firms to act as deputies for the federal government, which raised constitutional problems—especially for employees who were unaware of the legal minefield all around them during a purported “internal” investigation.

Let’s also consider how the doctrine might work within the government itself.  Say a rookie cop busts a homeless man named Al, for possession of heroin.  Al is street wise so he offers to become a snitch if his charge is dropped.  Al says he was using heroin with the governor just the day before and that the governor told him that he kept a stash of other drugs in his desk at the mansion.  The rookie thinks this is a huge deal and proposes to use Al in a sting operation against the governor.  The police captain rejects the proposal and tells the rookie to forget the whole thing because it’s a made up story.  Has the captain obstructed the investigation or exercised appropriate supervision?

Another example.  Let’s say 50 FBI agents are working on the Russia investigation (improper, possibly illegal, actions involving Mr. Trump or others working on his campaign).  One agent is convinced that Mr. Trump is a traitor, taking bribes from Putin, and other illegal acts.  He proposes grand jury subpoenas for Mr. and Mrs. Trump so that they can be questioned under oath right away.  Only his FBI supervisor rejects the idea.  Has the FBI supervisor obstructed justice or exercised sound discretion?

One important difference, of course, is that neither the police captain nor the FBI supervisor, were targets (or around the targets) of the underlying investigation. Repeat: That is an important difference.  The main point of this post is simply to caution against wild and vague claims of “obstruction of justice.”  Legal rights should never be considered “obstruction.”  When judges, or prosecutors, or law enforcement supervisors restrain overzealous subordinates, that should not be considered “obstruction.”  Mr. Trump is not above the law, but investigators must also respect the law as they go about their work.

https://www.cato.org/blog/obstruction-justice

 

WASHINGTON — President Trump asked the F.B.I. director, James B. Comey, to shut down the federal investigation into Mr. Trump’s former national security adviser, Michael T. Flynn, in an Oval Office meeting in February, according to a memo Mr. Comey wrote shortly after the meeting.

“I hope you can let this go,” the president told Mr. Comey, according to the memo.

The documentation of Mr. Trump’s request is the clearest evidence that the president has tried to directly influence the Justice Department and F.B.I. investigation into links between Mr. Trump’s associates and Russia. Late Tuesday, Representative Jason Chaffetz, the Republican chairman of the House Oversight Committee, demanded that the F.B.I. turn over all “memoranda, notes, summaries and recordings” of discussions between Mr. Trump and Mr. Comey.

Such documents, Mr. Chaffetz wrote, would “raise questions as to whether the president attempted to influence or impede” the F.B.I.

Mr. Comey wrote the memo detailing his conversation with the president immediately after the meeting, which took place the day after Mr. Flynn resigned, according to two people who read the memo. It was part of a paper trail Mr. Comey created documenting what he perceived as the president’s improper efforts to influence a continuing investigation. An F.B.I. agent’s contemporaneous notes are widely held up in court as credible evidence of conversations.

Mr. Comey shared the existence of the memo with senior F.B.I. officials and close associates. The New York Times has not viewed a copy of the memo, which is unclassified, but one of Mr. Comey’s associates read parts of it to a Times reporter.

“I hope you can see your way clear to letting this go, to letting Flynn go,” Mr. Trump told Mr. Comey, according to the memo. “He is a good guy. I hope you can let this go.”

In a statement, the White House denied the version of events in the memo.

“While the president has repeatedly expressed his view that General Flynn is a decent man who served and protected our country, the president has never asked Mr. Comey or anyone else to end any investigation, including any investigation involving General Flynn,” the statement said. “The president has the utmost respect for our law enforcement agencies, and all investigations. This is not a truthful or accurate portrayal of the conversation between the president and Mr. Comey.”

GRAPHIC

The Events That Led to Comey’s Firing, and How the White House’s Story Changed

New disclosures on Tuesday allege that in February, President Trump asked James B. Comey, then the F.B.I. director, to shut down an investigation into Mr. Trump’s former national security adviser, Michael T. Flynn.

OPEN GRAPHIC

Mr. Chaffetz’s letter, sent to the acting F.B.I. director, Andrew G. McCabe, set a May 24 deadline for the internal documents to be delivered to the House committee. The congressman, a Republican, was criticized in recent months for showing little of the appetite he demonstrated in pursuing Hillary Clinton to pursue investigations into Mr. Trump’s associates.

But since announcing in April that he will not seek re-election in 2018, Mr. Chaffetz has shown more interest in the Russia investigation, and held out the potential for a subpoena on Tuesday, a notably aggressive move as most Republicans have tried to stay out of the fray.

Document: Representative Jason Chaffetz’s Letter to the F.B.I.

In testimony to the Senate last week, Mr. McCabe said, “There has been no effort to impede our investigation to date.” Mr. McCabe was referring to the broad investigation into possible collusion between Russia and the Trump campaign. The investigation into Mr. Flynn is separate.

A spokesman for the F.B.I. declined to comment.

Mr. Comey created similar memos — including some that are classified — about every phone call and meeting he had with the president, the two people said. It is unclear whether Mr. Comey told the Justice Department about the conversation or his memos.

Mr. Trump fired Mr. Comey last week. Trump administration officials have provided multiple, conflicting accounts of the reasoning behind Mr. Comey’s dismissal. Mr. Trump said in a television interview that one of the reasons was because he believed “this Russia thing” was a “made-up story.”

The Feb. 14 meeting took place just a day after Mr. Flynn was forced out of his job after it was revealed he had lied to Vice President Mike Pence about the nature of phone conversations he had had with the Russian ambassador to the United States.

Despite the conversation between Mr. Trump and Mr. Comey, the investigation of Mr. Flynn has proceeded. In Virginia, a federal grand jury has issued subpoenas in recent weeks for records related to Mr. Flynn. Part of the Flynn investigation is centered on his financial links to Russia and Turkey.

Mr. Comey had been in the Oval Office that day with other senior national security officials for a terrorism threat briefing. When the meeting ended, Mr. Trump told those present — including Mr. Pence and Attorney General Jeff Sessions — to leave the room except for Mr. Comey.

Five Contradictions in the White House’s Story About Comey’s Firing

The Trump administration has offered conflicting answers about how and why the F.B.I. director, James Comey, was fired.

Alone in the Oval Office, Mr. Trump began the discussion by condemning leaks to the news media, saying that Mr. Comey should consider putting reporters in prison for publishing classified information, according to one of Mr. Comey’s associates.

Mr. Trump then turned the discussion to Mr. Flynn.

After writing up a memo that outlined the meeting, Mr. Comey shared it with senior F.B.I. officials. Mr. Comey and his aides perceived Mr. Trump’s comments as an effort to influence the investigation, but they decided that they would try to keep the conversation secret — even from the F.B.I. agents working on the Russia investigation — so the details of the conversation would not affect the investigation.

Mr. Comey was known among his closest advisers to document conversations that he believed would later be called into question, according to two former confidants, who said Mr. Comey was uncomfortable at times with his relationship with Mr. Trump.

Mr. Comey’s recollection has been bolstered in the past by F.B.I. notes. In 2007, he told Congress about a now-famous showdown with senior White House officials over the Bush administration’s warrantless wiretapping program. The White House disputed Mr. Comey’s account, but the F.B.I. director at the time, Robert S. Mueller III, kept notes that backed up Mr. Comey’s story.

The White House has repeatedly crossed lines that other administrations have been reluctant to cross when discussing politically charged criminal investigations. Mr. Trump has disparaged the continuing F.B.I. investigation as a hoax and called for an inquiry into his political rivals. His representatives have taken the unusual step of declaring no need for a special prosecutor to investigate the president’s associates.

The Oval Office meeting occurred a little over two weeks after Mr. Trump summoned Mr. Comey to the White House for a lengthy, one-on-one dinner at the residence. At that dinner, on Jan. 27, Mr. Trump asked Mr. Comey at least two times for a pledge of loyalty — which Mr. Comey declined, according to one of Mr. Comey’s associates.

In a Twitter post on Friday, Mr. Trump said that “James Comey better hope that there are no ‘tapes’ of our conversations before he starts leaking to the press!”

After the meeting, Mr. Comey’s associates did not believe there was any way to corroborate Mr. Trump’s statements. But Mr. Trump’s suggestion last week that he was keeping tapes has made them wonder whether there are tapes that back up Mr. Comey’s account.

The Jan. 27 dinner came a day after White House officials learned that Mr. Flynn had been interviewed by F.B.I. agents about his phone calls with the Russian ambassador, Sergey I. Kislyak. On Jan. 26, the acting attorney general, Sally Q. Yates, told the White House counsel about the interview, and said Mr. Flynn could be subject to blackmail by the Russians because they knew he had lied about the content of the calls.

The Pronk Pops Show Podcasts Portfolio

Listen To Pronk Pops Podcast or Download Shows 889-895

Listen To Pronk Pops Podcast or Download Shows 884-888

Listen To Pronk Pops Podcast or Download Shows 878-883

Listen To Pronk Pops Podcast or Download Shows 870-877

Listen To Pronk Pops Podcast or Download Shows 864-869

Listen To Pronk Pops Podcast or Download Shows 857-863

Listen To Pronk Pops Podcast or Download Shows 850-856

Listen To Pronk Pops Podcast or Download Shows 845-849

Listen To Pronk Pops Podcast or Download Shows 840-844

Listen To Pronk Pops Podcast or Download Shows 833-839

Listen To Pronk Pops Podcast or Download Shows 827-832

Listen To Pronk Pops Podcast or Download Shows 821-826

Listen To Pronk Pops Podcast or Download Shows 815-820

Listen To Pronk Pops Podcast or Download Shows 806-814

Listen To Pronk Pops Podcast or Download Shows 800-805

Listen To Pronk Pops Podcast or Download Shows 793-799

Listen To Pronk Pops Podcast or Download Shows 785-792

Listen To Pronk Pops Podcast or Download Shows 777-784

Listen To Pronk Pops Podcast or Download Shows 769-776

Listen To Pronk Pops Podcast or Download Shows 759-768

Listen To Pronk Pops Podcast or Download Shows 751-758

Listen To Pronk Pops Podcast or Download Shows 745-750

Listen To Pronk Pops Podcast or Download Shows 738-744

Listen To Pronk Pops Podcast or Download Shows 732-737

Listen To Pronk Pops Podcast or Download Shows 727-731

Listen To Pronk Pops Podcast or Download Shows 720-726

Listen To Pronk Pops Podcast or DownloadShows 713-719

Listen To Pronk Pops Podcast or DownloadShows 705-712

Listen To Pronk Pops Podcast or Download Shows 695-704

Listen To Pronk Pops Podcast or Download Shows 685-694

Listen To Pronk Pops Podcast or Download Shows 675-684

Listen To Pronk Pops Podcast or Download Shows 668-674

Listen To Pronk Pops Podcast or Download Shows 660-667

Listen To Pronk Pops Podcast or Download Shows 651-659

Listen To Pronk Pops Podcast or Download Shows 644-650

Listen To Pronk Pops Podcast or Download Shows 637-643

Listen To Pronk Pops Podcast or Download Shows 629-636

Listen To Pronk Pops Podcast or Download Shows 617-628

Listen To Pronk Pops Podcast or Download Shows 608-616

Listen To Pronk Pops Podcast or Download Shows 599-607

Listen To Pronk Pops Podcast or Download Shows 590-598

Listen To Pronk Pops Podcast or Download Shows 585- 589

Listen To Pronk Pops Podcast or Download Shows 575-584

Listen To Pronk Pops Podcast or Download Shows 565-574

Listen To Pronk Pops Podcast or Download Shows 556-564

Listen To Pronk Pops Podcast or Download Shows 546-555

Listen To Pronk Pops Podcast or Download Shows 538-545

Listen To Pronk Pops Podcast or Download Shows 532-537

Listen To Pronk Pops Podcast or Download Shows 526-531

Listen To Pronk Pops Podcast or Download Shows 519-525

Listen To Pronk Pops Podcast or Download Shows 510-518

Listen To Pronk Pops Podcast or Download Shows 500-509

Listen To Pronk Pops Podcast or Download Shows 490-499

Listen To Pronk Pops Podcast or Download Shows 480-489

Listen To Pronk Pops Podcast or Download Shows 473-479

Listen To Pronk Pops Podcast or Download Shows 464-472

Listen To Pronk Pops Podcast or Download Shows 455-463

Listen To Pronk Pops Podcast or Download Shows 447-454

Listen To Pronk Pops Podcast or Download Shows 439-446

Listen To Pronk Pops Podcast or Download Shows 431-438

Listen To Pronk Pops Podcast or Download Shows 422-430

Listen To Pronk Pops Podcast or Download Shows 414-421

Listen To Pronk Pops Podcast or Download Shows 408-413

Listen To Pronk Pops Podcast or Download Shows 400-407

Listen To Pronk Pops Podcast or Download Shows 391-399

Listen To Pronk Pops Podcast or Download Shows 383-390

Listen To Pronk Pops Podcast or Download Shows 376-382

Listen To Pronk Pops Podcast or Download Shows 369-375

Listen To Pronk Pops Podcast or Download Shows 360-368

Listen To Pronk Pops Podcast or Download Shows 354-359

Listen To Pronk Pops Podcast or Download Shows 346-353

Listen To Pronk Pops Podcast or Download Shows 338-345

Listen To Pronk Pops Podcast or Download Shows 328-337

Listen To Pronk Pops Podcast or Download Shows 319-327

Listen To Pronk Pops Podcast or Download Shows 307-318

Listen To Pronk Pops Podcast or Download Shows 296-306

Listen To Pronk Pops Podcast or Download Shows 287-295

Listen To Pronk Pops Podcast or Download Shows 277-286

Listen To Pronk Pops Podcast or Download Shows 264-276

Listen To Pronk Pops Podcast or Download Shows 250-263

Listen To Pronk Pops Podcast or Download Shows 236-249

Listen To Pronk Pops Podcast or Download Shows 222-235

Listen To Pronk Pops Podcast or Download Shows 211-221

Listen To Pronk Pops Podcast or Download Shows 202-210

Listen To Pronk Pops Podcast or Download Shows 194-201

Listen To Pronk Pops Podcast or Download Shows 184-193

Listen To Pronk Pops Podcast or Download Shows 174-183

Listen To Pronk Pops Podcast or Download Shows 165-173

Listen To Pronk Pops Podcast or Download Shows 158-164

Listen To Pronk Pops Podcast or Download Shows151-157

Listen To Pronk Pops Podcast or Download Shows 143-150

Listen To Pronk Pops Podcast or Download Shows 135-142

Listen To Pronk Pops Podcast or Download Shows 131-134

Listen To Pronk Pops Podcast or Download Shows 124-130

Listen To Pronk Pops Podcast or Download Shows 121-123

Listen To Pronk Pops Podcast or Download Shows 118-120

Listen To Pronk Pops Podcast or Download Shows 113 -117

Listen To Pronk Pops Podcast or Download Show 112

Listen To Pronk Pops Podcast or Download Shows 108-111

Listen To Pronk Pops Podcast or Download Shows 106-108

Listen To Pronk Pops Podcast or Download Shows 104-105

Listen To Pronk Pops Podcast or Download Shows 101-103

Listen To Pronk Pops Podcast or Download Shows 98-100

Listen To Pronk Pops Podcast or Download Shows 94-97

Listen To Pronk Pops Podcast or Download Show 93

Listen To Pronk Pops Podcast or Download Show 92

Listen To Pronk Pops Podcast or Download Show 91

Listen To Pronk Pops Podcast or Download Shows 88-90

Listen To Pronk Pops Podcast or Download Shows 84-87

Listen To Pronk Pops Podcast or Download Shows 79-83

Listen To Pronk Pops Podcast or Download Shows 74-78

Listen To Pronk Pops Podcast or Download Shows 71-73

Listen To Pronk Pops Podcast or Download Shows 68-70

Listen To Pronk Pops Podcast or Download Shows 65-67

Listen To Pronk Pops Podcast or Download Shows 62-64

Listen To Pronk Pops Podcast or Download Shows 58-61

Listen To Pronk Pops Podcast or Download Shows 55-57

Listen To Pronk Pops Podcast or Download Shows 52-54

Listen To Pronk Pops Podcast or Download Shows 49-51

Listen To Pronk Pops Podcast or Download Shows 45-48

Listen To Pronk Pops Podcast or Download Shows 41-44

Listen To Pronk Pops Podcast or Download Shows 38-40

Listen To Pronk Pops Podcast or Download Shows 34-37

Listen To Pronk Pops Podcast or Download Shows 30-33

Listen To Pronk Pops Podcast or Download Shows 27-29

Listen To Pronk Pops Podcast or Download Shows 17-26

Listen To Pronk Pops Podcast or Download Shows 16-22

Listen To Pronk Pops Podcast or Download Shows 10-15

Listen To Pronk Pops Podcast or Download Shows 1-9

Read Full Post | Make a Comment ( None so far )

The Pronk Pops Show 892, May 12, 2017, Story 1: Lester _______ (Bolt, Colt, Dolt, Holt, Jolt, Volt) Interviews President Donald J. Trump — The Real Scandal Is Obama Surveillance and Spying On Republican Party Presidential Candidates Using The Intelligent Community (CIA, NSA, FBI, …) Product–Unmasked and Leaked! — Videos– Story 2: Big Lie Media Crazy Credibility Crisis — Fake News is Media McCarthyism — Videos — Story 3: President Trump Voter Fraud Commission — Videos

Posted on May 12, 2017. Filed under: Addiction, American History, Benghazi, Blogroll, Breaking News, Cartoons, Communications, Computers, Congress, Corruption, Countries, Crime, Culture, Donald J. Trump, Donald J. Trump, Donald Trump, Donald Trump, Economics, Education, Elections, Empires, Employment, Fast and Furious, Federal Bureau of Investigation (FBI), Federal Government, Foreign Policy, Freedom of Speech, Government, Government Dependency, Government Spending, Hate Speech, High Crimes, History, House of Representatives, Human, Human Behavior, Illegal Immigration, Iran Nuclear Weapons Deal, IRS, Language, Law, Life, Lying, Marco Rubio, Media, National Interest, National Security Agency, News, Obama, Philosophy, Photos, Politics, Polls, President Barack Obama, President Trump, Progressives, Radio, Rand Paul, Raymond Thomas Pronk, Regulation, Scandals, Security, Senate, Servers, Software, Spying, Surveillance and Spying On American People, Surveillance/Spying, Taxation, Terror, Terrorism, Trump Surveillance/Spying, United States of America, Videos, Violence, War, Wealth, Wisdom | Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , |

Project_1

The Pronk Pops Show Podcasts

Pronk Pops Show 892,  May 12, 2017

Pronk Pops Show 891,  May 11, 2017

Pronk Pops Show 891,  May 11, 2017

Pronk Pops Show 890,  May 10, 2017

Pronk Pops Show 889,  May 9, 2017

Pronk Pops Show 888,  May 8, 2017

Pronk Pops Show 887,  May 5, 2017

Pronk Pops Show 886,  May 4, 2017

Pronk Pops Show 885,  May 3, 2017

Pronk Pops Show 884,  May 1, 2017

Pronk Pops Show 883 April 28, 2017

Pronk Pops Show 882: April 27, 2017

Pronk Pops Show 881: April 26, 2017

Pronk Pops Show 880: April 25, 2017

Pronk Pops Show 879: April 24, 2017

Pronk Pops Show 878: April 21, 2017

Pronk Pops Show 877: April 20, 2017

Pronk Pops Show 876: April 19, 2017

Pronk Pops Show 875: April 18, 2017

Pronk Pops Show 874: April 17, 2017

Pronk Pops Show 873: April 13, 2017

Pronk Pops Show 872: April 12, 2017

Pronk Pops Show 871: April 11, 2017

Pronk Pops Show 870: April 10, 2017

Pronk Pops Show 869: April 7, 2017

Pronk Pops Show 868: April 6, 2017

Pronk Pops Show 867: April 5, 2017

Pronk Pops Show 866: April 3, 2017

Pronk Pops Show 865: March 31, 2017

Pronk Pops Show 864: March 30, 2017

Pronk Pops Show 863: March 29, 2017

Pronk Pops Show 862: March 28, 2017

Pronk Pops Show 861: March 27, 2017

Pronk Pops Show 860: March 24, 2017

Pronk Pops Show 859: March 23, 2017

Pronk Pops Show 858: March 22, 2017

Pronk Pops Show 857: March 21, 2017

Pronk Pops Show 856: March 20, 2017

Pronk Pops Show 855: March 10, 2017

Pronk Pops Show 854: March 9, 2017

Pronk Pops Show 853: March 8, 2017

Pronk Pops Show 852: March 6, 2017

Pronk Pops Show 851: March 3, 2017

Pronk Pops Show 850: March 2, 2017

Pronk Pops Show 849: March 1, 2017

Pronk Pops Show 848: February 28, 2017

Pronk Pops Show 847: February 27, 2017

Pronk Pops Show 846: February 24, 2017

Pronk Pops Show 845: February 23, 2017

Pronk Pops Show 844: February 22, 2017

Pronk Pops Show 843: February 21, 2017

Pronk Pops Show 842: February 20, 2017

Pronk Pops Show 841: February 17, 2017

Pronk Pops Show 840: February 16, 2017

Pronk Pops Show 839: February 15, 2017

Pronk Pops Show 838: February 14, 2017

Pronk Pops Show 837: February 13, 2017

Pronk Pops Show 836: February 10, 2017

Pronk Pops Show 835: February 9, 2017

Pronk Pops Show 834: February 8, 2017

Pronk Pops Show 833: February 7, 2017

Pronk Pops Show 832: February 6, 2017

Pronk Pops Show 831: February 3, 2017

Pronk Pops Show 830: February 2, 2017

Pronk Pops Show 829: February 1, 2017

 

Story 1: Lester _______ (Bolt, Colt, Dolt, Holt, Jolt, Volt) Interviews President Donald J. Trump — The Real Scandal Is Obama Surveillance and Spying On Trump and Associates Using The Intelligent Community (CIA, NSA, FBI, …) Product!  —  Videos — 

 

Image result for obama surveillance of trumpImage result for cartoons obama surveillance of trumpImage result for trump crisisImage result for cartoons obama surveillance of trumpImage result for cartoons obama surveillance of trumpImage result for cartoons obama surveillance of trumpImage result for cartoons obama surveillance of trumpImage result for cartoons obama surveillance of trump

Image result for intelligence community

Image result for intelligence community

President Trump Full Interview with Lester Holt NBC 5/11/17

“This Is TOTALLY FAKE!” Tucker Loses His Temper on Russia Conspiracy

Obama Might have Spied on Rand Paul and Other Republicans

Obama Administration Spying on Rand Paul | Michael Savage (Audio)

Did President Obama Spy On Donald Trump? | True News

The Truth About FBI Director James Comey: You’re Fired!

Hannity: James Comey is a national embarrassment

Full || FBI Director James Comey Press Conference On Hillary Clinton Email Investigation (7-5-16)

United States Intelligence Community

From Wikipedia, the free encyclopedia
United States Intelligence Community
United States Intelligence Community Seal.svg

Seal of the United States Intelligence Community
Agency overview
Formed December 4, 1981
Agency executive

The United States Intelligence Community (IC)[1] is a federation of 16 separate United States government agencies that work separately and together to conduct intelligence activities considered necessary for the conduct of foreign relations and national security of the United States. Member organizations of the IC include intelligence agencies, military intelligence, and civilian intelligence and analysis offices within federal executive departments. The IC is headed by the Director of National Intelligence (DNI), who reports to the President of the United States.

Among their varied responsibilities, the members of the Community collect and produce foreign and domestic intelligence, contribute to military planning, and perform espionage. The IC was established by Executive Order 12333, signed on December 4, 1981, by U.S. PresidentRonald Reagan.[2]

The Washington Post reported in 2010 that there were 1,271 government organizations and 1,931 private companies in 10,000 locations in the United States that are working on counterterrorism, homeland security, and intelligence, and that the intelligence community as a whole includes 854,000 people holding top-secret clearances.[3] According to a 2008 study by the Office of the Director of National Intelligence, private contractors make up 29% of the workforce in the U.S. intelligence community and account for 49% of their personnel budgets.[4]

Etymology

The term “Intelligence Community” was first used during Lt. Gen. Walter Bedell Smith‘s tenure as Director of Central Intelligence (1950–1953).[5]

History

Intelligence is information that agencies collect, analyze, and distribute in response to government leaders’ questions and requirements. Intelligence is a broad term that entails:

Collection, analysis, and production of sensitive information to support national security leaders, including policymakers, military commanders, and Members of Congress. Safeguarding these processes and this information through counterintelligence activities. Execution of covert operations approved by the President. The IC strives to provide valuable insight on important issues by gathering raw intelligence, analyzing that data in context, and producing timely and relevant products for customers at all levels of national security—from the war-fighter on the ground to the President in Washington.[6]

Executive Order 12333 charged the IC with six primary objectives:[7]

  • Collection of information needed by the President, the National Security Council, the Secretary of State, the Secretary of Defense, and other executive branch officials for the performance of their duties and responsibilities;
  • Production and dissemination of intelligence;
  • Collection of information concerning, and the conduct of activities to protect against, intelligence activities directed against the U.S., international terrorist and/or narcotics activities, and other hostile activities directed against the U.S. by foreign powers, organizations, persons and their agents;
  • Special activities (defined as activities conducted in support of U.S. foreign policy objectives abroad which are planned and executed so that the “role of the United States Government is not apparent or acknowledged publicly”, and functions in support of such activities, but which are not intended to influence United States political processes, public opinion, policies, or media and do not include diplomatic activities or the collection and production of intelligence or related support functions);
  • Administrative and support activities within the United States and abroad necessary for the performance of authorized activities and
  • Such other intelligence activities as the President may direct from time to time.

Organization

Members

The IC is headed by the Director of National Intelligence (DNI), whose statutory leadership is exercised through the Office of the Director of National Intelligence (ODNI). The 16 members of the IC are:[8]

The official seals of U.S. Intelligence Community members.

Agency/Office Parent Agency Federal Department Date est.
Defense Intelligence Agency none Defense 1961
National Geospatial-Intelligence Agency none Defense 1996
National Reconnaissance Office none Defense 1961
National Security Agency none Defense 1952
Military Intelligence Corps United States Army Defense 1863
Office of Naval Intelligence United States Navy Defense 1882
Twenty-Fifth Air Force United States Air Force Defense 1948
Marine Corps Intelligence United States Marine Corps Defense 1939
Coast Guard Intelligence United States Coast Guard Homeland Security 1915
Office of Intelligence and Analysis none Homeland Security 2007
Central Intelligence Agency none Independent agency 1947
Bureau of Intelligence and Research none State 1945
Office of Terrorism and Financial Intelligence none Treasury 2004
Office of National Security Intelligence Drug Enforcement Administration Justice 2006
Intelligence Branch Federal Bureau of Investigation Justice 2005
Office of Intelligence and Counterintelligence none Energy 1977

Programs

The IC performs under two separate programs:

  • The National Intelligence Program (NIP), formerly known as the National Foreign Intelligence Program as defined by the National Security Act of 1947 (as amended), “refers to all programs, projects, and activities of the intelligence community, as well as any other programs of the intelligence community designated jointly by the Director of National Intelligence (DNI) and the head of a United States department or agency or by the President. Such term does not include programs, projects, or activities of the military departments to acquire intelligence solely for the planning and conduct of tactical military operations by United States Armed Forces”. Under the law, the DNI is responsible for directing and overseeing the NIP, though the ability to do so is limited (see the Organization structure and leadership section).
  • The Military Intelligence Program (MIP) refers to the programs, projects, or activities of the military departments to acquire intelligence solely for the planning and conduct of tactical military operations by United States Armed Forces. The MIP is directed and controlled by the Under Secretary of Defense for Intelligence. In 2005 the Department of Defense combined the Joint Military Intelligence Program and the Tactical Intelligence and Related Activities program to form the MIP.

Since the definitions of the NIP and MIP overlap when they address military intelligence, assignment of intelligence activities to the NIP and MIP sometimes proves problematic.

Organizational structure and leadership

IC Circle.jpg

The overall organization of the IC is primarily governed by the National Security Act of 1947 (as amended) and Executive Order12333. The statutory organizational relationships were substantially revised with the 2004 Intelligence Reform and Terrorism Prevention Act (IRTPA) amendments to the 1947 National Security Act.

Though the IC characterizes itself as a federation of its member elements, its overall structure is better characterized as a confederation due to its lack of a well-defined, unified leadership and governance structure. Prior to 2004, the Director of Central Intelligence (DCI) was the head of the IC, in addition to being the director of the CIA. A major criticism of this arrangement was that the DCI had little or no actual authority over the budgetary authorities of the other IC agencies and therefore had limited influence over their operations.

Following the passage of IRTPA in 2004, the head of the IC is the Director of National Intelligence (DNI). The DNI exerts leadership of the IC primarily through statutory authorities under which he or she:

  • controls the “National Intelligence Program” budget;
  • establishes objectives, priorities, and guidance for the IC; and
  • manages and directs the tasking of, collection, analysis, production, and dissemination of national intelligence by elements of the IC.

However, the DNI has no authority to direct and control any element of the IC except his own staff—the Office of the DNI—neither does the DNI have the authority to hire or fire personnel in the IC except those on his own staff. The member elements in the executive branch are directed and controlled by their respective department heads, all cabinet-level officials reporting to the President. By law, only the Director of the Central Intelligence Agency reports to the DNI.

In light of major intelligence failures in recent years that called into question how well Intelligence Community ensures U.S. national security, particularly those identified by the 9/11 Commission (National Commission on Terrorist Attacks Upon the United States), and the “WMD Commission” (Commission on the Intelligence Capabilities of the United States Regarding Weapons of Mass Destruction), the authorities and powers of the DNI and the overall organizational structure of the IC have become subject of intense debate in the United States.

Interagency cooperation

Previously, interagency cooperation and the flow of information among the member agencies was hindered by policies that sought to limit the pooling of information out of privacy and security concerns. Attempts to modernize and facilitate interagency cooperation within the IC include technological, structural, procedural, and cultural dimensions. Examples include the Intellipediawiki of encyclopedic security-related information; the creation of the Office of the Director of National Intelligence, National Intelligence Centers, Program Manager Information Sharing Environment, and Information Sharing Council; legal and policy frameworks set by the Intelligence Reform and Terrorism Prevention Act of 2004, information sharing Executive Orders 13354 and Executive Order 13388, and the 2005 National Intelligence Strategy.

Budget

Data visualization of U.S. intelligence black budget (2013)

The U.S. intelligence budget (excluding the Military Intelligence Program) in fiscal year 2013 was appropriated as $52.7 billion, and reduced by the amount sequestered to $49.0 billion.[9] In fiscal year2012 it peaked at $53.9 billion, according to a disclosure required under a recent law implementing recommendations of the 9/11 Commission.[10]The 2012 figure was up from $53.1 billion in 2010,[11] $49.8 billion in 2009,[12] $47.5 billion in 2008,[13] $43.5 billion in 2007,[14] and $40.9 billion in 2006.[15]

About 70 percent of the intelligence budget went to contractors for the procurement of technology and services (including analysis), according to the May 2007 chart from the ODNI. Intelligence spending has increased by a third over ten years ago, in inflation-adjusted dollars, according to the Center for Strategic and Budgetary Assessments.[citation needed]

In a statement on the release of newdeclassified figures, DNI Mike McConnell said[when?] there would be no additional disclosures of classified budget information beyond the overall spending figure because “such disclosures could harm national security”. How the money is divided among the 16 intelligence agencies and what it is spent on is classified. It includes salaries for about 100,000 people, multibillion-dollar satellite programs, aircraft, weapons, electronic sensors, intelligence analysis, spies, computers, and software.

On August 29, 2013 the Washington Post published the summary of the Office of the Director of National Intelligence’s multivolume FY 2013 Congressional Budget Justification, the U.S. intelligence community’s top-secret “black budget.”[16][17][18] The IC’s FY 2013 budget details, how the 16 spy agencies use the money and how it performs against the goals set by the president and Congress. Experts said that access to such details about U.S. spy programs is without precedent. Steven Aftergood, Federation of American Scientists, which provides analyses of national security issues stated that “It was a titanic struggle just to get the top-line budget number disclosed, and that has only been done consistently since 2007 … but a real grasp of the structure and operations of the intelligence bureaucracy has been totally beyond public reach. This kind of material, even on a historical basis, has simply not been available.”[19] Access to budget details will enable an informed public debate on intelligence spending for the first time said the co-chair of the 9/11 Commission Lee H. Hamilton. He added that Americans should not be excluded from the budget process because the intelligence community has a profound impact on the life of ordinary Americans.[19]

Oversight

Intelligence Community Oversight duties are distributed to both the Executive and Legislative branches. Primary Executive oversight is performed by the President’s Foreign Intelligence Advisory Board, the Joint Intelligence Community Council, the Office of the Inspector General, and the Office of Management and Budget. Primary congressional oversight jurisdiction over the IC is assigned to two committees: the United States House Permanent Select Committee on Intelligence and the United States Senate Select Committee on Intelligence. The House Armed Services Committee and Senate Armed Services Committee draft bills to annually authorize the budgets of DoD intelligence activities, and both the House and Senate appropriations committees annually draft bills to appropriate the budgets of the IC. The Senate Committee on Homeland Security and Governmental Affairs took a leading role in formulating the intelligence reform legislation in the 108th Congress.

See also

References

  1. Jump up^ Agrawal, Nina. “There’s more than the CIA and FBI: The 17 agencies that make up the U.S. intelligence community”. latimes.com. Retrieved 2017-01-30.
  2. Jump up^ “Executive Order 12333”. Cia.gov. Retrieved 2013-01-23.
  3. Jump up^ Dana Priest & William M Arkin (19 July 2010). “A hidden world, growing beyond control”. The Washington Post.
  4. Jump up^ Priest, Dana (2011). Top Secret America: The Rise of the New American Security State. Little, Brown and Company. p. 320. ISBN 0-316-18221-4.
  5. Jump up^ Michael Warner; Kenneth McDonald. “US Intelligence Community Reform Studies Since 1947” (PDF). CIA. p. 4. Retrieved 28 June 2013.
  6. Jump up^ Rosenbach, Eric & Aki J. Peritz (12 June 2009). “Confrontation or Collaboration? Congress and the Intelligence Community” (PDF). Belfer Center for Science and International Affairs, Harvard Kennedy School. Retrieved 21 July 2009.
  7. Jump up^ Executive Order 12333 text
  8. Jump up^ User, Super. “Members of the IC”.
  9. Jump up^ “DNI Releases Budget Figure for 2013 National Intelligence Program”. Office of the Director of National Intelligence. 30 October 2013. Retrieved 2 August 2014.
  10. Jump up^ DNI Releases FY 2012 Appropriated Budget Figure. Dni.gov (2012-10-30). Retrieved on 2013-08-16.
  11. Jump up^ “DNI Releases Budget Figure for 2010 National Intelligence Program”(PDF). Office of the Director of National Intelligence. 2010-10-28. Retrieved 15 June 2013.
  12. Jump up^ “DNI Releases Budget Figure for 2009 National Intelligence Program”(PDF). Retrieved 15 June 2013.
  13. Jump up^ “DNI Releases Budget Figure for 2008 National Intelligence Program”(PDF). Retrieved 15 June 2013.
  14. Jump up^ “DNI Releases Budget Figure for 2007 National Intelligence Program”(PDF). Retrieved 15 June 2013.
  15. Jump up^ Hacket, John F. (2010-10-28). “FY2006 National Intelligence Program Budget, 10-28-10” (PDF). Office of the Director of National Intelligence. Retrieved 15 June 2013.
  16. Jump up^ Matt DeLong (29 August 2013). “Inside the 2013 U.S. intelligence ‘black budget'”. The Washington Post. Retrieved 31 August 2013.
  17. Jump up^ Matthews, Dylan (29 August 2013). “America’s secret intelligence budget, in 11 (nay, 13) charts”. The Washington Post. Retrieved 31 August 2013.
  18. Jump up^ DeLong, Matt (29 August 2013). “2013 U.S. intelligence budget: Additional resources”. The Washington Post. Retrieved 31 August 2013.
  19. ^ Jump up to:a b Barton Gellman & Greg Miller (29 August 2013). “U.S. spy network’s successes, failures and objectives detailed in ‘black budget’ summary”. The Washington Post. Retrieved 31 August 2013.

Further reading

External links

https://en.wikipedia.org/wiki/United_States_Intelligence_Community

National Security Agency

From Wikipedia, the free encyclopedia
National Security Agency
Seal of the U.S. National Security Agency.svg

Seal of the National Security Agency
Flag of the U.S. National Security Agency.svg

Flag of the National Security Agency
National Security Agency headquarters, Fort Meade, Maryland.jpg
NSA Headquarters, Fort Meade, Maryland
Agency overview
Formed November 4, 1952; 64 years ago[1]
Preceding agency
  • Armed Forces Security Agency
Headquarters Fort Meade, Maryland, U.S.
39°6′32″N 76°46′17″WCoordinates: 39°6′32″N 76°46′17″W
Motto “Defending Our Nation. Securing The Future.”
Employees Classified (30,000–40,000 estimate)[2][3][4][5]
Annual budget Classified (estimated $10.8 billion, 2013)[6][7]
Agency executives
Parent agency United States Department of Defense
Website www.nsa.gov

The National Security Agency (NSA) is a military intelligence organization and a constituent of the United States Department of Defense (DOD). The NSA is responsible for global monitoring, collection, and processing of information and data for foreign intelligence and counterintelligence purposes, a discipline known as signals intelligence (SIGINT). NSA is concurrently charged with protection of U.S. government communications and information systems against penetration and network warfare.[8][9] Although many of NSA’s programs rely on “passive” electronic collection, the agency is authorized to accomplish its mission through active clandestine means,[10] among which are physically bugging electronic systems[11] and allegedly engaging in sabotage through subversive software.[12][13] Moreover, NSA maintains physical presence in a large number of countries across the globe, where its Special Collection Service (SCS) inserts eavesdropping devices in difficult-to-reach places. SCS collection tactics allegedly encompass “close surveillance, burglary, wiretapping, breaking and entering.”[14][15]

Unlike the Defense Intelligence Agency (DIA) and the Central Intelligence Agency (CIA), both of which specialize primarily in foreign human espionage, NSA does not unilaterally conduct human-source intelligence gathering, despite often being portrayed so in popular culture. Instead, NSA is entrusted with assistance to and coordination of SIGINT elements at other government organizations, which are prevented by law from engaging in such activities without the approval of the NSA via the Defense Secretary.[16] As part of these streamlining responsibilities, the agency has a co-located organization called the Central Security Service (CSS), which was created to facilitate cooperation between NSA and other U.S. military cryptanalysis components. Additionally, the NSA Director simultaneously serves as the Commander of the United States Cyber Command and as Chief of the Central Security Service.

Originating as a unit to decipher coded communications in World War II, it was officially formed as the NSA by President Harry S. Truman in 1952. Since then, it has become one of the largest U.S. intelligence organizations in terms of personnel and budget,[6][17] operating as part of the Department of Defense and simultaneously reporting to the Director of National Intelligence.

NSA surveillance has been a matter of political controversy on several occasions, such as its spying on anti-Vietnam-war leaders or economic espionage. In 2013, the extent of some of the NSA’s secret surveillance programs was revealed to the public by Edward Snowden. According to the leaked documents, the NSA intercepts the communications of over a billion people worldwide, many of whom are United States citizens, and tracks the movement of hundreds of millions of people using cellphones. Internationally, research has pointed to the NSA’s ability to surveil the domestic Internet traffic of foreign countries through “boomerang routing”.[18]

Contents

 [show

History

Army predecessor

The origins of the National Security Agency can be traced back to April 28, 1917, three weeks after the U.S. Congress declared war on Germany in World War I. A code and cipher decryption unit was established as the Cable and Telegraph Section which was also known as the Cipher Bureau. It was headquartered in Washington, D.C. and was part of the war effort under the executive branch without direct Congressional authorization. During the course of the war it was relocated in the army’s organizational chart several times. On July 5, 1917, Herbert O. Yardley was assigned to head the unit. At that point, the unit consisted of Yardley and two civilian clerks. It absorbed the navy’s cryptoanalysis functions in July 1918. World War I ended on November 11, 1918, and MI-8 moved to New York City on May 20, 1919, where it continued intelligence activities as the Code Compilation Company under the direction of Yardley.[19][20]

Black Chamber

Western Union allowed MI-8 to monitor telegraphic communications passing through the company’s wires until 1929.[21]

MI-8 also operated the so-called “Black Chamber“.[22] The Black Chamber was located on East 37th Street in Manhattan. Its purpose was to crack the communications codes of foreign governments. Jointly supported by the State Department and the War Department, the chamber persuaded Western Union, the largest U.S. telegram company, to allow government officials to monitor private communications passing through the company’s wires.[23]

Other “Black Chambers” were also found in Europe. They were established by the French and British governments to read the letters of targeted individuals, employing a variety of techniques to surreptitiously open, copy, and reseal correspondence before forwarding it to unsuspecting recipients.[24]

Despite the American Black Chamber’s initial successes, it was shut down in 1929 by U.S. Secretary of State Henry L. Stimson, who defended his decision by stating: “Gentlemen do not read each other’s mail”.[21]

World War II and its aftermath

During World War II, the Signal Security Agency (SSA) was created to intercept and decipher the communications of the Axis powers.[25] When the war ended, the SSA was reorganized as the Army Security Agency (ASA), and it was placed under the leadership of the Director of Military Intelligence.[25]

On May 20, 1949, all cryptologic activities were centralized under a national organization called the Armed Forces Security Agency (AFSA).[25] This organization was originally established within the U.S. Department of Defense under the command of the Joint Chiefs of Staff.[26] The AFSA was tasked to direct Department of Defense communications and electronic intelligence activities, except those of U.S. military intelligence units.[26] However, the AFSA was unable to centralize communications intelligence and failed to coordinate with civilian agencies that shared its interests such as the Department of State, Central Intelligence Agency (CIA) and the Federal Bureau of Investigation (FBI).[26] In December 1951, President Harry S. Truman ordered a panel to investigate how AFSA had failed to achieve its goals. The results of the investigation led to improvements and its redesignation as the National Security Agency.[27]

The agency was formally established by Truman in a memorandum of October 24, 1952, that revised National Security Council Intelligence Directive (NSCID) 9.[28] Since President Truman’s memo was a classified document,[28] the existence of the NSA was not known to the public at that time. Due to its ultra-secrecy the U.S. intelligence community referred to the NSA as “No Such Agency”.[29]

Vietnam War

In the 1960s, the NSA played a key role in expanding America’s commitment to the Vietnam War by providing evidence of a North Vietnamese attack on the American destroyer USS Maddox during the Gulf of Tonkin incident.[30]

A secret operation, code-named “MINARET“, was set up by the NSA to monitor the phone communications of Senators Frank Church and Howard Baker, as well as major civil rights leaders, including Martin Luther King, Jr., and prominent U.S. journalists and athletes who criticized the Vietnam War.[31] However, the project turned out to be controversial, and an internal review by the NSA concluded that its Minaret program was “disreputable if not outright illegal”.[31]

The NSA mounted a major effort to secure tactical communications among U.S. forces during the war with mixed success. The NESTOR family of compatible secure voice systems it developed was widely deployed during the Vietnam War, with about 30,000 NESTOR sets produced. However a variety of technical and operational problems limited their use, allowing the North Vietnamese to exploit intercepted U.S. communications.[32] :Vol I, p.79

Church Committee hearings

In the aftermath of the Watergate scandal, a congressional hearing in 1975 led by Sen. Frank Church[33] revealed that the NSA, in collaboration with Britain’s SIGINT intelligence agency Government Communications Headquarters (GCHQ), had routinely intercepted the international communications of prominent anti-Vietnam war leaders such as Jane Fonda and Dr. Benjamin Spock.[34] Following the resignation of President Richard Nixon, there were several investigations of suspected misuse of FBI, CIA and NSA facilities.[35] Senator Frank Church uncovered previously unknown activity,[35] such as a CIA plot (ordered by the administration of President John F. Kennedy) to assassinate Fidel Castro.[36] The investigation also uncovered NSA’s wiretaps on targeted American citizens.[37]

After the Church Committee hearings, the Foreign Intelligence Surveillance Act of 1978 was passed into law. This was designed to limit the practice of mass surveillance in the United States.[35]

From 1980s to 1990s

In 1986, the NSA intercepted the communications of the Libyan government during the immediate aftermath of the Berlin discotheque bombing. The White House asserted that the NSA interception had provided “irrefutable” evidence that Libya was behind the bombing, which U.S. President Ronald Reagan cited as a justification for the 1986 United States bombing of Libya.[38][39]

In 1999, a multi-year investigation by the European Parliament highlighted the NSA’s role in economic espionage in a report entitled ‘Development of Surveillance Technology and Risk of Abuse of Economic Information’.[40] That year, the NSA founded the NSA Hall of Honor, a memorial at the National Cryptologic Museum in Fort Meade, Maryland.[41] The memorial is a, “tribute to the pioneers and heroes who have made significant and long-lasting contributions to American cryptology”.[41] NSA employees must be retired for more than fifteen years to qualify for the memorial.[41]

NSA’s infrastructure deteriorated in the 1990s as defense budget cuts resulted in maintenance deferrals. On January 24, 2000, NSA headquarters suffered a total network outage for three days caused by an overloaded network. Incoming traffic was successfully stored on agency servers, but it could not be directed and processed. The agency carried out emergency repairs at a cost of $3 million to get the system running again. (Some incoming traffic was also directed instead to Britain’s GCHQ for the time being.) Director Michael Hayden called the outage a “wake-up call” for the need to invest in the agency’s infrastructure.[42]

War on Terror

After Osama bin Laden moved to Afghanistan in the 1980s, the NSA recorded all of his phone calls via satellite, logging over 2,000 minutes of conversation[43]

In the aftermath of the September 11 attacks, the NSA created new IT systems to deal with the flood of information from new technologies like the Internet and cellphones. ThinThread contained advanced data mining capabilities. It also had a “privacy mechanism”; surveillance was stored encrypted; decryption required a warrant. The research done under this program may have contributed to the technology used in later systems. ThinThread was cancelled when Michael Hayden chose Trailblazer, which did not include ThinThread’s privacy system.[44]

Trailblazer Project ramped up in 2002 and was worked on by Science Applications International Corporation (SAIC), Boeing, Computer Sciences Corporation, IBM, and Litton Industries. Some NSA whistleblowers complained internally about major problems surrounding Trailblazer. This led to investigations by Congress and the NSA and DoD Inspectors General. The project was cancelled in early 2004.

Turbulence started in 2005. It was developed in small, inexpensive “test” pieces, rather than one grand plan like Trailblazer. It also included offensive cyber-warfare capabilities, like injecting malware into remote computers. Congress criticized Turbulence in 2007 for having similar bureaucratic problems as Trailblazer.[45] It was to be a realization of information processing at higher speeds in cyberspace.[46]

Global surveillance disclosures

The massive extent of the NSA’s spying, both foreign and domestic, was revealed to the public in a series of detailed disclosures of internal NSA documents beginning in June 2013. Most of the disclosures were leaked by former NSA contractor, Edward Snowden.

Scope of surveillance

It was revealed that the NSA intercepts telephone and Internet communications of over a billion people worldwide, seeking information on terrorism as well as foreign politics, economics[47] and “commercial secrets”.[48] In a declassified document it was revealed that 17,835 phone lines were on an improperly permitted “alert list” from 2006 to 2009 in breach of compliance, which tagged these phone lines for daily monitoring.[49][50][51] Eleven percent of these monitored phone lines met the agency’s legal standard for “reasonably articulable suspicion” (RAS).[49][52]

A dedicated unit of the NSA locates targets for the CIA for extrajudicial assassination in the Middle East.[53] The NSA has also spied extensively on the European Union, the United Nations and numerous governments including allies and trading partners in Europe, South America and Asia.[54][55]

The NSA tracks the locations of hundreds of millions of cellphones per day, allowing it to map people’s movements and relationships in detail.[56] It reportedly has access to all communications made via Google, Microsoft, Facebook, Yahoo, YouTube, AOL, Skype, Apple and Paltalk,[57] and collects hundreds of millions of contact lists from personal email and instant messaging accounts each year.[58] It has also managed to weaken much of the encryption used on the Internet (by collaborating with, coercing or otherwise infiltrating numerous technology companies), so that the majority of Internet privacy is now vulnerable to the NSA and other attackers.[59][60]

Domestically, the NSA collects and stores metadata records of phone calls,[61] including over 120 million US Verizon subscribers,[62] as well as Internet communications,[57] relying on a secret interpretation of the Patriot Act whereby the entirety of US communications may be considered “relevant” to a terrorism investigation if it is expected that even a tiny minority may relate to terrorism.[63] The NSA supplies foreign intercepts to the DEA, IRS and other law enforcement agencies, who use these to initiate criminal investigations. Federal agents are then instructed to “recreate” the investigative trail via parallel construction.[64]

The NSA also spies on influential Muslims to obtain information that could be used to discredit them, such as their use of pornography. The targets, both domestic and abroad, are not suspected of any crime but hold religious or political views deemed “radical” by the NSA.[65]

Although NSA’s surveillance activities are controversial, government agencies and private enterprises have common needs, and sometimes cooperate at subtle and complex technical levels. Big data is becoming more advantageous, justifying the cost of required computer hardware, and social media lead the trend. The interests of NSA and Silicon Valley began to converge as advances in computer storage technology drastically reduced the costs of storing enormous amounts of data and at the same time the value of the data for use in consumer marketing began to rise. On the other hand, social media sites are growing as voluntary data mining operations on a scale that rivals or exceeds anything the government could attempt on its own.[66]

According to a report in The Washington Post in July 2014, relying on information provided by Snowden, 90% of those placed under surveillance in the U.S. are ordinary Americans, and are not the intended targets. The newspaper said it had examined documents including emails, text messages, and online accounts that support the claim.[67]

Legal accountability

Despite President Obama’s claims that these programs have congressional oversight, members of Congress were unaware of the existence of these NSA programs or the secret interpretation of the Patriot Act, and have consistently been denied access to basic information about them.[68] Obama has also claimed that there are legal checks in place to prevent inappropriate access of data and that there have been no examples of abuse;[69] however, the secret FISC court charged with regulating the NSA’s activities is, according to its chief judge, incapable of investigating or verifying how often the NSA breaks even its own secret rules.[70] It has since been reported that the NSA violated its own rules on data access thousands of times a year, many of these violations involving large-scale data interceptions;[71] and that NSA officers have even used data intercepts to spy on love interests.[72] The NSA has “generally disregarded the special rules for disseminating United States person information” by illegally sharing its intercepts with other law enforcement agencies.[73] A March 2009 opinion of the FISC court, released by court order, states that protocols restricting data queries had been “so frequently and systemically violated that it can be fairly said that this critical element of the overall … regime has never functioned effectively.”[74][75] In 2011 the same court noted that the “volume and nature” of the NSA’s bulk foreign Internet intercepts was “fundamentally different from what the court had been led to believe”.[73] Email contact lists (including those of US citizens) are collected at numerous foreign locations to work around the illegality of doing so on US soil.[58]

Legal opinions on the NSA’s bulk collection program have differed. In mid-December 2013, U.S. District Court Judge Richard Leon ruled that the “almost-Orwellian” program likely violates the Constitution, and wrote, “I cannot imagine a more ‘indiscriminate’ and ‘arbitrary invasion’ than this systematic and high-tech collection and retention of personal data on virtually every single citizen for purposes of querying and analyzing it without prior judicial approval. Surely, such a program infringes on ‘that degree of privacy’ that the Founders enshrined in the Fourth Amendment. Indeed, I have little doubt that the author of our Constitution, James Madison, who cautioned us to beware ‘the abridgement of freedom of the people by gradual and silent encroachments by those in power,’ would be aghast.”[76]

Later that month, U.S. District Judge William Pauley ruled that the NSA’s collection of telephone records is legal and valuable in the fight against terrorism. In his opinion, he wrote, “a bulk telephony metadata collection program [is] a wide net that could find and isolate gossamer contacts among suspected terrorists in an ocean of seemingly disconnected data” and noted that a similar collection of data prior to 9/11 might have prevented the attack.[77]

An October 2014 United Nations report condemned mass surveillance by the United States and other countries as violating multiple international treaties and conventions that guarantee core privacy rights.[78]

Official responses

On March 20, 2013 the Director of National Intelligence, Lieutenant General James Clapper, testified before Congress that the NSA does not wittingly collect any kind of data on millions or hundreds of millions of Americans, but he retracted this in June after details of the PRISM program were published, and stated instead that meta-data of phone and Internet traffic are collected, but no actual message contents.[79] This was corroborated by the NSA Director, General Keith Alexander, before it was revealed that the XKeyscore program collects the contents of millions of emails from US citizens without warrant, as well as “nearly everything a user does on the Internet”. Alexander later admitted that “content” is collected, but stated that it is simply stored and never analyzed or searched unless there is “a nexus to al-Qaida or other terrorist groups”.[69]

Regarding the necessity of these NSA programs, Alexander stated on June 27 that the NSA’s bulk phone and Internet intercepts had been instrumental in preventing 54 terrorist “events”, including 13 in the US, and in all but one of these cases had provided the initial tip to “unravel the threat stream”.[80] On July 31 NSA Deputy Director John Inglis conceded to the Senate that these intercepts had not been vital in stopping any terrorist attacks, but were “close” to vital in identifying and convicting four San Diego men for sending US$8,930 to Al-Shabaab, a militia that conducts terrorism in Somalia.[81][82][83]

The U.S. government has aggressively sought to dismiss and challenge Fourth Amendment cases raised against it, and has granted retroactive immunity to ISPs and telecoms participating in domestic surveillance.[84][85] The U.S. military has acknowledged blocking access to parts of The Guardian website for thousands of defense personnel across the country,[86][87] and blocking the entire Guardian website for personnel stationed throughout Afghanistan, the Middle East, and South Asia.[88]

Organizational structure

Michael S. Rogers, the director of the NSA.

The NSA is led by the Director of the National Security Agency (DIRNSA), who also serves as Chief of the Central Security Service (CHCSS) and Commander of the United States Cyber Command (USCYBERCOM) and is the highest-ranking military official of these organizations. He is assisted by a Deputy Director, who is the highest-ranking civilian within the NSA/CSS.

NSA also has an Inspector General, head of the Office of the Inspector General (OIG), a General Counsel, head of the Office of the General Counsel (OGC) and a Director of Compliance, who is head of the Office of the Director of Compliance (ODOC).[89]

Unlike other intelligence organizations such as CIA or DIA, NSA has always been particularly reticent concerning its internal organizational structure.

As of the mid-1990s, the National Security Agency was organized into five Directorates:

  • The Operations Directorate, which was responsible for SIGINT collection and processing.
  • The Technology and Systems Directorate, which develops new technologies for SIGINT collection and processing.
  • The Information Systems Security Directorate, which was responsible for NSA’s communications and information security missions.
  • The Plans, Policy and Programs Directorate, which provided staff support and general direction for the Agency.
  • The Support Services Directorate, which provided logistical and administrative support activities.[90]

Each of these directorates consisted of several groups or elements, designated by a letter. There were for example the A Group, which was responsible for all SIGINT operations against the Soviet Union and Eastern Europe, and G Group, which was responsible for SIGINT related to all non-communist countries. These groups were divided in units designated by an additional number, like unit A5 for breaking Soviet codes, and G6, being the office for the Middle East, North Africa, Cuba, Central and South America.[91][92]

Structure

As of 2013, NSA has about a dozen directorates, which are designated by a letter, although not all of them are publicly known. The directorates are divided in divisions and units starting with the letter of the parent directorate, followed by a number for the division, the sub-unit or a sub-sub-unit.

The main elements of the organizational structure of the NSA are:[93]

  • F – Directorate only known from unit F6, the Special Collection Service (SCS), which is a joint program created by CIA and NSA in 1978 to facilitate clandestine activities such as bugging computers throughout the world, using the expertise of both agencies.[94]
  • G – Directorate only known from unit G112, the office that manages the Senior Span platform, attached to the U2 spy planes.[95]
  • I – Information Assurance Directorate (IAD), which ensures availability, integrity, authentication, confidentiality, and non-repudiation of national security and telecommunications and information systems (national security systems).
  • J – Directorate only known from unit J2, the Cryptologic Intelligence Unit
  • L – Installation and Logistics
  • M – Human Resources
  • Q – Security and Counterintelligence
  • R – Research Directorate, which conducts research on signals intelligence and on information assurance for the U.S. Government.[96]
  • S – Signals Intelligence Directorate (SID), which is responsible for the collection, analysis, production and dissemination of signals intelligence. This directorate is led by a director and a deputy director. The SID consists of the following divisions:
    • S1 – Customer Relations
    • S2 – Analysis and Production Centers, with the following so-called Product Lines:
      • S2A: South Asia, S2B: China and Korea, S2C: International Security, S2E: Middle East/Asia, S2F: International Crime, S2G: Counter-proliferation, S2H: Russia, S2I: Counter-terrorism, S2J: Weapons and Space, S2T: Current Threats
    • S3 – Data Acquisition, with these divisions for the main collection programs:
      • S31 – Cryptanalysis and Exploitation Services (CES)
      • S32 – Tailored Access Operations (TAO), which hacks into foreign computers to conduct cyber-espionage and reportedly is “the largest and arguably the most important component of the NSA’s huge Signal Intelligence (SIGINT) Directorate, consisting of over 1,000 military and civilian computer hackers, intelligence analysts, targeting specialists, computer hardware and software designers, and electrical engineers.”[97]
      • S33 – Global Access Operations (GAO), which is responsible for intercepts from satellites and other international SIGINT platforms.[98] A tool which details and maps the information collected by this unit is code-named Boundless Informant.
      • S34 – Collections Strategies and Requirements Center
      • S35 – Special Source Operations (SSO), which is responsible for domestic and compartmented collection programs, like for example the PRISM program.[98] Special Source Operations is also mentioned in connection to the FAIRVIEW collection program.[99]
  • T – Technical Directorate (TD)
  • Directorate for Education and Training
  • Directorate for Corporate Leadership
  • Foreign Affairs Directorate, which acts as liaison with foreign intelligence services, counter-intelligence centers and the UKUSA-partners.
  • Acquisitions and Procurement Directorate
  • Information Sharing Services (ISS), led by a chief and a deputy chief.[100]

In the year 2000, a leadership team was formed, consisting of the Director, the Deputy Director and the Directors of the Signals Intelligence (SID), the Information Assurance (IAD) and the Technical Directorate (TD). The chiefs of other main NSA divisions became associate directors of the senior leadership team.[101]

After president George W. Bush initiated the President’s Surveillance Program (PSP) in 2001, the NSA created a 24-hour Metadata Analysis Center (MAC), followed in 2004 by the Advanced Analysis Division (AAD), with the mission of analyzing content, Internet metadata and telephone metadata. Both units were part of the Signals Intelligence Directorate.[102]

A 2016 proposal would combine the Signals Intelligence Directorate with the Information Assurance Directorate into a Directorate of Operations.[103]

Watch centers

The NSA maintains at least two watch centers:

  • National Security Operations Center (NSOC), which is the NSA’s current operations center and focal point for time-sensitive SIGINT reporting for the United States SIGINT System (USSS). This center was established in 1968 as the National SIGINT Watch Center (NSWC) and renamed into National SIGINT Operations Center (NSOC) in 1973. This “nerve center of the NSA” got its current name in 1996.[104]
  • NSA/CSS Threat Operations Center (NTOC), which is the primary NSA/CSS partner for Department of Homeland Security response to cyber incidents. The NTOC establishes real-time network awareness and threat characterization capabilities to forecast, alert, and attribute malicious activity and enable the coordination of Computer Network Operations. The NTOC was established in 2004 as a joint Information Assurance and Signals Intelligence project.[105]

Employees

The number of NSA employees is officially classified[4] but there are several sources providing estimates. In 1961, NSA had 59,000 military and civilian employees, which grew to 93,067 in 1969, of which 19,300 worked at the headquarters at Fort Meade. In the early 1980s NSA had roughly 50,000 military and civilian personnel. By 1989 this number had grown again to 75,000, of which 25,000 worked at the NSA headquarters. Between 1990 and 1995 the NSA’s budget and workforce were cut by one third, which led to a substantial loss of experience.[106]

In 2012, the NSA said more than 30,000 employees worked at Fort Meade and other facilities.[2] In 2012, John C. Inglis, the deputy director, said that the total number of NSA employees is “somewhere between 37,000 and one billion” as a joke,[4] and stated that the agency is “probably the biggest employer of introverts.”[4] In 2013 Der Spiegel stated that the NSA had 40,000 employees.[5] More widely, it has been described as the world’s largest single employer of mathematicians.[107] Some NSA employees form part of the workforce of the National Reconnaissance Office (NRO), the agency that provides the NSA with satellite signals intelligence.

As of 2013 about 1,000 system administrators work for the NSA.[108]

Security issues

The NSA received criticism early on in 1960 after two agents had defected to the Soviet Union. Investigations by the House Un-American Activities Committee and a special subcommittee of the United States House Committee on Armed Services revealed severe cases of ignorance in personnel security regulations, prompting the former personnel director and the director of security to step down and leading to the adoption of stricter security practices.[109] Nonetheless, security breaches reoccurred only a year later when in an issue of Izvestia of July 23, 1963, a former NSA employee published several cryptologic secrets.

The very same day, an NSA clerk-messenger committed suicide as ongoing investigations disclosed that he had sold secret information to the Soviets on a regular basis. The reluctance of Congressional houses to look into these affairs had prompted a journalist to write, “If a similar series of tragic blunders occurred in any ordinary agency of Government an aroused public would insist that those responsible be officially censured, demoted, or fired.” David Kahn criticized the NSA’s tactics of concealing its doings as smug and the Congress’ blind faith in the agency’s right-doing as shortsighted, and pointed out the necessity of surveillance by the Congress to prevent abuse of power.[109]

Edward Snowden‘s leaking of the existence of PRISM in 2013 caused the NSA to institute a “two-man rule“, where two system administrators are required to be present when one accesses certain sensitive information.[108]Snowden claims he suggested such a rule in 2009.[110]

Polygraphing

Defense Security Service (DSS) polygraph brochure given to NSA applicants

The NSA conducts polygraph tests of employees. For new employees, the tests are meant to discover enemy spies who are applying to the NSA and to uncover any information that could make an applicant pliant to coercion.[111] As part of the latter, historically EPQs or “embarrassing personal questions” about sexual behavior had been included in the NSA polygraph.[111]The NSA also conducts five-year periodic reinvestigation polygraphs of employees, focusing on counterintelligence programs. In addition the NSA conducts periodic polygraph investigations in order to find spies and leakers; those who refuse to take them may receive “termination of employment”, according to a 1982 memorandum from the director of the NSA.[112]

File:NSApolygraphvideo.webm

NSA-produced video on the polygraph process

There are also “special access examination” polygraphs for employees who wish to work in highly sensitive areas, and those polygraphs cover counterintelligence questions and some questions about behavior.[112] NSA’s brochure states that the average test length is between two and four hours.[113] A 1983 report of the Office of Technology Assessment stated that “It appears that the NSA [National Security Agency] (and possibly CIA) use the polygraph not to determine deception or truthfulness per se, but as a technique of interrogation to encourage admissions.”[114] Sometimes applicants in the polygraph process confess to committing felonies such as murder, rape, and selling of illegal drugs. Between 1974 and 1979, of the 20,511 job applicants who took polygraph tests, 695 (3.4%) confessed to previous felony crimes; almost all of those crimes had been undetected.[111]

In 2010 the NSA produced a video explaining its polygraph process.[115] The video, ten minutes long, is titled “The Truth About the Polygraph” and was posted to the Web site of the Defense Security Service. Jeff Stein of The Washington Post said that the video portrays “various applicants, or actors playing them — it’s not clear — describing everything bad they had heard about the test, the implication being that none of it is true.”[116] AntiPolygraph.org argues that the NSA-produced video omits some information about the polygraph process; it produced a video responding to the NSA video.[115] George Maschke, the founder of the Web site, accused the NSA polygraph video of being “Orwellian“.[116]

After Edward Snowden revealed his identity in 2013, the NSA began requiring polygraphing of employees once per quarter.[117]

Arbitrary firing

The number of exemptions from legal requirements has been criticized. When in 1964 the Congress was hearing a bill giving the director of the NSA the power to fire at will any employee,The Washington Post wrote: “This is the very definition of arbitrariness. It means that an employee could be discharged and disgraced on the basis of anonymous allegations without the slightest opportunity to defend himself.” Yet, the bill was accepted by an overwhelming majority.[109]

Insignia and memorials

Seal of the U.S. National Security Agency.svg

The heraldic insignia of NSA consists of an eagle inside a circle, grasping a key in its talons.[118] The eagle represents the agency’s national mission.[118] Its breast features a shield with bands of red and white, taken from the Great Seal of the United States and representing Congress.[118] The key is taken from the emblem of Saint Peter and represents security.[118]

When the NSA was created, the agency had no emblem and used that of the Department of Defense.[119] The agency adopted its first of two emblems in 1963.[119] The current NSA insignia has been in use since 1965, when then-Director, LTG Marshall S. Carter (USA) ordered the creation of a device to represent the agency.[120]

The NSA’s flag consists of the agency’s seal on a light blue background.

National Cryptologic Memorial

Crews associated with NSA missions have been involved in a number of dangerous and deadly situations.[121] The USS Liberty incident in 1967 and USS Pueblo incident in 1968 are examples of the losses endured during the Cold War.[121]

The National Security Agency/Central Security Service Cryptologic Memorial honors and remembers the fallen personnel, both military and civilian, of these intelligence missions.[122] It is made of black granite, and has 171 names carved into it, as of 2013 .[122] It is located at NSA headquarters. A tradition of declassifying the stories of the fallen was begun in 2001.[122]

NSANet (NSA’s intranet)

Behind the Green Door – Secure communications room with separate computer terminals for access to SIPRNET, GWAN, NSANET, and JWICS

NSANet stands for National Security Agency Network and is the official NSA intranet.[123] It is a classified network,[124] for information up to the level of TS/SCI[125] to support the use and sharing of intelligence data between NSA and the signals intelligence agencies of the four other nations of the Five Eyes partnership. The management of NSANet has been delegated to the Central Security Service Texas (CSSTEXAS).[126]

NSANet is a highly secured computer network consisting of fiber-optic and satellite communication channels which are almost completely separated from the public Internet. The network allows NSA personnel and civilian and military intelligence analysts anywhere in the world to have access to the agency’s systems and databases. This access is tightly controlled and monitored. For example, every keystroke is logged, activities are audited at random and downloading and printing of documents from NSANet are recorded.[127]

In 1998, NSANet, along with NIPRNET and SIPRNET, had “significant problems with poor search capabilities, unorganized data and old information”.[128] In 2004, the network was reported to have used over twenty commercial off-the-shelf operating systems.[129] Some universities that do highly sensitive research are allowed to connect to it.[130]

The thousands of Top Secret internal NSA documents that were taken by Edward Snowden in 2013 were stored in “a file-sharing location on the NSA’s intranet site” so they could easily be read online by NSA personnel. Everyone with a TS/SCI-clearance had access to these documents and as a system administrator, Snowden was responsible for moving accidentally misplaced highly sensitive documents to more secure storage locations.[131]

National Computer Security Center

The DoD Computer Security Center was founded in 1981 and renamed the National Computer Security Center (NCSC) in 1985. NCSC was responsible for computer security throughout the federal government.[132] NCSC was part of NSA,[133] and during the late 1980s and the 1990s, NSA and NCSC published Trusted Computer System Evaluation Criteria in a six-foot high Rainbow Series of books that detailed trusted computing and network platform specifications.[134] The Rainbow books were replaced by the Common Criteria, however, in the early 2000s.[134]

Facilities

Headquarters

National Security Agency headquarters in Fort Meade, 2013

Headquarters for the National Security Agency is located at 39°6′32″N 76°46′17″W in Fort George G. Meade, Maryland, although it is separate from other compounds and agencies that are based within this same military installation. Ft. Meade is about 20 mi (32 km) southwest of Baltimore,[135] and 25 mi (40 km) northeast of Washington, DC.[136] The NSA has its own exit off Maryland Route 295 South labeled “NSA Employees Only”.[137][138] The exit may only be used by people with the proper clearances, and security vehicles parked along the road guard the entrance.[139]

NSA is the largest employer in the U.S. state of Maryland, and two-thirds of its personnel work at Ft. Meade.[140] Built on 350 acres (140 ha; 0.55 sq mi)[141] of Ft. Meade’s 5,000 acres (2,000 ha; 7.8 sq mi),[142] the site has 1,300 buildings and an estimated 18,000 parking spaces.[136][143]

NSA headquarters building in Fort Meade (left), NSOC (right)

The main NSA headquarters and operations building is what James Bamford, author of Body of Secrets, describes as “a modern boxy structure” that appears similar to “any stylish office building.”[144] The building is covered with one-way dark glass, which is lined with copper shielding in order to prevent espionage by trapping in signals and sounds.[144] It contains 3,000,000 square feet (280,000 m2), or more than 68 acres (28 ha), of floor space; Bamford said that the U.S. Capitol “could easily fit inside it four times over.”[144]

The facility has over 100 watchposts,[145] one of them being the visitor control center, a two-story area that serves as the entrance.[144] At the entrance, a white pentagonal structure,[146] visitor badges are issued to visitors and security clearances of employees are checked.[147] The visitor center includes a painting of the NSA seal.[146]

The OPS2A building, the tallest building in the NSA complex and the location of much of the agency’s operations directorate, is accessible from the visitor center. Bamford described it as a “dark glass Rubik’s Cube“.[148] The facility’s “red corridor” houses non-security operations such as concessions and the drug store. The name refers to the “red badge” which is worn by someone without a security clearance. The NSA headquarters includes a cafeteria, a credit union, ticket counters for airlines and entertainment, a barbershop, and a bank.[146] NSA headquarters has its own post office, fire department, and police force.[149][150][151]

The employees at the NSA headquarters reside in various places in the Baltimore-Washington area, including Annapolis, Baltimore, and Columbia in Maryland and the District of Columbia, including the Georgetown community.[152]

Power consumption

Due to massive amounts of data processing, NSA is the largest electricity consumer in Maryland.[140]

Following a major power outage in 2000, in 2003 and in follow-ups through 2007, The Baltimore Sun reported that the NSA was at risk of electrical overload because of insufficient internal electrical infrastructure at Fort Meade to support the amount of equipment being installed. This problem was apparently recognized in the 1990s but not made a priority, and “now the agency’s ability to keep its operations going is threatened.”[153]

Baltimore Gas & Electric (BGE, now Constellation Energy) provided NSA with 65 to 75 megawatts at Ft. Meade in 2007, and expected that an increase of 10 to 15 megawatts would be needed later that year.[154] In 2011, NSA at Ft. Meade was Maryland’s largest consumer of power.[140] In 2007, as BGE’s largest customer, NSA bought as much electricity as Annapolis, the capital city of Maryland.[153]

One estimate put the potential for power consumption by the new Utah Data Center at US$40 million per year.[155]

History of headquarters

Headquarters at Fort Meade circa 1950s

When the agency was established, its headquarters and cryptographic center were in the Naval Security Station in Washington, D.C. The COMINT functions were located in Arlington Hall in Northern Virginia, which served as the headquarters of the U.S. Army‘s cryptographic operations.[156] Because the Soviet Union had detonated a nuclear bomb and because the facilities were crowded, the federal government wanted to move several agencies, including the AFSA/NSA. A planning committee considered Fort Knox, but Fort Meade, Maryland, was ultimately chosen as NSA headquarters because it was far enough away from Washington, D.C. in case of a nuclear strike and was close enough so its employees would not have to move their families.[157]

Construction of additional buildings began after the agency occupied buildings at Ft. Meade in the late 1950s, which they soon outgrew.[157] In 1963 the new headquarters building, nine stories tall, opened. NSA workers referred to the building as the “Headquarters Building” and since the NSA management occupied the top floor, workers used “Ninth Floor” to refer to their leaders.[158] COMSEC remained in Washington, D.C., until its new building was completed in 1968.[157] In September 1986, the Operations 2A and 2B buildings, both copper-shielded to prevent eavesdropping, opened with a dedication by President Ronald Reagan.[159] The four NSA buildings became known as the “Big Four.”[159] The NSA director moved to 2B when it opened.[159]

Fort Meade shooting

On March 30, 2015, shortly before 9 am, a stolen sports utility vehicle approached an NSA police vehicle blocking the road near the gate of Fort Meade, after it was told to leave the area. NSA officers fired on the SUV, killing the 27-year-old driver, Mya Hall, and seriously injuring her 20-year-old passenger. An NSA officer’s arm was injured when Hall subsequently crashed into his vehicle.[160][161]

The two women were transgender[162] and had just gotten off from a night of partying at a motel with the man they’d stolen the SUV from that morning. They “attempted to drive a vehicle into the National Security Agency portion of the installation without authorization”, according to an NSA statement.[163] FBI spokeswoman Amy Thoreson said the incident is not believed to be related to terrorism.[164] In June 2015 the FBI closed its investigation into the incident and federal prosecutors have declined to bring charges against anyone involved.[165]

An anonymous police official told The Washington Post, “This was not a deliberate attempt to breach the security of NSA. This was not a planned attack.” The two are believed to have made a wrong turn off the highway, while fleeing from the motel after stealing the vehicle. A small amount of cocaine was found in the SUV. A local CBS reporter initially said a gun was found,[166] but her later revision does not.[167] Dozens of journalists were corralled into a parking lot blocks away from the scene, and were barred from photographing the area.[168]

Computing

In 1995, The Baltimore Sun reported that the NSA is the owner of the single largest group of supercomputers.[169]

NSA held a groundbreaking ceremony at Ft. Meade in May 2013 for its High Performance Computing Center 2, expected to open in 2016.[170] Called Site M, the center has a 150 megawatt power substation, 14 administrative buildings and 10 parking garages.[149] It cost $3.2 billion and covers 227 acres (92 ha; 0.355 sq mi).[149] The center is 1,800,000 square feet (17 ha; 0.065 sq mi)[149] and initially uses 60 megawatts of electricity.[171]

Increments II and III are expected to be completed by 2030, and would quadruple the space, covering 5,800,000 square feet (54 ha; 0.21 sq mi) with 60 buildings and 40 parking garages.[149] Defense contractors are also establishing or expanding cybersecurity facilities near the NSA and around the Washington metropolitan area.[149]

Other U.S. facilities

Buckley Air Force Base in Colorado

Utah Data Center

As of 2012, NSA collected intelligence from four geostationary satellites.[155] Satellite receivers were at Roaring Creek Station in Catawissa, Pennsylvania and Salt Creek Station in Arbuckle, California.[155] It operated ten to twenty taps on U.S. telecom switches. NSA had installations in several U.S. states and from them observed intercepts from Europe, the Middle East, North Africa, Latin America, and Asia.[155]

NSA had facilities at Friendship Annex (FANX) in Linthicum, Maryland, which is a 20 to 25-minute drive from Ft. Meade;[172] the Aerospace Data Facility at Buckley Air Force Base in Aurora outside Denver, Colorado; NSA Texas in the Texas Cryptology Center at Lackland Air Force Base in San Antonio, Texas; NSA Georgia at Fort Gordon in Augusta, Georgia; NSA Hawaii in Honolulu; the Multiprogram Research Facility in Oak Ridge, Tennessee, and elsewhere.[152][155]

On January 6, 2011 a groundbreaking ceremony was held to begin construction on NSA’s first Comprehensive National Cyber-security Initiative (CNCI) Data Center, known as the “Utah Data Center” for short. The $1.5B data center is being built at Camp Williams, Utah, located 25 miles (40 km) south of Salt Lake City, and will help support the agency’s National Cyber-security Initiative.[173] It is expected to be operational by September 2013.[155]

In 2009, to protect its assets and to access more electricity, NSA sought to decentralize and expand its existing facilities in Ft. Meade and Menwith Hill,[174] the latter expansion expected to be completed by 2015.[175]

The Yakima Herald-Republic cited Bamford, saying that many of NSA’s bases for its Echelon program were a legacy system, using outdated, 1990s technology.[176] In 2004, NSA closed its operations at Bad Aibling Station (Field Station 81) in Bad Aibling, Germany.[177] In 2012, NSA began to move some of its operations at Yakima Research Station, Yakima Training Center, in Washington state to Colorado, planning to leave Yakima closed.[178] As of 2013, NSA also intended to close operations at Sugar Grove, West Virginia.[176]

International stations

RAF Menwith Hill has the largest NSA presence in the United Kingdom.[175]

Following the signing in 1946–1956[179] of the UKUSA Agreement between the United States, United Kingdom, Canada, Australia and New Zealand, who then cooperated on signals intelligence and ECHELON,[180] NSA stations were built at GCHQ Bude in Morwenstow, United Kingdom; Geraldton, Pine Gap and Shoal Bay, Australia; Leitrim and Ottawa, Canada; Misawa, Japan; and Waihopai and Tangimoana,[181] New Zealand.[182]

NSA operates RAF Menwith Hill in North Yorkshire, United Kingdom, which was, according to BBC News in 2007, the largest electronic monitoring station in the world.[183] Planned in 1954, and opened in 1960, the base covered 562 acres (227 ha; 0.878 sq mi) in 1999.[184]

The agency’s European Cryptologic Center (ECC), with 240 employees in 2011, is headquartered at a US military compound in Griesheim, near Frankfurt in Germany. A 2011 NSA report indicates that the ECC is responsible for the “largest analysis and productivity in Europe” and focusses on various priorities, including Africa, Europe, the Middle East and counterterrorism operations.[185]

In 2013, a new Consolidated Intelligence Center, also to be used by NSA, is being built at the headquarters of the United States Army Europe in Wiesbaden, Germany.[186] NSA’s partnership with Bundesnachrichtendienst (BND), the German foreign intelligence service, was confirmed by BND president Gerhard Schindler.[186]

Thailand

Thailand is a “3rd party partner” of the NSA along with nine other nations.[187] These are non-English-speaking countries that have made security agreements for the exchange of SIGINT raw material and end product reports.

Thailand is the site of at least two US SIGINT collection stations. One is at the US Embassy in Bangkok, a joint NSA-CIA Special Collection Service (SCS) unit. It presumably eavesdrops on foreign embassies, governmental communications, and other targets of opportunity.[188]

The second installation is a FORNSAT (foreign satellite interception) station in the Thai city of Khon Kaen. It is codenamed INDRA, but has also been referred to as LEMONWOOD.[188] The station is approximately 40 ha (100 acres) in size and consists of a large 3,700–4,600 m2 (40,000–50,000 ft2) operations building on the west side of the ops compound and four radome-enclosed parabolic antennas. Possibly two of the radome-enclosed antennas are used for SATCOM intercept and two antennas used for relaying the intercepted material back to NSA. There is also a PUSHER-type circularly-disposed antenna array (CDAA) array just north of the ops compound.[189][190]

NSA activated Khon Kaen in October 1979. Its mission was to eavesdrop on the radio traffic of Chinese army and air force units in southern China, especially in and around the city of Kunming in Yunnan Province. Back in the late 1970s the base consisted only of a small CDAA antenna array that was remote-controlled via satellite from the NSA listening post at Kunia, Hawaii, and a small force of civilian contractors from Bendix Field Engineering Corp. whose job it was to keep the antenna array and satellite relay facilities up and running 24/7.[189]

According to the papers of the late General William Odom, the INDRA facility was upgraded in 1986 with a new British-made PUSHER CDAA antenna as part of an overall upgrade of NSA and Thai SIGINT facilities whose objective was to spy on the neighboring communist nations of Vietnam, Laos, and Cambodia.[189]

The base apparently fell into disrepair in the 1990s as China and Vietnam became more friendly towards the US, and by 2002 archived satellite imagery showed that the PUSHER CDAA antenna had been torn down, perhaps indicating that the base had been closed. At some point in the period since 9/11, the Khon Kaen base was reactivated and expanded to include a sizeable SATCOM intercept mission. It is likely that the NSA presence at Khon Kaen is relatively small, and that most of the work is done by civilian contractors.[189]

Mission

NSA’s eavesdropping mission includes radio broadcasting, both from various organizations and individuals, the Internet, telephone calls, and other intercepted forms of communication. Its secure communications mission includes military, diplomatic, and all other sensitive, confidential or secret government communications.[191]

According to the Washington Post, “[e]very day, collection systems at the National Security Agency intercept and store 1.7 billion e-mails, phone calls and other types of communications. The NSA sorts a fraction of those into 70 separate databases.”[192]

Because of its listening task, NSA/CSS has been heavily involved in cryptanalytic research, continuing the work of predecessor agencies which had broken many World War II codes and ciphers (see, for instance, Purple, Venona project, and JN-25).

In 2004, NSA Central Security Service and the National Cyber Security Division of the Department of Homeland Security (DHS) agreed to expand NSA Centers of Academic Excellence in Information Assurance Education Program.[193]

As part of the National Security Presidential Directive 54/Homeland Security Presidential Directive 23 (NSPD 54), signed on January 8, 2008 by President Bush, the NSA became the lead agency to monitor and protect all of the federal government’s computer networks from cyber-terrorism.[9]

Operations

Operations by the National Security Agency can be divided in three types:

  • Collection overseas, which falls under the responsibility of the Global Access Operations (GAO) division.
  • Domestic collection, which falls under the responsibility of the Special Source Operations (SSO) division.
  • Hacking operations, which falls under the responsibility of the Tailored Access Operations (TAO) division.

Collection overseas

Echelon

Echelon was created in the incubator of the Cold War.[194] Today it is a legacy system, and several NSA stations are closing.[176]

NSA/CSS, in combination with the equivalent agencies in the United Kingdom (Government Communications Headquarters), Canada (Communications Security Establishment), Australia (Defence Signals Directorate), and New Zealand (Government Communications Security Bureau), otherwise known as the UKUSA group,[195] was reported to be in command of the operation of the so-called ECHELON system. Its capabilities were suspected to include the ability to monitor a large proportion of the world’s transmitted civilian telephone, fax and data traffic.[196]

During the early 1970s, the first of what became more than eight large satellite communications dishes were installed at Menwith Hill.[197] Investigative journalist Duncan Campbell reported in 1988 on the ECHELON surveillance program, an extension of the UKUSA Agreement on global signals intelligence SIGINT, and detailed how the eavesdropping operations worked.[198] In November 3, 1999 the BBC reported that they had confirmation from the Australian Government of the existence of a powerful “global spying network” code-named Echelon, that could “eavesdrop on every single phone call, fax or e-mail, anywhere on the planet” with Britain and the United States as the chief protagonists. They confirmed that Menwith Hill was “linked directly to the headquarters of the US National Security Agency (NSA) at Fort Meade in Maryland”.[199]

NSA’s United States Signals Intelligence Directive 18 (USSID 18) strictly prohibited the interception or collection of information about “… U.S. persons, entities, corporations or organizations….” without explicit written legal permission from the United States Attorney General when the subject is located abroad, or the Foreign Intelligence Surveillance Court when within U.S. borders. Alleged Echelon-related activities, including its use for motives other than national security, including political and industrial espionage, received criticism from countries outside the UKUSA alliance.[200][201]

Protesters against NSA data mining in Berlin wearing Chelsea Manning and Edward Snowden masks.

Other SIGINT operations overseas

The NSA is also involved in planning to blackmail people with “SEXINT“, intelligence gained about a potential target’s sexual activity and preferences. Those targeted had not committed any apparent crime nor were charged with one.[202]

In order to support its facial recognition program, the NSA is intercepting “millions of images per day”.[203]

The Real Time Regional Gateway is a data collection program introduced in 2005 in Iraq by NSA during the Iraq War that consisted of gathering all electronic communication, storing it, then searching and otherwise analyzing it. It was effective in providing information about Iraqi insurgents who had eluded less comprehensive techniques.[204] This “collect it all” strategy introduced by NSA director, Keith B. Alexander, is believed by Glenn Greenwald of The Guardian to be the model for the comprehensive worldwide mass archiving of communications which NSA is engaged in as of 2013.[205]

BoundlessInformant

Edward Snowden revealed in June 2013 that between February 8 and March 8, 2013, the NSA collected about 124.8 billion telephone data items and 97.1 billion computer data items throughout the world, as was displayed in charts from an internal NSA tool codenamed Boundless Informant. It was reported that some of these data reflected eavesdropping on citizens in countries like Germany, Spain and France.[206]

BoundlessInformant employs big data databases, cloud computing technology, and Free and Open Source Software (FOSS) to analyze data collected worldwide by the NSA.[207]

Bypassing encryption

In 2013, reporters uncovered a secret memo that claims the NSA created and pushed for the adoption of the Dual_EC_DRBG encryption standard that contained built-in vulnerabilities in 2006 to the United States National Institute of Standards and Technology (NIST), and the International Organization for Standardization (aka ISO).[208][209] This memo appears to give credence to previous speculation by cryptographers at Microsoft Research.[210]Edward Snowden claims that the NSA often bypasses encryption altogether by lifting information before it is encrypted or after it is decrypted.[209]

XKeyscore rules (as specified in a file xkeyscorerules100.txt, sourced by German TV stations NDR and WDR, who claim to have excerpts from its source code) reveal that the NSA tracks users of privacy-enhancing software tools, including Tor; an anonymous email service provided by the MIT Computer Science and Artificial Intelligence Laboratory (CSAIL) in Cambridge, Massachusetts; and readers of the Linux Journal.[211][212]

Domestic activity

NSA’s mission, as set forth in Executive Order 12333 in 1981, is to collect information that constitutes “foreign intelligence or counterintelligence” while not “acquiring information concerning the domestic activities of United States persons“. NSA has declared that it relies on the FBI to collect information on foreign intelligence activities within the borders of the United States, while confining its own activities within the United States to the embassies and missions of foreign nations.[213] The appearance of a ‘Domestic Surveillance Directorate’ of the NSA was soon exposed as a hoax in 2013.[214][215]

NSA’s domestic surveillance activities are limited by the requirements imposed by the Fourth Amendment to the U.S. Constitution. The Foreign Intelligence Surveillance Court for example held in October 2011, citing multiple Supreme Court precedents, that the Fourth Amendment prohibitions against unreasonable searches and seizures applies to the contents of all communications, whatever the means, because “a person’s private communications are akin to personal papers.”[216] However, these protections do not apply to non-U.S. persons located outside of U.S. borders, so the NSA’s foreign surveillance efforts are subject to far fewer limitations under U.S. law.[217] The specific requirements for domestic surveillance operations are contained in the Foreign Intelligence Surveillance Act of 1978 (FISA), which does not extend protection to non-U.S. citizens located outside of U.S. territory.[217]

George W. Bush administration

George W. Bush, president during the 9/11 terrorist attacks, approved the Patriot Act shortly after the attacks to take anti-terrorist security measures. Title 1, 2, and 9 specifically authorized measures that would be taken by the NSA. These titles granted enhanced domestic security against terrorism, surveillance procedures, and improved intelligence, respectively. On March 10, 2004, there was a debate between President Bush and White House Counsel Alberto Gonzales, Attorney General John Ashcroft, and Acting Attorney General James Comey. The Attorney Generals were unsure if the NSA’s programs could be considered constitutional. They threatened to resign over the matter, but ultimately the NSA’s programs continued.[218] On March 11, 2004, President Bush signed a new authorization for mass surveillance of Internet records, in addition to the surveillance of phone records.This allowed the president to be able to override laws such as the Foreign Intelligence Surveillance Act, which protected civilians from mass surveillance. In addition to this, President Bush also signed that the measures of mass surveillance were also retroactively in place.[219]

Warrantless wiretaps

On December 16, 2005, The New York Times reported that, under White House pressure and with an executive order from President George W. Bush, the National Security Agency, in an attempt to thwart terrorism, had been tapping phone calls made to persons outside the country, without obtaining warrants from the United States Foreign Intelligence Surveillance Court, a secret court created for that purpose under the Foreign Intelligence Surveillance Act (FISA).[220]

One such surveillance program, authorized by the U.S. Signals Intelligence Directive 18 of President George Bush, was the Highlander Project undertaken for the National Security Agency by the U.S. Army 513th Military Intelligence Brigade. NSA relayed telephone (including cell phone) conversations obtained from ground, airborne, and satellite monitoring stations to various U.S. Army Signal Intelligence Officers, including the 201st Military Intelligence Battalion. Conversations of citizens of the U.S. were intercepted, along with those of other nations.[221]

Proponents of the surveillance program claim that the President has executive authority to order such action, arguing that laws such as FISA are overridden by the President’s Constitutional powers. In addition, some argued that FISA was implicitly overridden by a subsequent statute, the Authorization for Use of Military Force, although the Supreme Court’s ruling in Hamdan v. Rumsfeld deprecates this view. In the August 2006 case ACLU v. NSA, U.S. District Court Judge Anna Diggs Taylor concluded that NSA’s warrantless surveillance program was both illegal and unconstitutional. On July 6, 2007 the 6th Circuit Court of Appeals vacated the decision on the grounds that the ACLU lacked standing to bring the suit.[222]

On January 17, 2006, the Center for Constitutional Rights filed a lawsuit, CCR v. Bush, against the George W. Bush Presidency. The lawsuit challenged the National Security Agency’s (NSA’s) surveillance of people within the U.S., including the interception of CCR emails without securing a warrant first.[223][224]

In September 2008, the Electronic Frontier Foundation (EFF) filed a class action lawsuit against the NSA and several high-ranking officials of the Bush administration,[225] charging an “illegal and unconstitutional program of dragnet communications surveillance,”[226] based on documentation provided by former AT&T technician Mark Klein.[227]

As a result of the USA Freedom Act passed by Congress in June 2015, the NSA had to shut down its bulk phone surveillance program on November 29 of the same year. The USA Freedom Act forbids the NSA to collect metadata and content of phone calls unless it has a warrant for terrorism investigation. In that case the agency has to ask the telecom companies for the record, which will only be kept for six months.

AT&T Internet monitoring

In May 2006, Mark Klein, a former AT&T employee, alleged that his company had cooperated with NSA in installing Narus hardware to replace the FBI Carnivore program, to monitor network communications including traffic between American citizens.[228]

Data mining

NSA was reported in 2008 to use its computing capability to analyze “transactional” data that it regularly acquires from other government agencies, which gather it under their own jurisdictional authorities. As part of this effort, NSA now monitors huge volumes of records of domestic email data, web addresses from Internet searches, bank transfers, credit-card transactions, travel records, and telephone data, according to current and former intelligence officials interviewed by The Wall Street Journal. The sender, recipient, and subject line of emails can be included, but the content of the messages or of phone calls are not.[229]

A 2013 advisory group for the Obama administration, seeking to reform NSA spying programs following the revelations of documents released by Edward J. Snowden.[230] mentioned in ‘Recommendation 30’ on page 37, “…that the National Security Council staff should manage an interagency process to review on a regular basis the activities of the US Government regarding attacks that exploit a previously unknown vulnerability in a computer application.” Retired cyber security expert Richard A. Clarke was a group member and stated on April 11 that NSA had no advance knowledge of Heartbleed.[231]

Illegally obtained evidence

In August 2013 it was revealed that a 2005 IRS training document showed that NSA intelligence intercepts and wiretaps, both foreign and domestic, were being supplied to the Drug Enforcement Administration (DEA) and Internal Revenue Service (IRS) and were illegally used to launch criminal investigations of US citizens. Law enforcement agents were directed to conceal how the investigations began and recreate an apparently legal investigative trail by re-obtaining the same evidence by other means.[232][233]

Barack Obama administration

In the months leading to April 2009, the NSA intercepted the communications of American citizens, including a Congressman, although the Justice Department believed that the interception was unintentional. The Justice Department then took action to correct the issues and bring the program into compliance with existing laws.[234] United States Attorney General Eric Holder resumed the program according to his understanding of the Foreign Intelligence Surveillance Act amendment of 2008, without explaining what had occurred.[235]

Polls conducted in June 2013 found divided results among Americans regarding NSA’s secret data collection.[236] Rasmussen Reports found that 59% of Americans disapprove,[237] Gallup found that 53% disapprove,[238] and Pew found that 56% are in favor of NSA data collection.[239]

Section 215 metadata collection

On April 25, 2013, the NSA obtained a court order requiring Verizon‘s Business Network Services to provide metadata on all calls in its system to the NSA “on an ongoing daily basis” for a three-month period, as reported by The Guardian on June 6, 2013. This information includes “the numbers of both parties on a call … location data, call duration, unique identifiers, and the time and duration of all calls” but not “[t]he contents of the conversation itself”. The order relies on the so-called “business records” provision of the Patriot Act.[240][241]

In August 2013, following the Snowden leaks, new details about the NSA’s data mining activity were revealed. Reportedly, the majority of emails into or out of the United States are captured at “selected communications links” and automatically analyzed for keywords or other “selectors”. Emails that do not match are deleted.[242]

The utility of such a massive metadata collection in preventing terrorist attacks is disputed. Many studies reveal the dragnet like system to be ineffective. One such report, released by the New America Foundation concluded that after an analysis of 225 terrorism cases, the NSA “had no discernible impact on preventing acts of terrorism.”[243]

Defenders of the program say that while metadata alone can’t provide all the information necessary to prevent an attack, it assures the ability to “connect the dots”[244] between suspect foreign numbers and domestic numbers with a speed only the NSA’s software is capable of. One benefit of this is quickly being able to determine the difference between suspicious activity and real threats.[citation needed] As an example, NSA director General Keith Alexander mentioned at the annual Cybersecurity Summit in 2013, that metadata analysis of domestic phone call records after the Boston Marathon bombing helped determine that[clarification needed] another attack in New York was baseless.[244]

In addition to doubts about its effectiveness, many people argue that the collection of metadata is an unconstitutional invasion of privacy. As of 2015, the collection process remains legal and grounded in the ruling from Smith v. Maryland (1979). A prominent opponent of the data collection and its legality is U.S. District Judge Richard J. Leon, who issued a report in 2013[245] in which he stated: “I cannot imagine a more ‘indiscriminate’ and ‘arbitrary invasion’ than this systematic and high tech collection and retention of personal data on virtually every single citizen for purposes of querying and analyzing it without prior judicial approval…Surely, such a program infringes on ‘that degree of privacy’ that the founders enshrined in the Fourth Amendment”.

The PRISM program[edit]

PRISM: a clandestine surveillance program under which the NSA collects user data from companies like Microsoft and Facebook.

Under the PRISM program, which started in 2007,[246][247] NSA gathers Internet communications from foreign targets from nine major U.S. Internet-based communication service providers: Microsoft,[248] Yahoo, Google, Facebook, PalTalk, AOL, Skype, YouTube and Apple. Data gathered include email, video and voice chat, videos, photos, VoIP chats such as Skype, and file transfers.

June 2015 – WikiLeaks: Industrial espionage

In June 2015, Wikileaks published documents, which showed that NSA spied on French companies.[249]

July 2015 – WikiLeaks: Espionage against German federal ministries

In July 2015, WikiLeaks published documents, which showed that NSA spied on federal German ministries since 1990s.[250][251] Even Germany’s Chancellor Angela Merkel‘s cellphones and phone of her predecessors had been intercepted.[252]

Claims of prevented terrorist attacks

Former NSA director General Keith Alexander claimed that in September 2009 the NSA prevented Najibullah Zazi and his friends from carrying out a terrorist attack.[253] However, this claim has been debunked and no evidence has been presented demonstrating that the NSA has ever been instrumental in preventing a terrorist attack.[254][255][256][257]

Hacking operations

Besides the more traditional ways of eavesdropping in order to collect signals intelligence, NSA is also engaged in hacking computers, smartphones and their networks. These operations are conducted by the Tailored Access Operations (TAO) division.

NSA’s China hacking group

According to the Foreign Policy magazine, “… the Office of Tailored Access Operations, or TAO, has successfully penetrated Chinese computer and telecommunications systems for almost 15 years, generating some of the best and most reliable intelligence information about what is going on inside the People’s Republic of China.”[258][259]

Syrian internet blackout

In an interview with Wired magazine, Edward Snowden said the Tailored Access Operations division accidentally caused Syria‘s internet blackout in 2012.[260]

Suspected responsibility for hacking operations by the Equation Group

The espionage group named the Equation Group, described by discoverers Kaspersky Labs as one of the most advanced (if not the most advanced) in the world as of 2015,[261]:31 and connected to over 500 malware infections in at least 42 countries over many years, is suspected of being a part of NSA.[262][263] The group’s known espionage methods have been documented to include interdiction (interception of legitimate CDs sent by a scientific conference organizer by mail),[261]:15 and the “unprecedented” ability to infect and be transmitted through the hard drive firmware of several of the major hard drive manufacturers, and create and use hidden disk areas and virtual disk systems for its purposes, a feat demanding access to the manufacturer’s source code of each to achieve.[261]:16–18 The methods used to deploy the tools demonstrated “surgical precision”, going so far as to exclude specific countries by IP and allow targeting of specific usernames on discussion forums.[261]:23–26 The techniques and knowledge used by the Equation Group are considered in summary to be “out of the reach of most advanced threat groups in the world except [this group].[261]:31

Software backdoors

Linux kernel

Linus Torvalds, the founder of Linux kernel, joked during a LinuxCon keynote on September 18, 2013 that the NSA, who are the founder of SELinux, wanted a backdoor in the kernel.[264] However, later, Linus’ father, a Member of the European Parliament (MEP), revealed that the NSA actually did this.[265]

When my oldest son was asked the same question: “Has he been approached by the NSA about backdoors?” he said “No”, but at the same time he nodded. Then he was sort of in the legal free. He had given the right answer, everybody understood that the NSA had approached him.

— Nils Torvalds, LIBE Committee Inquiry on Electronic Mass Surveillance of EU Citizens – 11th Hearing, 11 November 2013[266]
Microsoft Windows

_NSAKEY was a variable name discovered in Microsoft‘s Windows NT 4 Service Pack 5 (which had been released unstripped of its symbolic debugging data) in August 1999 by Andrew D. Fernandes of Cryptonym Corporation. That variable contained a 1024-bit public key.

IBM Notes

IBM Notes was the first widely adopted software product to use public key cryptography for client–server and server–server authentication and for encryption of data. Until US laws regulating encryption were changed in 2000, IBM and Lotus were prohibited from exporting versions of Notes that supported symmetric encryption keys that were longer than 40 bits. In 1997, Lotus negotiated an agreement with the NSA that allowed export of a version that supported stronger keys with 64 bits, but 24 of the bits were encrypted with a special key and included in the message to provide a “workload reduction factor” for the NSA. This strengthened the protection for users of Notes outside the US against private-sector industrial espionage, but not against spying by the US government.[267][268]

Boomerang routing

While it is assumed that foreign transmissions terminating in the U.S. (such as a non-U.S. citizen accessing a U.S. website) subject non-U.S. citizens to NSA surveillance, recent research into boomerang routing has raised new concerns about the NSA’s ability to surveil the domestic Internet traffic of foreign countries.[18] Boomerang routing occurs when an Internet transmission that originates and terminates in a single country transits another. Research at the University of Toronto has suggested that approximately 25% of Canadian domestic traffic may be subject to NSA surveillance activities as a result of the boomerang routing of Canadian Internet service providers.[18]

Hardware implanting

Intercepted packages are opened carefully by NSA employees
A “load station” implanting a beacon

A document included in NSA files released with Glenn Greenwald‘s book No Place to Hide details how the agency’s Tailored Access Operations (TAO) and other NSA units gain access to hardware. They intercept routers, servers and other network hardware being shipped to organizations targeted for surveillance and install covert implant firmware onto them before they are delivered. This was described by an NSA manager as “some of the most productive operations in TAO because they preposition access points into hard target networks around the world.”[269]

Computers seized by the NSA due to interdiction are often modified with a physical device known as Cottonmouth.[270] Cottonmouth is a device that can be inserted in the USB port of a computer in order to establish remote access to the targeted machine. According to NSA’s Tailored Access Operations (TAO) group implant catalog, after implanting Cottonmouth, the NSA can establish Bridging (networking) “that allows the NSA to load exploit software onto modified computers as well as allowing the NSA to relay commands and data between hardware and software implants.”[271]

Role in scientific research and development

NSA has been involved in debates about public policy, both indirectly as a behind-the-scenes adviser to other departments, and directly during and after Vice Admiral Bobby Ray Inman‘s directorship. NSA was a major player in the debates of the 1990s regarding the export of cryptography in the United States. Restrictions on export were reduced but not eliminated in 1996.

Its secure government communications work has involved the NSA in numerous technology areas, including the design of specialized communications hardware and software, production of dedicated semiconductors (at the Ft. Meade chip fabrication plant), and advanced cryptography research. For 50 years, NSA designed and built most of its computer equipment in-house, but from the 1990s until about 2003 (when the U.S. Congress curtailed the practice), the agency contracted with the private sector in the fields of research and equipment.[272]

Data Encryption Standard

FROSTBURG was the NSA’s first supercomputer, used from 1991 to 1997

NSA was embroiled in some minor controversy concerning its involvement in the creation of the Data Encryption Standard (DES), a standard and public block cipher algorithm used by the U.S. government and banking community. During the development of DES by IBM in the 1970s, NSA recommended changes to some details of the design. There was suspicion that these changes had weakened the algorithm sufficiently to enable the agency to eavesdrop if required, including speculation that a critical component—the so-called S-boxes—had been altered to insert a “backdoor” and that the reduction in key length might have made it feasible for NSA to discover DES keys using massive computing power. It has since been observed that the S-boxes in DES are particularly resilient against differential cryptanalysis, a technique which was not publicly discovered until the late 1980s, but which was known to the IBM DES team.

The United States Senate Select Committee on Intelligence reviewed NSA’s involvement, and concluded that while the agency had provided some assistance, it had not tampered with the design.[273][274] In late 2009 NSA declassified information stating that “NSA worked closely with IBM to strengthen the algorithm against all except brute force attacks and to strengthen substitution tables, called S-boxes. Conversely, NSA tried to convince IBM to reduce the length of the key from 64 to 48 bits. Ultimately they compromised on a 56-bit key.”[275][276]

Advanced Encryption Standard

The involvement of NSA in the selection of a successor to Data Encryption Standard (DES), the Advanced Encryption Standard (AES), was limited to hardware performance testing (see AES competition).[277] NSA has subsequently certified AES for protection of classified information (for at most two levels, e.g. SECRET information in an unclassified environment[clarification needed]) when used in NSA-approved systems.[278]

NSA encryption systems

STU-III secure telephones on display at the National Cryptologic Museum

The NSA is responsible for the encryption-related components in these legacy systems:

  • FNBDT Future Narrow Band Digital Terminal[279]
  • KL-7 ADONIS off-line rotor encryption machine (post-WWII – 1980s)[280][281]
  • KW-26 ROMULUS electronic in-line teletypewriter encryptor (1960s–1980s)[282]
  • KW-37 JASON fleet broadcast encryptor (1960s–1990s)[281]
  • KY-57 VINSON tactical radio voice encryptor[282]
  • KG-84 Dedicated Data Encryption/Decryption[282]
  • STU-III secure telephone unit,[282] phased out by the STE[283]

The NSA oversees encryption in following systems which are in use today:

The NSA has specified Suite A and Suite B cryptographic algorithm suites to be used in U.S. government systems; the Suite B algorithms are a subset of those previously specified by NIST and are expected to serve for most information protection purposes, while the Suite A algorithms are secret and are intended for especially high levels of protection.[278]

SHA

The widely used SHA-1 and SHA-2 hash functions were designed by NSA. SHA-1 is a slight modification of the weaker SHA-0 algorithm, also designed by NSA in 1993. This small modification was suggested by NSA two years later, with no justification other than the fact that it provides additional security. An attack for SHA-0 that does not apply to the revised algorithm was indeed found between 1998 and 2005 by academic cryptographers. Because of weaknesses and key length restrictions in SHA-1, NIST deprecates its use for digital signatures, and approves only the newer SHA-2 algorithms for such applications from 2013 on.[288]

A new hash standard, SHA-3, has recently been selected through the competition concluded October 2, 2012 with the selection of Keccak as the algorithm. The process to select SHA-3 was similar to the one held in choosing the AES, but some doubts have been cast over it,[289][290] since fundamental modifications have been made to Keccak in order to turn it into a standard.[291] These changes potentially undermine the cryptanalysis performed during the competition and reduce the security levels of the algorithm.[289]

Dual_EC_DRBG random number generator cryptotrojan

NSA promoted the inclusion of a random number generator called Dual_EC_DRBG in the U.S. National Institute of Standards and Technology‘s 2007 guidelines. This led to speculation of a backdoor which would allow NSA access to data encrypted by systems using that pseudo random number generator.[292]

This is now deemed to be plausible based on the fact that the output of the next iterations of the PRNG can provably be determined if the relation between two internal elliptic curve points is known.[293][294] Both NIST and RSA are now officially recommending against the use of this PRNG.[295][296]

Clipper chip

Because of concerns that widespread use of strong cryptography would hamper government use of wiretaps, NSA proposed the concept of key escrow in 1993 and introduced the Clipper chip that would offer stronger protection than DES but would allow access to encrypted data by authorized law enforcement officials.[297] The proposal was strongly opposed and key escrow requirements ultimately went nowhere.[298] However, NSA’s Fortezza hardware-based encryption cards, created for the Clipper project, are still used within government, and NSA ultimately declassified and published the design of the Skipjack cipher used on the cards.[299][300]

Perfect Citizen

Perfect Citizen is a program to perform vulnerability assessment by the NSA on U.S. critical infrastructure.[301][302] It was originally reported to be a program to develop a system of sensors to detect cyber attacks on critical infrastructure computer networks in both the private and public sector through a network monitoring system named Einstein.[303][304] It is funded by the Comprehensive National Cybersecurity Initiative and thus far Raytheon has received a contract for up to $100 million for the initial stage.

Academic research

NSA has invested many millions of dollars in academic research under grant code prefix MDA904, resulting in over 3,000 papers (as of 2007-10-11). NSA/CSS has, at times, attempted to restrict the publication of academic research into cryptography; for example, the Khufu and Khafre block ciphers were voluntarily withheld in response to an NSA request to do so. In response to a FOIA lawsuit, in 2013 the NSA released the 643-page research paper titled, “Untangling the Web: A Guide to Internet Research,[305] ” written and compiled by NSA employees to assist other NSA workers in searching for information of interest to the agency on the public Internet.[306]

Patents

NSA has the ability to file for a patent from the U.S. Patent and Trademark Office under gag order. Unlike normal patents, these are not revealed to the public and do not expire. However, if the Patent Office receives an application for an identical patent from a third party, they will reveal NSA’s patent and officially grant it to NSA for the full term on that date.[307]

One of NSA’s published patents describes a method of geographically locating an individual computer site in an Internet-like network, based on the latency of multiple network connections.[308] Although no public patent exists, NSA is reported to have used a similar locating technology called trilateralization that allows real-time tracking of an individual’s location, including altitude from ground level, using data obtained from cellphone towers.[309]

Controversy

File:Ron Wyden and James Clapper - 12 March 2013.webm

Excerpt from when James Clapper lied to Congress on NSA surveillance programs

In the United States, at least since 2001,[310] there has been legal controversy over what signal intelligence can be used for and how much freedom the National Security Agency has to use signal intelligence.[311] The government has made, in 2015, slight changes in how it uses and collects certain types of data,[312] specifically phone records. President Barack Obama has asked lawyers and his national security team to look at the tactics that are being used by the NSA. President Obama made a speech on January 17, 2014 where he defended the national security measures, including the NSA, and their intentions for keeping the country safe through surveillance. He said that it is difficult to determine where the line should be drawn between what is too much surveillance and how much is needed for national security because technology is ever changing and evolving. Therefore, the laws cannot keep up with the rapid advancements.

President Obama did make some changes to national security regulations and how much data can be collected and surveyed.[citation needed] The first thing he added, was more presidential directive and oversight so that privacy and basic rights are not violated. The president would look over requests on behalf of American citizens to make sure that their personal privacy is not violated by the data that is being requested. Secondly, surveillance tactics and procedures are becoming more public, including over 40 rulings of the FISC that have been declassified.[citation needed] Thirdly, further protections are being placed on activities that are justified under Section 702, such as the ability to retain, search and use data collected in investigations, which allows the NSA to monitor and intercept interaction of targets overseas. Finally, national security letters, which are secret requests for information that the FBI uses in their investigations, are becoming less secretive. The secrecy of the information requested will not be indefinite and will terminate after a set time if future secrecy is not required.[citation needed] Concerning the bulk surveillance of American’s phone records, President Obama also ordered a transition from bulk surveillance under Section 215 to a new policy that will eliminate unnecessary bulk collection of metadata.

As of May 7, 2015, the U.S. Court of Appeals for the Second Circuit ruled that the interpretation of Section 215 of the Patriot Act was wrong and that the NSA program that has been collecting Americans’ phone records in bulk is illegal.[313] It stated that Section 215 cannot be clearly interpreted to allow government to collect national phone data and, as a result, expired on June 1, 2015. This ruling “is the first time a higher-level court in the regular judicial system has reviewed the N.S.A. phone records program.” [314] The new bill getting passed later in May taking its place is known as the U.S.A. Freedom Act, which will enable the NSA to continue hunting for terrorists by analyzing telephone links between callers but “keep the bulk phone records in the hands of phone companies.”[314] This would give phone companies the freedom to dispose the records in an 18-month period. The White House argued that this new ruling validated President Obama’s support of the government being extracted from bulk data collection and giving power to the telecommunications companies.

Previously, the NSA paid billions of dollars to telecommunications companies in order to collect data from them.[315] While companies such as Google and Yahoo! claim that they do not provide “direct access” from their servers to the NSA unless under a court order,[316] the NSA had access to emails, phone calls and cellular data users.[317] With this new ruling, telecommunications companies would not provide the NSA with bulk information. The companies would allow the disposal of data in every 18 months,[314] which is arguably putting the telecommunications companies at a higher advantage.

This ruling made the collecting of phone records illegal, but it did not rule on Section 215’s constitutionality. Senate Majority Leader Mitch McConnell has already put forth a new bill to re-authorize the Patriot Act.[318] Defenders of this surveillance program are claiming that judges who sit on the Foreign Intelligence Surveillance Court (FISC) had ruled 37 times that this kind of collection of data is, in fact, lawful.[318] The FISC is the court specifically mandated to grant surveillance orders in the name of foreign intelligence. The new ruling made by the Second District Court of Appeals now retroactively dismisses the findings of the FISC on this program.

See also

Notes

 Story 2: Big Lie Media Crazy Credibility Crisis — Fake News is Media McCarthyism — No Tanks In Streets of D.C. Big Lie Coup Fake News — Videos

Image result for tanks in washington d.c.

Image result for cartoons obama surveillance of trump

Image result for cartoons obama surveillance of trump

Image result for cartoons obama surveillance of trump

Image result for cartoons obama surveillance of trump

Krauthammer: Comey incident has sent press over the edge

Conway: Democrats trashed Comey then made him a martyr

Ari Fleischer: Hypocrisy from Democratic Party is appalling

Michelle Malkin: Hypocrisy over Comey firing is overwhelming

Gingrich: Liberals will move on to Martian conspiracies next

Could a probe of Hillary’s email server be reopened?

Tucker to Dem: Are you saying Trump has corrupted FBI?

Rush Limbaugh rejects media’s ‘coup’ claims

Hume: Calling Comey firing a ‘coup’ is hysterical

Lionel on the Alex Jones Show: Fake News, Media Bias, McCarthyism, Redbaiting & Blatant Russophobia

The Truth About McCarthyism: Modern Parallels

Napolitano: Many FBI agents felt demeaned by Comey’s actions

Coup d’état

From Wikipedia, the free encyclopedia

A coup d’état (/ˌk dˈtɑː/ About this sound listen ; French: [ku.de.ta]), also known simply as a coup (/k/), a putsch (/pʊ/), or an overthrow, is the illegal and overt seizure of a state by the military or other elites within the state apparatus.[1]

Contents

 [show

Terminology

Etymology

The phrase coup d’état (French pronunciation:  [ku deta]) is French, literally meaning a “stroke of state” or “blow against the state.” In French the word “État” (French: [e.ta]), denoting a sovereign political entity, is capitalized.[2]

Although the concept of a coup d’état has been featured in politics since antiquity, the phrase is of relatively recent coinage;[3] the Oxford English Dictionary identifies it as a French expression meaning a “stroke of state.” The phrase did not appear within an English text before the 19th century except when used in translation of a French source, there being no simple phrase in English to convey the contextualized idea of a “knockout blow to the existing administration within a state.”

One early use within text translated from French was in 1785 in a printed translation of a letter from a French merchant, commenting on an arbitrary decree or “arrêt” issued by the French king restricting the import of British wool.[4] What may be its first published use within a text composed in English is an editor’s note in the London Morning Chronicle, 7 January 1802, reporting the arrest by Napoleon in France, of Moreau, Berthier, Masséna, and Bernadotte:

There was a report in circulation yesterday of a sort of coup d’état having taken place in France, in consequence of some formidable conspiracy against the existing government.

In post-Revolutionary France, the phrase came to be used to describe the various murders by Napoleon‘s hated secret police, the Gens d’Armes d’Elite, who murdered the Duke of Enghien:

…the actors in torture, the distributors of the poisoning draughts, and the secret executioners of those unfortunate individuals or families, whom Bonaparte’s measures of safety require to remove. In what revolutionary tyrants call grand[s] coups d’état, as butchering, or poisoning, or drowning, en masse, they are exclusively employed.[5]

Usage of the phrase

Clayton Thyne and Jonathan Powell’s dataset of coups defines attempted coups as “illegal and overt attempts by the military or other elites within the state apparatus to unseat the sitting executive.”[1] They arrive at this definition by combining common definitions in the existing literature and removing specificities and ambiguities that exist in many definitions.[1]

In looser usage, as in “intelligence coup” or “boardroom coup”, the term simply refers to gaining a sudden advantage on a rival.

Putsch

Since an unsuccessful coup d’état in 1920 (the Kapp Putsch), the Swiss-German word Putsch (pronounced [pʊtʃ], coined for the Züriputsch of September 6, 1839, in Zurich), also denotes the politico-military actions of an unsuccessful minority reactionary coup.[6][7][8]

Other recent and notable unsuccessful minority reactionary coups that are often referred to as Putsches are the 1923 Beer Hall Putsch and Küstrin Putsch, 1961 Algiers Putsch and the 1991 August Putsch. Putsch was used as disinformation by Hitler and his Nazi supporters to falsely claim that he had to suppress a reactionary coup during the Night of the Long Knives. Germans still use the term Röhm-Putsch to describe the murders, the term given to it by the Nazi regime, despite its unproven implication that the murders were necessary to prevent a coup. German authors often use quotation marks or write about the sogenannter Röhm-Putsch (“so-called Röhm Putsch”) for emphasis.[9]

Pronunciamiento

Pronunciamiento (“pronouncement”) is a term of Spanish and Latin-American origin for a special type of coup d’état. The coup d’état (called golpe de Estado in Spanish) was more common in Spain and South America, while the pronunciamiento was more common in Central America. The pronunciamiento is the formal explanation for deposing the regnant government, justifying the installation of the new government that was effected with the golpe de Estado.

In a coup, it is the military, paramilitary, or opposing political faction that deposes the current government and assumes power; whereas, in the pronunciamiento, the military deposes the existing government and installs an (ostensibly) civilian government.[10]

History

According to Clayton Thyne and Jonathan Powell’s coup dataset, there were 457 coup attempts from 1950 to 2010, of which 227 (49.7%) were successful and 230 (50.3%) were unsuccessful.[1] They find that coups have “been most common in Africa and the Americas (36.5% and 31.9%, respectively). Asia and the Middle East have experienced 13.1% and 15.8% of total global coups, respectively. Europe has experienced by far the fewest number of coup attempts: 2.6%.”[1] Most coup attempts occurred in the mid-1960s, but there were also large numbers of coup attempts in the mid-1970s and the early 1990s.[1] Successful coups have decreased over time.[1] Coups that occur in the post-Cold War period are more likely to result in democratic systems.[11][12][13] Coups that occur during civil wars shorten the war’s duration.[14] Research suggests that protests spur coups, as they help elites within the state apparatus to coordinate coups.[15]

Types

A 2016 study categorizes coups into four possible outcomes:[12]

  • Failed coup.
  • No regime change. Such as when a leader is illegally shuffled out of power without changing the identity of the group in power or the rules for governing.
  • Replacement of incumbent dictatorship with another.
  • Ouster of the dictatorship followed by democratization.

The 2016 study found that about half of all coups — both during and after the Cold War — install new autocratic regimes.[12] New dictatorships launched by coups engage in higher levels of repression in the year that follows the coup than existed in the year leading to the coup.[12] One third of coups during the Cold War and 10 percent of post-Cold War coups reshuffled the regime leadership.[12] Democracies were installed in the wake of 12 percent of Cold War coups and 40 percent of the post-Cold War coups.[12]

Samuel Huntington’s three types

Writing in 1968, political scientist Samuel P. Huntington identified three types of coup d’état, which correspond to the role the military plays in three different types of praetorian society.[16] As society changes, so does the role of the military. In the world of oligarchy, the soldier is a radical; in the middle class he is a participant and arbiter; as the “mass society looms on the horizon he becomes the conservative guardian of the existing order”.

Breakthrough coups

In breakthrough coups, the soldier plays the role of “reformer”, moving the society from “Oligarchical to Radical Praetorianism”. “In oligarchical praetorianism the dominant social forces are landowners, the leading clergy, and the wielders of the sword”. In “radical” society, the middle-class is an important social and political class. The shift toward “radical” society take the form of slow evolution, or a “breakthrough” to middle-class political participation may be led by civilian intelligentsia. A breakthrough to radical praetorianism (in which the military plays an important role among the middle class who govern) may occur when middle-class officers dislodge the civilian intelligentsia who led the breakthrough, or the military may take power directly from the absolute monarchy or the oligarchs in a military coup.

Arbiter coups

In this type of coup, society is in the stage of “radical praetorianism,” meaning that the praetorian society is in the “middle stages in the expansion of political participation,” when the middle-class (including the military) are actively involved in politics, but the masses are not regularly politically mobilized. This type of society often follows the breakthrough coup, which “clears the way for the entry of other middle-class elements into politics”. In radical praetorian society, various middle-class groups may act against one another in riots or demonstrations, and the military will step in with a military coup to re-establish order and “halt the rabid mobilization of social forces into politics and into the streets…to defuse the explosive political situation”.

Veto coup d’état

Veto coups d’état occur when the army vetoes the people’s mass participation and social mobilisation in governing themselves. “Military interventions of this “veto” variety thus directly reflect increasing lower-class political participation in politics”. In “veto coups” the soldier plays the role of “guardian of the existing order.” In such a case, the army confronts and suppresses large-scale, broad-based civil opposition.

Predictors

A 2003 review of the academic literature found that the following factors were associated with coups:

  • officers’ personal grievances
  • military organizational grievances
  • military popularity
  • military attitudinal cohesiveness
  • economic decline
  • domestic political crisis
  • contagion from other regional coups
  • external threat
  • participation in war
  • foreign veto power[clarify] and military’s national security doctrine
  • officers’ political culture
  • noninclusive institutions
  • colonial legacy
  • economic development
  • undiversified exports
  • officers’ class composition
  • military size
  • strength of civil society
  • regime legitimacy and past coups.[17]

The literature review in a 2016 study includes mentions of ethnic factionalism, supportive foreign governments, leader inexperience, slow growth, commodity price shocks, and poverty.[18]

The cumulative number of coups is a strong predictor of future coups.[17][19][20] Hybrid regimes are more vulnerable to coups than very authoritarian states or democratic states.[21] A 2015 study finds that terrorism is strongly associated with re-shuffling coups.[22] A 2016 study finds that there is an ethnic component to coups: “When leaders attempt to build ethnic armies, or dismantle those created by their predecessors, they provoke violent resistance from military officers.”[23] Another 2016 study shows that protests increase the risk of coups, presumably because they ease coordination obstacles among coup plotters and make international actors less likely to punish coup leaders.[24] A third 2016 study finds that coups become more likely in the wake of elections in autocracies when the results reveal electoral weakness for the incumbent autocrat.[25] A fourth 2016 study finds that inequality between social classes increase the likelihood of coups.[26] A 2016 study rejects the notion that participation in war makes coups more likely; to the contrary, coup risk declines in the presence of enduring interstate conflict.[27] One study found that coups are more likely to occur in states with small populations, as there are smaller coordination problems for coup-plotters.[28]

Coup-proofing

In what is referred to as “coup-proofing”, regimes create structures that make it hard for any small group to seize power. These coup-proofing strategies may include the strategic placing of family, ethnic, and religious groups in the military; creation of an armed force parallel to the regular military, and development of multiple internal security agencies with overlapping jurisdiction that constantly monitor one another.[29] Research shows that some coup-proofing strategies reduce the risk of coups occurring.[30][31] However, coup-proofing reduces military effectiveness,[32][33][34] and limits the rents that an incumbent can extract.[35]

A 2016 study shows that the implementation of succession rules reduce coup attempts.[36] Succession rules are believed to hamper coordination efforts among coup plotters by assuaging the elites who have more to gain with patience than with plotting.[36]

According to political scientists Curtis Bell and Jonathan Powell, coup attempts in neighbouring countries lead to greater coup-proofing and coup-related repression in a region.[37]

Democratization

Research suggests that coups promote democratization in staunchly authoritarian regimes, have become less likely to end democracy over time, and that the positive influence has strengthened since the end of the Cold War.[11][12][38][39][40]

A 2014 study found that “coups promote democratization, particularly among states that are least likely to democratize otherwise”.[38] The authors argue that coup attempts can have this consequence because leaders of successful coups have incentives to democratize quickly in order to establish political legitimacy and economic growth while leaders who stay in power after failed coup attempts see it as a sign that they must enact meaningful reforms to remain in power.[38] A 2014 study found that 40% of post-Cold War coups were successful. The authors argue that this may be due to the incentives created by international pressure.[11] A 2016 study found that democracies were installed in 12 percent of Cold War coups and 40 percent of the post-Cold War coups.[12]

Repression after failed coups, and counter-coups

According to Naunihal Singh, author of Seizing Power: The Strategic Logic of Military Coups (2014), it is “fairly rare” for the prevailing existing government to violently purge the army after a coup has been foiled. If it starts mass killing elements of the army, including officers who were not involved in the coup, this may trigger a “counter-coup” by soldiers who are afraid they will be next. To prevent such a desperate counter-coup that may be more successful than the initial attempt, governments usually resort to firing prominent officers and replacing them with loyalists instead.[41]

Some research suggests that increased repression and violence typically follow coup attempts (whether they’re successes or failures).[42] However, some tentative analysis by political scientist Jay Ulfelder finds no clear pattern of deterioration in human-rights practices in wake of failed coups in post-Cold War era.[43]

Notable counter-coups include the Ottoman countercoup of 1909, the 1960 Laotian counter-coup, the 1966 Nigerian counter-coup, the 1967 Greek counter-coup, and the 1971 Sudanese counter-coup.

A 2017 study finds that the use of state broadcasting by the putschist regime after Mali’s 2012 coup did not elevate explicit approval for the regime.[44]

International responses

The international community tends to react adversely to coups by reducing aid and imposing sanctions. A 2015 study finds that “coups against democracies, coups after the Cold War, and coups in states heavily integrated into the international community are all more likely to elicit global reaction.”[45] Another 2015 study shows that coups are the strongest predictor for the imposition of democratic sanctions.[46] A third 2015 study finds that Western states react strongest against coups of possible democratic and human rights abuses.[46] A 2016 study shows that the international donor community in the post-Cold War period penalizes coups by reducing foreign aid.[47] The US has been inconsistent in applying aid sanctions against coups both during the Cold War and post-Cold War periods, a likely consequence of its geopolitical interests.[47]

Organizations such as the African Union and Organization of American States have adopted anti-coup frameworks. Through the threat of sanctions, the organizations actively try to curb coups. A 2016 study finds that the African Union has played a meaningful role in reducing African coups.[48]

A forthcoming study in the Journal of Conflict Resolution finds that negative international responses to regimes created in coups have a significant influence on the sustainability of those regimes.[49] The study finds that “state reactions have the strongest effect during the Cold War, while international organizations matter the most afterward.”[49] Negative international responses from strong actors matter the most.[49]

Current leaders who assumed power via coups d’état

Position Name Assumed power as of Replaced Country Coup d’état
Sultan Qaboos bin Said al Said[50]1 23 July 1970 Said bin Taimur  Oman 1970 Omani coup d’état
President Teodoro Obiang Nguema Mbasogo 3 August 1979 Francisco Macías Nguema  Equatorial Guinea 1979 Equatoguinean coup d’état
President Yoweri Museveni 29 January 1986 Tito Okello  Uganda Ugandan Bush War
President Omar al-Bashir 30 June 1989 Sadiq al-Mahdi  Sudan 1989 Sudanese coup d’état
President Idriss Déby 2 December 1990 Hissène Habré  Chad 1990 Chadian revolution
President Isaias Afwerki 27 April 19912 Mengistu Haile Mariam
(Ethiopia)
 Eritrea Eritrean War of Independence
Prime Minister Hun Sen August 1997 Norodom Ranariddh  Cambodia 1997 Cambodian coup d’état
President Denis Sassou Nguesso 25 October 1997 Pascal Lissouba  Republic of the Congo Republic of the Congo Civil War
Prime Minister Frank Bainimarama 5 December 2006 Laisenia Qarase  Fiji 2006 Fijian coup d’état
President Mohamed Ould Abdel Aziz3 6 August 2008 Sidi Ould Cheikh Abdallahi  Mauritania 2008 Mauritanian coup d’état
President Abdel Fattah el-Sisi[51] 3 July 2013 Mohamed Morsi  Egypt 2013 Egyptian coup d’état
Prime Minister Prayuth Chan-ocha 22 May 2014 Niwatthamrong Boonsongpaisan4  Thailand 2014 Thai coup d’état
President of the Revolutionary Committee Mohammed Ali al-Houthi 6 February 2015 Abd Rabbuh Mansur Hadi5  Yemen 2014–15 Yemeni coup d’état

1Monarch who overthrew his father in a bloodless palace coup.
2As head of Provisional Government of Eritrea, which declared independence 24 May 1993.
3Subsequently, confirmed by a narrow margin in the 2009 Mauritanian presidential election, which was deemed “satisfactory” by international observers.
4Acting Prime Minister at that time.
5Hadi resigned on 22 January 2015.

See also

Story 3: President Trump Voter Fraud Commission — Videos

Image result for cartoons obama surveillance of trump

Trump Launches Commission To Investigate Voter Fraud

News Wrap: Trump signs executive orders on cybersecurity, voter fraud

Gov. Greg Abbott: Voter fraud is real, it must be stopped

Does the U.S. have a voter fraud problem?

John Fund References James O’Keefe’s Videos as Evidence of Voter Fraud

Veritas Voter Fraud Compilation – #VoterFraudIsReal

#CNNLeaks: James O’Keefe of Project Veritas Releases CNN Leaks and Offers Bounty for Its Destruction

The Pronk Pops Show Podcasts Portfolio

Listen To Pronk Pops Podcast or Download Shows 889-892

Listen To Pronk Pops Podcast or Download Shows 884-888

Listen To Pronk Pops Podcast or Download Shows 878-883

Listen To Pronk Pops Podcast or Download Shows 870-877

Listen To Pronk Pops Podcast or Download Shows 864-869

Listen To Pronk Pops Podcast or Download Shows 857-863

Listen To Pronk Pops Podcast or Download Shows 850-856

Listen To Pronk Pops Podcast or Download Shows 845-849

Listen To Pronk Pops Podcast or Download Shows 840-844

Listen To Pronk Pops Podcast or Download Shows 833-839

Listen To Pronk Pops Podcast or Download Shows 827-832

Listen To Pronk Pops Podcast or Download Shows 821-826

Listen To Pronk Pops Podcast or Download Shows 815-820

Listen To Pronk Pops Podcast or Download Shows 806-814

Listen To Pronk Pops Podcast or Download Shows 800-805

Listen To Pronk Pops Podcast or Download Shows 793-799

Listen To Pronk Pops Podcast or Download Shows 785-792

Listen To Pronk Pops Podcast or Download Shows 777-784

Listen To Pronk Pops Podcast or Download Shows 769-776

Listen To Pronk Pops Podcast or Download Shows 759-768

Listen To Pronk Pops Podcast or Download Shows 751-758

Listen To Pronk Pops Podcast or Download Shows 745-750

Listen To Pronk Pops Podcast or Download Shows 738-744

Listen To Pronk Pops Podcast or Download Shows 732-737

Listen To Pronk Pops Podcast or Download Shows 727-731

Listen To Pronk Pops Podcast or Download Shows 720-726

Listen To Pronk Pops Podcast or DownloadShows 713-719

Listen To Pronk Pops Podcast or DownloadShows 705-712

Listen To Pronk Pops Podcast or Download Shows 695-704

Listen To Pronk Pops Podcast or Download Shows 685-694

Listen To Pronk Pops Podcast or Download Shows 675-684

Listen To Pronk Pops Podcast or Download Shows 668-674

Listen To Pronk Pops Podcast or Download Shows 660-667

Listen To Pronk Pops Podcast or Download Shows 651-659

Listen To Pronk Pops Podcast or Download Shows 644-650

Listen To Pronk Pops Podcast or Download Shows 637-643

Listen To Pronk Pops Podcast or Download Shows 629-636

Listen To Pronk Pops Podcast or Download Shows 617-628

Listen To Pronk Pops Podcast or Download Shows 608-616

Listen To Pronk Pops Podcast or Download Shows 599-607

Listen To Pronk Pops Podcast or Download Shows 590-598

Listen To Pronk Pops Podcast or Download Shows 585- 589

Listen To Pronk Pops Podcast or Download Shows 575-584

Listen To Pronk Pops Podcast or Download Shows 565-574

Listen To Pronk Pops Podcast or Download Shows 556-564

Listen To Pronk Pops Podcast or Download Shows 546-555

Listen To Pronk Pops Podcast or Download Shows 538-545

Listen To Pronk Pops Podcast or Download Shows 532-537

Listen To Pronk Pops Podcast or Download Shows 526-531

Listen To Pronk Pops Podcast or Download Shows 519-525

Listen To Pronk Pops Podcast or Download Shows 510-518

Listen To Pronk Pops Podcast or Download Shows 500-509

Listen To Pronk Pops Podcast or Download Shows 490-499

Listen To Pronk Pops Podcast or Download Shows 480-489

Listen To Pronk Pops Podcast or Download Shows 473-479

Listen To Pronk Pops Podcast or Download Shows 464-472

Listen To Pronk Pops Podcast or Download Shows 455-463

Listen To Pronk Pops Podcast or Download Shows 447-454

Listen To Pronk Pops Podcast or Download Shows 439-446

Listen To Pronk Pops Podcast or Download Shows 431-438

Listen To Pronk Pops Podcast or Download Shows 422-430

Listen To Pronk Pops Podcast or Download Shows 414-421

Listen To Pronk Pops Podcast or Download Shows 408-413

Listen To Pronk Pops Podcast or Download Shows 400-407

Listen To Pronk Pops Podcast or Download Shows 391-399

Listen To Pronk Pops Podcast or Download Shows 383-390

Listen To Pronk Pops Podcast or Download Shows 376-382

Listen To Pronk Pops Podcast or Download Shows 369-375

Listen To Pronk Pops Podcast or Download Shows 360-368

Listen To Pronk Pops Podcast or Download Shows 354-359

Listen To Pronk Pops Podcast or Download Shows 346-353

Listen To Pronk Pops Podcast or Download Shows 338-345

Listen To Pronk Pops Podcast or Download Shows 328-337

Listen To Pronk Pops Podcast or Download Shows 319-327

Listen To Pronk Pops Podcast or Download Shows 307-318

Listen To Pronk Pops Podcast or Download Shows 296-306

Listen To Pronk Pops Podcast or Download Shows 287-295

Listen To Pronk Pops Podcast or Download Shows 277-286

Listen To Pronk Pops Podcast or Download Shows 264-276

Listen To Pronk Pops Podcast or Download Shows 250-263

Listen To Pronk Pops Podcast or Download Shows 236-249

Listen To Pronk Pops Podcast or Download Shows 222-235

Listen To Pronk Pops Podcast or Download Shows 211-221

Listen To Pronk Pops Podcast or Download Shows 202-210

Listen To Pronk Pops Podcast or Download Shows 194-201

Listen To Pronk Pops Podcast or Download Shows 184-193

Listen To Pronk Pops Podcast or Download Shows 174-183

Listen To Pronk Pops Podcast or Download Shows 165-173

Listen To Pronk Pops Podcast or Download Shows 158-164

Listen To Pronk Pops Podcast or Download Shows151-157

Listen To Pronk Pops Podcast or Download Shows 143-150

Listen To Pronk Pops Podcast or Download Shows 135-142

Listen To Pronk Pops Podcast or Download Shows 131-134

Listen To Pronk Pops Podcast or Download Shows 124-130

Listen To Pronk Pops Podcast or Download Shows 121-123

Listen To Pronk Pops Podcast or Download Shows 118-120

Listen To Pronk Pops Podcast or Download Shows 113 -117

Listen To Pronk Pops Podcast or Download Show 112

Listen To Pronk Pops Podcast or Download Shows 108-111

Listen To Pronk Pops Podcast or Download Shows 106-108

Listen To Pronk Pops Podcast or Download Shows 104-105

Listen To Pronk Pops Podcast or Download Shows 101-103

Listen To Pronk Pops Podcast or Download Shows 98-100

Listen To Pronk Pops Podcast or Download Shows 94-97

Listen To Pronk Pops Podcast or Download Show 93

Listen To Pronk Pops Podcast or Download Show 92

Listen To Pronk Pops Podcast or Download Show 91

Listen To Pronk Pops Podcast or Download Shows 88-90

Listen To Pronk Pops Podcast or Download Shows 84-87

Listen To Pronk Pops Podcast or Download Shows 79-83

Listen To Pronk Pops Podcast or Download Shows 74-78

Listen To Pronk Pops Podcast or Download Shows 71-73

Listen To Pronk Pops Podcast or Download Shows 68-70

Listen To Pronk Pops Podcast or Download Shows 65-67

Listen To Pronk Pops Podcast or Download Shows 62-64

Listen To Pronk Pops Podcast or Download Shows 58-61

Listen To Pronk Pops Podcast or Download Shows 55-57

Listen To Pronk Pops Podcast or Download Shows 52-54

Listen To Pronk Pops Podcast or Download Shows 49-51

Listen To Pronk Pops Podcast or Download Shows 45-48

Listen To Pronk Pops Podcast or Download Shows 41-44

Listen To Pronk Pops Podcast or Download Shows 38-40

Listen To Pronk Pops Podcast or Download Shows 34-37

Listen To Pronk Pops Podcast or Download Shows 30-33

Listen To Pronk Pops Podcast or Download Shows 27-29

Listen To Pronk Pops Podcast or Download Shows 17-26

Listen To Pronk Pops Podcast or Download Shows 16-22

Listen To Pronk Pops Podcast or Download Shows 10-15

Listen To Pronk Pops Podcast or Download Shows 1-9

Read Full Post | Make a Comment ( None so far )

The Pronk Pops Show 889, May 9, 2017, Breaking — Story 1: President Donald J. Trump Fires FBI Directory James Comey On Recommendation of Attorney General Jeff Sessions — Videos — Story 2: Democrats Designated Fall Guy — Flynn — Trump Needs To Declassify and Release Complete Transcripts of Flynn Conversations With Russian Ambassador — Hillary Clinton Was The Real National Security Blackmail Risk To United States — Time For Trump To Instruct Attorney General Sessions to Appoint A Special Prosecutor Before Statue of Limitations Runs Out — Videos — Story 3: Russia Celebrates World War II Victory Over Nazi Germany On May 9, 1945 With Display of Military Equipment and 10,000 Marching in Moscow’s Red Square — Videos — Story 4: Will President Trump Win War in Afghanistan By Authorizing 50,000 Additional Troops ? — Is President Trump a Non-interventionist or Interventionist or Neoconservative? — Videos

Posted on May 9, 2017. Filed under: American History, Benghazi, Blogroll, Breaking News, Budgetary Policy, Communications, Congress, Corruption, Countries, Culture, Donald J. Trump, Donald J. Trump, Donald Trump, Donald Trump, Economics, Elections, Empires, Fiscal Policy, Freedom of Speech, Government, Government Dependency, Government Spending, History, House of Representatives, Human, Language, Law, Life, Media, Monetary Policy, National Interest, Obama, Philosophy, Photos, Politics, Polls, Radio, Raymond Thomas Pronk, Scandals, Senate, Success, Tax Policy, United States of America, United States Supreme Court, Videos, Violence, War, Wealth, Wisdom | Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , |

Project_1

The Pronk Pops Show Podcasts

Pronk Pops Show 889,  May 9, 2017

Pronk Pops Show 888,  May 8, 2017

Pronk Pops Show 887,  May 5, 2017

Pronk Pops Show 886,  May 4, 2017

Pronk Pops Show 885,  May 3, 2017

Pronk Pops Show 884,  May 1, 2017

Pronk Pops Show 883 April 28, 2017

Pronk Pops Show 882: April 27, 2017

Pronk Pops Show 881: April 26, 2017

Pronk Pops Show 880: April 25, 2017

Pronk Pops Show 879: April 24, 2017

Pronk Pops Show 878: April 21, 2017

Pronk Pops Show 877: April 20, 2017

Pronk Pops Show 876: April 19, 2017

Pronk Pops Show 875: April 18, 2017

Pronk Pops Show 874: April 17, 2017

Pronk Pops Show 873: April 13, 2017

Pronk Pops Show 872: April 12, 2017

Pronk Pops Show 871: April 11, 2017

Pronk Pops Show 870: April 10, 2017

Pronk Pops Show 869: April 7, 2017

Pronk Pops Show 868: April 6, 2017

Pronk Pops Show 867: April 5, 2017

Pronk Pops Show 866: April 3, 2017

Pronk Pops Show 865: March 31, 2017

Pronk Pops Show 864: March 30, 2017

Pronk Pops Show 863: March 29, 2017

Pronk Pops Show 862: March 28, 2017

Pronk Pops Show 861: March 27, 2017

Pronk Pops Show 860: March 24, 2017

Pronk Pops Show 859: March 23, 2017

Pronk Pops Show 858: March 22, 2017

Pronk Pops Show 857: March 21, 2017

Pronk Pops Show 856: March 20, 2017

Pronk Pops Show 855: March 10, 2017

Pronk Pops Show 854: March 9, 2017

Pronk Pops Show 853: March 8, 2017

Pronk Pops Show 852: March 6, 2017

Pronk Pops Show 851: March 3, 2017

Pronk Pops Show 850: March 2, 2017

Pronk Pops Show 849: March 1, 2017

Pronk Pops Show 848: February 28, 2017

Pronk Pops Show 847: February 27, 2017

Pronk Pops Show 846: February 24, 2017

Pronk Pops Show 845: February 23, 2017

Pronk Pops Show 844: February 22, 2017

Pronk Pops Show 843: February 21, 2017

Pronk Pops Show 842: February 20, 2017

Pronk Pops Show 841: February 17, 2017

Pronk Pops Show 840: February 16, 2017

Pronk Pops Show 839: February 15, 2017

Pronk Pops Show 838: February 14, 2017

Pronk Pops Show 837: February 13, 2017

Pronk Pops Show 836: February 10, 2017

Pronk Pops Show 835: February 9, 2017

Pronk Pops Show 834: February 8, 2017

Pronk Pops Show 833: February 7, 2017

Pronk Pops Show 832: February 6, 2017

Pronk Pops Show 831: February 3, 2017

Pronk Pops Show 830: February 2, 2017

Pronk Pops Show 829: February 1, 2017

Image result for cartoon clapper and yatesImage result for president trump fires fbi director james comey may 9, 2017Image result for trump fires james comeyImage result for cartoons trump fires comey fbiImage result for cartoons branco democrats vs republicans over russia colusion with russiaImage result for timeline of l flynn - russia talks

Breaking — Story 1: President Donald J. Trump Fires FBI Directory James Comey On Recommendation of Attorney General Jeff Sessions — Videos — 

Image result for cartoons trump fires comeyImage result for president trump fires fbi director james comey may 9, 2017

Image result for cartoons trump fires comey

Why did President Trump fire FBI director Comey?

The Real Reason Comey Was Fired

FBI Director James Comey FULL STATEMENT on Hillary Clinton Email Investigation (C-SPAN)

Napolitano: Many FBI agents felt demeaned by Comey’s actions

Tucker: Comey’s firing was long overdue

Hume: Calling Comey firing a ‘coup’ is hysterical

President Trump to FBI’s James Comey…”You’re Fired!”

BREAKING: President Trump Fires FBI Director James Comey

The Fox News Specialists 5/9/17 : Trump Fires FBI Director James Comey

FBI Director James Comey fired by Trump

Trump fires FBI Director James Comey

BREAKING NEWS: FBI Director James Comey FIRED by President Trump

“JAMES COMEY Should Have Been FIRED”

“DANGER To the Country?” Tucker Weighs In On James Comey’s Testimony

BREAKING NEWS: President Trump Fires FBI Director James Comey

Trey Gowdy Finds Out FBI Director James Comey Won’t Obey The Law & He’s Pissed

FBI Director James Comey Is Fired by Donald Trump – LIVE STREAM

Trump Says Clinton Will Be in Jail if He’s President

TRUMP FIRES FBI DIRECTOR JAMES COMEY

President Donald Trump has fired FBI Director James Comey.

In a statement, Trump says Comey’s firing “will mark a new beginning” for the FBI. The White House says the search for a new FBI director will begin immediately.

Comey’s firing comes days after he testified on Capitol Hill about the FBI’s investigation into Russia’s election meddling and possible connections between Russia and Trump’s campaign.

http://hosted.ap.org/dynamic/stories/U/US_TRUMP_COMEY?SITE=AP&SECTION=HOME&TEMPLATE=DEFAULT&CTIME=2017-05-09-17-47-00

Story 2: Democrats Designated Fall Guy — Flynn  — Trump Needs To Declassify and Release Complete Transcripts of Flynn Conversations With Russian Ambassador — Hillary Clinton Was The Real National Security Blackmail Risk To United States — Time For Trump To Instruct Attorney General Session to Appoint A Special Prosecutor Before Statue of Limitations Runs Out — Videos — 

Image result for cartoon clapper and yatesImage result for cartoons branco general flynn sally yatesImage result for cartoon clapper and yatesImage result for cartoon clapper and yatesImage result for cartoons branco general flynn sally yatesImage result for cartoon clapper and yatesImage result for cartoon clapper and yates

NSA Received Around 2,000 Requests To Unmask Americans’ Names In 2016

Published on May 9, 2017

If a U.S. citizen is caught up in incidental intelligence collection, that person’s name cannot be revealed unless the intelligence agency that gathered the information agrees to a request to “unmask” that American person’s name. “How many of those requests did you get in 2016?” Sen. Lindsey Graham (R-S.C.) asked Admiral Michael Rogers at a Senate Armed Services Committee hearing on Tuesday. Rogers heads both the National Security Agency and the U.S. Cyber Command. “I think we’ve publicly acknowledged something – it’s 2,000. I think it’s one thousand nine-hundred and something,” Rogers replied. “How many people can request the unmasking of an American citizen?” Graham continued. “If you’re an authorized recipient of the intelligence – we use two criteria. Number one, the requester must be asking this in the execution of their official duties. It can’t be something that would be neat to know,” Rogers said.

“Number two, the revealing of the U.S. person has to provide context and greater value for the intelligence. Again, it can’t just be, ‘I’m just curious.’” Rogers said a broad group of people can make unmasking requests: “If you are on the authorized distribution for our intelligence reporting, you can ask. It doesn’t mean it gets approved, but you can ask.” Rogers said the national security adviser is normally on the distribution list, and “yes,” there is a record for every unmasking request that is made. Graham told Rogers, “So there’s a record of who made the request to unmask the conversation involving the American citizen. There’s a record of whether or not you granted it.” Rogers agreed with both those statements, but he said there is no record of what the person did with the information once they got it. “There’s also a record of the basis — so why did we say yes,” Rogers added. He said the unmasking is authorized only for the individual who requested it, and that person is told not to share the information.

Graham noted that former National Security Adviser Michael Flynn’s conversation with the Russian ambassador to the U.S. was captured by one of the intelligence agencies: “Assuming he did not have a FISA warrant allowing us to collect on him, it would be a case of incidental collection (from) following the Russian ambassador. Does that make sense?” Graham asked Rogers. “Yes, sir,” Rogers agreed. “We would know how that conversation was revealed and to who (sic) it was revealed,” Graham continued. Rogers said yes – if the unmasking was based on information gathered by the NSA. He noted that the FBI also picks up incidental collection. “OK, so we could either ask the FBI or you,” Graham said. “OK. So somebody took that information that we gained through collection with Flynn and gave it to the Washington Post.” — “And that is a leak, and that is illegal, yes, sir,” Rogers said. He added that he is very concerned about such leaks, and he has warned his employees in writing not to engage in such behavior or they will be held criminally liable.

Graham concluded: “The bottom line here, it is possible for the Congress to find out who requested unmasking of American citizens, who that information was given to, and that is possible for us to know.” Rogers replied, “On the NSA side, that’s part of the ongoing investigation with the primary oversight committees that we’re going through right now.” — “OK,” said Graham. “Do you know if Susan Rice ever asked for an American citizen to be unmasked?” — “I’d have to pull the data, sir, I apologize,” Rogers said. The exchange ended at that point. At a Senate Judiciary subcommittee hearing on Monday, Sen. Graham asked a similar question: “How did the conversation between the Russian ambassador and Mr. Flynn make it to the Washington Post?” He said he intends to find out.

 Sally Yates testifies on Flynn-Russia contacts

Sean Spicer CONFRONTED on Sally Yates, Trump Mike Flynn Russia Connections 5/8/2017

York: What we still don’t know after Sally Yates’ testimony

Ingraham: Dems desperately wanted to find Trump-Russia link

Brit Hume: Yates testimony ‘didn’t move the ball very much’

John Ashcroft: Yates wasn’t going to give the president his day in court

Sally Yates: We believed Michael Flynn was compromised

Published on May 8, 2017

Former acting Attorney General Sally Yates testified before a Senate panel Monday saying she notified the White House when she believed former National Security Adviser Michael Flynn had been “compromised.” Yahoo chief investigative reporter Michael Isikoff joined “Red & Blue” for a closer look at the hearing and what we can expect from the investigation down the road.

“U.S. Citizens Names Are Already Unmasked In My Reports” Sally Yates Drops Bombshell During Congress

Sean Spicer Blames Obama For Flynn Clearance

Published on May 8, 2017

At his daily briefing, press secretary Sean Spicer pivots on the Trump administration’s appointment of General Michael Flynn, saying the Obama administration was responsible for Flynn’s security clearance. The Obama administration fired Flynn in 2014, and warned Trump against hiring him.

White House explains Gen. Flynn’s resignation

Trey Gowdy Brilliantly Checkmates The FBI “Hillary Clinton Told You The Truth & Then Lied To Us”

Obama warned Trump about hiring Flynn

Spicer: It’s true, Obama wasn’t a fan of Flynn 00:51

Washington (CNN)Then-President Barack Obama warned President-elect Donald Trump in November against hiring retired Lt. Gen. Michael Flynn as his national security adviser, former Obama administration officials confirmed to CNN Monday.

Obama warned Trump about Flynn during their Oval Office meeting on November 10, days after Trump was elected president.
“Given the importance of the job, the President through there were better people for it, and that Flynn wasn’t up for the job,” a former senior Obama administration official told CNN Monday.
Other former Obama administration officials said then-Director of National Intelligence James Clapper didn’t think highly of Flynn, and in fact was the person who recommended Flynn’s firing as DNI in 2014. Flynn’s focus was generally limited to terrorism and didn’t know much about many other issues important for the national security adviser job, such as China, the officials said.

RELATED: The many paths from Trump to Russia

But at least one former Obama official disputed that, saying Obama’s concerns were not related to the firing of Flynn from the Defense Intelligence Agency but rather in the course of the investigation into Russian interference into the 2016 election.

“Flynn’s name kept popping up,” according to a senior Obama administration source.

Trump transition officials warned Flynn about Russia communications

The White House confirmed later Monday that Obama raised concerns about Flynn during his Oval Office sitdown with Trump in November.
“It’s true President Obama made it known he wasn’t exactly a fan of Gen. Flynn’s,” press secretary Sean Spicer said.
He said the concerns shouldn’t have come as a surprise, since Flynn was an “outspoken critic” of the Obama administration’s shortcomings on foreign policy.
Spicer said if the Obama administration was “truly concerned” about Flynn, there are steps it could have taken, including suspending his security clearance.
Flynn previously served as the head of the Defense Intelligence Agency under Obama until he was reportedly forced out of the post 2014 over internal disagreements over policy and management.
Trump did not heed Obama’s counsel on Flynn, bringing aboard the former military intelligence officer who supported Trump during his campaign as his national security adviser. Trump fired Flynn 24 days later when news broke of Flynn’s conversations with Russian Ambassador to the US Sergey Kislyak.
News of the warning comes as former acting Attorney General Sally Yates is set to testify before Congress on Monday about the concerns she expressed to Trump administration officials about Flynn’s contacts with Russian officials, namely with Kislyak.
Yates, in her role as acting attorney general, warned White House counsel Don McGahn on January 26 that Flynn was lying when he denied — both publicly and privately — that he discussed US sanctions on Russia with Kislyak. It wasn’t until weeks later that Trump asked for Flynn’s resignation, only after news surfaced that Flynn had misled Vice President Mike Pence about his conversations with Kislyak.
trump flynn russia mcenany sot_00001726
Trump: I feel badly for Michael Flynn 01:31
According to five current and former intelligence officials, their concern started around the time Flynn went to Moscow for the 10th anniversary gala of the state-sponsored news agency Russia Today. At that dinner, the former high-ranking intelligence official was seated right next to Russian President Vladimir Putin. He also had contact with Kislyak after the trip.
Former US officials were highly suspicious of Kislyak and his motives, and there were concerns Flynn didn’t seem to understand the dangers in the conversations, the officials said. As was reported over the weekend, even Trump’s own team was concerned enough to request a CIA profile of the Russian ambassador to help illustrate to Flynn he was taking a big chance in his interactions with Kislyak.
Yates’ testimony on Monday will be the first time she speaks publicly about her warnings to the White House about Flynn.
The Senate and House intelligence committees are continuing to investigate Russian interference in the 2016 election, including potential coordination between Russian officials and the Trump campaign or people close to the campaign.
Congressional investigators have so far homed in on Flynn, Carter Page, a former foreign policy adviser to the Trump campaign, and Roger Stone, who informally advised Trump during his presidential run.
While Trump asked for Flynn’s resignation, he has not abandoned his former national security adviser altogether.
Trump on Monday morning sought to get ahead of Yates’ testimony, taking to Twitter to deflect criticism that he or his administration should have kept Flynn out of the top national security post from the outset.
“General Flynn was given the highest security clearance by the Obama administration — but the Fake News seldom likes talking about that,” Trump said in his first missive.
“Ask Sally Yates, under oath, if she knows how classified information got into the newspapers soon after she explained it to W.H. Counsel,” he tweeted.
Flynn began advising Trump on national security in early 2016 and soon became a constant presence by Trump’s side as he crisscrossed the country from rally to rally.
He frequently introduced Trump on the campaign trail, delivering introductory remarks rife with criticism of the Obama administration’s foreign policy and of Democratic nominee Hillary Clinton. Flynn often led Trump supporters in chants of “Lock her up!” as he accused her of corruption and negligence in her use of a private email server.
Trump came to value Flynn not only for his like-minded view of global affairs but for his loyalty throughout the campaign.

Head of Pentagon intelligence agency forced out, officials say

April 30, 2014
The top two officials at the Defense Intelligence Agency said Wednesday that they will retire from those positions in the coming months, part of a leadership shake-up at an agency that is under pressure to trim budgets and shift focus after more than a decade of war, current and former U.S. officials said.Lt. Gen. Michael T. Flynn is expected to end his tenure as DIA director this summer, about a year before he was scheduled to depart, according to officials who said Flynn faced pressure from Director of National Intelligence James R. Clapper Jr. and others in recent months. His deputy, David Shedd, had been in his job since 2010.The moves come at a time when the DIA is in the midst of major changes, including an effort by senior Pentagon officials to expand the agency’s network of spies overseas, improve collection on unfolding crises such as the one in Ukraine, and work more closely with the CIA.

The Pentagon press secretary, John Kirby, said that their retirements “have been planned for some time” and that Defense Secretary Chuck Hagel “appreciates the service of these two dedicated and professional leaders.”

Kirby did not indicate when Flynn and Shedd would step down. Lt. Gen. Mary A. Legere, the Army’s top intelligence officer, is considered a leading candidate to replace Flynn, and she would be the first female DIA director if nominated and confirmed.

Flynn, who served as a top intelligence adviser to Gen. Stanley McChrystal in Iraq and Afghanistan, arrived at the DIA in July 2012 vowing to accelerate the agency’s overhaul. Asked after a public speech how he would treat employees reluctant to embrace his agenda, Flynn said he would “move them or fire them.”

He drafted a blueprint that called for sending more employees overseas, being more responsive to regional U.S. military commanders, and turning analysts’ attention from the war zones of Iraq and Afghanistan to a broader array of emerging national security threats.

“I think that Flynn’s efforts to move the organization into a role supporting combatant commanders was spot on and it is where DIA should be heading,” said Fred Kagan, a military historian and unpaid adviser to the DIA. “I think that he was trying to introduce a lot of valuable innovation into the organization.”

Critics said that his management style could be chaotic and that the scope of his plans met resistance from both superiors and subordinates. At the same time, his tenure was marked by significant turbulence, including the fallout from the classified intelligence files leaked by former intelligence contractor Edward Snowden, as well as other emerging crises.

“His vision in DIA was seen as disruptive,” said a former Pentagon official who worked closely with Flynn. At the DIA, Flynn sought to push DIA analysts and operators “up and out of their cubicles into the field to support war fighters or high-intensity operations,” the former official said. “I’m not sure DIA sees itself as that.”

Flynn clashed with other high-ranking officials, including Undersecretary of Defense for Intelligence Michael G. Vickers. Officials said Flynn had opposed Vickers’ efforts to make significant cuts to large intelligence centers established to support the U.S. military’s regional overseas commands. A former CIA operative, Vickers has sought to model the DIA’s training and overseas presence more closely on its civilian counterpart, according to current and former U.S. officials.

The plan has encountered significant opposition on Capitol Hill, particularly from members of the Senate Armed Services Committee who have voiced concern over the cost of creating the Defense Clandestine Service, and questioned whether Pentagon spies would end up being used to fill intelligence gaps that are supposed to be handled by the CIA.

Flynn’s departure, which has been rumored for weeks, was set in motion earlier this year when Clapper informed him that the administration had concluded that a leadership change was necessary, officials said. Others described it as a mutual agreement that Flynn would step down.

Flynn was a key player in U.S. military efforts to dismantle insurgent networks in Iraq and Afghanistan, an approach that relied heavily on combining U.S. Special Operations forces with intelligence operatives and analysts.

With McChrystal, Flynn helped to compress a cycle of carrying out raids and then exploiting the intelligence from those operations to find other targets.

In 2010, Flynn rankled many of his counterparts in the intelligence community when he published an article that was sharply critical of the information that spy agencies were assembling in Afghanistan. The effort was so focused on tracking insurgents that U.S. military and diplomatic leaders got little to help them understand the political, economic and cultural issues driving the insurgency.

https://www.washingtonpost.com/world/national-security/head-of-pentagon-intelligence-agency-forced-out-officials-say/2014/04/30/ec15a366-d09d-11e3-9e25-188ebe1fa93b_story.html?utm_term=.6f699e24f117

Story 2:  Russia Celebrates World War II Victory Over Nazi Germany On May 9, 1945,  With Display of Military Equipment and 10,000 Marching in Moscow’s Red Square — Videos

Image result for russia parade in moscow red square May 9, 2017 putinImage result for russia parade in moscow red square May 9, 2017Image result for russia parade in moscow red square May 9, 2017 putin

Advanced Russian weaponry rolls through Red Square in Victory Day parade

Published on May 9, 2017

More than 10,000 troops accompanied by military hardware marched across Moscow’s central square on May 9. Unfortunately, cloudy weather meant the ceremonial flyovers had to be canceled. Watch more – https://rbth.com

Russia puts military on display for Victory Day parade

Moscow Victory Day Parade 2017 俄罗斯胜利日阅兵式

Putin warns his Russian army can ‘repel any potential aggression’ as 10,000 troops march through Red Square with terrifying arsenal of missiles in Victory Day parade

  • Huge Victory Day military parade in Moscow involves 10,000 troops and more than 100 units of equipment 
  • Russian President Vladimir Putin was in attendance as well as former Kremlin leader Mikhail Gorbachev
  • The annual Red Square march in Moscow marks the defeat of Hitler’s Nazi Germany in the Second World War
  • Fly-past scrapped due to weather despite attempt to guarantee sunshine by ‘spiking clouds’ with chemicals

Vladimir Putin has warned his Russian army can ‘repel any potential aggression’ after 10,000 troops marched through Red Square with a terrifying arsenal of missiles in a military parade.

The annual march in Moscow marks the defeat of Hitler in the Second World War, but the Russian president was using it today to showcase the Kremlin’s modern military might.

Putin was personally taking the salute at the parade involving 10,000 troops and 114 units of military equipment.

The parade gave the first public showing of Tor and Pantsir mobile surface-to-air missile that have been adapted for use in Russia’s Arctic forces, their white-and-black winter camouflage standing out amid the olive drab of other war machines.

‘The armed forces of Russia are capable of repelling any potential aggression,’ Putin told thousands of military personnel.

Plans to send 72 aircraft overhead were defeated by the weather – despite the Kremlin spending £1.3 million to spike the clouds with a chemical cocktail to supposedly guarantee sunshine.

The fly-past was grounded because of low cloud, thwarting Putin’s bid to showcase his air force and honour Russian pilots who have served in Syria.

Scroll down for video

As the sun descended over Moscow, locals were treated to a spectacular fireworks and pyrotechnic display 

As the sun descended over Moscow, locals were treated to a spectacular fireworks and pyrotechnic display

The spectacular fireworks display was to mark the 72nd anniversary of Victory of Nazi Germany in the Great Patriotic War

The spectacular fireworks display was to mark the 72nd anniversary of Victory of Nazi Germany in the Great Patriotic War

Thousands of armed military personnel marched in formation through Red Square on a day of celebrations in Moscow

Thousands of armed military personnel marched in formation through Red Square on a day of celebrations in Moscow

Female servicemen march in formation during the parade this morning. Putin used the event to show off his military might

Female servicemen march in formation during the parade this morning. Putin used the event to show off his military might

Thousands of troops, including servicewomen, saluted as they passed Russian President Vladimir Putin (pictured back centre) at the parade

Thousands of troops, including servicewomen, saluted as they passed Russian President Vladimir Putin (pictured back centre) at the parade

Dozens of tanks rumbled through Red Square as troops saluted Putin during the massive military parade in Red Square today

As well as tanks and troops, this Russian Yars RS-24 intercontinental ballistic missile system was driven through Red Square

Snipers were seen on the Kremlin Wall during the Victory Day military parade amid heightened security with Vladimir Putin watching on

Snipers were seen on the Kremlin Wall during the Victory Day military parade amid heightened security with Vladimir Putin watching on

Putin also watched this S-400 Triumf medium-range and long-range surface-to-air missile system trundle through Red Square

Putin also watched this S-400 Triumf medium-range and long-range surface-to-air missile system trundle through Red Square

There were similar scenes in St Petersburg, Russia when an estimated 400,000 people walked through the streets carrying pictures of relatives killed in the Second World War

There were similar scenes in St Petersburg, Russia when an estimated 400,000 people walked through the streets carrying pictures of relatives killed in the Second World War

The Russian president was personally taking the salute as at the parade involving 10,000 troops, 114 units of military equipment and 72 aircraft

The Russian president was personally taking the salute as at the parade involving 10,000 troops, 114 units of military equipment and 72 aircraft

The Soviet ‘weather changing’ technology successfully prevented rain on Putin’s parade but failed to disperse the thick low cloud so only a display of armoured vehicles and missile systems went ahead.

Putin told the annual commemoration: ‘We will always guard Russia just as you, the soldiers of the Victory, did.

‘And [we will] strengthen the traditions of patriotism, loyally serving the homeland.

He vowed: ‘There was no, there is no and there will be no force that could ever enslave our people.

‘They fought to the bitter end, defending their homeland, and did what seemed impossible, they turned the bloody wheel of the Second World War back, drove the enemy from our land where it dared to come, crushed Nazism, put an end to its atrocities.

‘And we will never forget that it was our fathers, grandfathers and great-grandfathers who brought the freedom to Europe and the long-awaited peace on the planet.’

Hundreds of servicewomen wearing white skirts and blue military jackets were involved in the mass parade this morning

The military display included this Buk-M2 missile system. But a planned fly-past of 72 aircraft had to be cancelled due to the weather

The military display included this Buk-M2 missile system. But a planned fly-past of 72 aircraft had to be cancelled due to the weather

Dozens of female military personnel wearing white jackets and skirts were involved in the huge rally in Red Square this morning

Dozens of female military personnel wearing white jackets and skirts were involved in the huge rally in Red Square this morning

Columns of troops, servicewomen, tanks and missile systems were on display at Putin's showcase military event today

Columns of troops, servicewomen, tanks and missile systems were on display at Putin’s showcase military event today

The annual event marks the anniversary of the end of the Second World War and sees thousands of military personnel marching through Red Square

The annual event marks the anniversary of the end of the Second World War and sees thousands of military personnel marching through Red Square

Military might: Dozens of missiles and launchers were paraded through Red Square in a terrifying display of Russia's fire power

Military might: Dozens of missiles and launchers were paraded through Red Square in a terrifying display of Russia’s fire power

Russian Yars RS-24 intercontinental ballistic missiles were brought in to the square after a parade by thousands of troops

Russian Yars RS-24 intercontinental ballistic missiles were brought in to the square after a parade by thousands of troops

These Russian T-14 Armata tanks were also driven slowly through Red Square. But the event did not go totally as planned after a fly-past had to be cancelled

These Russian T-14 Armata tanks were also driven slowly through Red Square. But the event did not go totally as planned after a fly-past had to be cancelled

Russian president Vladimir Putin (pictured meeting World War Two veterans) personally took the salute at the parade. But a fly-past of 72 aircraft was cancelled

Russian president Vladimir Putin (pictured meeting World War Two veterans) personally took the salute at the parade. But a fly-past of 72 aircraft was cancelled

Quick march: Vladimir Putin warned his Russian army can 'repel any potential aggression' after he watched 10,000 soldiers take part in the Victory Day parade

Putin told the annual Victory Day parade on Red Square that the horrors of World War II demonstrate the necessity of countries working together to prevent war

Putin told the annual Victory Day parade on Red Square that the horrors of World War II demonstrate the necessity of countries working together to prevent war

Tens of thousands took to the streets in Moscow to pay tribute to those killed in the Second World War. It followed a massive military parade at the Red Square

Tens of thousands took to the streets in Moscow to pay tribute to those killed in the Second World War. It followed a massive military parade at the Red Square

Russian and Soviet flags were waved while a banner was unfurled reading 'Immortal Regiment ', during the Victory Day event

Russian and Soviet flags were waved while a banner was unfurled reading ‘Immortal Regiment ‘, during the Victory Day event

The Russian president personally took the salute at the parade. But a fly-past of 72 aircraft was cancelled.

This meant no display by Russia’s Sukhoi Su-30SM fighter jets, which have seen combat action recently in Syria.

A debut Victory Day march was scheduled for schoolchildren in Russia’s new ‘Yunarmia’, a 30,000-strong militarised patriotic movement nicknamed the Putin Youth Army and established by the Defence Ministry.

It was scheduled to begin at 10am in Moscow, 8am London time, with other commemorations held in cities across Russia’s 11 time zones.

On display in Moscow was the the newly developed Tor-M2DT short-range anti-aircraft missile system and the Pantsir-SA surface-to-air missile system, both designed to operate in the Arctic.

The air display included a first outing at the Victory Day event for the Sukhoi Su-30SM fighter jets, which have seen combat action recently in Syria.

On display too were the T-72B3M variant of the T-72 main battle tank.

Tens of thousands of Russians took to the streets of Moscow carrying portraits of relatives they had lost in World War Two

Tens of thousands of Russians took to the streets of Moscow carrying portraits of relatives they had lost in World War Two

Russia's President Vladimir Putin (centre) greets guests at a Victory Day reception at the Moscow Kremlin this afternoon

Russia’s President Vladimir Putin (centre) greets guests at a Victory Day reception at the Moscow Kremlin this afternoon

Children hold portraits of World War Two soldiers as they attend the Immortal Regiment march in central Moscow today

Children hold portraits of World War Two soldiers as they attend the Immortal Regiment march in central Moscow today

The streets of Moscow were packed with people paying tribute to Russia's war dead. The Immortal Regiment march was part of the Victory Day celebrations

The streets of Moscow were packed with people paying tribute to Russia’s war dead. The Immortal Regiment march was part of the Victory Day celebrations

Two Second World War veterans dance at a traditional meeting point near Bolshoi Theatre in Moscow today

Two Second World War veterans dance at a traditional meeting point near Bolshoi Theatre in Moscow today

Vladimir Putin is today staging a vast military parade showcasing Russia's firepower, and hailing as heroes his troops who have seen service in Syria

Vladimir Putin is today staging a vast military parade showcasing Russia’s firepower, and hailing as heroes his troops who have seen service in Syria

A Russian TOR-M2 tactical surface-to-air missile 'Arctic edition' system was also driven through Red Square this morfing

A Russian TOR-M2 tactical surface-to-air missile ‘Arctic edition’ system was also driven through Red Square this morfing

The annual Red Square march and fly-past in Moscow marks the defeat of Hitler in the Second World War, but the Russian president was using it today to showcase the Kremlin's modern military might

The annual Red Square march and fly-past in Moscow marks the defeat of Hitler in the Second World War, but the Russian president was using it today to showcase the Kremlin’s modern military might

A BTR-82A armoured personnel carrier rolls down Moscow's Red Square carrying military personnel dressed in white armu outfits

A BTR-82A armoured personnel carrier rolls down Moscow’s Red Square carrying military personnel dressed in white armu outfits

On display: Russian servicemen stand atop a T-72B3 main battle tank as the vehicle belches out thick black smoke

On display: Russian servicemen stand atop a T-72B3 main battle tank as the vehicle belches out thick black smoke

Russian servicemen lined up at the start of the parade marking the World War Two anniversary in Moscow this morning

Russian servicemen lined up at the start of the parade marking the World War Two anniversary in Moscow this morning

in Vladivostok, Russia, tens of thousands of people took to the street to take part in the traditional Immortal Regiment march

in Vladivostok, Russia, tens of thousands of people took to the street to take part in the traditional Immortal Regiment march

Russian air force Commander Col. Gen. Viktor Bondarev said: ‘What makes this year so special is that virtually each and every pilot who will take part in the 9 May flyby in Moscow has fought in Syria, is highly decorated, and will showcase skills that will make many countries salivate.’

This year marks the 72nd anniversary of the end of the Second World War in Europe.

The sombre occasion is a show of respect to the 27 million Soviet soldiers and civilians who died during the defeat of the Nazis.

Many Russians were today honouring the dead in their own families by taking part in marches to the Immortal Regiment, holding pictures of relatives who perished in the war.

Meanwhile, more than 10,000 people waving Russian flags and carrying portraits of Stalin watched tanks roll through Ukraine’s de facto rebel capital Donetsk on Tuesday in celebration of the Soviet Union’s victory over Nazi Germany.

Russia celebrates the 1945 defeat of Nazi Germany every May 9 to honor those who fought and died for their country

Russia celebrates the 1945 defeat of Nazi Germany every May 9 to honor those who fought and died for their country

About 10,000 soldiers participated, standing rigidly as Defense Minister Sergei Shoigu reviewed them while standing in an open-top limousine

About 10,000 soldiers participated, standing rigidly as Defense Minister Sergei Shoigu reviewed them while standing in an open-top limousine

Russian President Vladimir Putin (centre) holds a photograph of his father in a naval uniform, as he joins people carrying portraits of relatives who fought in the Second World War

Russian President Vladimir Putin (centre) holds a photograph of his father in a naval uniform, as he joins people carrying portraits of relatives who fought in the Second World War

Security was tight at the event and snipers could be seen monitoring the parade from outposts surrounding Red Square

Security was tight at the event and snipers could be seen monitoring the parade from outposts surrounding Red Square

President Vladimir Putin was pictured arriving for the Victory Day military parade in Red Square in Moscow this morning

President Vladimir Putin was pictured arriving for the Victory Day military parade in Red Square in Moscow this morning

Vladimir Putin took to the stage to tell thousands of soldiers: 'We will never forget that it was our fathers, grandfathers and great-grandfathers who brought the freedom to Europe'

Vladimir Putin took to the stage to tell thousands of soldiers: ‘We will never forget that it was our fathers, grandfathers and great-grandfathers who brought the freedom to Europe’

This year marks the 72nd anniversary of the end of the Second World War in Europe. The sombre occasion is a show of respect to the 27 million Soviet soldiers and civilians who died during the defeat of the Nazis

This enormous Russian Topol M intercontinental ballistic missile launcher was among a terrifying arsenal of weapons on display

This enormous Russian Topol M intercontinental ballistic missile launcher was among a terrifying arsenal of weapons on display

Russian guards march during the Victory Day military parade. On display too were the T-72B3M variant of the T-72 main battle tank

Russian guards march during the Victory Day military parade. On display too were the T-72B3M variant of the T-72 main battle tank

The display was scheduled to begin at 10am in Moscow, 8am London time, with other commemorations held in cities across Russia’s 11 time zones

A debut Victory Day march was scheduled for schoolchildren in Russia’s new ‘Yunarmia’, a 30,000-strong militarised patriotic movement nicknamed the Putin Youth Army and established by the Defence Ministry

The display of military might used by the Moscow-backed insurgents in their three-year conflict against government forces violated the terms of a long-ignored 2015 peace deal.

Donetsk straddles a demarcation line in the industrial east of Ukraine from which both sides’ big guns were meant to have been withdrawn almost two years ago.

An AFP reporter counted 45 pieces of heavy military equipment – ranging from a lone World War II-era tank to its modern versions used in the current war as well as rocket launchers and anti-aircraft guns – roll through the city’s main street.

Donetsk separatist leader Alexander Zakharchenko led a march of about 1,000 fighters who held up a long banner painted the black and orange colours of Russia’s patriotic Saint George’s ribbon.

Former President of the USSR Mikhail Gorbatchev (centre) was among the VIP guests who watched the parade this morning

Former President of the USSR Mikhail Gorbatchev (centre) was among the VIP guests who watched the parade this morning

Vladimir Putin lays flowers at the Hero Cities memorial by the Kremlin Wall. He has warned his army can 'repel any aggression'

Vladimir Putin lays flowers at the Hero Cities memorial by the Kremlin Wall. He has warned his army can ‘repel any aggression’

The Soviet Union is estimated to have lost 26 million people in the war, including 8 million soldiers, and the immense suffering contributes to Victory Day's status as Russia's most important secular holiday

The Soviet Union is estimated to have lost 26 million people in the war, including 8 million soldiers, and the immense suffering contributes to Victory Day’s status as Russia’s most important secular holiday

Up to 10,000 servicemen and women lined up in Red Square ahead of the vast military display. Putin attended the event this morning

Up to 10,000 servicemen and women lined up in Red Square ahead of the vast military display. Putin attended the event this morning

Parades were held across Russia's sprawling expanse as well as in the Russia-annexed Crimea Peninsula, but the Red Square parade is the centerpiece of the country's observances

Parades were held across Russia’s sprawling expanse as well as in the Russia-annexed Crimea Peninsula, but the Red Square parade is the centerpiece of the country’s observances

About 10,000 soldiers participated, standing rigidly as Defense Minister Sergei Shoigu reviewed them while standing in an open-top limousine, then marching out to make way for a display of military vehicles ranging from armored cars to lumbering Topol ICBM launchers

About 10,000 soldiers participated, standing rigidly as Defense Minister Sergei Shoigu reviewed them while standing in an open-top limousine, then marching out to make way for a display of military vehicles ranging from armored cars to lumbering Topol ICBM launchers

Former president of the USSR Mikhail Gorbachev (centre) was given a helping hand as he attended the event today

Former president of the USSR Mikhail Gorbachev (centre) was given a helping hand as he attended the event today

At one point Russian artillery was fired as part of tributes to Russia's war dead. The Soviet Union is estimated to have lost 26 million people in the Second World War, including 8 million soldiers

At one point Russian artillery was fired as part of tributes to Russia’s war dead. The Soviet Union is estimated to have lost 26 million people in the Second World War, including 8 million soldiers

Others in the parade carried portraits of warlords killed in Europe’s only war, in which more than 10,000 people have died.

Zakharchenko told the crowd that May 9 ‘is the holiest day for us all’.

On the other side of the frontline Ukrainian authorities have joined European nations in marking the end of World War II on May 8 after its 2014 pro-EU revolution. The decision was meant to underscore Ukraine’s split with Russia and embrace of the West.

Ukrainian President Petro Poroshenko told a group of soldiers on Tuesday that ‘we will no longer celebrate this holiday along the Russian scenario.’

But several hundred people carrying photographs of relatives who fought in what the Soviet Union called ‘The Great Patriotic War’ still marched through Kiev on Tuesday.

Many Russians were today honouring the dead in their own families by taking part in marches to the Immortal Regiment, holding pictures of relatives who perished in the war

Russian President Vladimir Putin joined other dignitaries as he watched the massive parade this morning

Russian President Vladimir Putin joined other dignitaries as he watched the massive parade this morning

Amid heightened security both President Vladimir Putin (left) and Prime Minister Dmitry Medvedev (right) were there to celebrate the 72nd anniversary of the victory over Nazi Germany

Amid heightened security both President Vladimir Putin (left) and Prime Minister Dmitry Medvedev (right) were there to celebrate the 72nd anniversary of the victory over Nazi Germany

The Kremlin has been flexing its military muscle in the hydrocarbon-rich Arctic region, as it vies for dominance with rivals Canada, the United States and Norway

The Kremlin has been flexing its military muscle in the hydrocarbon-rich Arctic region, as it vies for dominance with rivals Canada, the United States and Norway

The strongman was using the parade today to showcase Russia's modern military might, with one senior military commander saying it would make foreign foes

The strongman was using the parade today to showcase Russia’s modern military might, with one senior military commander saying it would make foreign foes ‘salivate’.

Preparations: Servicemen gathered in huge numbers before standing to attention as Vladimir Putin arrived this morning

A young child holds red flowers before the parade marking the Second World War anniversary in Moscow this morning

A young child holds red flowers before the parade marking the Second World War anniversary in Moscow this morning

A number of war veterans were invited to watch the Victory Day military parade at Red Square in Moscow today

A number of war veterans were invited to watch the Victory Day military parade at Red Square in Moscow today

Vladimir Putin was among the high-ranking Russian officials who attended the event, which saw 10,000 troops march through Red Square

Vladimir Putin was among the high-ranking Russian officials who attended the event, which saw 10,000 troops march through Red Square

The event included a performance from a military band. Parades were held across Russia's sprawling expanse

The event included a performance from a military band. Parades were held across Russia’s sprawling expanse

Russia's Defence Minister Sergei Shoigu and Col Gen Oleg Salyukov, Commander-in-Chief of the Russian Ground Forces, review the troops during a Victory Day military parade marking the 72nd anniversary of the victory over Nazi Germany in the Great Patriotic War, the Eastern Front of World War II, in Moscow's Red Squareniversary of the victory over Nazi Germany in the Great Patriotic War, the Eastern Front of World War II, in Moscow’s Red Square

People in Sevastopol, Crimea, carry portraits of late Soviet leader Joseph Stalin and World War Two soldiers during the Immortal Regiment march as they celebrate the 72nd anniversary of the Soviet Union's victory over Nazi Germany

People in Sevastopol, Crimea, carry portraits of late Soviet leader Joseph Stalin and World War Two soldiers during the Immortal Regiment march as they celebrate the 72nd anniversary of the Soviet Union’s victory over Nazi Germany

They were confronted by a small group of nationalists who pelted them with several smoke bombs before being restrained by the police.

The atmosphere was calmer on Donetsk’s central Lenin Square.

Entire families watched the hardware roll by and cheered. Some parents dressed up their children in military fatigues.

Lenin Square itself was adorned by a 1960s L-29 Delfin military jet trainer used during the Cold War by nations in central and eastern Europe that were under the Kremlin’s thumb.

A young student came to the rebel parade with a Russian Saint George’s ribbon pinned to his shirt and a bouquet of flowers.

‘I want to see the day when, at the end of our own war, we also get a chance to celebrate Victory Day,’ the 20-year-old told AFP.

‘Our war is almost as long as the Great Patriotic War. It is time to finish it already.’

World War Two veteran Vladimir Ivanov talks to a child during celebrations in Gorky Park marking the 72nd anniversary of the Victory over Nazi Germany

World War Two veteran Vladimir Ivanov talks to a child during celebrations in Gorky Park marking the 72nd anniversary of the Victory over Nazi Germany

People carry portraits of relatives who fought in World War Two, and Russian and Soviet flags, during the Immortal Regiment march along the Red Square in Moscow

People carry portraits of relatives who fought in World War Two, and Russian and Soviet flags, during the Immortal Regiment march along the Red Square in Moscow

Russians came out in their thousands to remember the country's war dead, by carrying pictures and portraits of their relatives above their heads

Russians came out in their thousands to remember the country’s war dead, by carrying pictures and portraits of their relatives above their heads

Cadets from the Saint Petersburg Suvorov Military School march and sing in the city's Palace Square during a Victory Day parade

Cadets from the Saint Petersburg Suvorov Military School march and sing in the city’s Palace Square during a Victory Day parade

A pensioner in Ryazan, south east of Moscow, shares a dance with a young women as they celebrate Victory Day

A pensioner in Ryazan, south east of Moscow, shares a dance with a young women as they celebrate Victory Day

Russian young couples dressed in old style military uniform dance at a traditional veterans meeting point near Bolshoi Theatre in Moscow

Paratroopers dressed in blue were involved in a huge march on Red Square

Russian young couples dressed in old style military uniform dance at a traditional veterans meeting point near Bolshoi Theatre in Moscow (left). Paratroopers dressed in blue were involved in a huge march on Red Square (right)

: http://www.dailymail.co.uk/news/article-4487306/Putin-shows-Russia-s-firepower-huge-military-parade.html#ixzz4gbxBg4jf

Story 3: Will President Trump Win War in Afghanistan By Authorizing 40,000 Additional Troops? —  Is President Trump a Noninterventionist or  Interventionist or Neoconservative? — Videos

Sean Spicer Won’t Confirm If President Trump Is Sending Thousands More US Troops To Afghanistan 

Trump Could Send As Many As 5K More Troops To Afghanistan

Pentagon to request thousands more US troops for Afghan : Is it necessary??

Published on May 8, 2017

Pentagon to request thousands more US troops for Afghan: Is it necessary??

he US military will ask the Donald Trump administration next week to deploy thousands more troops to Afghanistan, a senior official says.

War And Peace In The Age Of Trump

Rand Paul Questions Deputy Sec. of State About Foreign Intervention Excess

Why neocons love Trump’s new national security adviser

BREAKING NEWS: Trump Chooses H R McMaster as National Security Adviser

Condoleezza Rice: Increasing Troops In Afghanistan ‘Doesn’t Make Sense’ Without New Strategy | TODAY

U.S. poised to expand military effort against Taliban in Afghanistan

May 8 at 6:30 PM
President Trump’s most senior military and foreign policy advisers have proposed a major shift in strategy in Afghanistan that would effectively put the United States back on a war footing with the Taliban.The new plan, which still needs the approval of the president, calls for expanding the U.S. military role as part of a broader effort to push an increasingly confident and resurgent Taliban back to the negotiating table, U.S. officials said.The plan comes at the end of a sweeping policy review built around the president’s desire to reverse worsening security in Afghanistan and “start winning” again, said one U.S. official, who like others spoke on the condition of anonymity to discuss internal deliberations.
The new strategy, which has the backing of top Cabinet officials, would authorize the Pentagon, not the White House, to set troop numbers in Afghanistan and give the military far broader authority to use airstrikes to target Taliban militants. It would also lift Obama-era restrictions that limited the mobility of U.S. military advisers on the battlefield.

The net result of the changes would be to reverse moves by President Barack Obama to steadily limit the U.S. military role in Afghanistan, along with the risk to American troops and the cost of the war effort, more than 15 years after U.S. forces first arrived there.

Spicer says Trump wants to ‘eliminate the threats’ in Afghanistan

White House press secretary Sean Spicer on May 9 said President Trump wants to “eliminate the threats” against the U.S. in Afghanistan. (Reuters)

Trump is expected to make a final call on the strategy before a May 25 NATO summit in Brussels that he plans to attend.

Officials said it is unclear whether Trump, who has spoken little about the United States’ longest war, will look favorably upon expanding the U.S. role in Afghanistan. While he has voiced skepticism about allowing U.S. troops to become bogged down in foreign conflicts, the president has also expressed a desire to be tough on terrorism and has seemed to delight in the use of military force.

“The review is an opportunity to send a message that, yes, the U.S. is going to send more troops, but it’s not to achieve a forever military victory,” said Andrew Wilder, an Afghanistan expert at the U.S. Institute of Peace. “Rather, it’s to try to bring about a negotiated end to this conflict.”

The new strategy is a product of the U.S. military’s mounting worries that the fragile stalemate with the Taliban has been steadily eroding for years, jeopardizing the survival of an allied government and endangering a key U.S. base for combating militant groups such as al-Qaeda and the Islamic State throughout South Asia.

Even as it moves to the president’s desk, the proposal faces resistance from some senior administration officials who fear a repeat of earlier decisions to intensify military efforts that produced only temporary improvements.

Inside the White House, those opposed to the plan have begun to refer derisively to the strategy as “McMaster’s War,” a reference to H.R. McMaster, the president’s national security adviser. The general, who once led anti-corruption efforts in Afghanistan and was one of the architects of President George W. Bush’s troop surge in Iraq, is the driving force behind the new strategy at the White House.

Defense Secretary Jim Mattis says he sees 2017 as “another tough year for the valiant Afghan security forces and the international troops.” (Reuters)

The White House declined to comment.

The plan envisions an increase of at least 3,000 U.S. troops to an existing force of about 8,400. The U.S. force would also be bolstered by requests for matching troops from NATO nations.

But, in keeping with the Trump administration’s desire to empower military decision-making, the Pentagon would have final say on troop levels and how those forces are employed on the battlefield. The plan would also increase spending on Afghanistan’s troubled government in an effort to improve its capacity.

The additional troops and aid spending would add to the fiscal toll of a war that already costs $23 billion annually, a factor Trump advisers expect will weigh heavily in the president’s considerations.

In a break with the past, U.S. officials said that increases in U.S. troop levels and support to the Afghan government and military would be heavily conditioned on the ability of Afghan President Ashraf Ghani, who heads a fragile unity government, to weed out ineffective military commanders and reduce corruption, both of which have led some aggrieved Afghans to turn to the Taliban as a better alternative.

The question at the heart of the new strategy is whether U.S. and Afghan forces, even if bolstered by new troops and authorities to target the Taliban, can create enough pressure to push the war toward a negotiated settlement. Those opposing the escalation have argued that even the Obama-era surge, which peaked at 100,000, did not result in Taliban concessions in on-again, off-again U.S.-Taliban talks begun in 2011.

That effort eventually crumbled amid U.S. government divisions and resistance from the Afghan government, which feared being cut out of the process. While Pakistan and other governments have sought to foster separate talks in recent years, progress has been scant since the 2016 death of Taliban leader Akhtar Mohammad Mansour in a U.S. airstrike .

Those failures, and his deep-seated desire to end the war before leaving office, led Obama to craft a plan to cut U.S. troop levels to 1,000 before leaving office. In late 2014, he also took away the military’s authority to directly target Taliban leadership, stating that the United States was no longer at war with the insurgent group.

But the Taliban’s advance across Afghanistan, where it has chipped away at government control of rural areas and occasionally seized a major city, eventually compelled Obama to abandon that low troop target.

Obama also loosened rules so U.S. forces could target the Taliban with airstrikes in limited situations, for example when Afghan troops faced danger of being overrun or needed support from American warplanes for major operations.

Under the steps proposed in the new strategy, U.S. aircraft would again be permitted to strike the Taliban in a broader array of situations, allowing for greater air support of Afghan offensives. The new rules would also enable U.S. military advisers to accompany conventional Afghan forces closer to the front lines, similar to the freedom they have with elite Afghan forces in a separate counterterrorism mission.

Similar measures proposed last year by the outgoing U.S. military commander for Afghanistan provoked a backlash among top Pentagon leaders, but this time military leaders including Defense Secretary Jim Mattis are supportive.

The new strategy comes at a critical time for Afghan forces, which have taken massive casualties and continue to suffer from corruption and poor leadership. Their vulnerability was exposed last month when a handful of Taliban militants killed 140 soldiers in an assault on a military base in northern Afghanistan.

Even proponents of the plan have modest expectations for what an enhanced military effort, given the Taliban’s strength, can achieve. Rather than stopping the militants from taking over additional territory, officials expect that Afghan forces will at best be able to “hold the line” this year and begin to recapture some key terrain from the Taliban next year.

The goal is to make “incremental progress” in coming years in the hope that those gains will be enough to persuade the Taliban to make concessions that will lead to peace, said a U.S. official familiar with the plan.

Wilder said that the emphasis on using military pressure to reach a political agreement made sense but that there is no guarantee it would work given the diverse objectives of key players in the war, such as the Taliban, the Afghan government, Pakistan, Iran and increasingly Russia.

Even backers of a more robust approach concede that the chances of a major peace deal to end the war are low.

“If we don’t achieve that, Plan B should be to prevent state collapse, which would also require additional military resources,” Wilder said.

https://www.washingtonpost.com/world/national-security/us-poised-to-expand-military-effort-against-taliban-in-afghanistan/2017/05/08/356c4930-33fa-11e7-b412-62beef8121f7_story.html?utm_term=.6129a27bc9db

The Pronk Pops Show Podcasts Portfolio

Listen To Pronk Pops Podcast or Download Shows 889

Listen To Pronk Pops Podcast or Download Shows 884-888

Listen To Pronk Pops Podcast or Download Shows 878-883

Listen To Pronk Pops Podcast or Download Shows 870-877

Listen To Pronk Pops Podcast or Download Shows 864-869

Listen To Pronk Pops Podcast or Download Shows 857-863

Listen To Pronk Pops Podcast or Download Shows 850-856

Listen To Pronk Pops Podcast or Download Shows 845-849

Listen To Pronk Pops Podcast or Download Shows 840-844

Listen To Pronk Pops Podcast or Download Shows 833-839

Listen To Pronk Pops Podcast or Download Shows 827-832

Listen To Pronk Pops Podcast or Download Shows 821-826

Listen To Pronk Pops Podcast or Download Shows 815-820

Listen To Pronk Pops Podcast or Download Shows 806-814

Listen To Pronk Pops Podcast or Download Shows 800-805

Listen To Pronk Pops Podcast or Download Shows 793-799

Listen To Pronk Pops Podcast or Download Shows 785-792

Listen To Pronk Pops Podcast or Download Shows 777-784

Listen To Pronk Pops Podcast or Download Shows 769-776

Listen To Pronk Pops Podcast or Download Shows 759-768

Listen To Pronk Pops Podcast or Download Shows 751-758

Listen To Pronk Pops Podcast or Download Shows 745-750

Listen To Pronk Pops Podcast or Download Shows 738-744

Listen To Pronk Pops Podcast or Download Shows 732-737

Listen To Pronk Pops Podcast or Download Shows 727-731

Listen To Pronk Pops Podcast or Download Shows 720-726

Listen To Pronk Pops Podcast or DownloadShows 713-719

Listen To Pronk Pops Podcast or DownloadShows 705-712

Listen To Pronk Pops Podcast or Download Shows 695-704

Listen To Pronk Pops Podcast or Download Shows 685-694

Listen To Pronk Pops Podcast or Download Shows 675-684

Listen To Pronk Pops Podcast or Download Shows 668-674

Listen To Pronk Pops Podcast or Download Shows 660-667

Listen To Pronk Pops Podcast or Download Shows 651-659

Listen To Pronk Pops Podcast or Download Shows 644-650

Listen To Pronk Pops Podcast or Download Shows 637-643

Listen To Pronk Pops Podcast or Download Shows 629-636

Listen To Pronk Pops Podcast or Download Shows 617-628

Listen To Pronk Pops Podcast or Download Shows 608-616

Listen To Pronk Pops Podcast or Download Shows 599-607

Listen To Pronk Pops Podcast or Download Shows 590-598

Listen To Pronk Pops Podcast or Download Shows 585- 589

Listen To Pronk Pops Podcast or Download Shows 575-584

Listen To Pronk Pops Podcast or Download Shows 565-574

Listen To Pronk Pops Podcast or Download Shows 556-564

Listen To Pronk Pops Podcast or Download Shows 546-555

Listen To Pronk Pops Podcast or Download Shows 538-545

Listen To Pronk Pops Podcast or Download Shows 532-537

Listen To Pronk Pops Podcast or Download Shows 526-531

Listen To Pronk Pops Podcast or Download Shows 519-525

Listen To Pronk Pops Podcast or Download Shows 510-518

Listen To Pronk Pops Podcast or Download Shows 500-509

Listen To Pronk Pops Podcast or Download Shows 490-499

Listen To Pronk Pops Podcast or Download Shows 480-489

Listen To Pronk Pops Podcast or Download Shows 473-479

Listen To Pronk Pops Podcast or Download Shows 464-472

Listen To Pronk Pops Podcast or Download Shows 455-463

Listen To Pronk Pops Podcast or Download Shows 447-454

Listen To Pronk Pops Podcast or Download Shows 439-446

Listen To Pronk Pops Podcast or Download Shows 431-438

Listen To Pronk Pops Podcast or Download Shows 422-430

Listen To Pronk Pops Podcast or Download Shows 414-421

Listen To Pronk Pops Podcast or Download Shows 408-413

Listen To Pronk Pops Podcast or Download Shows 400-407

Listen To Pronk Pops Podcast or Download Shows 391-399

Listen To Pronk Pops Podcast or Download Shows 383-390

Listen To Pronk Pops Podcast or Download Shows 376-382

Listen To Pronk Pops Podcast or Download Shows 369-375

Listen To Pronk Pops Podcast or Download Shows 360-368

Listen To Pronk Pops Podcast or Download Shows 354-359

Listen To Pronk Pops Podcast or Download Shows 346-353

Listen To Pronk Pops Podcast or Download Shows 338-345

Listen To Pronk Pops Podcast or Download Shows 328-337

Listen To Pronk Pops Podcast or Download Shows 319-327

Listen To Pronk Pops Podcast or Download Shows 307-318

Listen To Pronk Pops Podcast or Download Shows 296-306

Listen To Pronk Pops Podcast or Download Shows 287-295

Listen To Pronk Pops Podcast or Download Shows 277-286

Listen To Pronk Pops Podcast or Download Shows 264-276

Listen To Pronk Pops Podcast or Download Shows 250-263

Listen To Pronk Pops Podcast or Download Shows 236-249

Listen To Pronk Pops Podcast or Download Shows 222-235

Listen To Pronk Pops Podcast or Download Shows 211-221

Listen To Pronk Pops Podcast or Download Shows 202-210

Listen To Pronk Pops Podcast or Download Shows 194-201

Listen To Pronk Pops Podcast or Download Shows 184-193

Listen To Pronk Pops Podcast or Download Shows 174-183

Listen To Pronk Pops Podcast or Download Shows 165-173

Listen To Pronk Pops Podcast or Download Shows 158-164

Listen To Pronk Pops Podcast or Download Shows151-157

Listen To Pronk Pops Podcast or Download Shows 143-150

Listen To Pronk Pops Podcast or Download Shows 135-142

Listen To Pronk Pops Podcast or Download Shows 131-134

Listen To Pronk Pops Podcast or Download Shows 124-130

Listen To Pronk Pops Podcast or Download Shows 121-123

Listen To Pronk Pops Podcast or Download Shows 118-120

Listen To Pronk Pops Podcast or Download Shows 113 -117

Listen To Pronk Pops Podcast or Download Show 112

Listen To Pronk Pops Podcast or Download Shows 108-111

Listen To Pronk Pops Podcast or Download Shows 106-108

Listen To Pronk Pops Podcast or Download Shows 104-105

Listen To Pronk Pops Podcast or Download Shows 101-103

Listen To Pronk Pops Podcast or Download Shows 98-100

Listen To Pronk Pops Podcast or Download Shows 94-97

Listen To Pronk Pops Podcast or Download Show 93

Listen To Pronk Pops Podcast or Download Show 92

Listen To Pronk Pops Podcast or Download Show 91

Listen To Pronk Pops Podcast or Download Shows 88-90

Listen To Pronk Pops Podcast or Download Shows 84-87

Listen To Pronk Pops Podcast or Download Shows 79-83

Listen To Pronk Pops Podcast or Download Shows 74-78

Listen To Pronk Pops Podcast or Download Shows 71-73

Listen To Pronk Pops Podcast or Download Shows 68-70

Listen To Pronk Pops Podcast or Download Shows 65-67

Listen To Pronk Pops Podcast or Download Shows 62-64

Listen To Pronk Pops Podcast or Download Shows 58-61

Listen To Pronk Pops Podcast or Download Shows 55-57

Listen To Pronk Pops Podcast or Download Shows 52-54