Social Science

The Pronk Pops Show 914, June 19, 2017, Story 1: Otto Warmbier Died After Being Released From North Korea in A Coma — Videos — Story 2: Time For Strategic Patience Is Over — Take Out The Korean Dictator, Missiles, Nuclear Bomb Facilities, Artillery and Rocket Launchers In Range of South Korea — Regularly Planned and Scheduled War — Videos — Story 3: U.S. Navy F-18 Fighter Shoots Down Syrian SU -22 Fighter Over Raqqa, Syria After U.S. Allies On Ground Bombed– Russia Warns U.S. Planes Will Be Considered Targets — Videos — Story 4: Interventionist Foreign Policy of Progressive Democrats and Republicans (Neocons) Projecting Power of American Empire — No War Ever Declared Or American People Consulted — Videos

Posted on June 19, 2017. Filed under: American History, Blogroll, Breaking News, Communications, Congress, Constitutional Law, Countries, Crime, Culture, Defense Spending, Diet, Donald J. Trump, Donald J. Trump, Donald J. Trump, Donald Trump, Donald Trump, Education, Empires, Exercise, Food, Foreign Policy, Former President Barack Obama, Freedom of Speech, Government Spending, Health, Health Care, History, House of Representatives, Human, Human Behavior, Independence, Japan, Language, Law, Life, Lying, Media, Medicine, National Interest, News, North Korea, Obama, People, Philosophy, Photos, Politics, Polls, President Trump, Progressives, Raymond Thomas Pronk, Resources, Scandals, Security, Senate, Social Science, South Korea, Success, Taxation, Taxes, Terror, Terrorism, Unemployment, United States of America, Videos, War, Wealth, Wisdom | Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , |

Project_1

The Pronk Pops Show Podcasts

Pronk Pops Show 914,  June 19, 2017

Pronk Pops Show 913,  June 16, 2017

Pronk Pops Show 912,  June 15, 2017

Pronk Pops Show 911,  June 14, 2017

Pronk Pops Show 910,  June 13, 2017

Pronk Pops Show 909,  June 12, 2017

Pronk Pops Show 908,  June 9, 2017

Pronk Pops Show 907,  June 8, 2017

Pronk Pops Show 906,  June 7, 2017

Pronk Pops Show 905,  June 6, 2017

Pronk Pops Show 904,  June 5, 2017

Pronk Pops Show 903,  June 1, 2017

Pronk Pops Show 902,  May 31, 2017

Pronk Pops Show 901,  May 30, 2017

Pronk Pops Show 900,  May 25, 2017

Pronk Pops Show 899,  May 24, 2017

Pronk Pops Show 898,  May 23, 2017

Pronk Pops Show 897,  May 22, 2017

Pronk Pops Show 896,  May 18, 2017

Pronk Pops Show 895,  May 17, 2017

Pronk Pops Show 894,  May 16, 2017

Pronk Pops Show 893,  May 15, 2017

Pronk Pops Show 892,  May 12, 2017

Pronk Pops Show 891,  May 11, 2017

Pronk Pops Show 890,  May 10, 2017

Pronk Pops Show 889,  May 9, 2017

Pronk Pops Show 888,  May 8, 2017

Pronk Pops Show 887,  May 5, 2017

Pronk Pops Show 886,  May 4, 2017

Pronk Pops Show 885,  May 3, 2017

Pronk Pops Show 884,  May 1, 2017

Pronk Pops Show 883 April 28, 2017

Pronk Pops Show 882: April 27, 2017

Pronk Pops Show 881: April 26, 2017

Pronk Pops Show 880: April 25, 2017

Pronk Pops Show 879: April 24, 2017

Pronk Pops Show 878: April 21, 2017

Pronk Pops Show 877: April 20, 2017

Pronk Pops Show 876: April 19, 2017

Pronk Pops Show 875: April 18, 2017

Pronk Pops Show 874: April 17, 2017

Pronk Pops Show 873: April 13, 2017

Pronk Pops Show 872: April 12, 2017

Pronk Pops Show 871: April 11, 2017

Pronk Pops Show 870: April 10, 2017

Pronk Pops Show 869: April 7, 2017

Pronk Pops Show 868: April 6, 2017

Pronk Pops Show 867: April 5, 2017

Pronk Pops Show 866: April 3, 2017

Pronk Pops Show 865: March 31, 2017

Pronk Pops Show 864: March 30, 2017

Pronk Pops Show 863: March 29, 2017

Pronk Pops Show 862: March 28, 2017

Pronk Pops Show 861: March 27, 2017

Pronk Pops Show 860: March 24, 2017

Pronk Pops Show 859: March 23, 2017

Pronk Pops Show 858: March 22, 2017

Pronk Pops Show 857: March 21, 2017

Pronk Pops Show 856: March 20, 2017

Pronk Pops Show 855: March 10, 2017

Pronk Pops Show 854: March 9, 2017

Pronk Pops Show 853: March 8, 2017

Pronk Pops Show 852: March 6, 2017

Pronk Pops Show 851: March 3, 2017

Pronk Pops Show 850: March 2, 2017

Pronk Pops Show 849: March 1, 2017

Image result for otto warmbierImage result for map of war with north korea june 2017

Image result for map of syria and ISIS territory u.s. f-18 shots Russian SU-22 Image result for us navy fighter shot down syrian fighter june 18, 2017Image result for Russian SU-22Image result for russia warns us will shot down us planes

Story 1: Otto Warmbier Died After Being Released From North Korea in A Coma — Videos

GLOBALNEWS: North Korea Invites More Western Tourists To Visit Days After Sending One Home In A Coma

Trump administration weighs options after Warmbier death

Should the US retaliate against North Korea for the death of Otto Warmbier?

HOT NEWS: Lt. Col. Tony Shaffer Drops A BOMB And Reveals Real Reason Otto Warmbier Died- This is BIG

North Korea ‘murdered’ Otto Warmbier: Gen. Keane

Family announces Otto Warmbier has died

Otto Warmbier’s Dad Destroys Obama With 5 Words After Trump Brings His Son Home From N. Korea

Father of Otto Warmbier give a press conference and questions following the release of his son, now

‘North Korea Crossed the Line’ | Tucker Carlson Interviews Otto Warmbier’s Father

Doctors update public on Otto Warmbier’s health

North Korea releases American in a coma

Dr. Siegel: Very unlikely Otto Warmbier will ever wake up

Otto Warmbier, Just released from North Korea, Has Died! # 2

Otto Warmbier, American student held in North Korea, dead at 22, family says

American Doctors Examine Otto Warmbier – They JUST Found Something SHOCKING!

Man in vegetative state for 12 years wakes up to tell remarkable story || Full story

Vegetative State

NCBC: What is Persistent Vegetative State, or PVS?

What happened to Otto Warmbier?

The Truth About ‘Truth Serum’

MacGyver – Truth Serum

Otto Warmbier has died, hospital says

CINCINNATI — Otto Warmbier has died, University of Cincinnati Medical Center announced Monday.

Warmbier died at 2:20 p.m. Monday, days after he was released from captivity in North Korea.

In a statement, family members said Warmbier had been unable to speak, see or react to verbal commands since his return to Cincinnati June 13.

“He looked very uncomfortable – almost anguished,” family members said. “Although we would never hear his voice again, within a day the countenance of his face changed – he was at peace. He was home and we believe he could sense that.”

Family members thanked the hospital’s staff for the care they provided Warmbier but said ” the awful torturous mistreatment our son received at the hands of the North Koreans ensured that no other outcome was possible beyond the sad one we experienced today.”

“It would be easy at a moment like this to focus on all that we lost – future time that won’t be spent with a warm, engaging, brilliant young man whose curiosity and enthusiasm for life knew no bounds,” the family said. “But we choose to focus on the time we were given to be with this remarkable person. You can tell from the outpouring of emotion from the communities that he touched – Wyoming, Ohio and the University of Virginia to name just two – that the love for Otto went well beyond his immediate family.”

Check back for more on this breaking story.

Sodium thiopental

From Wikipedia, the free encyclopedia
Sodium thiopental
Sodium thiopental.svg
Sodium-thiopental-3D-vdW-2.png
Clinical data
AHFS/Drugs.com Monograph
Routes of
administration
Intravenous (most common), oral or rectal
ATC code
Legal status
Legal status
Pharmacokinetic data
Biological half-life 5.5[1]-26 hours[2]
Identifiers
CAS Number
  • 71-73-8 Yes (sodium salt)
    76-75-5 (free acid)
PubChem CID
DrugBank
ChemSpider
UNII
KEGG
ChEBI
ChEMBL
ECHA InfoCard 100.000.896
Chemical and physical data
Formula C11H17N2NaO2S
Molar mass 264.32 g/mol
3D model (Jmol)
Chirality Racemic mixture
 Yes (what is this?)  (verify)

Sodium thiopental, also known as Sodium Pentothal (a trademark of Abbott Laboratories, not to be confused with pentobarbital), thiopental, thiopentone, or Trapanal (also a trademark), is a rapid-onset short-acting barbiturate general anesthetic that is an analogue of thiobarbital. Sodium thiopental was a core medicine in the World Health Organization‘s “Essential Drugs List“, which is a list of minimum medical needs for a basic healthcare system, but was supplanted by propofol.[3] It was previously the first of three drugs administered during most lethal injections in the United States, but the U.S. manufacturer Hospira stopped manufacturing the drug and the EU banned the export of the drug for this purpose.[4]

Uses

Anesthesia

Sodium thiopental is an ultra-short-acting barbiturate and has been used commonly in the induction phase of general anesthesia. Its use has been largely replaced with that of propofol, but retains popularity as an induction agent for rapid sequence intubation and in obstetrics.[citation needed] Following intravenous injection, the drug rapidly reaches the brain and causes unconsciousness within 30–45 seconds. At one minute, the drug attains a peak concentration of about 60% of the total dose in the brain. Thereafter, the drug distributes to the rest of the body, and in about 5–10 minutes the concentration is low enough in the brain that consciousness returns.[citation needed]

A normal dose of sodium thiopental (usually 4–6 mg/kg) given to a pregnant woman for operative delivery (caesarian section) rapidly makes her unconscious, but the baby in her uterus remains conscious. However, larger or repeated doses can depress the baby.[5]

Sodium thiopental is not used to maintain anesthesia in surgical procedures because, in infusion, it displays zero-order elimination kinetics, leading to a long period before consciousness is regained. Instead, anesthesia is usually maintained with an inhaled anesthetic (gas) agent. Inhaled anesthetics are eliminated relatively quickly, so that stopping the inhaled anesthetic will allow rapid return of consciousness. Sodium thiopental would have to be given in large amounts to maintain an anesthetic plane, and because of its 11.5- to 26-hour half-life, consciousness would take a long time to return.[6]

In veterinary medicine, sodium thiopental is used to induce anesthesia in animals. Since it is redistributed to fat, certain lean breeds of dogs such as sight hounds will have prolonged recoveries from sodium thiopental due to their lack of body fat and their lean body mass. Conversely, obese animals will have rapid recoveries, but it will be some time[vague] before it is entirely removed (metabolized) from their bodies. Sodium thiopental is always administered intravenously, as it can be fairly irritating; severe tissue necrosis and sloughing can occur if it is injected incorrectly into the tissue around a vein.[citation needed]

Sodium thiopental decreases the cardiac stroke volume, which results in a decrease in cardiac output. The decrease in cardiac output occurs in conjunction with a decrease in systemic vascular resistance, which results in hypotension. However, in comparison with propofol, the reflex tachycardia seen during states of hypotension is relatively spared (a bradycardia is common after administration of propofol) and therefore the observed fall in blood pressure is generally less severe.

Medically induced coma

In addition to anesthesia induction, sodium thiopental was historically used to induce medical comas.[7] It has now been superseded by drugs such as propofol because their effects wear off more quickly than thiopental. Patients with brain swelling, causing elevation of intracranial pressure, either secondary to trauma or following surgery, may benefit from this drug. Sodium thiopental, and the barbiturate class of drugs, decrease neuronal activity and therefore decrease the production of osmotically active metabolites, which in turn decreases swelling. Patients with significant swelling have improved outcomes following the induction of coma. Reportedly, thiopental has been shown to be superior to pentobarbital in reducing intracranial pressure.[8] This phenomenon is also called a reverse steal effect.[citation needed]

Status epilepticus

In refractory status epilepticus, thiopental may be used to terminate a seizure.

Euthanasia

Sodium thiopental is used intravenously for the purposes of euthanasia. In both Belgium and the Netherlands, where active euthanasia is allowed by law, the standard protocol recommends sodium thiopental as the ideal agent to induce coma, followed by pancuronium bromide.[9]

Intravenous administration is the most reliable and rapid way to accomplish euthanasia. A coma is first induced by intravenous administration of 20 mg/kg thiopental sodium (Nesdonal) in a small volume (10 ml physiological saline). Then, a triple dose of a non-depolarizing neuromuscular blocking drug is given, such as 20 mg pancuronium bromide (Pavulon) or 20 mg vecuronium bromide (Norcuron). The muscle relaxant should be given intravenously to ensure optimal availability but pancuronium bromide may be administered intramuscularly at an increased dosage level of 40 mg.[9]

Lethal injection

Along with pancuronium bromide and potassium chloride, thiopental is used in 34 states of the U.S. to execute prisoners by lethal injection. A very large dose is given to ensure rapid loss of consciousness. Although death usually occurs within ten minutes of the beginning of the injection process, some have been known to take longer.[10] The use of sodium thiopental in execution protocols was challenged in court after a study in the medical journal The Lancet reported autopsies of executed inmates showed the level of thiopental in their bloodstream was insufficient to cause unconsciousness.

On December 8, 2009, the State of Ohio became the first to use a single dose of sodium thiopental for its capital execution, following the failed use of the standard three-drug cocktail during a recent execution, due to inability to locate suitable veins. Kenneth Biros was executed using the single-drug method.[11]

The state of Washington is now the second state in the U.S. to use the single-dose sodium thiopental injections for death penalty executions. On September 10, 2010, Cal Coburn Brown was executed. This was the first execution in the state to use a single dose, single drug injection. His death was pronounced approximately one and a half minutes after the intravenous administration of five grams of the drug.[12]

After its use for execution of Jeffrey Landrigan in the U.S., the UK introduced a ban on the export of sodium thiopental in December 2010,[13] after it was established that no European supplies to the U.S. were being used for any other purpose.[14] The restrictions were based on “the European Union Torture Regulation (including licensing of drugs used in execution by lethal injection)”.[15] From 21 December 2011 the European Union extended trade restrictions to prevent the export of certain medicinal products for capital punishment, stating that “the Union disapproves of capital punishment in all circumstances and works towards its universal abolition”.[16]

Truth serum

Thiopental (Pentothal) is still used in some places as a truth serum to weaken the resolve of a subject and make them more compliant to pressure.[17] The barbiturates as a class decrease higher cortical brain functioning. Some psychiatrists hypothesize that because lying is more complex than telling the truth, suppression of the higher cortical functions may lead to the uncovering of the truth. The drug tends to make subjects loquacious and cooperative with interrogators; however, the reliability of confessions made under thiopental is questionable.[18] “Sodium pentathol” as a truth serum has become a trope in films, comics and literature, and even appears in popular music.[19]

Psychiatry

Psychiatrists have used thiopental to desensitize patients with phobias,[20] and to “facilitate the recall of painful repressed memories.”[21] One psychiatrist who worked with thiopental is the Dutch Professor Jan Bastiaans, who used this procedure to help relieve trauma in surviving victims of the Holocaust.[22]

Mechanism of action

Sodium thiopental is a member of the barbiturate class of drugs, which are relatively non-selective compounds that bind to an entire superfamily of ligand-gated ion channels, of which the GABAA receptor channel is one of several representatives. This superfamily of ion channels includes the neuronal nAChR channel, the 5HT3R channel, the GlyR channel and others. Surprisingly, while GABAA receptor currents are increased by barbiturates (and other general anesthetics), ligand-gated ion channels that are predominantly permeable for cationic ions are blocked by these compounds. For example, neuronal nAChR channels are blocked by clinically relevant anesthetic concentrations of both sodium thiopental and pentobarbital.[23] Such findings implicate (non-GABA-ergic) ligand-gated ion channels, e.g. the neuronal nAChR channel, in mediating some of the (side) effects of barbiturates.[24]The GABAA receptor is an inhibitory channel that decreases neuronal activity, and barbiturates enhance the inhibitory action of the GABAA receptor.[25]

Controversies

Following a shortage that led a court to delay an execution in California, a company spokesman for Hospira, the sole American manufacturer of the drug, objected to the use of thiopental in lethal injection. “Hospira manufactures this product because it improves or saves lives, and the company markets it solely for use as indicated on the product labeling. The drug is not indicated for capital punishment and Hospira does not support its use in this procedure.”[26] On January 21, 2011, the company announced that it would stop production of sodium thiopental from its plant in Italy because Italian authorities couldn’t guarantee that exported quantities of the drug would not be used in executions. Italy was the only viable place where the company could produce sodium thiopental, leaving the United States without a supplier.[27]

Metabolism

Thiopental rapidly and easily crosses the blood brain barrier as it is a lipophilic molecule. As with all lipid-soluble anaesthetic drugs, the short duration of action of sodium thiopental is due almost entirely to its redistribution away from central circulation towards muscle and fat tissue, due to its very high fat:water partition coefficient (aprx 10), leading to sequestration in fat tissue. Once redistributed, the free fraction in the blood is metabolized in the liver. Sodium thiopental is mainly metabolized to pentobarbital,[28] 5-ethyl-5-(1′-methyl-3′-hydroxybutyl)-2-thiobarbituric acid, and 5-ethyl-5-(1′-methyl-3′-carboxypropyl)-2-thiobarbituric acid.[29]

Dosage

The usual dose range for induction of anesthesia using thiopental is from 3 to 6 mg/kg; however, there are many factors that can alter this. Premedication with sedatives such as benzodiazepines or clonidine will reduce requirements, as do specific disease states and other patient factors. Among patient factors are: age, sex, and lean body mass. Specific disease conditions that can alter the dose requirements of thiopentone and for that matter any other intravenous anaesthetic are: hypovolemia, burns, azotemia, hepatic failure, hypoproteinemia, etc.[citation needed]

Side effects

As with nearly all anesthetic drugs, thiopental causes cardiovascular and respiratory depression resulting in hypotension, apnea and airway obstruction. For these reasons, only suitably trained medical personnel should give thiopental in an environment suitably equipped to deal with these effects. Side effects include headache, agitated emergence, prolonged somnolence, and nausea. Intravenous administration of sodium thiopental is followed instantly by an odor and/or taste sensation, sometimes described as being similar to rotting onions, or to garlic. The hangover from the side effects may last up to 36 hours.

Although individual molecules of thiopental contain one sulfur atom, it is not a sulfonamide, and does not show allergic reactions of sulfa/sulpha drugs.

Contraindications

Thiopental should be used with caution in cases of liver disease, Addison’s disease, myxedema, severe heart disease, severe hypotension, a severe breathing disorder, or a family history of porphyria.[30][31]

Co-administration of pentoxifylline and thiopental causes death by acute pulmonary edema in rats. This pulmonary edema was not mediated by cardiac failure or by pulmonary hypertension but was due to increased pulmonary vascular permeability.[32]

History

Sodium thiopental was discovered in the early 1930s by Ernest H. Volwiler and Donalee L. Tabern, working for Abbott Laboratories. It was first used in human beings on March 8, 1934, by Dr. Ralph M. Waters[33] in an investigation of its properties, which were short-term anesthesia and surprisingly little analgesia.[34] Three months later,[35] Dr. John S. Lundy started a clinical trial of thiopental at the Mayo Clinic at the request of Abbott.[36]Abbott continued to make the drug until 2004, when it spun off its hospital-products division as Hospira.

Thiopental is famously associated with a number of anesthetic deaths in victims of the attack on Pearl Harbor. These deaths, relatively soon after the drug’s introduction, were said to be due to excessive doses given to shocked trauma patients. However, recent evidence available through freedom of information legislation was reviewed in the British Journal of Anaesthesia,[37] which has suggested that this story was grossly exaggerated. Of the 344 wounded that were admitted to the Tripler Army Hospital only 13 did not survive and it is unlikely that thiopentone overdose was responsible for more than a few of these.

Thiopental is still rarely used as a recreational drug, usually stolen from veterinarians or other legitimate users of the drug; however, more common sedatives such as benzodiazepines are usually preferred as recreational drugs, and abuse of thiopental tends to be uncommon and opportunistic.[citation needed]

See also

https://en.wikipedia.org/wiki/Sodium_thiopental

Story 2: Time For Strategic Patience Is Over — Take Out The Korean Dictator, Missiles, Nuclear Bomb Facilities, Artillery and Rocket Launchers In Range of South Korea — Regularly Planned and Scheduled War — Videos

FRIEDMAN: US Attack on North Korea is Imminent

Crisis & Chaos: Are We Moving Toward World War III?

Inside North Korea’s Special Forces: The North Korea Nightmare

[News – Live] ‘China must be prepared to TOPPLE Kim Jong-un or WE’LL do it’, former US chief claim

A North Korean Mystery: Where Did Its Rockets and Missiles Come From?

‘North Korea would Lose in Nuclear War with USA’ Chief of Staff

HORRIFIC WAR WITH NORTH KOREA IS IMMANENT

WHY U.S IS NOT USING MILITARY OPTION AGAINST NORTH KOREA?

US ATTACK ON NORTH KOREA IS IMMINENT

U.S. defense secretary Mattis says war with North Korea would be “catastrophic”

WHY RUSSIA & CHINA SHOULD FEAR USS GERALD R. FORD? TOP 5 DEFINITIVE REASONS

Special: Attack Weapons on USS Ford Carrier

North Korea: 4th US Aircraft Carrier Joining the 3 Carriers Already in War Zone!

Show of Force: The US Deploys Third Aircraft Carrier to North Korea

Can North Korea Sink a US Aircraft Carrier? Analysis

Russia & China Warn USA: DO NOT use military force against N.Korea-China warns WW3 inevitable!

USA & Japan & South Korea VS Russia & China & North Korea Military Power Comparison 2017 – 2018

WHY U.S. WILL NEVER ATTACK NORTH KOREA?

Who Are North Korea’s Allies?

Why Did America Fight the Korean War?

Why Korea Split Into North and South Korea

Russia warning after US shoots down Syrian jet

The Breathtaking Incoherence of American Foreign Policy as to North Korea and Syria

Story 3: U.S. Navy F-18 Fighter Shoots Down Syrian SU -22 Fighter Over Raqqa, Syria After U.S. Allies On Ground Bombed– Russia Warns U.S. Planes Will Be Considered Targets — Videos

RED ALERT! U.S. Army Chief Threatens War With Russia – china and North Korea

US Navy fighter jet shoots down Syrian warplane

US Navy Fighter shoots down Syrian Warplane over Syria

NEWS ALERT – Syrian warplane shot down by US-led coalition

Russia Vows to Shoot Down Any Aircraft West of Euphrates River

U.S. Warplane Shoots Down Syrian Army Jet, Russia Threatens to Target U.S. Aircraft

Bombshell ‘Army Readiness is at 30% ‘U.S. Army Chief of Staff

‘Extremely Lethal and Fast’ Army Warns Future War with Russia/China

US Shoots Down Syrian Jet, Russia Threatens to Track and Attack Anything West of Euphrates

Russia to treat US jets in Syria as ‘targets’ after America guns down first regime warplane

Communication channel between Washington and Moscow to be suspended immediately

Russia has said it will treat US warplanes operating in parts of Syria where its air forces are also present as “targets” amid a diplomatic row caused by the downing of a Syrian jet.

The country’s defence ministry said it would track US-led coalition aircraft with missile systems and military aircraft, but stopped short of saying it would shoot them down.

A hotline set up between Russia and the US to prevent mid-air collisions will also be suspended.

“All kinds of airborne vehicles, including aircraft and UAVs of the international coalition detected to the west of the Euphrates River will be tracked by the Russian SAM systems as air targets,” the Russian Defence Ministry said in a statement.

The warning comes after a US F-18 Super Hornet shot down a Syrian army SU-22 jet on Sunday in the countryside southwest of Raqqa – the first such downing of a Syrian jet by the US since the start of the country’s civil war in 2011.

Washington said the jet had dropped bombs near US-backed forces but Damascus said the plane was downed while flying a mission against Isis militants.

Russia’s defence ministry said the suspension of its communication line with the Americans would begin immediately.

The US did not use its hotline with Russia ahead of the downing of the Syrian government warplane, said the ministry, which accused the US of a “deliberate failure to make good on its commitments” under the deconfliction deal.

“The shooting down of a Syrian Air Force jet in Syria’s airspace is a cynical violation of Syria’s sovereignty,” the ministry said.

“The US’ repeated combat operations under the guise of ‘combating terrorism’ against the legitimate armed forces of a UN member-country are a flagrant violation of international law and an actual military aggression against the Syrian Arab Republic.”

Theresa May appealed to Russia to continue the use of “deconfliction” measures over the skies of Syria to reduce the risk of misunderstandings in what is a crowded airspace.

Russia, which has been providing air cover for Syria’s President, Bashar al-Assad, since 2015, has an agreement with the US aimed at preventing incidents involving either country’s warplanes engaged in operations in Syria.

Downing the jet was akin to “helping the terrorists that the US is fighting against”, Sergei Ryabkov, Russia’s deputy foreign minister, said.

A statement released by US Central Command on Sunday said the Syrian jet was “immediately shot down… in accordance with rules of engagement and in collective self-defence of Coalition partnered forces”.

“The Coalition’s mission is to defeat Isis in Iraq and Syria. The Coalition does not seek to fight Syrian regime, Russian, or pro-regime forces partnered with them, but will not hesitate to defend Coalition or partner forces from any threat,” it added.

“The Coalition presence in Syria addresses the imminent threat Isis in Syria poses globally. The demonstrated hostile intent and actions of pro-regime forces toward Coalition and partner forces in Syria conducting legitimate counter-Isis operations will not be tolerated.”

Tensions rise in Syria as Russia, Iran send US warnings

By BASSEM MROUE and NATALIYA VASILYEVA, Associated PressTHE ASSOCIATED PRESS STATEMENT OF NEWS VALUES AND PRINCIPLES

(AP) — Russia on Monday threatened aircraft from the U.S.-led coalition in Syrian-controlled airspace and suspended a hotline intended to avoid collisions in retaliation for the U.S. military shooting down a Syrian warplane.

The U.S. said it had downed the Syrian jet a day earlier after it dropped bombs near the U.S.-backed Syrian Democratic Forces conducting operations against the Islamic State group, adding that was something it would not tolerate.

The downing of the warplane — the first time in the six-year conflict that the U.S. has shot down a Syrian jet — came amid another first: Iran fired several ballistic missiles Sunday night at IS positions in eastern Syria in what it said was a message to archrival Saudi Arabia and the United States.

The developments added to already-soaring regional tensions and reflect the intensifying rivalry among the major players in Syria’s civil war that could spiral out of control just as the fight against the Islamic State group in its stronghold of Raqqa is gaining ground.

Russia, a key ally of Syrian President Bashar Assad, called on the U.S. military to provide a full accounting as to why it decided to shoot down the Syrian Su-22 bomber.

The U.S. military confirmed that one of its F-18 Super Hornets shot down a Syrian jet that had dropped bombs near the U.S. partner forces SDF. Those forces, which are aligned with the U.S. in the campaign against the Islamic State group, warned Syrian government troops to stop their attacks or face retaliation.

The Russian Defense Ministry said in a statement that as of Monday, all coalition jets and drones flying west of the Euphrates River will be tracked as potential targets.

Areas of northern Syria west of the Euphrates were controlled by IS before Syrian government forces captured most of them in recent months. The Russians, who have been providing air cover for Assad’s forces since 2015, appear to want to avoid further U.S. targeting of Syrian warplanes or ground troops that have come under U.S. attack in eastern Syria recently.

It was the second time Russia suspended a hotline intended to minimize incidents with the U.S. in Syrian airspace. In April, Russia briefly suspended cooperation after the U.S. military fired 59 missiles at a Syrian air base following a chemical weapons attack that Washington blamed on the Assad government.

Gen. Joseph Dunford, chairman of the Joint Chiefs of Staff, said Washington is working to re-establish communications aimed at avoiding mishaps involving U.S. and Russian air operations in Syria.

Speaking in Washington, the top U.S. military officer said the two sides were in delicate discussions to lower tensions.

“The worst thing any of us could do right now is address this with hyperbole,” Dunford said.

Viktor Ozerov, chairman of the defense and security committee at the upper chamber of Russian parliament, described his Defense Ministry’s statement as a warning.

“I’m sure that because of this, neither the U.S. nor anyone else will take any actions to threaten our aircraft,” he told the state-owned RIA Novosti news agency. “That’s why there’s no threat of direct confrontation between Russia and American aircraft.”

Ozerov insisted that Russia will be tracking the coalition’s jets, not shooting them down, but he added that “a threat for those jets may appear only if they take action that pose a threat to Russian aircraft.”

Iran said the missile strike by its powerful Revolutionary Guard hit Syria’s eastern city of Deir el-Zour on Sunday night and was in retaliation for two attacks in Tehran earlier this month that killed 17 people and were claimed by the Islamic State group.

It appeared to be Iran’s first missile attack abroad in over 15 years and its first in the Syrian conflict, in which it has provided crucial support to Assad. The muscle-flexing comes amid the worsening of a long-running feud between Shiite powerhouse Iran and Saudi Arabia, with supports Syrian rebels and has led recent efforts to isolate the Gulf nation of Qatar.

“The Saudis and Americans are especially receivers of this message,” Gen. Ramazan Sharif of the Revolutionary Guard told Iranian state TV in an interview.

It also raised questions about how U.S. President Donald Trump’s administration, which had previously put Iran “on notice” for its ballistic missile tests, will respond. Israel also is concerned about Iran’s missiles and has deployed a multilayered missile-defense system.

The missile attack came amid recent confrontations in Syria between U.S.-backed forces and Iranian-backed pro-government factions. The U.S. recently deployed a truck-mounted missile system in Syria as Iranian-backed forces cut off the advance of the U.S.-supported rebels along the Iraqi border.

Iranian officials threatened more strikes. Former Guard chief Gen. Mohsen Rezai wrote on Twitter: “The bigger slap is yet to come.”

U.S.-backed opposition fighters said Assad’s forces have been attacking them in the northern province of Raqqa and warned that if such attacks continue, the fighters will take action.

Clashes between Syrian troops and the SDF would escalate tensions and open a new front line in the many complex battlefields of the civil war, now in its seventh year. Clashes between the Kurdish-led SDF and Syrian forces have been rare and some rebel groups have even accused them of coordinating on the battlefield.

Both sides are battling the Islamic State group, with SDF fighters focusing on their march into the northern city of Raqqa, which the extremist group has declared to be its capital.

Syrian government forces have also been attacking IS in northern, central and southern parts of the country, seizing 25,000 square kilometers (9,600 square miles) and reaching the Iraqi border for the first time in years.

SDF spokesman Talal Sillo said the government wants to thwart the SDF offensive to capture Raqqa. He said government forces began attacking the SDF on Saturday, using warplanes, artillery and tanks in areas that SDF had liberated from IS.

Sillo also warned that if “the regime continues in its offensive against our positions in Raqqa province, this will force us to retaliate with force.”

The Britain-based Syrian Observatory for Human Rights, which tracks Syria’s war, said government forces expanded their presence in Raqqa province by capturing from IS the town of Rasafa.

___

Vasilyeva reported from Moscow. Associated Press writers Nasser Karimi in Tehran and Jon Gambrell in Dubai, United Arab Emirates, contributed.

http://hosted2.ap.org/APDefault/*/Article_2017-06-19-Syria/id-371357b2c20e4aaa982d07da071a7f7a

Story 4: Interventionist Foreign Policy of Progressive Democrats and Republicans (Neocons) Projecting Power of American Empire — No War Ever Declared Or American People Consulted — Videos

Ron Paul – Neo-CONNED!

Should America be the World’s Policeman?

Ron Paul Americans Are Forced to Pay for U S Government’s Interventionist Foreign Policy

Outline of US foreign interventions

CIA Covert Operations and U.S. Interventions Since World War II Full documentary

Overthrowing Governments 101, CIA Coups

Ron Paul explains he’s not an Isolationist

The Middle East Problem

The Pronk Pops Show Podcasts Portfolio

Listen To Pronk Pops Podcast or Download Shows 906-914

Listen To Pronk Pops Podcast or Download Shows 889-896

Listen To Pronk Pops Podcast or Download Shows 884-888

Listen To Pronk Pops Podcast or Download Shows 878-883

Listen To Pronk Pops Podcast or Download Shows 870-877

Listen To Pronk Pops Podcast or Download Shows 864-869

Listen To Pronk Pops Podcast or Download Shows 857-863

Listen To Pronk Pops Podcast or Download Shows 850-856

Listen To Pronk Pops Podcast or Download Shows 845-849

Listen To Pronk Pops Podcast or Download Shows 840-844

Listen To Pronk Pops Podcast or Download Shows 833-839

Listen To Pronk Pops Podcast or Download Shows 827-832

Listen To Pronk Pops Podcast or Download Shows 821-826

Listen To Pronk Pops Podcast or Download Shows 815-820

Listen To Pronk Pops Podcast or Download Shows 806-814

Listen To Pronk Pops Podcast or Download Shows 800-805

Listen To Pronk Pops Podcast or Download Shows 793-799

Listen To Pronk Pops Podcast or Download Shows 785-792

Listen To Pronk Pops Podcast or Download Shows 777-784

Listen To Pronk Pops Podcast or Download Shows 769-776

Listen To Pronk Pops Podcast or Download Shows 759-768

Listen To Pronk Pops Podcast or Download Shows 751-758

Listen To Pronk Pops Podcast or Download Shows 745-750

Listen To Pronk Pops Podcast or Download Shows 738-744

Listen To Pronk Pops Podcast or Download Shows 732-737

Listen To Pronk Pops Podcast or Download Shows 727-731

Listen To Pronk Pops Podcast or Download Shows 720-726

Listen To Pronk Pops Podcast or DownloadShows 713-719

Listen To Pronk Pops Podcast or DownloadShows 705-712

Listen To Pronk Pops Podcast or Download Shows 695-704

Listen To Pronk Pops Podcast or Download Shows 685-694

Listen To Pronk Pops Podcast or Download Shows 675-684

Listen To Pronk Pops Podcast or Download Shows 668-674

Listen To Pronk Pops Podcast or Download Shows 660-667

Listen To Pronk Pops Podcast or Download Shows 651-659

Listen To Pronk Pops Podcast or Download Shows 644-650

Listen To Pronk Pops Podcast or Download Shows 637-643

Listen To Pronk Pops Podcast or Download Shows 629-636

Listen To Pronk Pops Podcast or Download Shows 617-628

Listen To Pronk Pops Podcast or Download Shows 608-616

Listen To Pronk Pops Podcast or Download Shows 599-607

Listen To Pronk Pops Podcast or Download Shows 590-598

Listen To Pronk Pops Podcast or Download Shows 585- 589

Listen To Pronk Pops Podcast or Download Shows 575-584

Listen To Pronk Pops Podcast or Download Shows 565-574

Listen To Pronk Pops Podcast or Download Shows 556-564

Listen To Pronk Pops Podcast or Download Shows 546-555

Listen To Pronk Pops Podcast or Download Shows 538-545

Listen To Pronk Pops Podcast or Download Shows 532-537

Listen To Pronk Pops Podcast or Download Shows 526-531

Listen To Pronk Pops Podcast or Download Shows 519-525

Listen To Pronk Pops Podcast or Download Shows 510-518

Listen To Pronk Pops Podcast or Download Shows 500-509

Listen To Pronk Pops Podcast or Download Shows 490-499

Listen To Pronk Pops Podcast or Download Shows 480-489

Listen To Pronk Pops Podcast or Download Shows 473-479

Listen To Pronk Pops Podcast or Download Shows 464-472

Listen To Pronk Pops Podcast or Download Shows 455-463

Listen To Pronk Pops Podcast or Download Shows 447-454

Listen To Pronk Pops Podcast or Download Shows 439-446

Listen To Pronk Pops Podcast or Download Shows 431-438

Listen To Pronk Pops Podcast or Download Shows 422-430

Listen To Pronk Pops Podcast or Download Shows 414-421

Listen To Pronk Pops Podcast or Download Shows 408-413

Listen To Pronk Pops Podcast or Download Shows 400-407

Listen To Pronk Pops Podcast or Download Shows 391-399

Listen To Pronk Pops Podcast or Download Shows 383-390

Listen To Pronk Pops Podcast or Download Shows 376-382

Listen To Pronk Pops Podcast or Download Shows 369-375

Listen To Pronk Pops Podcast or Download Shows 360-368

Listen To Pronk Pops Podcast or Download Shows 354-359

Listen To Pronk Pops Podcast or Download Shows 346-353

Listen To Pronk Pops Podcast or Download Shows 338-345

Listen To Pronk Pops Podcast or Download Shows 328-337

Listen To Pronk Pops Podcast or Download Shows 319-327

Listen To Pronk Pops Podcast or Download Shows 307-318

Listen To Pronk Pops Podcast or Download Shows 296-306

Listen To Pronk Pops Podcast or Download Shows 287-295

Listen To Pronk Pops Podcast or Download Shows 277-286

Listen To Pronk Pops Podcast or Download Shows 264-276

Listen To Pronk Pops Podcast or Download Shows 250-263

Listen To Pronk Pops Podcast or Download Shows 236-249

Listen To Pronk Pops Podcast or Download Shows 222-235

Listen To Pronk Pops Podcast or Download Shows 211-221

Listen To Pronk Pops Podcast or Download Shows 202-210

Listen To Pronk Pops Podcast or Download Shows 194-201

Listen To Pronk Pops Podcast or Download Shows 184-193

Listen To Pronk Pops Podcast or Download Shows 174-183

Listen To Pronk Pops Podcast or Download Shows 165-173

Listen To Pronk Pops Podcast or Download Shows 158-164

Listen To Pronk Pops Podcast or Download Shows151-157

Listen To Pronk Pops Podcast or Download Shows 143-150

Listen To Pronk Pops Podcast or Download Shows 135-142

Listen To Pronk Pops Podcast or Download Shows 131-134

Listen To Pronk Pops Podcast or Download Shows 124-130

Listen To Pronk Pops Podcast or Download Shows 121-123

Listen To Pronk Pops Podcast or Download Shows 118-120

Listen To Pronk Pops Podcast or Download Shows 113 -117

Listen To Pronk Pops Podcast or Download Show 112

Listen To Pronk Pops Podcast or Download Shows 108-111

Listen To Pronk Pops Podcast or Download Shows 106-108

Listen To Pronk Pops Podcast or Download Shows 104-105

Listen To Pronk Pops Podcast or Download Shows 101-103

Listen To Pronk Pops Podcast or Download Shows 98-100

Listen To Pronk Pops Podcast or Download Shows 94-97

Listen To Pronk Pops Podcast or Download Show 93

Listen To Pronk Pops Podcast or Download Show 92

Listen To Pronk Pops Podcast or Download Show 91

Listen To Pronk Pops Podcast or Download Shows 88-90

Listen To Pronk Pops Podcast or Download Shows 84-87

Listen To Pronk Pops Podcast or Download Shows 79-83

Listen To Pronk Pops Podcast or Download Shows 74-78

Listen To Pronk Pops Podcast or Download Shows 71-73

Listen To Pronk Pops Podcast or Download Shows 68-70

Listen To Pronk Pops Podcast or Download Shows 65-67

Listen To Pronk Pops Podcast or Download Shows 62-64

Listen To Pronk Pops Podcast or Download Shows 58-61

Listen To Pronk Pops Podcast or Download Shows 55-57

Listen To Pronk Pops Podcast or Download Shows 52-54

Listen To Pronk Pops Podcast or Download Shows 49-51

Listen To Pronk Pops Podcast or Download Shows 45-48

Listen To Pronk Pops Podcast or Download Shows 41-44

Listen To Pronk Pops Podcast or Download Shows 38-40

Listen To Pronk Pops Podcast or Download Shows 34-37

Listen To Pronk Pops Podcast or Download Shows 30-33

Listen To Pronk Pops Podcast or Download Shows 27-29

Listen To Pronk Pops Podcast or Download Shows 17-26

Listen To Pronk Pops Podcast or Download Shows 16-22

Listen To Pronk Pops Podcast or Download Shows 10-15

Listen To Pronk Pops Podcast or Download Shows 1-9

Read Full Post | Make a Comment ( None so far )

The Pronk Pops Show 893, May 15, 2017, Story 1: World Wide Ransom Ware Demands Spreading To Over 150 Countries — Huge Hacker Holdup Using Exploit of Security Flaw In Microsoft XP Operating System — Used Code Developed By U.S. National Security Agency (NSA) — Running Sacred — Crying — It’s Over — Videos — Story 2: American People Demand Congress Appoint Special Prosecutor — Investigate Obama’s Administration Use of Intelligence Community (NSA, CIA, FBI, …) Warrantless Surveillance of Both Democrat and Republican Presidential Candidates — The Use Intelligence Information For Political Purposes Is A Felony! — Videos

Posted on May 15, 2017. Filed under: American History, Applications, Blogroll, Breaking News, Computer, Computers, Corruption, Crime, Donald J. Trump, Donald Trump, Hardware, History, Human, Law, Life, Media, Networking, Privacy, Raymond Thomas Pronk, Science, Security, Servers, Social Science, Software, Wealth, Wisdom | Tags: , , , , , , |

Project_1

The Pronk Pops Show Podcasts

Pronk Pops Show 893,  May 15, 2017

Pronk Pops Show 892,  May 12, 2017

Pronk Pops Show 891,  May 11, 2017

Pronk Pops Show 891,  May 11, 2017

Pronk Pops Show 890,  May 10, 2017

Pronk Pops Show 889,  May 9, 2017

Pronk Pops Show 888,  May 8, 2017

Pronk Pops Show 887,  May 5, 2017

Pronk Pops Show 886,  May 4, 2017

Pronk Pops Show 885,  May 3, 2017

Pronk Pops Show 884,  May 1, 2017

Pronk Pops Show 883 April 28, 2017

Pronk Pops Show 882: April 27, 2017

Pronk Pops Show 881: April 26, 2017

Pronk Pops Show 880: April 25, 2017

Pronk Pops Show 879: April 24, 2017

Pronk Pops Show 878: April 21, 2017

Pronk Pops Show 877: April 20, 2017

Pronk Pops Show 876: April 19, 2017

Pronk Pops Show 875: April 18, 2017

Pronk Pops Show 874: April 17, 2017

Pronk Pops Show 873: April 13, 2017

Pronk Pops Show 872: April 12, 2017

Pronk Pops Show 871: April 11, 2017

Pronk Pops Show 870: April 10, 2017

Pronk Pops Show 869: April 7, 2017

Pronk Pops Show 868: April 6, 2017

Pronk Pops Show 867: April 5, 2017

Pronk Pops Show 866: April 3, 2017

Pronk Pops Show 865: March 31, 2017

Pronk Pops Show 864: March 30, 2017

Pronk Pops Show 863: March 29, 2017

Pronk Pops Show 862: March 28, 2017

Pronk Pops Show 861: March 27, 2017

Pronk Pops Show 860: March 24, 2017

Pronk Pops Show 859: March 23, 2017

Pronk Pops Show 858: March 22, 2017

Pronk Pops Show 857: March 21, 2017

Pronk Pops Show 856: March 20, 2017

Pronk Pops Show 855: March 10, 2017

Pronk Pops Show 854: March 9, 2017

Pronk Pops Show 853: March 8, 2017

Pronk Pops Show 852: March 6, 2017

Pronk Pops Show 851: March 3, 2017

Pronk Pops Show 850: March 2, 2017

Pronk Pops Show 849: March 1, 2017

Pronk Pops Show 848: February 28, 2017

Pronk Pops Show 847: February 27, 2017

Pronk Pops Show 846: February 24, 2017

Pronk Pops Show 845: February 23, 2017

Pronk Pops Show 844: February 22, 2017

Pronk Pops Show 843: February 21, 2017

Pronk Pops Show 842: February 20, 2017

Pronk Pops Show 841: February 17, 2017

Pronk Pops Show 840: February 16, 2017

Pronk Pops Show 839: February 15, 2017

Pronk Pops Show 838: February 14, 2017

Pronk Pops Show 837: February 13, 2017

Pronk Pops Show 836: February 10, 2017

Pronk Pops Show 835: February 9, 2017

Pronk Pops Show 834: February 8, 2017

Pronk Pops Show 833: February 7, 2017

Pronk Pops Show 832: February 6, 2017

Pronk Pops Show 831: February 3, 2017

Pronk Pops Show 830: February 2, 2017

Pronk Pops Show 829: February 1, 2017

Image result for cartoons ransom ware attack

Image result for obamagate surveillance of presidential candidates susan rice

Image result for cartoons branco susan rice trump

 

Story 1: Huge Hacker Holdup — Cyber extortion Attack — NSA Ransom War — Running Sacred — Crying — It’s Over — VideosImage result for ransome ware attackImage result for bitcoinImage result for cartoons ransom ware attackImage result for ransome ware attack list of countries and companies

Image result for ransome ware attack list of countries and companies
Image result for ransome ware attack list of countries and companies
Image result for ransome ware attack list of countries and companiesImage result for ransome ware attack list of countries and companies

 

 

Image result for cartoons ransom ware attack

Image result for cartoons ransom ware attack

Image result for 12 May 2017 ransome ware attack list of countries and companies

 New version of ransomware worm expected

Cyber Attack: Ransomware causing chaos globally – BBC News

Ransomware virus ‘WannaCry’ plagues 100k computers across 99 countries

Ransomware attack takes down LA hospital for hours

WannaCry Ransomware Hits Hospitals

WannaCry Ransomware Used In Global Attacks!

WATCH: Ransomware cyberattack targets Windows users around the world

BREAKING***100 Countries Massive Global Ransomware Attack Used NSA Hacking Tool

What is ransomware and how can I protect myself?

How Ransomware Locks Your PC & Holds Your Data Hostage

Massive Ransomware Outbreak Thanks to NSA – WannaCry Worm Spreading Fast

Ransomware As Fast As Possible

The Truth About Ransomware – Webinar

What is Ransomware, How it Works and What You Can Do to Stay Protected

NSA Whistleblower Bill Binney on Tucker Carlson 03.24.2017

NSA Whistleblower William Binney: The Future of FREEDOM

ROY ORBISON – CRYING – LIVE 1988

Roy Orbison – “Running Scared” from Black and White Night

Roy Orbison – Crying (Monument Concert 1965)

Roy Orbison – It’s Over (Monument Concert 1965)

Roy Orbison – “It’s Over” from Black and White Night

Worldwide ransomware attacks: What we know so far

May 15, 2017
AUTHOR: LILY HAY NEWMAN. SECURITY

HOW AN ACCIDENTAL ‘KILL SWITCH’ SLOWED FRIDAY’S MASSIVE RANSOMWARE ATTACK

Cybersecurity Experts’ First Task: Find Out How Virus Spread

Investigators think a computer outlet that isn’t supposed to be connected to the internet was a possible vector for WannaCry

The virus, dubbed WannaCry, is a two-part virus. One part is ransomware, which locks computer files and demands online payment to unlock them. The other part spreads it.

The virus, dubbed WannaCry, is a two-part virus. One part is ransomware, which locks computer files and demands online payment to unlock them. The other part spreads it. PHOTO: RITCHIE B. TONGO/EUROPEAN PRESSPHOTO AGENCY

Government investigators and private cybersecurity firms are trying to find out how a virus managed to spread around the globe over the weekend, which would give them their best chance to identify the mastermind behind the cyberattacks.

Investigators have already ruled out phishing—tricking someone into opening a seemingly legitimate email attachment that actually contains the virus—as a possible tactic. One of their hypotheses centers on something called port 445, an outlet that isn’t supposed to be connected to the internet.

The race is on to identify patient zero, or the first known infection of the virus, to find clues that could lead back to the hacker.

The attacks appear to have largely abated Monday, despite fears that a new workweek would trigger a second wave. Cybersecurity experts see fewer infections compared with Friday, when the onslaught started.

“We think the initial fire is put out,” said Rob Holmes, vice president of products at Proofpoint, a Silicon Valley company with virus sensors at major corporations and telecom companies.

The virus, dubbed WannaCry, is a two-part virus. One part is ransomware, which locks computer files and demands online payment to unlock them. The other part is a “spreader,” which transmits WannaCry to all other computers on a network. It attacks machines running Microsoft Corp.’s Windows systems that don’t have up-to-date security patches.

Mr. Holmes said 95% of ransomware attacks use the relatively unsophisticated technique of phishing.

A European Union cybersecurity agency published a report Monday, which said early indications pointed to emails containing WannaCry-infected Microsoft Office documents as the attacker’s weapon. But it quickly amended the report, saying phishing probably wasn’t involved.

If it had been a phishing attack, organizations would have found the offending email by now and described it to the public, cybersecurity experts said.

Now there are two main hypotheses as to how WannaCry could have wormed its way into a computer. One theory centers on port 445.

Imagine a network of 100 computers. These computers communicate with each other through digital roads. One of the roads is port 445, and it is usually reserved for Windows-running computers to transfer files to each other, or to send stuff to the printer, said Becky Pinkard, a vice president at cybersecurity firm Digital Shadows.

Authorities know WannaCry spread itself within a network using the port 445 roads. But how did it get there in the first place? Port 445 roads connect computers within a network, but it was thought to be walled off from the internet and outside world. Now investigators are trying to determine whether port 445’s wall has a hole that WannaCry wiggled through.

“Most researchers tend to believe at the moment that it spreads initially through vulnerable computers exposing port 445 on the internet,” the updated EU agency report said.

There is another theory. Ms. Pinkard said an employee could have taken an office-issued laptop to a coffee shop or hotel and logged onto the venue’s unsecure internet network. If that laptop doesn’t have the antivirus protections that networks at big organizations typically have, a hacker could’ve slipped WannaCry onto the device. When the employee brings the laptop back to the office and connects it to the network, bam: WannaCry spreads itself via port 445.

Companies can protect laptops from this with commercially available protection software, Ms. Pinkard said.

If researchers can find the original WannaCry victim, they might be able to trace the signature of the attacker who delivered the virus via an internet-protocol address, or IP address. “If I were law enforcement, I would be working to find who was the very first company impacted,” Ms. Pinkard said. “I would knock at the door and be asking, ‘Can I look at your logs?’ ”

The problem is that the IP address could lead to another IP address, which would lead to another IP address, and so on. “It’s a very slow and painful process,” Ms. Pinkard said.

Cybersecurity experts said that, even though some of the world’s smartest minds are on the case, it could take months or years to find the mastermind—if they find the attacker at all.

A parallel hunt would be following the money. WannaCry asked for ransom to be delivered via a digital currency called bitcoin. About 124 payments totaling about $34,000, or a little less than $300 each, went to the attacker as of Sunday afternoon, said bitcoin-analytics-firm Chainalysis. Every bitcoin transaction is recorded on an online ledger. But finding out the individual behind each transaction is difficult because users’ identities are well encrypted.

“There’s going to be a paper trail,” said Brian Knight, a George Mason University specialist in financial technology. “Whether it can be deciphered is a separate question.”

https://www.wsj.com/articles/cybersecurity-experts-first-task-find-out-how-virus-spread-1494868250

The cyberattacks started Friday and spread rapidly around the globe using a security flaw in Microsoft’s Windows XP operating system

The cyberattacks started Friday and spread rapidly around the globe using a security flaw in Microsoft’s Windows XP operating system

 Security agencies are hunting for those behind a crippling cyberattack which has so far hit hundreds of thousands of computers worldwide, including at government agencies, factories and health services.

Here is what we know so far about the cyber ransom attacks:

– What happened? –

The cyberattacks started Friday and spread rapidly around the globe using a security flaw in Microsoft’s Windows XP operating system, an older version that is no longer given mainstream tech support by the US giant.

The so-called WannaCry ransomware locks access to user files and in an on-screen message demands payment of $300 (275 euros) in the virtual currency Bitcoin in order to decrypt the files.

Victims have been advised by security experts not to pay up.

The attack is unique, according to policing agency Europol, because it combines ransomware with a worm function, meaning once one machine is infected, the entire internal network is scanned and other vulnerable machines are infected.

– Who has been affected? –

Europol chief Rob Wainwright said computer systems in more than 150 countries were hit, with the majority of organisations affected over the weekend in Europe.

But as Asia woke up to the working week on Monday, leading Chinese security-software provider Qihoo 360 said “hundreds of thousands” of computers in the country were hit at nearly 30,000 institutions including government agencies.

In Japan, a spokesman for Hitachi said the conglomerate discovered problems on Monday morning and its computer networks were “unstable”.

Other high-profile victims include hospitals in Britain, the Spanish telecoms giant Telefonica, French carmaker Renault, US package delivery company FedEx, Russia’s interior ministry and the German rail operator Deutsche Bahn.

– Where did the malware come from? –

Brad Smith, Microsoft’s president and chief legal officer, said in a blog post Sunday that the culprits used a code developed by the US National Security Agency.

It was leaked as part of a document dump, according to researchers at the Moscow-based computer security firm Kaspersky Lab.

Smith warned governments against stockpiling such vulnerabilities and said instead they should report them to manufacturers — not sell, store or exploit them, lest they fall into the wrong hands.

“An equivalent scenario with conventional weapons would be the US military having some of its Tomahawk missiles stolen,” Smith wrote.

“The governments of the world should treat this attack as a wake up call.”

– Who was behind the attack? –

Europol said on Monday it was continuing to hunt for the culprits behind the unprecedented attack.

The agency’s senior spokesman Jan Op Gen Oorth said it was still “a bit early too say who is behind it, but we are working on a decrypting tool”.

Experts think it unlikely to have been one person, with criminally minded cyber crime syndicates nowadays going underground and using ever more sophisticated encryption to hide their activities.

– How can people protect their computers? –

Microsoft took the unusual step of reissuing security patches first made available in March for Windows XP and other older versions of its operating system.

Kaspersky said it was seeking to develop a decryption tool “as soon as possible”.

Europol said European companies and governments had heeded warnings and as a result avoided further fallout from the ransomware.

“It seems that a lot of internet security guys over the weekend did their homework and ran the security software updates,” Jan Op Gen Oorth told AFP.

https://www.yahoo.com/tech/worldwide-ransomware-cyberattacks-know-152751340.html

Dozens of countries hit by huge cyberextortion attack

NEW YORK (AP) — Dozens of countries were hit with a huge cyberextortion attack Friday that locked up computers and held users’ files for ransom at a multitude of hospitals, companies and government agencies.

It was believed to the biggest attack of its kind ever recorded.

The malicious software behind the onslaught appeared to exploit a vulnerability in Microsoft Windows that was supposedly identified by the National Security Agency for its own intelligence-gathering purposes and was later leaked to the internet.

Britain’s national health service fell victim, its hospitals forced to close wards and emergency rooms and turn away patients. Russia appeared to be the hardest hit, according to security experts, with the country’s Interior Ministry confirming it was struck.

All told, several cybersecurity firms said they had identified the malicious software, which so far has been responsible for tens of thousands of attacks, in more than 60 countries. That includes the United States, although its effects there didn’t appear to be widespread, at least initially.

The attack infected computers with what is known as “ransomware” — software that locks up the user’s data and flashes a message demanding payment to release it. In the U.S., FedEx reported that its Windows computers were “experiencing interference” from malware, but wouldn’t say if it had been hit by ransomware.

Mikko Hypponen, chief research officer at the Helsinki-based cybersecurity company F-Secure, called the attack “the biggest ransomware outbreak in history.”

Security experts said the attack appeared to be caused by a self-replicating piece of software that enters companies and organizations when employees click on email attachments, then spreads quickly internally from computer to computer when employees share documents and other files.

Its ransom demands start at $300 and increase after two hours to $400, $500 and then $600, said Kurt Baumgartner, a security researcher at Kaspersky Lab. Affected users can restore their files from backups, if they have them, or pay the ransom; otherwise they risk losing their data entirely.

Chris Wysopal of the software security firm Veracode said criminal organizations were probably behind the attack, given how quickly the malware spread.

“For so many organizations in the same day to be hit, this is unprecedented,” he said.

The security holes it exploits were disclosed several weeks ago by TheShadowBrokers, a mysterious group that has published what it says are hacking tools used by the NSA as part of its intelligence-gathering.

Shortly after that disclosure, Microsoft announced that it had already issued software “patches” for those holes. But many companies and individuals haven’t installed the fixes yet or are using older versions of Windows that Microsoft no longer supports and didn’t fix.

By Kaspersky Lab’s count, the malware struck at least 74 countries. In addition to Russia, the biggest targets appeared to be Ukraine and India, nations where it is common to find older, unpatched versions of Windows in use, according to the security firm.

Hospitals across Britain found themselves without access to their computers or phone systems. Many canceled all routine procedures and asked patients not to come to the hospital unless it was an emergency. Doctors’ practices and pharmacies reported similar problems.

Patrick Ward, a 47-year-old sales director, said his heart operation, scheduled for Friday, was canceled at St. Bartholomew’s Hospital in London.

Tom Griffiths, who was at the hospital for chemotherapy, said several cancer patients had to be sent home because their records or bloodwork couldn’t be accessed.

“Both staff and patients were frankly pretty appalled that somebody, whoever they are, for commercial gain or otherwise, would attack a health care organization,” he said. “It’s stressful enough for someone going through recovery or treatment for cancer.”

British Prime Minister Theresa May said there was no evidence patient data had been compromised and added that the attack had not specifically targeted the National Health Service.

“It’s an international attack and a number of countries and organizations have been affected,” she said.

Spain, meanwhile, took steps to protect critical infrastructure in response to the attack. Authorities said they were communicating with more than 100 energy, transportation, telecommunications and financial services providers about the attack.

Spain’s Telefonica, a global broadband and telecommunications company, was among the companies hit.

Ransomware attacks are on the rise around the world. In 2016, Hollywood Presbyterian Medical Center in California said it had paid a $17,000 ransom to regain control of its computers from hackers.

Krishna Chinthapalli, a doctor at Britain’s National Hospital for Neurology & Neurosurgery who wrote a paper on cybersecurity for the British Medical Journal, warned that British hospitals’ old operating systems and confidential patient information made them an ideal target for blackmailers.

He said many NHS hospitals in Britain use Windows XP software, introduced in 2001, and as government funding for the health service has been squeezed, “IT budgets are often one of the first ones to be reduced.”

“Looking at the trends, it was going to happen,” he said. “I did not expect an attack on this scale. That was a shock.

https://apnews.com/e8402f2faf934f7ab5419d4961d3dafe/Global-extortion-cyberattack-hits-dozens-of-nations

Global ‘WannaCry’ ransomware cyberattack seeks cash for data

LONDON (AP) — A global “ransomware” cyberattack, unprecedented in scale, had technicians scrambling to restore Britain’s crippled hospital network Saturday and secure the computers that run factories, banks, government agencies and transport systems in many other nations.

The worldwide effort to extort cash from computer users spread so widely that Microsoft quickly changed its policy, making security fixes available for free for the older Windows systems still used by millions of individuals and smaller businesses.

A malware tracking map showed “WannaCry” infections popping up around the world. Britain canceled or delayed treatments for thousands of patients, even people with cancer. Train systems were hit in Germany and Russia, and phone companies in Madrid and Moscow. Renault’s futuristic assembly line in Slovenia, where rows of robots weld car bodies together, was stopped cold.

In Brazil, the social security system had to disconnect its computers and cancel public access. The state-owned oil company Petrobras and Brazil’s Foreign Ministry also disconnected computers as a precautionary measure, and court systems went down, too.

Britain’s home secretary said one in five of 248 National Health Service groups had been hit. Home Secretary Amber Rudd said all but six of the NHS trusts back to normal Saturday.

The U.K.’s National Cyber Security Center was “working round the clock” to restore vital health services, while urging people to update security software fixes, run anti-virus software and back up their data elsewhere.

Who perpetrated this wave of attacks remains unknown. Two security firms — Kaspersky Lab and Avast — said they identified the malicious software in more than 70 countries. Both said Russia was hit hardest.

These hackers “have caused enormous amounts of disruption— probably the biggest ransomware cyberattack in history,” said Graham Cluley, a veteran of the anti-virus industry in Oxford, England.

And all this may be just a taste of what’s coming, another cyber security expert warned.

Computer users worldwide — and everyone else who depends on them — should assume that the next big “ransomware” attack has already been launched, and just hasn’t manifested itself yet, Ori Eisen, who founded the Trusona cybersecurity firm in Scottsdale, Arizona, told The Associated Press.

The attack held hospitals and other entities hostage by freezing computers, encrypting data and demanding money through online bitcoin payments. But it appears to be “low-level” stuff, Eisen said Saturday, given the amount of ransom demanded — $300 at first, rising to $600 before it destroys files hours later.

He said the same thing could be done to crucial infrastructure, like nuclear power plants, dams or railway systems.

“This is child’s play, what happened. This is not the serious stuff yet. What if the same thing happened to 10 nuclear power plants, and they would shut down all the electricity to the grid? What if the same exact thing happened to a water dam or to a bridge?” he asked.

“Today, it happened to 10,000 computers,” Eisen said. “There’s no barrier to do it tomorrow to 100 million computers.”

This is already believed to be the biggest online extortion attack ever recorded, disrupting services in nations as diverse as the U.S., Ukraine, Brazil, Spain and India. Europol, the European Union’s police agency, said the onslaught was at “an unprecedented level and will require a complex international investigation to identify the culprits.”

In Russia, government agencies insisted that all attacks had been resolved. Russian Interior Ministry, which runs the national police, said the problem had been “localized” with no information compromised. Russia’s health ministry said its attacks were “effectively repelled.”

The ransomware exploits a vulnerability in Microsoft Windows that was purportedly identified by the U.S. National Security Agency for its own intelligence-gathering purposes. Hackers said they stole the tools from the NSA and dumped them on the internet.

It could have been much worse if not for a young cybersecurity researcher who helped to halt its spread by accidentally activating a so-called “kill switch” in the malicious software.

The 22-year-old Britain-based researcher, identified online only as MalwareTech, explained Saturday that he spotted a hidden web address in the “WannaCrypt” code and made it official by registering its domain name. That inexpensive move redirected the attacks to MalwareTech’s server, which operates as a “sinkhole” to keep malware from escaping.

“Because WannaCrypt used a single hardcoded domain, my registration of it caused all infections globally to believe they were inside a sandbox … thus we initially unintentionally prevented the spread,” the researcher said, humbly and anonymously, in his blog post.

His move may have saved governments and companies millions of dollars and slowed the outbreak before U.S.-based computers were more widely infected.

Indeed, while FedEx Corp. reported that its Windows computers were “experiencing interference” from malware — it wouldn’t say if it had been hit by the ransomware — other impacts in the U.S. were not readily apparent on Saturday.

That said, the threat hasn’t disappeared, the MalwareTech researcher said.

“One thing that is very important to note is our sinkholing only stops this sample and there is nothing stopping them removing the domain check and trying again, so it’s incredibly important that any unpatched systems are patched as quickly as possible,” he warned.

The kill switch also couldn’t help those already infected. Short of paying, options for these individuals and companies are usually limited to recovering data files from a backup, if available, or living without them.

Security experts said it appeared to be caused by a self-replicating piece of software that enters companies when employees click on email attachments, then spreads quickly as employees share documents.

The security holes it exploits were disclosed weeks ago by TheShadowBrokers, a mysterious hacking group. Microsoft swiftly released software “patches” to fix those holes, but many users still haven’t installed updates or still use older versions of Windows.

Microsoft had made fixes for older systems, such as 2001′s Windows XP, available only to mostly larger organizations, including Britain’s National Health Service, that paid extra for extended technical support. In light of Friday’s attacks, Microsoft announced that it’s making the fixes free to all.

Cluley said “There’s clearly some culpability on the part of the U.S. intelligence services. Because they could have done something ages ago to get this problem fixed, and they didn’t do it.”

“It’s very, very difficult these days, with encryption, to spy on people,” Cluley added. “But I don’t think that those concerns should hide the fact that ALL of us need to be protected … We’re living an online life, and we all deserve security there.”

https://apnews.com/770946e7df454d2e9acda3bdbd3ed425/Unprecedented-global-‘ransomware’-attack-seeks-cash-for-data

Ransomware

From Wikipedia, the free encyclopedia

Ransomware is a type of malicious software designed to block access to a computer system or data until a ransom is paid. Simple ransomware may lock the system in a way which is not difficult for a knowledgeable person to reverse, and display a message requesting payment to unlock it. More advanced malware encrypts the victim’s files, making them inaccessible, and demands a ransom payment to decrypt them.[1] The ransomware may also encrypt the computer’s Master File Table (MFT)[2][3] or the entire hard drive.[4] Thus, ransomware is a denial-of-access attack that prevents computer users from accessing files[5] since it is intractable to decrypt the files without the decryption key. Ransomware attacks are typically carried out using a Trojan that has a payload disguised as a legitimate file.

While initially popular in Russia, the use of ransomware scams has grown internationally;[6][7][8] in June 2013, security software vendor McAfee released data showing that it had collected over 250,000 unique samples of ransomware in the first quarter of 2013, more than double the number it had obtained in the first quarter of 2012.[9] Wide-ranging attacks involving encryption-based ransomware began to increase through Trojans such as CryptoLocker, which had procured an estimated US$3 million before it was taken down by authorities,[10] and CryptoWall, which was estimated by the US Federal Bureau of Investigation (FBI) to have accrued over $18m by June 2015.[11]

Operation

Typically, modern ransomware uses encryption to deny users’ access to their files. The software encrypts the victim’s files using a symmetric cipher with a randomly generated key, and then deletes the key, leaving only a version of it made inaccessible to the victim using public key cryptography. Only the attacker can then decrypt the symmetric key needed to restore the files.[12]

The symmetric key is randomly generated and will not assist other victims. At no point is the attacker’s private key exposed to victims and the victim need only send a very small ciphertext (the encrypted symmetric-cipher key) to the attacker.

Ransomware attacks are typically carried out using a Trojan, entering a system through, for example, a downloaded file or a vulnerability in a network service. The program then runs a payload, which locks the system in some fashion, or claims to lock the system but does not (e.g., a scareware program). Payloads may display a fake warning purportedly by an entity such as a law enforcement agency, falsely claiming that the system has been used for illegal activities, contains content such as pornography and “pirated” media.[13][14][15]

Some payloads consist simply of an application designed to lock or restrict the system until payment is made, typically by setting the Windows Shell to itself,[16] or even modifying the master boot record and/or partition table to prevent the operating system from booting until it is repaired.[17] The most sophisticated payloads encrypt files, with many using strong encryption to encrypt the victim’s files in such a way that only the malware author has the needed decryption key.[12][18][19]

Payment is virtually always the goal, and the victim is coerced into paying for the ransomware to be removed—which may or may not actually occur—either by supplying a program that can decrypt the files, or by sending an unlock code that undoes the payload’s changes. A key element in making ransomware work for the attacker is a convenient payment system that is hard to trace. A range of such payment methods have been used, including wire transfers, premium-rate text messages,[20] pre-paid voucher services such as Paysafecard,[6][21][22] and the digital currency Bitcoin.[23][24][25] A 2016 census commissioned by Citrix revealed that larger business are holding bitcoin as contingency plans.[26]

History

Encrypting ransomware

The first known malware extortion attack, the “AIDS Trojan” written by Joseph Popp in 1989, had a design failure so severe it was not necessary to pay the extortionist at all. Its payload hid the files on the hard drive and encrypted only their names, and displayed a message claiming that the user’s license to use a certain piece of software had expired. The user was asked to pay US$189 to “PC Cyborg Corporation” in order to obtain a repair tool even though the decryption key could be extracted from the code of the Trojan. The Trojan was also known as “PC Cyborg”. Popp was declared mentally unfit to stand trial for his actions, but he promised to donate the profits from the malware to fund AIDS research.[27]

The notion of using public key cryptography for ransom attacks was introduced in 1996 by Adam L. Young and Moti Yung. Young and Yung critiqued the failed AIDS Information Trojan that relied on symmetric cryptography alone, the fatal flaw being that the decryption key could be extracted from the Trojan, and implemented an experimental proof-of-concept cryptovirus on a Macintosh SE/30 that used RSA and the Tiny Encryption Algorithm (TEA) to hybrid encrypt the victim’s data. Since public key crypto is used, the cryptovirus only contains the encryption key. The attacker keeps the corresponding private decryption key private. Young and Yung’s original experimental cryptovirus had the victim send the asymmetric ciphertext to the attacker who deciphers it and returns the symmetric decryption key it contains to the victim for a fee. Long before electronic money existed Young and Yung proposed that electronic money could be extorted through encryption as well, stating that “the virus writer can effectively hold all of the money ransom until half of it is given to him. Even if the e-money was previously encrypted by the user, it is of no use to the user if it gets encrypted by a cryptovirus”.[12] They referred to these attacks as being “cryptoviral extortion”, an overt attack that is part of a larger class of attacks in a field called cryptovirology, which encompasses both overt and covert attacks.[12]

Examples of extortionate ransomware became prominent in May 2005.[28] By mid-2006, Trojans such as Gpcode, TROJ.RANSOM.A, Archiveus, Krotten, Cryzip, and MayArchive began utilizing more sophisticated RSA encryption schemes, with ever-increasing key-sizes. Gpcode.AG, which was detected in June 2006, was encrypted with a 660-bit RSA public key.[29] In June 2008, a variant known as Gpcode.AK was detected. Using a 1024-bit RSA key, it was believed large enough to be computationally infeasible to break without a concerted distributed effort.[30][31][32][33]

Encrypting ransomware returned to prominence in late 2013 with the propagation of CryptoLocker—using the Bitcoin digital currency platform to collect ransom money. In December 2013, ZDNet estimated based on Bitcoin transaction information that between 15 October and 18 December, the operators of CryptoLocker had procured about US$27 million from infected users.[34] The CryptoLocker technique was widely copied in the months following, including CryptoLocker 2.0 (though not to be related to CryptoLocker), CryptoDefense (which initially contained a major design flaw that stored the private key on the infected system in a user-retrievable location, due to its use of Windows’ built-in encryption APIs),[24][35][36][37] and the August 2014 discovery of a Trojan specifically targeting network-attached storage devices produced by Synology.[38] In January 2015, it was reported that ransomware-styled attacks have occurred against individual websites via hacking, and through ransomware designed to target Linux-based web servers.[39][40][41]

Some ransomware strains have used proxies tied to Tor hidden services to connect to their command and control servers, increasing the difficulty of tracing the exact location of the criminals.[42][43] Furthermore, dark web vendors have increasingly started to offer the technology as a service.[43][44][45]

Symantec has classified ransomware to be the most dangerous cyber threat.[46]

Non-encrypting ransomware

In August 2010, Russian authorities arrested nine individuals connected to a ransomware Trojan known as WinLock. Unlike the previous Gpcode Trojan, WinLock did not use encryption. Instead, WinLock trivially restricted access to the system by displaying pornographic images, and asked users to send a premium-rate SMS (costing around US$10) to receive a code that could be used to unlock their machines. The scam hit numerous users across Russia and neighboring countries—reportedly earning the group over US$16 million.[15][47]

In 2011, a ransomware Trojan surfaced that imitated the Windows Product Activation notice, and informed users that a system’s Windows installation had to be re-activated due to “[being a] victim of fraud”. An online activation option was offered (like the actual Windows activation process), but was unavailable, requiring the user to call one of six international numbers to input a 6-digit code. While the malware claimed that this call would be free, it was routed through a rogue operator in a country with high international phone rates, who placed the call on hold, causing the user to incur large international long distance charges.[13]

In February 2013, a ransomware Trojan based on the Stamp.EK exploit kit surfaced; the malware was distributed via sites hosted on the project hosting services SourceForge and GitHub that claimed to offer “fake nude pics” of celebrities.[48] In July 2013, an OS X-specific ransomware Trojan surfaced, which displays a web page that accuses the user of downloading pornography. Unlike its Windows-based counterparts, it does not block the entire computer, but simply exploits the behavior of the web browser itself to frustrate attempts to close the page through normal means.[49]

In July 2013, a 21-year-old man from Virginia, whose computer coincidentally did contain pornographic photographs of underaged girls with whom he had conducted sexualized communications, turned himself in to police after receiving and being deceived by ransomware purporting to be an FBI message accusing him of possessing child pornography. An investigation discovered the incriminating files, and the man was charged with child sexual abuse and possession of child pornography.[50]

Leakware (also called Doxware)

The converse of ransomware is a cryptovirology attack that threatens to publish stolen information from the victim’s computer system rather than deny the victim access to it.[51] In a leakware attack, malware exfiltrates sensitive host data either to the attacker or alternatively, to remote instances of the malware, and the attacker threatens to publish the victim’s data unless a ransom is paid. The attack was presented at West Point in 2003 and was summarized in the book Malicious Cryptography as follows, “The attack differs from the extortion attack in the following way. In the extortion attack, the victim is denied access to its own valuable information and has to pay to get it back, where in the attack that is presented here the victim retains access to the information but its disclosure is at the discretion of the computer virus”.[52] The attack is rooted in game theory and was originally dubbed “non-zero sum games and survivable malware”. The attack can yield monetary gain in cases where the malware acquires access to information that may damage the victim user or organization, e.g., reputational damage that could result from publishing proof that the attack itself was a success.

Mobile ransomware

With the increased popularity of ransomware on PC platforms, ransomware targeting mobile operating systems have also proliferated. Typically, mobile ransomware payloads are blockers, as there is little incentive to encrypt data since it can be easily restored via online synchronization.[53] Mobile ransomware typically targets the Android platform, as it allows applications to be installed from third-party sources.[53][54] The payload is typically distributed as an APK file installed by an unsuspecting user; it may attempt to display a blocking message over top of all other applications,[54] while another used a form of clickjacking to cause the user to give it “device administrator” privileges to achieve deeper access to the system.[55]

Different tactics have been used on iOS devices, such as exploiting iCloud accounts and using the Find My iPhone system to lock access to the device.[56] On iOS 10.3, Apple patched a bug in the handling of JavaScript pop-up windows in Safari that had been exploited by ransomware websites.[57]

Notable examples

Reveton

A Reveton payload, fraudulently claiming that the user must pay a fine to the Metropolitan Police Service

In 2012, a major ransomware Trojan known as Reveton began to spread. Based on the Citadel Trojan (which itself, is based on the Zeus Trojan), its payload displays a warning purportedly from a law enforcement agency claiming that the computer has been used for illegal activities, such as downloading unlicensed software or child pornography. Due to this behaviour, it is commonly referred to as the “Police Trojan”.[58][59][60] The warning informs the user that to unlock their system, they would have to pay a fine using a voucher from an anonymous prepaid cash service such as Ukash or Paysafecard. To increase the illusion that the computer is being tracked by law enforcement, the screen also displays the computer’s IP address, while some versions display footage from a victim’s webcam to give the illusion that the user is being recorded.[6][61]

Reveton initially began spreading in various European countries in early 2012.[6] Variants were localized with templates branded with the logos of different law enforcement organizations based on the user’s country; for example, variants used in the United Kingdom contained the branding of organizations such as the Metropolitan Police Service and the Police National E-Crime Unit. Another version contained the logo of the royalty collection society PRS for Music, which specifically accused the user of illegally downloading music.[62] In a statement warning the public about the malware, the Metropolitan Police clarified that they would never lock a computer in such a way as part of an investigation.[6][14]

In May 2012, Trend Micro threat researchers discovered templates for variations for the United States and Canada, suggesting that its authors may have been planning to target users in North America.[63] By August 2012, a new variant of Reveton began to spread in the United States, claiming to require the payment of a $200 fine to the FBI using a MoneyPak card.[7][8][61]In February 2013, a Russian citizen was arrested in Dubai by Spanish authorities for his connection to a crime ring that had been using Reveton; ten other individuals were arrested on money laundering charges.[64] In August 2014, Avast Software reported that it had found new variants of Reveton that also distribute password stealing malware as part of its payload.[65]

CryptoLocker

Encrypting ransomware reappeared in September 2013 with a Trojan known as CryptoLocker, which generated a 2048-bit RSA key pair and uploaded in turn to a command-and-control server, and used to encrypt files using a whitelist of specific file extensions. The malware threatened to delete the private key if a payment of Bitcoin or a pre-paid cash voucher was not made within 3 days of the infection. Due to the extremely large key size it uses, analysts and those affected by the Trojan considered CryptoLocker extremely difficult to repair.[23][66][67][68]Even after the deadline passed, the private key could still be obtained using an online tool, but the price would increase to 10 BTC—which cost approximately US$2300 as of November 2013.[69][70]

CryptoLocker was isolated by the seizure of the Gameover ZeuS botnet as part of Operation Tovar, as officially announced by the U.S. Department of Justice on 2 June 2014. The Department of Justice also publicly issued an indictment against the Russian hacker Evgeniy Bogachev for his alleged involvement in the botnet.[71][72] It was estimated that at least US$3 million was extorted with the malware before the shutdown.[10]

CryptoLocker.F and TorrentLocker

In September 2014, a wave of ransomware Trojans surfaced that first targeted users in Australia, under the names CryptoWall and CryptoLocker (which is, as with CryptoLocker 2.0, unrelated to the original CryptoLocker). The Trojans spread via fraudulent e-mails claiming to be failed parcel delivery notices from Australia Post; to evade detection by automatic e-mail scanners that follow all links on a page to scan for malware, this variant was designed to require users to visit a web page and enter a CAPTCHA code before the payload is actually downloaded, preventing such automated processes from being able to scan the payload. Symantec determined that these new variants, which it identified as CryptoLocker.F, were again, unrelated to the original CryptoLocker due to differences in their operation.[73][74] A notable victim of the Trojans was the Australian Broadcasting Corporation; live programming on its television news channel ABC News 24 was disrupted for half an hour and shifted to Melbourne studios due to a CryptoWall infection on computers at its Sydney studio.[75][76][77]

Another Trojan in this wave, TorrentLocker, initially contained a design flaw comparable to CryptoDefense; it used the same keystream for every infected computer, making the encryption trivial to overcome. However, this flaw was later fixed.[35] By late-November 2014, it was estimated that over 9,000 users had been infected by TorrentLocker in Australia alone, trailing only Turkey with 11,700 infections.[78]

CryptoWall

Another major ransomware Trojan targeting Windows, CryptoWall, first appeared in 2014. One strain of CryptoWall was distributed as part of a malvertising campaign on the Zedo ad network in late-September 2014 that targeted several major websites; the ads redirected to rogue websites that used browser plugin exploits to download the payload. A Barracuda Networks researcher also noted that the payload was signed with a digital signature in an effort to appear trustworthy to security software.[79] CryptoWall 3.0 used a payload written in JavaScript as part of an email attachment, which downloads executables disguised as JPG images. To further evade detection, the malware creates new instances of explorer.exe and svchost.exe to communicate with its servers. When encrypting files, the malware also deletes volume shadow copies, and installs spyware that steals passwords and Bitcoin wallets.[80]

The FBI reported in June 2015 that nearly 1,000 victims had contacted the bureau’s Internet Crime Complaint Center to report CryptoWall infections, and estimated losses of at least $18 million.[11]

The most recent version, CryptoWall 4.0, enhanced its code to avoid antivirus detection, and encrypts not only the data in files but also the file names.[81]

Fusob

Fusob is one of the major mobile ransomware families. Between April 2015 and March 2016, about 56 percent of accounted mobile ransomwares was Fusob.[82]

Like a typical mobile ransomware, it employs scare tactics to extort people to pay a ransom.[83] The program pretends to be an accusatory authority, demanding the victim to pay a fine from $100 to $200 USD or otherwise face a fictitious charge. Rather surprisingly, Fusob suggests using iTunes gift cards for payment. Also, a timer clicking down on the screen adds to the users’ anxiety as well.

In order to infect devices, Fusob masquerades as a pornographic video player. Thus, victims, thinking it is harmless, unwittingly download Fusob.[84]

When Fusob is installed, it first checks the language used in the device. If it uses Russian or certain Eastern European languages, Fusob does nothing. Otherwise, it proceeds on to lock the device and demand ransom. Among victims, about 40% of them are in Germany with the United Kingdom and the United States following with 14.5% and 11.4% respectively.

Fusob has lots in common with Small, which is another major family of mobile ransomware. They represented over 93% of mobile ransomwares between 2015 and 2016.

WannaCry

In May 2017, the WannaCry ransomware attack spread though the Internet, using an exploit vector that Microsoft had issued a “Critical” patch for (MS17-010) two months before on March 14, 2017. The ransomware attack infected over 75,000 users in over 99 countries, using 20 different languages to demand money from users. The attack affected Telefónica and several other large companies in Spain, as well as parts of the British National Health Service (NHS),[85] FedEx, Deutsche Bahn, as well as the Russian Interior Ministry and Russian telecom MegaFon.[86]

Mitigation

As with other forms of malware, security software might not detect a ransomware payload, or, especially in the case of encrypting payloads, only after encryption is under way or complete, particularly if a new version unknown to the protective software is distributed.[87] If an attack is suspected or detected in its early stages, it takes some time for encryption to take place; immediate removal of the malware (a relatively simple process) before it has completed would stop further damage to data, without salvaging any already lost.[88][89]

Alternately, new categories of security software, specifically deception technology, can detect ransomware without using a signature-based approach. Deception technology utilizes fake SMB shares which surround real IT assets. These fake SMB data shares deceive ransomware, tie the ransomware up encrypting these false SMB data shares, alert and notify cyber security teams which can then shut down the attack and return the organization to normal operations. There are multiple vendors[90] that support this capability with multiple announcements in 2016.[91]

Security experts have suggested precautionary measures for dealing with ransomware. Using software or other security policies to block known payloads from launching will help to prevent infection, but will not protect against all attacks. Keeping “offline” backups of data stored in locations inaccessible to the infected computer, such as external storage drives, prevents them from being accessed by the ransomware, thus accelerating data restoration.[23][92]

There are a number of tools intended specifically to decrypt files locked by ransomware, although successful recovery may not be possible.[2][93] If the same encryption key is used for all files, decryption tools use files for which there are both uncorrupted backups (plaintext in the jargon of cryptanalysis) and encrypted copies; recovery of the key, if it is possible, may take several days.[94]

See also

References

WannaCry ransomware attack

From Wikipedia, the free encyclopedia
WannaCry ransomware attack
Wana Decrypt0r screenshot.png

Screenshot of the ransom note left on an infected system
Date 12 May 2017 (ongoing)
Location Worldwide
Also known as WannaCrypt, WanaCrypt0r
Type Cyber-attack
Theme Ransomware encrypting hard disk with $300 demand
Cause EternalBlue exploit
Participants Unknown
Outcome More than 230,000 computers infected[1]

WannaCry, also known by the names WannaCrypt,[2] WanaCrypt0r 2.0,[3] Wanna Decryptor[4] and other similar names, is a ransomware program targeting Microsoft Windows. In May 2017, a large cyber-attack using it was launched, infecting over 230,000 computers in 99 countries, demanding ransom payments in bitcoin in 28 languages. The attack has been described by Europol as unprecedented in scale.[5]

The attack affected Telefónica and several other large companies in Spain, as well as parts of Britain’s National Health Service (NHS),[6] FedEx and Deutsche Bahn.[7][8][9] Other targets in at least 99 countries were also reported to have been attacked around the same time.[10][11]

WannaCry is believed to use the EternalBlue exploit, which was developed by the U.S. National Security Agency[12][13] to attack computers running Microsoft Windows operating systems.[3][14] Although a patch to remove the underlying vulnerability had been issued on 14 March 2017,[15] delays in applying security updates left some users and organisations vulnerable.[16] Microsoft has taken the unusual step of releasing updates for the unsupported Windows XP and Windows Server 2003 and patches for Windows 8 operating systems.[2][17]

A kill switch has been found in the code, which prevents new infections. This has been activated by researchers and should slow or stop the spread. However, different versions of the attack may be released and all vulnerable systems still have an urgent need to be patched.

Background

The purported infection vector, EternalBlue, was released by the hacker group The Shadow Brokers on 14 April 2017,[18][19] along with other tools apparently leaked from Equation Group, which is believed to be part of the United States National Security Agency.[20][21]

EternalBlue exploits vulnerability MS17-010[15] in Microsoft‘s implementation of the Server Message Block (SMB) protocol. Microsoft had released a “Critical” advisory, along with an update patch to plug the vulnerability a month before, on 14 March 2017.[15] This patch only fixed Windows Vista and later operating systems but not the older Windows XP.

Countries initially affected[22]

On 12 May 2017, WannaCry began affecting computers worldwide.[23] After gaining access to the computers, via local area network (LAN), an email attachment, or drive-by download, the ransomware encrypts the computer’s hard disk drive,[24][25] then attempts to exploit the SMB vulnerability to spread to random computers on the Internet,[26] and “laterally” between computers on the same LAN.[27] As with other modern ransomware, the payload displays a message informing the user that files have been encrypted, and demands a payment of $300 in bitcoin within three days.

The Windows vulnerability is not a zero-day flaw, but one for which Microsoft had made available a security patch on 14 March 2017,[15] nearly two months before the attack. The patch was to the Server Message Block (SMB) protocol used by Windows.[28] Organizations that lacked this security patch were affected for this reason, although there is so far no evidence that any were specifically targeted by the ransomware developers.[28] Any organization still running the older Windows XP[29] were at particularly high risk because until 13 May,[2] no security patches had been released since April 2014.[30] Following the attack, Microsoft released a security patch for Windows XP.[2]

According to Wired, affected systems will also have had the DOUBLEPULSAR backdoor installed; this will also need to be removed when systems are cleaned up.[31]

Impact

The ransomware campaign was unprecedented in scale according to Europol.[5] The attack affected many NHS hospitals in the UK.[32] On 12 May, some NHS services had to turn away non-critical emergencies, and some ambulances were diverted.[7][33] In 2016, thousands of computers in 42 separate NHS trusts in England were reported to be still running Windows XP.[29]Nissan Motor Manufacturing UK in Tyne and Wear, one of Europe‘s most productive car manufacturing plants, halted production after the ransomware infected some of their systems. Renault also stopped production at several sites in an attempt to stop the spread of the ransomware.[34][35]

List of affected organizations

Response

Several hours after the initial release of the ransomware on 12 May 2017, a “kill switch” hardcoded into the malware was discovered. This allowed the spread of the initial infection to be halted by registering a domain name.[52] However, the kill switch appears to be a coding mistake on the part of the criminals, and variants without the kill switch are expected to be created.[53][54]

Reactions

Upon learning about the impact on the NHS, Edward Snowden said that if the NSA “had privately disclosed the flaw used to attack hospitals when they found it, not when they lost it, [the attack] may not have happened”.[55]

British Prime Minister Theresa May said of the ransomware, “This is not targeted at the NHS. It is an international attack. A number of countries and organizations have been affected.”[56]

Microsoft has created security patches for its now-unsupported versions of Windows, including Windows XP, Windows 8 and Windows Server 2003.[57]

See also

___

Story 2: American People Demand Congress Appoint Special Prosecutor — Investigate Obama’s Administration Use of Intelligence Community  (NSA, CIA, FBI, …) Warrantless Surveillance of Both Democrat and Republican Presidential Candidates — The Use Intelligence Information For Political Purposes Is A Felony! — Videos

Were senators under surveillance by Obama administration?

Obama Might have Spied on Rand Paul and Other Republicans

Tucker Carlson : Did Obama Admin Spy On President Trump’s Team “Compelling Evidence Revealed”

Trump slams Susan Rice over refusal to testify

What is the status of the Susan Rice investigation?

Sen Rand Paul Destroys Morning Joe Panel Over Trump Spying Allegations

Dr. Gorka: Susan Rice controversy more than ‘just smoke’

David Bossie: These are criminal acts by Susan Rice

Where does the Susan Rice story go from here?

Byron York reacts to Clapper denying wiretap of Trump

White House asks Congress to investigate Obama 5 Mar 2017

White House Asks Congress To Investigate Wiretap Claim – America’s Newsroom

Multiple Felonies Committed By Obama Admin. Obama Surveillance on Trump.

Obama stopped FBI from revealing russia probe, so surveillance of Trump could continue in 2016/2017

Surveillance Confirmed Of President Trump. Obama spied on Trump. where is the arrest?

FIRING: HERRIDGE FINDS NAIL IN COMEY COFFIN

 

The Pronk Pops Show Podcasts Portfolio

Listen To Pronk Pops Podcast or Download Shows 889-893

Listen To Pronk Pops Podcast or Download Shows 884-888

Listen To Pronk Pops Podcast or Download Shows 878-883

Listen To Pronk Pops Podcast or Download Shows 870-877

Listen To Pronk Pops Podcast or Download Shows 864-869

Listen To Pronk Pops Podcast or Download Shows 857-863

Listen To Pronk Pops Podcast or Download Shows 850-856

Listen To Pronk Pops Podcast or Download Shows 845-849

Listen To Pronk Pops Podcast or Download Shows 840-844

Listen To Pronk Pops Podcast or Download Shows 833-839

Listen To Pronk Pops Podcast or Download Shows 827-832

Listen To Pronk Pops Podcast or Download Shows 821-826

Listen To Pronk Pops Podcast or Download Shows 815-820

Listen To Pronk Pops Podcast or Download Shows 806-814

Listen To Pronk Pops Podcast or Download Shows 800-805

Listen To Pronk Pops Podcast or Download Shows 793-799

Listen To Pronk Pops Podcast or Download Shows 785-792

Listen To Pronk Pops Podcast or Download Shows 777-784

Listen To Pronk Pops Podcast or Download Shows 769-776

Listen To Pronk Pops Podcast or Download Shows 759-768

Listen To Pronk Pops Podcast or Download Shows 751-758

Listen To Pronk Pops Podcast or Download Shows 745-750

Listen To Pronk Pops Podcast or Download Shows 738-744

Listen To Pronk Pops Podcast or Download Shows 732-737

Listen To Pronk Pops Podcast or Download Shows 727-731

Listen To Pronk Pops Podcast or Download Shows 720-726

Listen To Pronk Pops Podcast or DownloadShows 713-719

Listen To Pronk Pops Podcast or DownloadShows 705-712

Listen To Pronk Pops Podcast or Download Shows 695-704

Listen To Pronk Pops Podcast or Download Shows 685-694

Listen To Pronk Pops Podcast or Download Shows 675-684

Listen To Pronk Pops Podcast or Download Shows 668-674

Listen To Pronk Pops Podcast or Download Shows 660-667

Listen To Pronk Pops Podcast or Download Shows 651-659

Listen To Pronk Pops Podcast or Download Shows 644-650

Listen To Pronk Pops Podcast or Download Shows 637-643

Listen To Pronk Pops Podcast or Download Shows 629-636

Listen To Pronk Pops Podcast or Download Shows 617-628

Listen To Pronk Pops Podcast or Download Shows 608-616

Listen To Pronk Pops Podcast or Download Shows 599-607

Listen To Pronk Pops Podcast or Download Shows 590-598

Listen To Pronk Pops Podcast or Download Shows 585- 589

Listen To Pronk Pops Podcast or Download Shows 575-584

Listen To Pronk Pops Podcast or Download Shows 565-574

Listen To Pronk Pops Podcast or Download Shows 556-564

Listen To Pronk Pops Podcast or Download Shows 546-555

Listen To Pronk Pops Podcast or Download Shows 538-545

Listen To Pronk Pops Podcast or Download Shows 532-537

Listen To Pronk Pops Podcast or Download Shows 526-531

Listen To Pronk Pops Podcast or Download Shows 519-525

Listen To Pronk Pops Podcast or Download Shows 510-518

Listen To Pronk Pops Podcast or Download Shows 500-509

Listen To Pronk Pops Podcast or Download Shows 490-499

Listen To Pronk Pops Podcast or Download Shows 480-489

Listen To Pronk Pops Podcast or Download Shows 473-479

Listen To Pronk Pops Podcast or Download Shows 464-472

Listen To Pronk Pops Podcast or Download Shows 455-463

Listen To Pronk Pops Podcast or Download Shows 447-454

Listen To Pronk Pops Podcast or Download Shows 439-446

Listen To Pronk Pops Podcast or Download Shows 431-438

Listen To Pronk Pops Podcast or Download Shows 422-430

Listen To Pronk Pops Podcast or Download Shows 414-421

Listen To Pronk Pops Podcast or Download Shows 408-413

Listen To Pronk Pops Podcast or Download Shows 400-407

Listen To Pronk Pops Podcast or Download Shows 391-399

Listen To Pronk Pops Podcast or Download Shows 383-390

Listen To Pronk Pops Podcast or Download Shows 376-382

Listen To Pronk Pops Podcast or Download Shows 369-375

Listen To Pronk Pops Podcast or Download Shows 360-368

Listen To Pronk Pops Podcast or Download Shows 354-359

Listen To Pronk Pops Podcast or Download Shows 346-353

Listen To Pronk Pops Podcast or Download Shows 338-345

Listen To Pronk Pops Podcast or Download Shows 328-337

Listen To Pronk Pops Podcast or Download Shows 319-327

Listen To Pronk Pops Podcast or Download Shows 307-318

Listen To Pronk Pops Podcast or Download Shows 296-306

Listen To Pronk Pops Podcast or Download Shows 287-295

Listen To Pronk Pops Podcast or Download Shows 277-286

Listen To Pronk Pops Podcast or Download Shows 264-276

Listen To Pronk Pops Podcast or Download Shows 250-263

Listen To Pronk Pops Podcast or Download Shows 236-249

Listen To Pronk Pops Podcast or Download Shows 222-235

Listen To Pronk Pops Podcast or Download Shows 211-221

Listen To Pronk Pops Podcast or Download Shows 202-210

Listen To Pronk Pops Podcast or Download Shows 194-201

Listen To Pronk Pops Podcast or Download Shows 184-193

Listen To Pronk Pops Podcast or Download Shows 174-183

Listen To Pronk Pops Podcast or Download Shows 165-173

Listen To Pronk Pops Podcast or Download Shows 158-164

Listen To Pronk Pops Podcast or Download Shows151-157

Listen To Pronk Pops Podcast or Download Shows 143-150

Listen To Pronk Pops Podcast or Download Shows 135-142

Listen To Pronk Pops Podcast or Download Shows 131-134

Listen To Pronk Pops Podcast or Download Shows 124-130

Listen To Pronk Pops Podcast or Download Shows 121-123

Listen To Pronk Pops Podcast or Download Shows 118-120

Listen To Pronk Pops Podcast or Download Shows 113 -117

Listen To Pronk Pops Podcast or Download Show 112

Listen To Pronk Pops Podcast or Download Shows 108-111

Listen To Pronk Pops Podcast or Download Shows 106-108

Listen To Pronk Pops Podcast or Download Shows 104-105

Listen To Pronk Pops Podcast or Download Shows 101-103

Listen To Pronk Pops Podcast or Download Shows 98-100

Listen To Pronk Pops Podcast or Download Shows 94-97

Listen To Pronk Pops Podcast or Download Show 93

Listen To Pronk Pops Podcast or Download Show 92

Listen To Pronk Pops Podcast or Download Show 91

Listen To Pronk Pops Podcast or Download Shows 88-90

Listen To Pronk Pops Podcast or Download Shows 84-87

Listen To Pronk Pops Podcast or Download Shows 79-83

Listen To Pronk Pops Podcast or Download Shows 74-78

Listen To Pronk Pops Podcast or Download Shows 71-73

Listen To Pronk Pops Podcast or Download Shows 68-70

Listen To Pronk Pops Podcast or Download Shows 65-67

Listen To Pronk Pops Podcast or Download Shows 62-64

Listen To Pronk Pops Podcast or Download Shows 58-61

Listen To Pronk Pops Podcast or Download Shows 55-57

Listen To Pronk Pops Podcast or Download Shows 52-54

Listen To Pronk Pops Podcast or Download Shows 49-51

Listen To Pronk Pops Podcast or Download Shows 45-48

Listen To Pronk Pops Podcast or Download Shows 41-44

Listen To Pronk Pops Podcast or Download Shows 38-40

Listen To Pronk Pops Podcast or Download Shows 34-37

Listen To Pronk Pops Podcast or Download Shows 30-33

Listen To Pronk Pops Podcast or Download Shows 27-29

Listen To Pronk Pops Podcast or Download Shows 17-26

Listen To Pronk Pops Podcast or Download Shows 16-22

Listen To Pronk Pops Podcast or Download Shows 10-15

Listen To Pronk Pops Podcast or Download Shows 1-9

Read Full Post | Make a Comment ( None so far )

The Pronk Pops Show 853, March 8, 2017, Story 1: Republicans United For Clean Repeal of Obamacare and Divided On Obamacare Replacement — Conservatives, Classical Liberals and Libertarians Oppose House Rollover Republican Ryancare — CATO Institute, Club for Growth, Freedom Works Heritage Foundation and House Freedom Caucus, Republican Study Committee and American People All Oppose Obamacare 2.0 Lite — Support Senator Rand Paul’s Bill and Freedom Caucus — Negotiate — Negotiate — Negotiate — Videos — Story 2: Wikileaks Vault 7 Release Reveals CIA’s Collection of Hacking Tools and Malware of Secret Surveillance Spying Security State (S5) — Intelligence Community Are Listening and Watching — George Orwell Was An Optimist — Two Party Turnkey Tyranny — Videos -_

Posted on March 8, 2017. Filed under: Addiction, American History, Animal, Benghazi, Blogroll, Breaking News, Communications, Congress, Constitutional Law, Corruption, Countries, Culture, Defense Spending, Donald J. Trump, Donald Trump, Elections, Fast and Furious, Government, Government Dependency, Government Spending, Hate Speech, Health, Health Care, Health Care Insurance, Hillary Clinton, History, House of Representatives, Human Behavior, Illegal Immigration, Illegal Immigration, Immigration, Independence, Iran Nuclear Weapons Deal, Islam, Law, Legal Immigration, Life, Lying, Medicare, Obama, Philosophy, Photos, Politics, Polls, Progressives, Rand Paul, Raymond Thomas Pronk, Religion, Scandals, Science, Security, Senate, Social Science, Social Security, Socials Security, Spying, Taxation, Taxes, Terror, Terrorism, Unemployment, Videos, Violence, War, Wealth, Weather, Welfare Spending, Wisdom | Tags: , , , , , , , , , , , , |

Project_1

The Pronk Pops Show Podcasts

Pronk Pops Show 853: March 8, 2017

Pronk Pops Show 852: March 6, 2017

Pronk Pops Show 851: March 3, 2017

Pronk Pops Show 850: March 2, 2017

Pronk Pops Show 849: March 1, 2017

Pronk Pops Show 848: February 28, 2017

Pronk Pops Show 847: February 27, 2017

Pronk Pops Show 846: February 24, 2017

Pronk Pops Show 845: February 23, 2017

Pronk Pops Show 844: February 22, 2017

Pronk Pops Show 843: February 21, 2017

Pronk Pops Show 842: February 20, 2017

Pronk Pops Show 841: February 17, 2017

Pronk Pops Show 840: February 16, 2017

Pronk Pops Show 839: February 15, 2017

Pronk Pops Show 838: February 14, 2017

Pronk Pops Show 837: February 13, 2017

Pronk Pops Show 836: February 10, 2017

Pronk Pops Show 835: February 9, 2017

Pronk Pops Show 834: February 8, 2017

Pronk Pops Show 833: February 7, 2017

Pronk Pops Show 832: February 6, 2017

Pronk Pops Show 831: February 3, 2017

Pronk Pops Show 830: February 2, 2017

Pronk Pops Show 829: February 1, 2017

Pronk Pops Show 828: January 31, 2017

Pronk Pops Show 827: January 30, 2017

Pronk Pops Show 826: January 27, 2017

Pronk Pops Show 825: January 26, 2017

Pronk Pops Show 824: January 25, 2017

Pronk Pops Show 823: January 24, 2017

Pronk Pops Show 822: January 23, 2017

Pronk Pops Show 821: January 20, 2017

Pronk Pops Show 820: January 19, 2017

Pronk Pops Show 819: January 18, 2017

Pronk Pops Show 818: January 17, 2017

Pronk Pops Show 817: January 13, 2017

Pronk Pops Show 816: January 12, 2017

Pronk Pops Show 815: January 11, 2017

Pronk Pops Show 814: January 10, 2017

Pronk Pops Show 813: January 9, 2017

Pronk Pops Show 812: December 12, 2016

Pronk Pops Show 811: December 9, 2016

Pronk Pops Show 810: December 8, 2016

Pronk Pops Show 809: December 7, 2016

Pronk Pops Show 808: December 6, 2016

Pronk Pops Show 807: December 5, 2016

Pronk Pops Show 806: December 2, 2016

Pronk Pops Show 805: December 1, 2016

 

Story 1: Republicans United For Clean Repeal of Obamacare and Divided On Obamacare Replacement — Conservatives, Classical Liberals and Libertarians Oppose House Rollover Republican Ryancare — CATO Institute, Club for Growth, Freedom Works Heritage Foundation and House Freedom Caucus,  Republican Study Committee and American People  All Oppose Obamacare 2.0 Lite — Support Senator Rand Paul’s Bill and Freedom Caucus — Negotiate — Negotiate — Negotiate — Videos — 

Image result for cartoons on repeal and repace obamacare

Image result for cartoon branco republican repeal and replace obamacare

Image result for vault 7 cia

Image result for cartoons on obamacare

Conservative Freedom Caucus Torpedoes GOP Obamacare Replacement

MAJOR: Paul Ryan Introduces American Health Care Act, House GOP’s Obamacare Replacement

SABOTAGE! WHAT PAUL RYAN JUST DID TO TRUMPCARE PROVES HE’S A TRAITOR TO THE PRESIDENT

Speaker Paul Ryan: There isn’t chaos in GOP-led Congress

SEAN HANNITY INTERVIEWS TOM PRICE ABOUT TRUMP’S NEW HEALTHCARE PLAN – 3/7/17

Trump’s HHS Secretary On Obamacare Replacement Bill

Ingraham takes issue with GOP’s health care replacement bill

Herman Cain on Obamacare replacement bill: Consumers now back in charge

Laffer: Obamacare replacement bill worth 2,000-3,000 points on the Dow

President Trump Holds Meeting On Obamacare Replacement with House Deputy Whip Team 3/7/17

GOP releases Obamacare replacement details

York: Fate of GOP health care bill lies with Freedom Caucus

Republicans unveil Obamacare replacement

Trump backs healthcare tax credit amid conservative opposition

Sen. Rand Paul unveils ObamaCare replacement plan

Conservatives lash out at House GOP’s Obamacare replacement bill

March 7 at 3:01 PM
Influential conservative lawmakers and activist groups panned health-care legislation drafted by House Republican leaders Tuesday, throwing the GOP’s plan to undo the Affordable Care Act in serious doubt less than 24 hours after it was released.Those groups dubbed the House bill, backed by House Speaker Paul D. Ryan (R-Wis.), as “Obamacare Lite,” “RyanCare” or “RINOcare” — a reference to “Republican in name only,” a popular conservative epithet for establishment politicians.The Ryan-backed bill offers a more conservative vision for the nation’s health-care system, replacing federal insurance subsidies with a new form of individual tax credits and phasing out most of the ACA’s taxes. But key lawmakers and outside groups, who can rile up the party’s base against legislative plans, said the legislation does not go far enough in pulling back elements of President Barack Obama’s overhaul.“The House Republican proposal released last night not only accepts the flawed progressive premises of Obamacare but expands upon them,” Michael Needham, the head of Heritage Action for America, said in a statement Tuesday. “Congressional Republicans should fully repeal the failed law and begin a genuine effort to deliver on longstanding campaign promises that create a free market health care system.”Two other groups, FreedomWorks and the Club for Growth, decried the plans Tuesday as a betrayal of campaign promises.

A day after House Republicans released a plan to supplant the Affordable Care Act, Sen. Rand Paul (R-Ky.) outlined the issues he has with their proposal, indicating it might be unconstitutional. (Alice Li, Jayne Orenstein/The Washington Post)

“If this warmed-over substitute for government-run health care remains unchanged, the Club for Growth will key vote against it,” said the group’s president, David McIntosh, referring to a process in which lawmakers are graded on their votes, the better to use them as ammunition on the campaign trail.

The dilemma Republican congressional leaders face is, if they change the legislation to appease hard-line conservatives, they are likely to alienate more-moderate members who are wary of disrupting insurance markets and taking coverage away from those who gained it under the ACA.

The margin for dissent is slim: Assuming no Democrats break ranks to support the bill, for the overhaul to pass, Republicans can lose only 21 votes in the House and two votes in the Senate.

CONTENT FROM WELLS FARGO ADVISORS
Keep these factors in mind when planning for retirement
Understanding the risks that can come between you and the retirement you want is an important step toward meeting your goals.

Four key Republicans in the Senate have expressed worries about the plan’s possible impact on lower-income people who received Medicaid coverage through the ACA’s expansion of that program. The four senators are split on exactly what proposals would meet their standards, but none are likely to support the course of action favored by many conservatives — passing a 2015 bill that repealed key ACA provisions without immediately including replacement provisions.

There were some signs of hope for the House plan Tuesday. President Trump offered an early boost to GOP leaders with a morning tweet: “Our wonderful new Healthcare Bill is now out for review and negotiation. ObamaCare is a complete and total disaster — is imploding fast!”

Vice President Pence attended a Senate Republican policy luncheon Tuesday and, in a break with normal practice, joined Senate Majority Leader Mitch McConnell and other GOP leaders at a news conference afterward to defend the House approach as “the framework for reform.”

“We are certainly open to improvements and recommendations in the legislative process, but this is the bill, and the president supports the American Health Care Act,” he said. “We are looking forward to working very directly with leadership in the House and the Senate in the weeks ahead. We are very confident that the American Health Care Act, with their help, will be on the president’s desk.”

In another sign of the administration’s support, Health and Human Services Secretary Tom Price sent a letter Tuesday to the chairmen of the two House committees processing the legislation, calling it a “necessary and important first step toward fulfilling our promises to the American people.”

But Price, who authored a similar ACA replacement proposal when he served in the House, said that achieving all of Trump’s health-care goals “will require more than what is possible” in the current legislation, which is limited in its scope to take advantage of special budget rules allowing for easier Senate passage.

He specifically mentioned allowing insurance to be sold across state lines, pharmaceutical cost reductions and “medical legal reforms,” an apparent reference to long-standing GOP proposals to limit malpractice liability.

Senate Majority Leader Mitch McConnell (R-Ky.) offered measured support for the proposed legislation and said he would bring it to the Senate floor should it pass the House.

“I encourage every member to review [the legislation] because I hope to call it up when we receive it from the House,” McConnell said Tuesday on the Senate floor. “We’ve come a long way. We’ve got a lot further to go, but we’re making significant progress. Working arm in arm with the House and the new administration, we’re going to keep our promise to the American people.”

While some of the fiercest criticism came from hard-right activist groups that have dogged Republican congressional leaders for years, other more establishment-minded organs joined the chorus of dissent.

National Review published an editorial Tuesday that said the legislation was “a disappointment” and has “serious flaws even as a first step toward full repeal and replacement.”

Republicans, the influential conservative magazine said, “would be better off rallying behind a bill in which they really believe, even if Democrats kill it with a filibuster,than trying and failing to enact a bill that they support only tepidly.”

Leaders involved in drafting the bills sought to defend their plan against the onslaught of criticism, describing it as the product of months of internal discussions and saying its details could still change.

“We now have a bill that’s available for all to read,” said Rep. Greg Walden (R-Ore.), chairman of the House Energy and Commerce Committee, which helped craft one of them, at a news conference Tuesday. “I’d encourage them to do it. I’d encourage them to look against their own bills and what they’ve supported in the past. And then let’s have a thoughtful legislative discussion.”

Rep. Kevin Brady (R-Tex.), chairman of the House Ways and Means Committee, which produced the other bill, said: “As Republicans, we have a choice. We can act now, or we can keep fiddling around and squander this opportunity to repeal Obamacare and begin a new chapter of freedom for the American people. House Republicans are choosing to act now.”

Still, agitation among conservatives was evident Monday night and poured into Tuesday.

CONTENT FROM WELLS FARGO ADVISORS
Keep these factors in mind when planning for retirement
Understanding the risks that can come between you and the retirement you want is an important step toward meeting your goals.

“Keep the ‘Cadillac’ tax in place? Keep Medicaid in place until 2020?” said Rep. Jim Jordan (R-Ohio), a co-founder of the House Freedom Caucus, referring to high-priced health-care plans. “We didn’t have Medicaid expansion in the bill we sent to President Obama, but we have it in the one we send to President Trump? That makes no sense to me.”

“Obamacare 2.0,” tweeted Rep. Justin Amash (R-Mich.), a libertarian who frequently breaks with GOP leadership.

Under two bills drafted by separate House committees, the government would no longer penalize Americans for failing to have health insurance but would try to encourage people to maintain coverage by allowing insurers to impose a 30 percent surcharge for those who do not have continuous coverage.

The legislation would preserve two of the most popular features of the 2010 health-care law, letting young adults stay on their parents’ health plans until age 26 and forbidding insurers to deny coverage or charge more to people with preexisting medical problems. It would also target Planned Parenthood, rendering the women’s health organization ineligible for Medicaid reimbursements or federal family -planning grants — a key priority for antiabortion groups.

Taken together, the bills introduced Monday represent the Republicans’ first attempt — and best shot to date, with an ally in the White House — to translate into action seven years of talking points about demolishing the ACA.

At the same time, major aspects of the House GOP plan reflect the treacherous terrain that Republicans face to win enough votes within their own conferences in the GOP-controlled House and Senate.

The bills must address concerns of both conservatives worried about the plan’s cost and the notion it might enshrine a new federal entitlement, as well as more moderate members who want to ensure that their constituents, including those who received coverage under the ACA’s Medicaid expansion, retain access to affordable health care.

The Freedom Caucus, a block of roughly 30 House hard-liners who criticized earlier versions of the bill, is set to meet Tuesday night to discuss the health-care bill and perhaps develop a list of demands to present to GOP leaders.

Members of the Republican Study Committee, a larger conservative group, were already critical of key elements of the plan. “This is a Republican welfare entitlement,” reads an RSC analysis distributed late Monday, addressing the inclusion of refundable tax credits in the plan.

With no Democrats expected to vote to pass the bill and four House GOP seats vacant, Republicans can afford to lose no more than 21 members in the lower chamber.

In recognition of the close vote that is expected, House Majority Whip Steve Scalise (R-La.) and several deputy whips are expected to visit the White House Tuesday afternoon to discuss the health-care bill with Trump administration officials.

On Tuesday morning, Trump signaled the work on the proposal was not completely finished, referring to selling insurance across state lines and saying that change would come in “phase 2 & 3 of healthcare rollout.” The president also said he was “working on new system where there will be competition in the Drug Industry” that will lead prices to “come way down.”

Conservative critics of the measure had noted the plan’s exclusion of selling insurance across state lines. “The problems with this bill are not just what’s in it, but also what’s missing,” said McIntosh.

Yet attacks from the right were not the only challenge facing Republican leaders.

Four key Republican senators, all from states that opted to expand Medicaid under the ACA, said they would oppose any new plan that would leave millions of Americans uninsured.

“We will not support a plan that does not include stability for Medicaid expansion populations or flexibility for states,” Sens. Rob Portman (Ohio), Shelley Moore Capito (W.Va.), Cory Gardner (Colo.) and Lisa Murkowski (Alaska) wrote in a letter to McConnell on Monday.

The plan from House Republicans would substantially redesign Medicaid with the goal of balancing the GOP’s antipathy toward the ACA’s expansion of the program against the concerns of a significant cadre of Republican governors — and the lawmakers from their states — who fear losing millions of dollars that the law has funneled to help insure low-income residents.

Democrats, meanwhile, have given no indication that they intend to work with Republicans, and top party leaders decried the GOP plan Monday as a betrayal of everyday Americans. “Trumpcare doesn’t replace the Affordable Care Act, it forces millions of Americans to pay more for less care,” said Senate Minority Leader Charles E. Schumer (D-N.Y.).

In particular, the plan to target Planned Parenthood has already generated fierce pushback from Democrats and doubts from some Republicans who have noted that federal funds are already barred from funding abortions and that Planned Parenthood provides routine medical care to millions of American women.

https://www.washingtonpost.com/powerpost/house-leaders-brace-for-the-task-ahead-selling-obamacare-lite/2017/03/07/ab2f721e-02e5-11e7-ad5b-d22680e18d10_story.html?utm_term=.b64bbc38491c

A Disappointing Start

by THE EDITORS March 7, 2017 12:45 PM We believe that Obamacare should be repealed and replaced with policies that enable Americans to make their own decisions about what sort of health insurance to

We believe that Obamacare should be repealed and replaced with policies that enable Americans to make their own decisions about what sort of health insurance to buy, and that their options should include low-premium coverage that protects them against the risk of major financial setbacks resulting from health care. The legislation released last night by House Republicans is, even on the most charitable reading, only a first step toward that goal.

It does not repeal all of Obamacare, leaving many of its regulations in place. The apparent rationale for this omission is that eliminating the regulations would subject the legislation to a fatal Senate filibuster. We have recommended that Republicans defang the regulations by replacing Obamacare’s subsidies with a simple new tax credit that people could use to buy insurance governed by a new, lighter regulatory regime. That way Obamacare’s regulations would stay on the books but no longer hinder consumer choice. But Republicans shrank from this option, too.

We disagree with this tactical decision, which places Senate parliamentary rules — or, rather, places guesses about how those rules would operate — ahead of good health policy and making good on longstanding party promises. It also seems to us that Republicans would be better off rallying behind a bill in which they really believe, even if Democrats kill it with a filibuster, than trying and failing to enact a bill that they support only tepidly. That second outcome may now take place.

Moreover, the legislation has some serious flaws even as a first step toward full repeal and replacement. It eliminates Obamacare’s fines on people who go without insurance, but in their place creates a new surcharge for people who let their insurance lapse and then try to purchase a new policy. The goal is to keep healthy people from leaving the insurance rolls and thus destabilizing insurance markets.

The surcharge is a heavy-handed instrument: Insurers would be obligated to impose it regardless of their preferences. Yet the surcharge might not achieve its goal. A lot of healthy people might well decide to go without insurance and run the risk of paying a surcharge if they get sick later. The surcharge even undermines its own goal, since it would discourage healthy people who had already left the insurance rolls from getting back on them.

The bill has its good points. If the surcharge works, the deregulation in the bill would lower premiums. Many of Obamacare’s taxes would be repealed. Obamacare’s tax credits create high effective marginal tax rates for people in the lower middle class; the bill’s replacement tax credits would avoid this problem. Permissible contributions to and limits on health savings accounts would be loosened. Federal contributions to Medicaid would be capped, ending the perverse incentives that have for decades enabled the growth of the program. All in all, though, the bill is a disappointment. And it is not too late to get a second opinion.

All in all, though, the bill is a disappointment. And it is not too late to get a second opinion.

 http://www.nationalreview.com/article/445558/obamacare-replacement-republican-plan-house-representatives-disappointing

Story 2: Wikileaks Vault 7 Release Reveals CIA’s Collection of Hacking Tools and Malware of Secret Surveillance Spying Security State (S5) — Intelligence Community Are Listening and Watching — George Orwell Was An Optimist — Two Party Turnkey Tyranny — Videos — 

Image result for vault 7 cia

Image result for vault 7 cia

Image result for george orwell quotesImage result for george orwell quotesImage result for george orwell quotesImage result for george orwell quotesImage result for george orwell quotesImage result for george orwell quotesImage result for george orwell quotesImage result for george orwell quotesImage result for george orwell quotesImage result for george orwell quotesImage result for george orwell quotesImage result for george orwell quotesImage result for george orwell quotesImage result for george orwell quotesImage result for george orwell quotesImage result for george orwell quotes

Image result for george orwell quotesImage result for george orwell quotes

Image result for george orwell quotesImage result for george orwell quotesImage result for george orwell quotesImage result for george orwell quotesImage result for george orwell quotesImage result for george orwell quotesImage result for george orwell quotesImage result for george orwell quotes

Image result for george orwell quotes

Ari Fleischer on CIA leaks, wiretapping claims

Wikileaks Claims CIA Is Hacking Americans’ Electronics – Tucker Carlson Tonight – Fox News – 3/7/17

Wikileaks dumps information claiming proof of CIA hacking

What Pisses Me Off About Wikileaks Vault 7 Release

‘Cyber warfare is a new frontline’: CIA created malware designed to penetrate software – WikiLeaks

VAULT 7: CIA Staged Fake Russian Hacking to Set Up Trump — Russian Cyber-Attack M.O. As False Flag

Former CIA Director: Wikileaks Dump Could Be ‘Very Damaging’ | Andrea Mitchell | MSNBC

On the Russia Lunacy & Wikileaks BOMBSHELL Leak of CIA Hacking Force

Wikileaks Vault 7: A Massive and Confusing Revelation

WikiLeaks UNLEASHES ‘Year Zero’ CIA Hacking Tools (Vault 7)

WIKILEAKS VAULT 7: The C.I.A. Is Listening Via Everything

Inside Vault 7: CIA Hacking Tools Published by Wikileaks

George Orwell 1984 Telescreen Exercise

Nineteen Eighty-Four (1984) – Last Scene

ANIMAL FARM – full movie

1984 George Orwell – Full Movie – Hollywood best Greatest blockbuster movie Film

Watch Nineteen Eighty Four Watch Movies Online Free

George Orwell: A Life in Pictures Full Documentary (High Quality)

A Final Warning from George Orwell

Wikileaks Unveils ‘Vault 7’: “The Largest Ever Publication Of Confidential CIA Documents”; Another Snowden Emerges

Tyler Durden's picture

TwitterFacebookReddit

WikiLeaks has published what it claims is the largest ever release of confidential documents on the CIA. It includes more than 8,000 documents as part of ‘Vault 7’, a series of leaks on the agency, which have allegedly emerged from the CIA’s Center For Cyber Intelligence in Langley, and which can be seen on the org chart below, which Wikileaks also released:

A total of 8,761 documents have been published as part of ‘Year Zero’, the first in a series of leaks the whistleblower organization has dubbed ‘Vault 7.’ WikiLeaks said that ‘Year Zero’ revealed details of the CIA’s “global covert hacking program,” including “weaponized exploits” used against company products including “Apple’s iPhone, Google’s Android and Microsoft’s Windows and even Samsung TVs, which are turned into covert microphones.”

WikiLeaks tweeted the leak, which it claims came from a network inside the CIA’s Center for Cyber Intelligence in Langley, Virginia.

Among the more notable disclosures which, if confirmed, “would rock the technology world“, the CIA had managed to bypass encryption on popular phone and messaging services such as Signal, WhatsApp and Telegram. According to the statement from WikiLeaks, government hackers can penetrate Android phones and collect “audio and message traffic before encryption is applied.”

Another profound revelation is that the CIA can engage in “false flag” cyberattacks which portray Russia as the assailant. Discussing the CIA’s Remote Devices Branch’s UMBRAGE group, Wikileaks’ source notes that it “collects and maintains a substantial library of attack techniques ‘stolen’ from malware produced in other states including the Russian Federation.

“With UMBRAGE and related projects the CIA cannot only increase its total number of attack types but also misdirect attribution by leaving behind the “fingerprints” of the groups that the attack techniques were stolen from. UMBRAGE components cover keyloggers, password collection, webcam capture, data destruction, persistence, privilege escalation, stealth, anti-virus (PSP) avoidance and survey techniques.”

As Kim Dotcom summarizes this finding, “CIA uses techniques to make cyber attacks look like they originated from enemy state. It turns DNC/Russia hack allegation by CIA into a JOKE

CIA uses techniques to make cyber attacks look like they originated from enemy state. It turns DNC/Russia hack allegation by CIA into a JOKE

But perhaps what is most notable is the purported emergence of another Snowden-type whistleblower: the source of the information told WikiLeaks in a statement that they wish to initiate a public debate about the “security, creation, use, proliferation and democratic control of cyberweapons.”  Policy questions that should be debated in public include “whether the CIA’s hacking capabilities exceed its mandated powers and the problem of public oversight of the agency,” WikiLeaks claims the source said.

The FAQ section of the release, shown below, provides further details on the extent of the leak, which was “obtained recently and covers through 2016”. The time period covered in the latest leak is between the years 2013 and 2016, according to the CIA timestamps on the documents themselves. Secondly, WikiLeaks has asserted that it has not mined the entire leak and has only verified it, asking that journalists and activists do the leg work.

Among the various techniques profiled by WikiLeaks is “Weeping Angel”, developed by the CIA’s Embedded Devices Branch (EDB), which infests smart TVs, transforming them into covert microphones. After infestation, Weeping Angel places the target TV in a ‘Fake-Off’ mode, so that the owner falsely believes the TV is off when it is on. In ‘Fake-Off’ mode the TV operates as a bug, recording conversations in the room and sending them over the Internet to a covert CIA server.

As Kim Dotcom chimed in on Twitter, “CIA turns Smart TVs, iPhones, gaming consoles and many other consumer gadgets into open microphones” and added ” CIA turned every Microsoft Windows PC in the world into spyware. Can activate backdoors on demand, including via Windows update”

BREAKING: CIA turns Smart TVs, iPhones, gaming consoles and many other consumer gadgets into open microphones.

Dotcom also added that “Obama accused Russia of cyberattacks while his CIA turned all internet enabled consumer electronics in Russia into listening devices. Wow!”

Obama accused Russia of cyberattacks while his CIA turned all internet enabled consumer electronics in Russia into listening devices. Wow!

Julian Assange, WikiLeaks editor stated that “There is an extreme proliferation risk in the development of cyber ‘weapons’. Comparisons can be drawn between the uncontrolled proliferation of such ‘weapons’, which results from the inability to contain them combined with their high market value, and the global arms trade. But the significance of “Year Zero” goes well beyond the choice between cyberwar and cyberpeace. The disclosure is also exceptional from a political, legal and forensic perspective.”

Key Highlights from the Vault 7 release so far:

  • “Year Zero” introduces the scope and direction of the CIA’s global covert hacking program, its malware arsenal and dozens of “zero day” weaponized exploits against a wide range of U.S. and European company products, include Apple’s iPhone, Google’s Android and Microsoft’s Windows and even Samsung TVs, which are turned into covert microphones.
  • Wikileaks claims that the CIA lost control of the majority of its hacking arsenal including malware, viruses, trojans, weaponized “zero day” exploits, malware remote control systems and associated documentation. This extraordinary collection, which amounts to more than several hundred million lines of code, gives its possessor the entire hacking capacity of the CIA. The archive appears to have been circulated among former U.S. government hackers and contractors in an unauthorized manner, one of whom has provided WikiLeaks with portions of the archive.
  • By the end of 2016, the CIA’s hacking division, which formally falls under the agency’s Center for Cyber Intelligence (CCI), had over 5000 registered users and had produced more than a thousand hacking systems, trojans, viruses, and other “weaponized” malware. Such is the scale of the CIA’s undertaking that by 2016, its hackers had utilized more code than that used to run Facebook.
  • The CIA had created, in effect, its “own NSA” with even less accountability and without publicly answering the question as to whether such a massive budgetary spend on duplicating the capacities of a rival agency could be justified.
  • Once a single cyber ‘weapon’ is ‘loose’ it can spread around the world in seconds, to be used by rival states, cyber mafia and teenage hackers alike.

Snowden 2.0?

  • In a statement to WikiLeaks the source details policy questions that they say urgently need to be debated in public, including whether the CIA’s hacking capabilities exceed its mandated powers and the problem of public oversight of the agency. The source wishes to initiate a public debate about the security, creation, use, proliferation and democratic control of cyberweapons.

CIA targets iPhones, Androids, smart TVs:

  • CIA malware and hacking tools are built by EDG (Engineering Development Group), a software development group within CCI (Center for Cyber Intelligence), a department belonging to the CIA’s DDI (Directorate for Digital Innovation). The DDI is one of the five major directorates of the CIA (see this organizational chart of the CIA for more details).
  • The increasing sophistication of surveillance techniques has drawn comparisons with George Orwell’s 1984, but “Weeping Angel”, developed by the CIA’s Embedded Devices Branch (EDB), which infests smart TVs, transforming them into covert microphones, is surely its most emblematic realization.

Also cars, suggesting that the CIA may have a role in the death of Michael Hastings:

  • As of October 2014 the CIA was also looking at infecting the vehicle control systems used by modern cars and trucks.
  • The purpose of such control is not specified, but it would permit the CIA to engage in nearly undetectable assassinations.

And computers:

  • The CIA also runs a very substantial effort to infect and control Microsoft Windows users with its malware. This includes multiple local and remote weaponized “zero days”, air gap jumping viruses such as “Hammer Drill” which infects software distributed on CD/DVDs, infectors for removable media such as USBs, systems to hide data in images or in covert disk areas ( “Brutal Kangaroo”) and to keep its malware infestations going.

Hoarding of Zero Day exploits:

  • In the wake of Edward Snowden’s leaks about the NSA, the U.S. technology industry secured a commitment from the Obama administration that the executive would disclose on an ongoing basis — rather than hoard — serious vulnerabilities, exploits, bugs or “zero days” to Apple, Google, Microsoft, and other US-based manufacturers.
  • Serious vulnerabilities not disclosed to the manufacturers places huge swathes of the population and critical infrastructure at risk to foreign intelligence or cyber criminals who independently discover or hear rumors of the vulnerability. If the CIA can discover such vulnerabilities so can others.

Proliferation of leaked/hacked Cyberwar programs:

  • While nuclear proliferation has been restrained by the enormous costs and visible infrastructure involved in assembling enough fissile material to produce a critical nuclear mass, cyber ‘weapons’, once developed, are very hard to retain. Cyber ‘weapons’ are in fact just computer programs which can be pirated like any other. Since they are entirely comprised of information they can be copied quickly with no marginal cost.
  • Over the last three years the United States intelligence sector, which consists of government agencies such as the CIA and NSA and their contractors, such as Booze Allan Hamilton, has been subject to unprecedented series of data exfiltrations by its own workers.
  • Once a single cyber ‘weapon’ is ‘loose’ it can spread around the world in seconds, to be used by peer states, cyber mafia and teenage hackers alike.

The U.S. Consulate in Frankfurt is a covert CIA hacker base

  • In addition to its operations in Langley, Virginia the CIA also uses the U.S. consulate in Frankfurt as a covert base for its hackers covering Europe, the Middle East and Africa. CIA hackers operating out of the Frankfurt consulate ( “Center for Cyber Intelligence Europe” or CCIE) are given diplomatic (“black”) passports and State Department cover.
  • The instructions for incoming CIA hackers make Germany’s counter-intelligence efforts appear inconsequential: “Breeze through German Customs because you have your cover-for-action story down pat, and all they did was stamp your passport”

Examples of CIA projects

  • The CIA’s Engineering Development Group (EDG) management system contains around 500 different projects (only some of which are documented by “Year Zero”) each with their own sub-projects, malware and hacker tools. The majority of these projects relate to tools that are used for penetration, infestation (“implanting”), control, and exfiltration.
  • Umbrage: The CIA’s Remote Devices Branch’s UMBRAGE group collects and maintains a substantial library of attack techniques ‘stolen’ from malware produced in other states including the Russian Federation. With UMBRAGE and related projects the CIA cannot only increase its total number of attack types but also misdirect attribution by leaving behind the “fingerprints” of the groups that the attack techniques were stolen from.
  • Fine Dining:  Fine Dining comes with a standardized questionnaire i.e menu that CIA case officers fill out. The questionnaire is used by the agency’s OSB (Operational Support Branch) to transform the requests of case officers into technical requirements for hacking attacks (typically “exfiltrating” information from computer systems) for specific operations.  Among the list of possible targets of the collection are ‘Asset’, ‘Liason Asset’, ‘System Administrator’, ‘Foreign Information Operations’, ‘Foreign Intelligence Agencies’ and ‘Foreign Government Entities’. Notably absent is any reference to extremists or transnational criminals.
  • ‘Improvise’; a toolset for configuration, post-processing, payload setup and execution vector selection for survey/exfiltration tools supporting all major operating systems like Windows (Bartender), MacOS (JukeBox) and Linux (DanceFloor).
  • HIVE: HIVE is a multi-platform CIA malware suite and its associated control software. The project provides customizable implants for Windows, Solaris, MikroTik (used in internet routers) and Linux platforms and a Listening Post (LP)/Command and Control (C2) infrastructure to communicate with these implants. The implants are configured to communicate via HTTPS with the webserver of a cover domain; each operation utilizing these implants has a separate cover domain and the infrastructure can handle any number of cover domains.

And some key sections from the FAQ:

  • What time period is covered? The years 2013 to 2016. The sort order of the pages within each level is determined by date (oldest first). WikiLeaks has obtained the CIA’s creation/last modification date for each page but these do not yet appear for technical reasons. Usually the date can be discerned or approximated from the content and the page order. If it is critical to know the exact time/date contact WikiLeaks.
  • What is “Vault 7” “Vault 7” is a substantial collection of material about CIA activities obtained by WikiLeaks.
  • What is the total size of “Vault 7”? The series is the largest intelligence publication in history.
  • When was each part of “Vault 7” obtained?: Part one was obtained recently and covers through 2016. Details on the other parts will be available at the time of publication.
  • Is each part of “Vault 7” from a different source? Details on the other parts will be available at the time of publication.
  • How did WikiLeaks obtain each part of “Vault 7”? Sources trust WikiLeaks to not reveal information that might help identify them.
  • Isn’t WikiLeaks worried that the CIA will act against its staff to stop the series? No. That would be certainly counter-productive.

* * *

PREVIOUSLY

As a reminder, last night Wikileaks announced that it has released an encrypted torrent file which reportedly contains information on the mysterious “Vault 7”, and which we now know is the biggest “collection of material about CIA activities obtained by WikiLeaks.publication in history.” It can be downloaded now at the following URL, and accessed using the password “SplinterItIntoAThousandPiecesAndScatterItIntoTheWinds”

Wikileaks had previously announced that it would hold an 8am Eastern press conference, as part of the unveiling.

ANNOUNCE: WikiLeaks press conference in under five hours at 8am ET / 1pm UTC / 14:00 CET. Streamed live.

However, there appeared to have been some complications, with Wikileaks tweeting that “the press conference is under attack: Facebook+Periscope video used by WikiLeaks’ editor Julian Assange have been attacked. Activating contingency plans”

Press conf under attack: Facebook+Periscope video used by WikiLeaks’ editor Julian Assange have been attacked. Activating contingency (1/2)

Wikileaks then announced that “As Mr. Assange’s Perscipe+Facebook video stream links are under attack his video press conference will be rescheduled.”

NOTICE: As Mr. Assange’s Perscipe+Facebook video stream links are under attack his video press conference will be rescheduled.

In a separate tweet, Wikileaks has just released the passphrase to decrypt the torrent file: RELEASE: CIA Vault 7 Year Zero decryption passphrase:

SplinterItIntoAThousandPiecesAndScatterItIntoTheWinds

RELEASE: CIA Vault 7 Year Zero decryption passphrase:

SplinterItIntoAThousandPiecesAndScatterItIntoTheWinds

As a result, since Assange appears to have been unable to launch his previously scheduled press conference, he has gone ahead and issued the press release on Vault 7 Part 1 “Year Zero, which is titled: Inside the CIA’s global hacking force:

Press Release

Vault 7: CIA Hacking Tools Revealed

Today, Tuesday 7 March 2017, WikiLeaks begins its new series of leaks on the U.S. Central Intelligence Agency. Code-named “Vault 7” by WikiLeaks, it is the largest ever publication of confidential documents on the agency.

The first full part of the series, “Year Zero”, comprises 8,761 documents and files from an isolated, high-security network situated inside the CIA’s Center for Cyber Intelligence in Langley, Virgina. It follows an introductory disclosure last month of CIA targeting French political parties and candidates in the lead up to the 2012 presidential election.

Recently, the CIA lost control of the majority of its hacking arsenal including malware, viruses, trojans, weaponized “zero day” exploits, malware remote control systems and associated documentation. This extraordinary collection, which amounts to more than several hundred million lines of code, gives its possessor the entire hacking capacity of the CIA. The archive appears to have been circulated among former U.S. government hackers and contractors in an unauthorized manner, one of whom has provided WikiLeaks with portions of the archive.

“Year Zero” introduces the scope and direction of the CIA’s global covert hacking program, its malware arsenal and dozens of “zero day” weaponized exploits against a wide range of U.S. and European company products, include Apple’s iPhone, Google’s Android and Microsoft’s Windows and even Samsung TVs, which are turned into covert microphones.

Since 2001 the CIA has gained political and budgetary preeminence over the U.S. National Security Agency (NSA). The CIA found itself building not just its now infamous drone fleet, but a very different type of covert, globe-spanning force — its own substantial fleet of hackers. The agency’s hacking division freed it from having to disclose its often controversial operations to the NSA (its primary bureaucratic rival) in order to draw on the NSA’s hacking capacities.

By the end of 2016, the CIA’s hacking division, which formally falls under the agency’s Center for Cyber Intelligence (CCI), had over 5000 registered users and had produced more than a thousand hacking systems, trojans, viruses, and other “weaponized” malware. Such is the scale of the CIA’s undertaking that by 2016, its hackers had utilized more code than that used to run Facebook. The CIA had created, in effect, its “own NSA” with even less accountability and without publicly answering the question as to whether such a massive budgetary spend on duplicating the capacities of a rival agency could be justified.

In a statement to WikiLeaks the source details policy questions that they say urgently need to be debated in public, including whether the CIA’s hacking capabilities exceed its mandated powers and the problem of public oversight of the agency. The source wishes to initiate a public debate about the security, creation, use, proliferation and democratic control of cyberweapons.

Once a single cyber ‘weapon’ is ‘loose’ it can spread around the world in seconds, to be used by rival states, cyber mafia and teenage hackers alike.

Julian Assange, WikiLeaks editor stated that “There is an extreme proliferation risk in the development of cyber ‘weapons’. Comparisons can be drawn between the uncontrolled proliferation of such ‘weapons’, which results from the inability to contain them combined with their high market value, and the global arms trade. But the significance of “Year Zero” goes well beyond the choice between cyberwar and cyberpeace. The disclosure is also exceptional from a political, legal and forensic perspective.”

Wikileaks has carefully reviewed the “Year Zero” disclosure and published substantive CIA documentation while avoiding the distribution of ‘armed’ cyberweapons until a consensus emerges on the technical and political nature of the CIA’s program and how such ‘weapons’ should analyzed, disarmed and published.

Wikileaks has also decided to redact and anonymise some identifying information in “Year Zero” for in depth analysis. These redactions include ten of thousands of CIA targets and attack machines throughout Latin America, Europe and the United States. While we are aware of the imperfect results of any approach chosen, we remain committed to our publishing model and note that the quantity of published pages in “Vault 7” part one (“Year Zero”) already eclipses the total number of pages published over the first three years of the Edward Snowden NSA leaks.

* * *

Analysis

CIA malware targets iPhone, Android, smart TVs

CIA malware and hacking tools are built by EDG (Engineering Development Group), a software development group within CCI (Center for Cyber Intelligence), a department belonging to the CIA’s DDI (Directorate for Digital Innovation). The DDI is one of the five major directorates of the CIA (see this organizational chart of the CIA for more details).

The EDG is responsible for the development, testing and operational support of all backdoors, exploits, malicious payloads, trojans, viruses and any other kind of malware used by the CIA in its covert operations world-wide.

The increasing sophistication of surveillance techniques has drawn comparisons with George Orwell’s 1984, but “Weeping Angel”, developed by the CIA’s Embedded Devices Branch (EDB), which infests smart TVs, transforming them into covert microphones, is surely its most emblematic realization.

The attack against Samsung smart TVs was developed in cooperation with the United Kingdom’s MI5/BTSS. After infestation, Weeping Angel places the target TV in a ‘Fake-Off’ mode, so that the owner falsely believes the TV is off when it is on. In ‘Fake-Off’ mode the TV operates as a bug, recording conversations in the room and sending them over the Internet to a covert CIA server.

As of October 2014 the CIA was also looking at infecting the vehicle control systems used by modern cars and trucks. The purpose of such control is not specified, but it would permit the CIA to engage in nearly undetectable assassinations.

The CIA’s Mobile Devices Branch (MDB) developed numerous attacks to remotely hack and control popular smart phones. Infected phones can be instructed to send the CIA the user’s geolocation, audio and text communications as well as covertly activate the phone’s camera and microphone.

Despite iPhone’s minority share (14.5%) of the global smart phone market in 2016, a specialized unit in the CIA’s Mobile Development Branch produces malware to infest, control and exfiltrate data from iPhones and other Apple products running iOS, such as iPads. CIA’s arsenal includes numerous local and remote “zero days” developed by CIA or obtained from GCHQ, NSA, FBI or purchased from cyber arms contractors such as Baitshop. The disproportionate focus on iOS may be explained by the popularity of the iPhone among social, political, diplomatic and business elites.

A similar unit targets Google’s Android which is used to run the majority of the world’s smart phones (~85%) including Samsung, HTC and Sony. 1.15 billion Android powered phones were sold last year. “Year Zero” shows that as of 2016 the CIA had 24 “weaponized” Android “zero days” which it has developed itself and obtained from GCHQ, NSA and cyber arms contractors.

These techniques permit the CIA to bypass the encryption of WhatsApp, Signal, Telegram, Wiebo, Confide and Cloackman by hacking the “smart” phones that they run on and collecting audio and message traffic before encryption is applied.

CIA malware targets Windows, OSx, Linux, routers

The CIA also runs a very substantial effort to infect and control Microsoft Windows users with its malware. This includes multiple local and remote weaponized “zero days”, air gap jumping viruses such as “Hammer Drill” which infects software distributed on CD/DVDs, infectors for removable media such as USBs, systems to hide data in images or in covert disk areas ( “Brutal Kangaroo”) and to keep its malware infestations going.

Many of these infection efforts are pulled together by the CIA’s Automated Implant Branch (AIB), which has developed several attack systems for automated infestation and control of CIA malware, such as “Assassin” and “Medusa”.

Attacks against Internet infrastructure and webservers are developed by the CIA’s Network Devices Branch (NDB).

The CIA has developed automated multi-platform malware attack and control systems covering Windows, Mac OS X, Solaris, Linux and more, such as EDB’s “HIVE” and the related “Cutthroat” and “Swindle” tools, which are described in the examples section below.

CIA ‘hoarded’ vulnerabilities (“zero days”)

In the wake of Edward Snowden’s leaks about the NSA, the U.S. technology industry secured a commitment from the Obama administration that the executive would disclose on an ongoing basis — rather than hoard — serious vulnerabilities, exploits, bugs or “zero days” to Apple, Google, Microsoft, and other US-based manufacturers.

Serious vulnerabilities not disclosed to the manufacturers places huge swathes of the population and critical infrastructure at risk to foreign intelligence or cyber criminals who independently discover or hear rumors of the vulnerability. If the CIA can discover such vulnerabilities so can others.

The U.S. government’s commitment to the Vulnerabilities Equities Process came after significant lobbying by US technology companies, who risk losing their share of the global market over real and perceived hidden vulnerabilities. The government stated that it would disclose all pervasive vulnerabilities discovered after 2010 on an ongoing basis.

“Year Zero” documents show that the CIA breached the Obama administration’s commitments. Many of the vulnerabilities used in the CIA’s cyber arsenal are pervasive and some may already have been found by rival intelligence agencies or cyber criminals.

As an example, specific CIA malware revealed in “Year Zero” is able to penetrate, infest and control both the Android phone and iPhone software that runs or has run presidential Twitter accounts. The CIA attacks this software by using undisclosed security vulnerabilities (“zero days”) possessed by the CIA but if the CIA can hack these phones then so can everyone else who has obtained or discovered the vulnerability. As long as the CIA keeps these vulnerabilities concealed from Apple and Google (who make the phones) they will not be fixed, and the phones will remain hackable.

The same vulnerabilities exist for the population at large, including the U.S. Cabinet, Congress, top CEOs, system administrators, security officers and engineers. By hiding these security flaws from manufacturers like Apple and Google the CIA ensures that it can hack everyone &mdsh; at the expense of leaving everyone hackable.

‘Cyberwar’ programs are a serious proliferation risk

Cyber ‘weapons’ are not possible to keep under effective control.

While nuclear proliferation has been restrained by the enormous costs and visible infrastructure involved in assembling enough fissile material to produce a critical nuclear mass, cyber ‘weapons’, once developed, are very hard to retain.

Cyber ‘weapons’ are in fact just computer programs which can be pirated like any other. Since they are entirely comprised of information they can be copied quickly with no marginal cost.

Securing such ‘weapons’ is particularly difficult since the same people who develop and use them have the skills to exfiltrate copies without leaving traces — sometimes by using the very same ‘weapons’ against the organizations that contain them. There are substantial price incentives for government hackers and consultants to obtain copies since there is a global “vulnerability market” that will pay hundreds of thousands to millions of dollars for copies of such ‘weapons’. Similarly, contractors and companies who obtain such ‘weapons’ sometimes use them for their own purposes, obtaining advantage over their competitors in selling ‘hacking’ services.

Over the last three years the United States intelligence sector, which consists of government agencies such as the CIA and NSA and their contractors, such as Booze Allan Hamilton, has been subject to unprecedented series of data exfiltrations by its own workers.

A number of intelligence community members not yet publicly named have been arrested or subject to federal criminal investigations in separate incidents.

Most visibly, on February 8, 2017 a U.S. federal grand jury indicted Harold T. Martin III with 20 counts of mishandling classified information. The Department of Justice alleged that it seized some 50,000 gigabytes of information from Harold T. Martin III that he had obtained from classified programs at NSA and CIA, including the source code for numerous hacking tools.

Once a single cyber ‘weapon’ is ‘loose’ it can spread around the world in seconds, to be used by peer states, cyber mafia and teenage hackers alike.

http://www.zerohedge.com/news/2017-03-07/wikileaks-hold-press-conference-vault-7-release-8am-eastern

WikiLeaks Posts Thousands of Purported CIA Cyberhacking Documents

Records show CIA able to spy on smartphones, internet TVs

WikiLeaks released thousands of documents and files Tuesday that it said exposed hacking tools the Central Intelligence Agency uses.

WikiLeaks released thousands of documents and files Tuesday that it said exposed hacking tools the Central Intelligence Agency uses.PHOTO: LARRY DOWNING/REUTERS

WASHINGTON—WikiLeaks released thousands of documents and files Tuesday that it said exposed tools the Central Intelligence Agency uses to hack smartphones, computer operating systems, messenger applications and internet-connected televisions.

The unauthorized disclosure—the first part of which WikiLeaks said consisted of 8,761 documents and files from the CIA’s Center for Cyber Intelligence—confronts President Donald Trump with a threat from the very organization that leaked documents on his opponent, Democrat Hillary Clinton, during the 2016 presidential campaign.

WikiLeaks named the series of files “Vault 7” and called the unauthorized disclosure the “largest ever publication of confidential documents on the agency,” saying it exposed the malware and exploits the agency amassed to hack smartphones and turn some televisions into covert microphones.

A CIA spokesman declined to comment “on the authenticity or content of purported intelligence documents.”

An intelligence source said some of the information does pertain to tools that the CIA uses to hack computers and other devices. This person said disclosing the information would jeopardize ongoing intelligence-gathering operations and the revelations were far more significant than the leaks of Edward Snowden, a former contractor for the National Security Agency who exposed active surveillance programs in 2013.

Mr. Snowden’s leaks revealed names of programs, companies that assist the NSA in surveillance and in some cases the targets of American spying. But the recent leak purports to contain highly technical details about how surveillance is carried out. That would make them far more revealing and useful to an adversary, this person said.

In one sense, Mr. Snowden provided a briefing book on U.S. surveillance, but the CIA leaks could provide the blueprints.

WikiLeaks said in its statement that it was not publishing such information as computer source code that could be used to replicate the tools it claims to have exposed. But the group left open the possibility of publishing those crucial details if “a consensus emerges on the technical and political nature of the CIA’s program and how such ‘weapons’ should [sic] analyzed, disarmed and published.”

Mr. Snowden said in a tweet Tuesday, “Still working through the publication, but what @Wikileaks has here is genuinely a big deal. Looks authentic.”

WikiLeaks said the CIA recently “lost control” of the majority of its hacking arsenal. “This extraordinary collection, which amounts to more than several hundred million lines of code, gives its possessor the entire hacking capacity of the CIA,” the site said in a statement. “The archive appears to have been circulating among former U.S. government hackers and contractors in an unauthorized manner, one of whom has provided WikiLeaks with portions of the archive.”

The website put out what it called the first installment in a series of planned leaks on Tuesday, calling it “Year Zero.” It said the first installment “introduces the scope and direction of the CIA’s global covert hacking program, its malware arsenal and dozens of ‘zero day’ weaponized exploits against a wide range of U.S. and European company products.”

WikiLeaks said the information on CIA hacking came from an unidentified source who believes the spy agency’s hacking authorities “urgently need to be debated in public, including whether the CIA’s hacking capabilities exceed its mandated powers and the problem of public oversight of the agency.”

Much of what WikiLeaks posted Tuesday appeared to be a kind of internal Wikipedia for U.S. cyber-warfare developers to collaborate, post and access information about available hacking tools. In many instances, WikiLeaks has redacted entries that appear to link to specific executable files. The documents show, for example, what capabilities exist to bypass antivirus software, with a different entry for each antivirus company.

The revelations are sure to fuel an ongoing debate over whether intelligence agencies that discover security flaws in popular technology should disclose them, so that the users can defend themselves from hackers, or keep that information secret for use in intelligence operations.

One document claims that the CIA has discovered numerous ways to hack into versions of Apple’s iOS, the mobile operating system used on iPhones. In general, hacking tools for the iPhone are considered especially valuable because the technology is so widely used, experts said. One particular hacking tool appears to remain on an iPhone even after it has been rebooted, which would make it particularly valuable to an intruder.

“These documents, which appear to be authentic, show that the intelligence community has deliberately maintained vulnerabilities in the most common devices used by hundreds of millions of people,” Ben Wizner, the director of the Speech, Privacy, and Technology Project at the American Civil Liberties Union, said in a statement.

“Those vulnerabilities will be exploited not just by our security agencies, but by hackers and governments around the world. The government has the capacity and obligation to help technology companies fix vulnerabilities as soon as they are discovered,” Mr. Wizner said.

This is the latest high-profile leak of information by WikiLeaks, which last fall published emails stolen from Mrs. Clinton’s campaign chairman, John Podesta. U.S. intelligence agencies concluded that Russian government hackers stole those emails and provided them to WikiLeaks.

WikiLeaks said the documents show the CIA’s ability to bypass the encryption of popular messenger applications, including WhatsApp, Signal, Telegram and Confide by hacking the smartphones they run on and collecting audio and message traffic before the applications encrypt the user’s texts.

The site said the documents also show how the CIA developed other mobile hacking technologies, including the ability to activate the camera and microphone of a target’s smartphone covertly and surreptitiously retrieve a target’s geolocation, audio and text communications.

WikiLeaks said one of the documents also shows how the CIA developed a program to hack internet-connected televisions in conjunction with British intelligence. The attacks can place Samsung smart TVs in a fake off mode, so the owner believes the television is switched off, while in reality it is functioning as a bug and recording conversations in the room, WikiLeaks said.

https://www.wsj.com/articles/wikileaks-posts-thousands-of-purported-cia-cyberhacking-documents-1488905823

WikiLeaks publishes massive trove of CIA spying files in ‘Vault 7’ release

Julian Assange claims that documents are the most comprehensive CIA release ever and are far larger than the Snowden files

The Independent Tech

WikiLeaks has published a huge trove of what appear to be CIA spying secrets.

The files are the most comprehensive release of US spying files ever made public, according to Julian Assange. In all, there are 8,761 documents that account for “the entire hacking capacity of the CIA”, Mr Assange claimed in a release, and the trove is just the first of a series of “Vault 7” leaks.

Already, the files include far more pages than the Snowden files that exposed the vast hacking power of the NSA and other agencies.

 In publishing the documents, WikiLeaks had ensured that the CIA had “lost control of its arsenal”, he claimed. That included a range of software and exploits that if real could allow unparalleled control of computers around the world.

It includes software that could allow people to take control of the most popular consumer electronics products used today, claimed WikiLeaks.

“‘Year Zero’ introduces the scope and direction of the CIA’s global covert hacking program, its malware arsenal and dozens of “zero day” weaponized exploits against a wide range of U.S. and European company products, include Apple’s iPhone, Google’s Android and Microsoft’s Windows and even Samsung TVs, which are turned into covert microphones,” the organisation said in a release.

The public files don’t include the cyber weapons themselves, according to a statement. The organisation will refrain from distributing “armed” software “until a consensus emerges on the technical and political nature of the CIA’s program and how such ‘weapons’ should analyzed, disarmed and published”, it said.

The files were made available by a source who intended for them to start a conversation about whether the CIA had gained too much power, according to the organisation.

“In a statement to WikiLeaks the source details policy questions that they say urgently need to be debated in public, including whether the CIA’s hacking capabilities exceed its mandated powers and the problem of public oversight of the agency,” a release read. “The source wishes to initiate a public debate about the security, creation, use, proliferation and democratic control of cyberweapons.”

It also redacts the details of some of the names, locations and targets that are identified in the documents.

The organisation had teased the release in advance with strange messages about the release being “Year Zero”, and references to “Vault 7”. It had planned to release the files later on but that plan was thrown off when its press conference came under cyber attack, Mr Assange claimed.

http://www.independent.co.uk/life-style/gadgets-and-tech/news/wikileaks-cia-vault-7-julian-assange-year-zero-documents-download-spying-secrets-a7616031.html

WikiLeaks releases ‘entire hacking capacity of the CIA’

Gutfeld: ‘Day Without a Woman’ strike sends wrong message

WikiLeaks on Tuesday released what it said is the full hacking capacity of the CIA in a stunning 8,000-plus page disclosure the anti-secrecy website contends is “the largest ever publication of confidential documents on the agency.”

The 8,761 documents and files — released as “Vault 7 Part 1” and titled “Year Zero” — were obtained from an “isolated, high-security network” at the CIA’s Center for Cyber Intelligence in Langley, Va., a press release from the website said. The trove had been “circulated among former U.S. government hackers and contractors,” one of whom “recently” gave the archive to WikiLeaks. The CIA allegedly employs more than 5,000 people in its cyber spying operation and had produced more than 1,000 programs as of 2016.

“We do not comment on the authenticity or content of purported intelligence documents,” a CIA spokesperson told Fox News.

The collection of purported intelligence documents includes information on CIA-developed malware — bearing names such as “Assassin” and “Medusa” — intended to target iPhones, Android phones, smart TVs and Microsoft, Mac and Linux operating systems, among others. An entire unit in the CIA is devoted to inventing programs to hack data from Apple products, according to WikiLeaks.

WIKILEAKS OFFERS REWARD FOR INFO ON OBAMA MISDEEDS

Some of the remote hacking programs can allegedly turn numerous electronic devices into recording and transmitting stations to spy on their targets, with the information then sent back to secret CIA servers. One document appears to show the CIA was trying to “infect” vehicle control systems in cars and trucks for unspecified means.

WikiLeaks hinted that the capabilites revealed in Tuesday’s disclosure could have even darker utility than simply spying.

“It would permit the CIA to engage in nearly undetectable assassinations,” the release stated.

WikiLeaks confirms CIA can effectively bypass Signal + Telegram + WhatsApp + Confide encryptionhttps://wikileaks.org/ciav7p1 

FLASHBACK: WIKILEAKS REVEALS CLINTON ‘HITS’ FILE ON SANDERS

The site said the CIA additionally failed to disclose security vulnerabilities and bugs to major U.S. software manufacturers, violating an Obama administration commitment made in January 2014. Instead, the agency used the software vulnerabilities — which could also be exploited by rival agencies, nations and groups — for its own ends, WikiLeaks said.

CIA hackers celebrated what they saw as the financial largesse of Obama towards them with “Make It Rain” gifhttps://wikileaks.org/ciav7p1/cms/files/makeitrain.gif 

“As an example, specific CIA malware revealed in ‘Year Zero’ is able to penetrate, infest and control both the Android phone and iPhone software that runs or has run presidential Twitter accounts,” the WikiLeaks release stated.

Digital rights non-profit Access Now said in a statement on Tuesday it was “fantasy to believe only the ‘good guys'” would be able to use the discovered vulnerabilities.

“Today, our digital security has been compromised because the CIA has been stockpiling vulnerabilities rather than working with companies to patch them,” Senior Legislative Manager Nathan White said.

The CIA allegedly also maintains a database of malware created in other nations — WikiLeaks specifically cites Russia — in order to disguise its own hacking attempts as the work of another group.

In what is described by WikiLeaks as “one of the most astounding intelligence own goals in living memory,” the CIA is said to have made most of its programs unclassified to avoid legal consequences for transmitting classified information through the Internet — a move that increased the risk of outside groups pirating the cyber spying tools.

WikiLeaks also revealed the U.S. Consulate in Frankfurt is a hacking base, and the website provided the methods by which agents obfuscate customs officers to gain entry to Germany, pretending to provide technical consultation.

WikiLeaks said its source released the files because they believed questions surrounding the CIA’s reach “urgently need to be debated in public,” echoing the motives of many previous leakers.

PSA: This incorrectly implies CIA hacked these apps / encryption. But the docs show iOS/Android are what got hacked – a much bigger problem. https://twitter.com/wikileaks/status/839120909625606152 

Still working through the publication, but what @Wikileaks has here is genuinely a big deal. Looks authentic.

One such former leaker, Edward Snowden, tweeted Tuesday afternoon about the WikiLeaks release.

“Still working through the publication, but what @Wikileaks has here is genuinely a big deal. Looks authentic,” wrote Snowden, who has been granted asylum in Russia as he seeks to avoid criminal prosecution in the U.S.

Some of the WikiLeaks files include redacted information, such as tens “of thousands of CIA targets and attack machines throughout Latin America, Europe and the United States.”

http://www.foxnews.com/us/2017/03/07/wikileaks-releases-entire-hacking-capacity-cia.html

Vault 7: CIA Hacking Tools Revealed

  • Releases
  • Documents

Press Release

Today, Tuesday 7 March 2017, WikiLeaks begins its new series of leaks on the U.S. Central Intelligence Agency. Code-named “Vault 7” by WikiLeaks, it is the largest ever publication of confidential documents on the agency.

The first full part of the series, “Year Zero”, comprises 8,761 documents and files from an isolated, high-security network situated inside the CIA’s Center for Cyber Intelligence in Langley, Virgina. It follows an introductory disclosure last month of CIA targeting French political parties and candidates in the lead up to the 2012 presidential election.

Recently, the CIA lost control of the majority of its hacking arsenal including malware, viruses, trojans, weaponized “zero day” exploits, malware remote control systems and associated documentation. This extraordinary collection, which amounts to more than several hundred million lines of code, gives its possessor the entire hacking capacity of the CIA. The archive appears to have been circulated among former U.S. government hackers and contractors in an unauthorized manner, one of whom has provided WikiLeaks with portions of the archive.

“Year Zero” introduces the scope and direction of the CIA’s global covert hacking program, its malware arsenal and dozens of “zero day” weaponized exploits against a wide range of U.S. and European company products, include Apple’s iPhone, Google’s Android and Microsoft’s Windows and even Samsung TVs, which are turned into covert microphones.

Since 2001 the CIA has gained political and budgetary preeminence over the U.S. National Security Agency (NSA). The CIA found itself building not just its now infamous drone fleet, but a very different type of covert, globe-spanning force — its own substantial fleet of hackers. The agency’s hacking division freed it from having to disclose its often controversial operations to the NSA (its primary bureaucratic rival) in order to draw on the NSA’s hacking capacities.

By the end of 2016, the CIA’s hacking division, which formally falls under the agency’s Center for Cyber Intelligence (CCI), had over 5000 registered users and had produced more than a thousand hacking systems, trojans, viruses, and other “weaponized” malware. Such is the scale of the CIA’s undertaking that by 2016, its hackers had utilized more code than that used to run Facebook. The CIA had created, in effect, its “own NSA” with even less accountability and without publicly answering the question as to whether such a massive budgetary spend on duplicating the capacities of a rival agency could be justified.

In a statement to WikiLeaks the source details policy questions that they say urgently need to be debated in public, including whether the CIA’s hacking capabilities exceed its mandated powers and the problem of public oversight of the agency. The source wishes to initiate a public debate about the security, creation, use, proliferation and democratic control of cyberweapons.

Once a single cyber ‘weapon’ is ‘loose’ it can spread around the world in seconds, to be used by rival states, cyber mafia and teenage hackers alike.

Julian Assange, WikiLeaks editor stated that “There is an extreme proliferation risk in the development of cyber ‘weapons’. Comparisons can be drawn between the uncontrolled proliferation of such ‘weapons’, which results from the inability to contain them combined with their high market value, and the global arms trade. But the significance of “Year Zero” goes well beyond the choice between cyberwar and cyberpeace. The disclosure is also exceptional from a political, legal and forensic perspective.”

Wikileaks has carefully reviewed the “Year Zero” disclosure and published substantive CIA documentation while avoiding the distribution of ‘armed’ cyberweapons until a consensus emerges on the technical and political nature of the CIA’s program and how such ‘weapons’ should analyzed, disarmed and published.

Wikileaks has also decided to redact and anonymise some identifying information in “Year Zero” for in depth analysis. These redactions include ten of thousands of CIA targets and attack machines throughout Latin America, Europe and the United States. While we are aware of the imperfect results of any approach chosen, we remain committed to our publishing model and note that the quantity of published pages in “Vault 7” part one (“Year Zero”) already eclipses the total number of pages published over the first three years of the Edward Snowden NSA leaks.

Analysis

CIA malware targets iPhone, Android, smart TVs

CIA malware and hacking tools are built by EDG (Engineering Development Group), a software development group within CCI (Center for Cyber Intelligence), a department belonging to the CIA’s DDI (Directorate for Digital Innovation). The DDI is one of the five major directorates of the CIA (see this organizational chart of the CIA for more details).

The EDG is responsible for the development, testing and operational support of all backdoors, exploits, malicious payloads, trojans, viruses and any other kind of malware used by the CIA in its covert operations world-wide.

The increasing sophistication of surveillance techniques has drawn comparisons with George Orwell’s 1984, but “Weeping Angel”, developed by the CIA’s Embedded Devices Branch (EDB), which infests smart TVs, transforming them into covert microphones, is surely its most emblematic realization.

The attack against Samsung smart TVs was developed in cooperation with the United Kingdom’s MI5/BTSS. After infestation, Weeping Angel places the target TV in a ‘Fake-Off’ mode, so that the owner falsely believes the TV is off when it is on. In ‘Fake-Off’ mode the TV operates as a bug, recording conversations in the room and sending them over the Internet to a covert CIA server.

As of October 2014 the CIA was also looking at infecting the vehicle control systems used by modern cars and trucks. The purpose of such control is not specified, but it would permit the CIA to engage in nearly undetectable assassinations.

The CIA’s Mobile Devices Branch (MDB) developed numerous attacks to remotely hack and control popular smart phones. Infected phones can be instructed to send the CIA the user’s geolocation, audio and text communications as well as covertly activate the phone’s camera and microphone.

Despite iPhone’s minority share (14.5%) of the global smart phone market in 2016, a specialized unit in the CIA’s Mobile Development Branch produces malware to infest, control and exfiltrate data from iPhones and other Apple products running iOS, such as iPads. CIA’s arsenal includesnumerous local and remote “zero days” developed by CIA or obtained from GCHQ, NSA, FBI or purchased from cyber arms contractors such as Baitshop. The disproportionate focus on iOS may be explained by the popularity of the iPhone among social, political, diplomatic and business elites.

A similar unit targets Google’s Android which is used to run the majority of the world’s smart phones (~85%) including Samsung, HTC and Sony. 1.15 billion Android powered phones were sold last year. “Year Zero” shows that as of 2016 the CIA had 24 “weaponized” Android “zero days” which it has developed itself and obtained from GCHQ, NSA and cyber arms contractors.

These techniques permit the CIA to bypass the encryption of WhatsApp, Signal, Telegram, Wiebo, Confide and Cloackman by hacking the “smart” phones that they run on and collecting audio and message traffic before encryption is applied.

CIA malware targets Windows, OSx, Linux, routers

The CIA also runs a very substantial effort to infect and control Microsoft Windows users with its malware. This includes multiple local and remote weaponized “zero days”, air gap jumping viruses such as “Hammer Drill” which infects software distributed on CD/DVDs, infectors for removable media such as USBs, systems to hide data in images or in covert disk areas ( “Brutal Kangaroo”) and to keep its malware infestations going.

Many of these infection efforts are pulled together by the CIA’s Automated Implant Branch (AIB), which has developed several attack systems for automated infestation and control of CIA malware, such as “Assassin” and “Medusa”.

Attacks against Internet infrastructure and webservers are developed by the CIA’s Network Devices Branch (NDB).

The CIA has developed automated multi-platform malware attack and control systems covering Windows, Mac OS X, Solaris, Linux and more, such as EDB’s “HIVE” and the related “Cutthroat” and “Swindle” tools, which are described in the examples section below.

CIA ‘hoarded’ vulnerabilities (“zero days”)

In the wake of Edward Snowden’s leaks about the NSA, the U.S. technology industry secured a commitment from the Obama administration that the executive would disclose on an ongoing basis — rather than hoard — serious vulnerabilities, exploits, bugs or “zero days” to Apple, Google, Microsoft, and other US-based manufacturers.

Serious vulnerabilities not disclosed to the manufacturers places huge swathes of the population and critical infrastructure at risk to foreign intelligence or cyber criminals who independently discover or hear rumors of the vulnerability. If the CIA can discover such vulnerabilities so can others.

The U.S. government’s commitment to the Vulnerabilities Equities Process came after significant lobbying by US technology companies, who risk losing their share of the global market over real and perceived hidden vulnerabilities. The government stated that it would disclose all pervasive vulnerabilities discovered after 2010 on an ongoing basis.

“Year Zero” documents show that the CIA breached the Obama administration’s commitments. Many of the vulnerabilities used in the CIA’s cyber arsenal are pervasive and some may already have been found by rival intelligence agencies or cyber criminals.

As an example, specific CIA malware revealed in “Year Zero” is able to penetrate, infest and control both the Android phone and iPhone software that runs or has run presidential Twitter accounts. The CIA attacks this software by using undisclosed security vulnerabilities (“zero days”) possessed by the CIA but if the CIA can hack these phones then so can everyone else who has obtained or discovered the vulnerability. As long as the CIA keeps these vulnerabilities concealed from Apple and Google (who make the phones) they will not be fixed, and the phones will remain hackable.

The same vulnerabilities exist for the population at large, including the U.S. Cabinet, Congress, top CEOs, system administrators, security officers and engineers. By hiding these security flaws from manufacturers like Apple and Google the CIA ensures that it can hack everyone &mdsh; at the expense of leaving everyone hackable.

‘Cyberwar’ programs are a serious proliferation risk

Cyber ‘weapons’ are not possible to keep under effective control.

While nuclear proliferation has been restrained by the enormous costs and visible infrastructure involved in assembling enough fissile material to produce a critical nuclear mass, cyber ‘weapons’, once developed, are very hard to retain.

Cyber ‘weapons’ are in fact just computer programs which can be pirated like any other. Since they are entirely comprised of information they can be copied quickly with no marginal cost.

Securing such ‘weapons’ is particularly difficult since the same people who develop and use them have the skills to exfiltrate copies without leaving traces — sometimes by using the very same ‘weapons’ against the organizations that contain them. There are substantial price incentives for government hackers and consultants to obtain copies since there is a global “vulnerability market” that will pay hundreds of thousands to millions of dollars for copies of such ‘weapons’. Similarly, contractors and companies who obtain such ‘weapons’ sometimes use them for their own purposes, obtaining advantage over their competitors in selling ‘hacking’ services.

Over the last three years the United States intelligence sector, which consists of government agencies such as the CIA and NSA and their contractors, such as Booz Allan Hamilton, has been subject to unprecedented series of data exfiltrations by its own workers.

A number of intelligence community members not yet publicly named have been arrested or subject to federal criminal investigations in separate incidents.

Most visibly, on February 8, 2017 a U.S. federal grand jury indicted Harold T. Martin III with 20 counts of mishandling classified information. The Department of Justice alleged that it seized some 50,000 gigabytes of information from Harold T. Martin III that he had obtained from classified programs at NSA and CIA, including the source code for numerous hacking tools.

Once a single cyber ‘weapon’ is ‘loose’ it can spread around the world in seconds, to be used by peer states, cyber mafia and teenage hackers alike.

U.S. Consulate in Frankfurt is a covert CIA hacker base

In addition to its operations in Langley, Virginia the CIA also uses the U.S. consulate in Frankfurt as a covert base for its hackers covering Europe, the Middle East and Africa.

CIA hackers operating out of the Frankfurt consulate ( “Center for Cyber Intelligence Europe” or CCIE) are given diplomatic (“black”) passports and State Department cover. The instructions for incoming CIA hackers make Germany’s counter-intelligence efforts appear inconsequential: “Breeze through German Customs because you have your cover-for-action story down pat, and all they did was stamp your passport”

Your Cover Story (for this trip)
Q: Why are you here?
A: Supporting technical consultations at the Consulate.

Two earlier WikiLeaks publications give further detail on CIA approaches to customs and secondary screening procedures.

Once in Frankfurt CIA hackers can travel without further border checks to the 25 European countries that are part of the Shengen open border area — including France, Italy and Switzerland.

A number of the CIA’s electronic attack methods are designed for physical proximity. These attack methods are able to penetrate high security networks that are disconnected from the internet, such as police record database. In these cases, a CIA officer, agent or allied intelligence officer acting under instructions, physically infiltrates the targeted workplace. The attacker is provided with a USB containing malware developed for the CIA for this purpose, which is inserted into the targeted computer. The attacker then infects and exfiltrates data to removable media. For example, the CIA attack system Fine Dining, provides 24 decoy applications for CIA spies to use. To witnesses, the spy appears to be running a program showing videos (e.g VLC), presenting slides (Prezi), playing a computer game (Breakout2, 2048) or even running a fake virus scanner (Kaspersky, McAfee, Sophos). But while the decoy application is on the screen, the underlaying system is automatically infected and ransacked.

How the CIA dramatically increased proliferation risks

In what is surely one of the most astounding intelligence own goals in living memory, the CIA structured its classification regime such that for the most market valuable part of “Vault 7” — the CIA’s weaponized malware (implants + zero days), Listening Posts (LP), and Command and Control (C2) systems — the agency has little legal recourse.

The CIA made these systems unclassified.

Why the CIA chose to make its cyberarsenal unclassified reveals how concepts developed for military use do not easily crossover to the ‘battlefield’ of cyber ‘war’.

To attack its targets, the CIA usually requires that its implants communicate with their control programs over the internet. If CIA implants, Command & Control and Listening Post software were classified, then CIA officers could be prosecuted or dismissed for violating rules that prohibit placing classified information onto the Internet. Consequently the CIA has secretly made most of its cyber spying/war code unclassified. The U.S. government is not able to assert copyright either, due to restrictions in the U.S. Constitution. This means that cyber ‘arms’ manufactures and computer hackers can freely “pirate” these ‘weapons’ if they are obtained. The CIA has primarily had to rely on obfuscation to protect its malware secrets.

Conventional weapons such as missiles may be fired at the enemy (i.e into an unsecured area). Proximity to or impact with the target detonates the ordnance including its classified parts. Hence military personnel do not violate classification rules by firing ordnance with classified parts. Ordnance will likely explode. If it does not, that is not the operator’s intent.

Over the last decade U.S. hacking operations have been increasingly dressed up in military jargon to tap into Department of Defense funding streams. For instance, attempted “malware injections” (commercial jargon) or “implant drops” (NSA jargon) are being called “fires” as if a weapon was being fired. However the analogy is questionable.

Unlike bullets, bombs or missiles, most CIA malware is designed to live for days or even years after it has reached its ‘target’. CIA malware does not “explode on impact” but rather permanently infests its target. In order to infect target’s device, copies of the malware must be placed on the target’s devices, giving physical possession of the malware to the target. To exfiltrate data back to the CIA or to await further instructions the malware must communicate with CIA Command & Control (C2) systems placed on internet connected servers. But such servers are typically not approved to hold classified information, so CIA command and control systems are also made unclassified.

A successful ‘attack’ on a target’s computer system is more like a series of complex stock maneuvers in a hostile take-over bid or the careful planting of rumors in order to gain control over an organization’s leadership rather than the firing of a weapons system. If there is a military analogy to be made, the infestation of a target is perhaps akin to the execution of a whole series of military maneuvers against the target’s territory including observation, infiltration, occupation and exploitation.

Evading forensics and anti-virus

A series of standards lay out CIA malware infestation patterns which are likely to assist forensic crime scene investigators as well as Apple, Microsoft, Google, Samsung, Nokia, Blackberry, Siemens and anti-virus companies attribute and defend against attacks.

“Tradecraft DO’s and DON’Ts” contains CIA rules on how its malware should be written to avoid fingerprints implicating the “CIA, US government, or its witting partner companies” in “forensic review”. Similar secret standards cover the use of encryption to hide CIA hacker and malware communication (pdf), describing targets & exfiltrated data (pdf) as well as executing payloads (pdf) and persisting (pdf) in the target’s machines over time.CIA hackers developed successful attacks against most well known anti-virus programs. These are documented in AV defeats, Personal Security Products, Detecting and defeating PSPs and PSP/Debugger/RE Avoidance. For example, Comodo was defeated by CIA malware placing itself in the Window’s “Recycle Bin”. While Comodo 6.x has a “Gaping Hole of DOOM”.

CIA hackers discussed what the NSA’s “Equation Group” hackers did wrong and how the CIA’s malware makers could avoid similar exposure.

Examples

The CIA’s Engineering Development Group (EDG) management system contains around 500 different projects (only some of which are documented by “Year Zero”) each with their own sub-projects, malware and hacker tools.

The majority of these projects relate to tools that are used for penetration, infestation (“implanting”), control, and exfiltration.

Another branch of development focuses on the development and operation of Listening Posts (LP) and Command and Control (C2) systems used to communicate with and control CIA implants; special projects are used to target specific hardware from routers to smart TVs.

Some example projects are described below, but see the table of contents for the full list of projects described by WikiLeaks’ “Year Zero”.

UMBRAGE

The CIA’s hand crafted hacking techniques pose a problem for the agency. Each technique it has created forms a “fingerprint” that can be used by forensic investigators to attribute multiple different attacks to the same entity.

This is analogous to finding the same distinctive knife wound on multiple separate murder victims. The unique wounding style creates suspicion that a single murderer is responsible. As soon one murder in the set is solved then the other murders also find likely attribution.

The CIA’s Remote Devices Branch‘s UMBRAGE group collects and maintains a substantial library of attack techniques ‘stolen’ from malware produced in other states including the Russian Federation.

With UMBRAGE and related projects the CIA cannot only increase its total number of attack types but also misdirect attribution by leaving behind the “fingerprints” of the groups that the attack techniques were stolen from.

UMBRAGE components cover keyloggers, password collection, webcam capture, data destruction, persistence, privilege escalation, stealth, anti-virus (PSP) avoidance and survey techniques.

Fine Dining

Fine Dining comes with a standardized questionnaire i.e menu that CIA case officers fill out. The questionnaire is used by the agency’s OSB (Operational Support Branch) to transform the requests of case officers into technical requirements for hacking attacks (typically “exfiltrating” information from computer systems) for specific operations. The questionnaire allows the OSB to identify how to adapt existing tools for the operation, and communicate this to CIA malware configuration staff. The OSB functions as the interface between CIA operational staff and the relevant technical support staff.

Among the list of possible targets of the collection are ‘Asset’, ‘Liason Asset’, ‘System Administrator’, ‘Foreign Information Operations’, ‘Foreign Intelligence Agencies’ and ‘Foreign Government Entities’. Notably absent is any reference to extremists or transnational criminals. The ‘Case Officer’ is also asked to specify the environment of the target like the type of computer, operating system used, Internet connectivity and installed anti-virus utilities (PSPs) as well as a list of file types to be exfiltrated like Office documents, audio, video, images or custom file types. The ‘menu’ also asks for information if recurring access to the target is possible and how long unobserved access to the computer can be maintained. This information is used by the CIA’s ‘JQJIMPROVISE’ software (see below) to configure a set of CIA malware suited to the specific needs of an operation.

Improvise (JQJIMPROVISE)

‘Improvise’ is a toolset for configuration, post-processing, payload setup and execution vector selection for survey/exfiltration tools supporting all major operating systems like Windows (Bartender), MacOS (JukeBox) and Linux (DanceFloor). Its configuration utilities like Margarita allows the NOC (Network Operation Center) to customize tools based on requirements from ‘Fine Dining’ questionairies.

HIVE

HIVE is a multi-platform CIA malware suite and its associated control software. The project provides customizable implants for Windows, Solaris, MikroTik (used in internet routers) and Linux platforms and a Listening Post (LP)/Command and Control (C2) infrastructure to communicate with these implants.

The implants are configured to communicate via HTTPS with the webserver of a cover domain; each operation utilizing these implants has a separate cover domain and the infrastructure can handle any number of cover domains.

Each cover domain resolves to an IP address that is located at a commercial VPS (Virtual Private Server) provider. The public-facing server forwards all incoming traffic via a VPN to a ‘Blot’ server that handles actual connection requests from clients. It is setup for optional SSL client authentication: if a client sends a valid client certificate (only implants can do that), the connection is forwarded to the ‘Honeycomb’ toolserver that communicates with the implant; if a valid certificate is missing (which is the case if someone tries to open the cover domain website by accident), the traffic is forwarded to a cover server that delivers an unsuspicious looking website.

The Honeycomb toolserver receives exfiltrated information from the implant; an operator can also task the implant to execute jobs on the target computer, so the toolserver acts as a C2 (command and control) server for the implant.

Similar functionality (though limited to Windows) is provided by the RickBobby project.

See the classified user and developer guides for HIVE.

Frequently Asked Questions

Why now?

WikiLeaks published as soon as its verification and analysis were ready.

In Febuary the Trump administration has issued an Executive Order calling for a “Cyberwar” review to be prepared within 30 days.

While the review increases the timeliness and relevance of the publication it did not play a role in setting the publication date.

Redactions

Names, email addresses and external IP addresses have been redacted in the released pages (70,875 redactions in total) until further analysis is complete.

  1. Over-redaction: Some items may have been redacted that are not employees, contractors, targets or otherwise related to the agency, but are, for example, authors of documentation for otherwise public projects that are used by the agency.
  2. Identity vs. person: the redacted names are replaced by user IDs (numbers) to allow readers to assign multiple pages to a single author. Given the redaction process used a single person may be represented by more than one assigned identifier but no identifier refers to more than one real person.
  3. Archive attachments (zip, tar.gz, …) are replaced with a PDF listing all the file names in the archive. As the archive content is assessed it may be made available; until then the archive is redacted.
  4. Attachments with other binary content are replaced by a hex dump of the content to prevent accidental invocation of binaries that may have been infected with weaponized CIA malware. As the content is assessed it may be made available; until then the content is redacted.
  5. The tens of thousands of routable IP addresses references (including more than 22 thousand within the United States) that correspond to possible targets, CIA covert listening post servers, intermediary and test systems, are redacted for further exclusive investigation.
  6. Binary files of non-public origin are only available as dumps to prevent accidental invocation of CIA malware infected binaries.

Organizational Chart

The organizational chart corresponds to the material published by WikiLeaks so far.

Since the organizational structure of the CIA below the level of Directorates is not public, the placement of the EDG and its branches within the org chart of the agency is reconstructed from information contained in the documents released so far. It is intended to be used as a rough outline of the internal organization; please be aware that the reconstructed org chart is incomplete and that internal reorganizations occur frequently.

Wiki pages

“Year Zero” contains 7818 web pages with 943 attachments from the internal development groupware. The software used for this purpose is called Confluence, a proprietary software from Atlassian. Webpages in this system (like in Wikipedia) have a version history that can provide interesting insights on how a document evolved over time; the 7818 documents include these page histories for 1136 latest versions.

The order of named pages within each level is determined by date (oldest first). Page content is not present if it was originally dynamically created by the Confluence software (as indicated on the re-constructed page).

What time period is covered?

The years 2013 to 2016. The sort order of the pages within each level is determined by date (oldest first).

WikiLeaks has obtained the CIA’s creation/last modification date for each page but these do not yet appear for technical reasons. Usually the date can be discerned or approximated from the content and the page order. If it is critical to know the exact time/date contact WikiLeaks.

What is “Vault 7”

“Vault 7” is a substantial collection of material about CIA activities obtained by WikiLeaks.

When was each part of “Vault 7” obtained?

Part one was obtained recently and covers through 2016. Details on the other parts will be available at the time of publication.

Is each part of “Vault 7” from a different source?

Details on the other parts will be available at the time of publication.

What is the total size of “Vault 7”?

The series is the largest intelligence publication in history.

How did WikiLeaks obtain each part of “Vault 7”?

Sources trust WikiLeaks to not reveal information that might help identify them.

Isn’t WikiLeaks worried that the CIA will act against its staff to stop the series?

No. That would be certainly counter-productive.

Has WikiLeaks already ‘mined’ all the best stories?

No. WikiLeaks has intentionally not written up hundreds of impactful stories to encourage others to find them and so create expertise in the area for subsequent parts in the series. They’re there. Look. Those who demonstrate journalistic excellence may be considered for early access to future parts.

Won’t other journalists find all the best stories before me?

Unlikely. There are very considerably more stories than there are journalists or academics who are in a position to write them.

https://wikileaks.org/ciav7p1/

The Pronk Pops Show Podcasts Portfolio

Listen To Pronk Pops Podcast or Download Shows 850-853

Listen To Pronk Pops Podcast or Download Shows 845-849

Listen To Pronk Pops Podcast or Download Shows 840-844

Listen To Pronk Pops Podcast or Download Shows 833-839

Listen To Pronk Pops Podcast or Download Shows 827-832

Listen To Pronk Pops Podcast or Download Shows 821-826

Listen To Pronk Pops Podcast or Download Shows 815-820

Listen To Pronk Pops Podcast or Download Shows 806-814

Listen To Pronk Pops Podcast or Download Shows 800-805

Listen To Pronk Pops Podcast or Download Shows 793-799

Listen To Pronk Pops Podcast or Download Shows 785-792

Listen To Pronk Pops Podcast or Download Shows 777-784

Listen To Pronk Pops Podcast or Download Shows 769-776

Listen To Pronk Pops Podcast or Download Shows 759-768

Listen To Pronk Pops Podcast or Download Shows 751-758

Listen To Pronk Pops Podcast or Download Shows 745-750

Listen To Pronk Pops Podcast or Download Shows 738-744

Listen To Pronk Pops Podcast or Download Shows 732-737

Listen To Pronk Pops Podcast or Download Shows 727-731

Listen To Pronk Pops Podcast or Download Shows 720-726

Listen To Pronk Pops Podcast or DownloadShows 713-719

Listen To Pronk Pops Podcast or DownloadShows 705-712

Listen To Pronk Pops Podcast or Download Shows 695-704

Listen To Pronk Pops Podcast or Download Shows 685-694

Listen To Pronk Pops Podcast or Download Shows 675-684

Listen To Pronk Pops Podcast or Download Shows 668-674

Listen To Pronk Pops Podcast or Download Shows 660-667

Listen To Pronk Pops Podcast or Download Shows 651-659

Listen To Pronk Pops Podcast or Download Shows 644-650

Listen To Pronk Pops Podcast or Download Shows 637-643

Listen To Pronk Pops Podcast or Download Shows 629-636

Listen To Pronk Pops Podcast or Download Shows 617-628

Listen To Pronk Pops Podcast or Download Shows 608-616

Listen To Pronk Pops Podcast or Download Shows 599-607

Listen To Pronk Pops Podcast or Download Shows 590-598

Listen To Pronk Pops Podcast or Download Shows 585- 589

Listen To Pronk Pops Podcast or Download Shows 575-584

Listen To Pronk Pops Podcast or Download Shows 565-574

Listen To Pronk Pops Podcast or Download Shows 556-564

Listen To Pronk Pops Podcast or Download Shows 546-555

Listen To Pronk Pops Podcast or Download Shows 538-545

Listen To Pronk Pops Podcast or Download Shows 532-537

Listen To Pronk Pops Podcast or Download Shows 526-531

Listen To Pronk Pops Podcast or Download Shows 519-525

Listen To Pronk Pops Podcast or Download Shows 510-518

Listen To Pronk Pops Podcast or Download Shows 500-509

Listen To Pronk Pops Podcast or Download Shows 490-499

Listen To Pronk Pops Podcast or Download Shows 480-489

Listen To Pronk Pops Podcast or Download Shows 473-479

Listen To Pronk Pops Podcast or Download Shows 464-472

Listen To Pronk Pops Podcast or Download Shows 455-463

Listen To Pronk Pops Podcast or Download Shows 447-454

Listen To Pronk Pops Podcast or Download Shows 439-446

Listen To Pronk Pops Podcast or Download Shows 431-438

Listen To Pronk Pops Podcast or Download Shows 422-430

Listen To Pronk Pops Podcast or Download Shows 414-421

Listen To Pronk Pops Podcast or Download Shows 408-413

Listen To Pronk Pops Podcast or Download Shows 400-407

Listen To Pronk Pops Podcast or Download Shows 391-399

Listen To Pronk Pops Podcast or Download Shows 383-390

Listen To Pronk Pops Podcast or Download Shows 376-382

Listen To Pronk Pops Podcast or Download Shows 369-375

Listen To Pronk Pops Podcast or Download Shows 360-368

Listen To Pronk Pops Podcast or Download Shows 354-359

Listen To Pronk Pops Podcast or Download Shows 346-353

Listen To Pronk Pops Podcast or Download Shows 338-345

Listen To Pronk Pops Podcast or Download Shows 328-337

Listen To Pronk Pops Podcast or Download Shows 319-327

Listen To Pronk Pops Podcast or Download Shows 307-318

Listen To Pronk Pops Podcast or Download Shows 296-306

Listen To Pronk Pops Podcast or Download Shows 287-295

Listen To Pronk Pops Podcast or Download Shows 277-286

Listen To Pronk Pops Podcast or Download Shows 264-276

Listen To Pronk Pops Podcast or Download Shows 250-263

Listen To Pronk Pops Podcast or Download Shows 236-249

Listen To Pronk Pops Podcast or Download Shows 222-235

Listen To Pronk Pops Podcast or Download Shows 211-221

Listen To Pronk Pops Podcast or Download Shows 202-210

Listen To Pronk Pops Podcast or Download Shows 194-201

Listen To Pronk Pops Podcast or Download Shows 184-193

Listen To Pronk Pops Podcast or Download Shows 174-183

Listen To Pronk Pops Podcast or Download Shows 165-173

Listen To Pronk Pops Podcast or Download Shows 158-164

Listen To Pronk Pops Podcast or Download Shows151-157

Listen To Pronk Pops Podcast or Download Shows 143-150

Listen To Pronk Pops Podcast or Download Shows 135-142

Listen To Pronk Pops Podcast or Download Shows 131-134

Listen To Pronk Pops Podcast or Download Shows 124-130

Listen To Pronk Pops Podcast or Download Shows 121-123

Listen To Pronk Pops Podcast or Download Shows 118-120

Listen To Pronk Pops Podcast or Download Shows 113 -117

Listen To Pronk Pops Podcast or Download Show 112

Listen To Pronk Pops Podcast or Download Shows 108-111

Listen To Pronk Pops Podcast or Download Shows 106-108

Listen To Pronk Pops Podcast or Download Shows 104-105

Listen To Pronk Pops Podcast or Download Shows 101-103

Listen To Pronk Pops Podcast or Download Shows 98-100

Listen To Pronk Pops Podcast or Download Shows 94-97

Listen To Pronk Pops Podcast or Download Show 93

Listen To Pronk Pops Podcast or Download Show 92

Listen To Pronk Pops Podcast or Download Show 91

Listen To Pronk Pops Podcast or Download Shows 88-90

Listen To Pronk Pops Podcast or Download Shows 84-87

Listen To Pronk Pops Podcast or Download Shows 79-83

Listen To Pronk Pops Podcast or Download Shows 74-78

Listen To Pronk Pops Podcast or Download Shows 71-73

Listen To Pronk Pops Podcast or Download Shows 68-70

Listen To Pronk Pops Podcast or Download Shows 65-67

Listen To Pronk Pops Podcast or Download Shows 62-64

Listen To Pronk Pops Podcast or Download Shows 58-61

Listen To Pronk Pops Podcast or Download Shows 55-57

Listen To Pronk Pops Podcast or Download Shows 52-54

Listen To Pronk Pops Podcast or Download Shows 49-51

Listen To Pronk Pops Podcast or Download Shows 45-48

Listen To Pronk Pops Podcast or Download Shows 41-44

Listen To Pronk Pops Podcast or Download Shows 38-40

Listen To Pronk Pops Podcast or Download Shows 34-37

Listen To Pronk Pops Podcast or Download Shows 30-33

Listen To Pronk Pops Podcast or Download Shows 27-29

Listen To Pronk Pops Podcast or Download Shows 17-26

Listen To Pronk Pops Podcast or Download Shows 16-22

Listen To Pronk Pops Podcast or Download Shows 10-15

Listen To Pronk Pops Podcast or Download Shows 1-9

Read Full Post | Make a Comment ( None so far )

The Pronk Pops Show 851, March 3, 2017, Story 1 : Trump Russian Connection: All Noise — No Evidence — Fake News Of Big Lie Media and Lying Lunatic Leftist Low Life Losers — It Is Not A One Variable World! — Videos — Story 2: Who Are Real Red Russian Agents of Influence? — Who Lost The Crimea To Russia? — Who Gave Iran A Pathway To Nuclear Weapons? — Obama and Jarrett — Videos — Story 3: Real News, Real Evidence, Real Crimes of Destruction of Government Document, Mishandling of Classified Documents, Perjury, Obstruction of Justice (Also By Department of Justice), Conspiracy, Public Corruption of Hillary Clinton — Awaiting Trump Telephone To Attorney General Jeff Session To Appoint Special Prosecutor — Videos

Posted on March 4, 2017. Filed under: Benghazi, Blogroll, Books, Breaking News, College, Communications, Congress, Constitutional Law, Corruption, Countries, Donald J. Trump, Donald J. Trump, Donald Trump, Donald Trump, Elections, Employment, Fast and Furious, Fourth Amendment, Freedom of Speech, Hillary Clinton, House of Representatives, Human, Illegal Immigration, Impeachment, Iran Nuclear Weapons Deal, IRS, Law, Life, News, Obama, Philosophy, Photos, Politics, Polls, President Barack Obama, President Trump, Raymond Thomas Pronk, Resources, Russia, Second Amendment, Senate, Social Science, Taxation, Taxes, Terror, Terrorism, Unemployment, United States Constitution, United States of America, Videos, Violence, Wealth, Weapons, Weather | Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , |

Project_1

The Pronk Pops Show Podcasts

Pronk Pops Show 851: March 3, 2017

Pronk Pops Show 850: March 2, 2017

Pronk Pops Show 849: March 1, 2017

Pronk Pops Show 848: February 28, 2017

Pronk Pops Show 847: February 27, 2017

Pronk Pops Show 846: February 24, 2017

Pronk Pops Show 845: February 23, 2017

Pronk Pops Show 844: February 22, 2017

Pronk Pops Show 843: February 21, 2017

Pronk Pops Show 842: February 20, 2017

Pronk Pops Show 841: February 17, 2017

Pronk Pops Show 840: February 16, 2017

Pronk Pops Show 839: February 15, 2017

Pronk Pops Show 838: February 14, 2017

Pronk Pops Show 837: February 13, 2017

Pronk Pops Show 836: February 10, 2017

Pronk Pops Show 835: February 9, 2017

Pronk Pops Show 834: February 8, 2017

Pronk Pops Show 833: February 7, 2017

Pronk Pops Show 832: February 6, 2017

Pronk Pops Show 831: February 3, 2017

Pronk Pops Show 830: February 2, 2017

Pronk Pops Show 829: February 1, 2017

Pronk Pops Show 828: January 31, 2017

Pronk Pops Show 827: January 30, 2017

Pronk Pops Show 826: January 27, 2017

Pronk Pops Show 825: January 26, 2017

Pronk Pops Show 824: January 25, 2017

Pronk Pops Show 823: January 24, 2017

Pronk Pops Show 822: January 23, 2017

Pronk Pops Show 821: January 20, 2017

Pronk Pops Show 820: January 19, 2017

Pronk Pops Show 819: January 18, 2017

Pronk Pops Show 818: January 17, 2017

Pronk Pops Show 817: January 13, 2017

Pronk Pops Show 816: January 12, 2017

Pronk Pops Show 815: January 11, 2017

Pronk Pops Show 814: January 10, 2017

Pronk Pops Show 813: January 9, 2017

Pronk Pops Show 812: December 12, 2016

Pronk Pops Show 811: December 9, 2016

Pronk Pops Show 810: December 8, 2016

Pronk Pops Show 809: December 7, 2016

Pronk Pops Show 808: December 6, 2016

Pronk Pops Show 807: December 5, 2016

Pronk Pops Show 806: December 2, 2016

Pronk Pops Show 805: December 1, 2016

Story 1 : Trump Russian Connection: All Noise — No Evidence — Fake News Of Big Lie Media and Lying Lunatic Leftist Low Life Losers — It Is Not A One Variable World! — Videos —

Image result for branco cartoons fake news

Image result for cartoons fake news

Image result for cartoons fake news
Image result for cartoons fake newsImage result for cartoons fake news

Image result for cartoons fake news

Image result for cartoons fake news

Image result for cartoons fake news

Attorney General Jeff Sessions press conference. Mar 2. 2017.

Sessions “I Did Not Have Communications With The Russians”

Spicer: “NOT ACCURATE!” “IT’S BS!” on Russia Scandal

How the Obama Palace Guard and Deep State Torpedoed Sessions to Dilute Trump’s Post-Address Euphoria

Donald trump fox news – “The Media Is Trump’s ENEMY!” Rush Limbaugh BACKS Donald Trump With Chris Wallace

Ted Cruz dismantles Jeff Sessions Russian ambassador fake new story

Tucker Carlson takes apart Democrat Sean Maloney on fake news Jeff Sessions Russia

Trump Russian Connection=Fake News

Truth Warriors vs. Mainstream Fake News | Limited Hangout Federalized Propaganda | NDAA Brainwashing

The Truth About Fake News | Russia Hacked U.S. Election For Donald Trump?

Rush Limbaugh: “The Media did not make Donald Trump, and they can’t destroy him”

Scott Adams on fake news, climate, and the Trump press ban

Rand Paul destroys MSNBC Chris Jansing on fake news Jeff Sessions Russia story

Who is Russian Ambassador Sergey Kislyak?

Sen. Franken Quizzes Jeff Sessions At Confirmation Hearing

Jeff Sessions explains meeting with Russian ambassador in interview with Tucker Carlson

‘Stirring up trouble’: US intelligence has no proof of anything – Ron Paul on ‘Russian hacking’

Krauthammer gives his take on AG Sessions’ recusal

Trey Gowdy on fake news Jeff Session Russia and Democrat Adam Schiff lying to press

ALL IN WITH CHRIS HAYES 3/2/17 Carter Page: ‘I don’t deny’ meeting with Russian ambassador

Former U.S. Ambassador To Russia Weighs In On Sergey Kislyak | Morning Joe | MSNBC

“Did Jeff Sessions Talk To Russia?” Sean Spicer Destroys ABC Reporter

Will The Neocons ‘Flynn’ Jeff Sessions?

Keiser Report: Fake News (E1005, ft. Alex Jones from Infowars)

Democrats & GOP War Hawks Align in Lunatic Russia Manipulation of American People

Published on Mar 3, 2017

Sources & Links Below, Click SHOW MORE:
Despite not producing ONE piece of tangible, objective evidence that Russia interfered with our elections, Democrats have aligned with Neo-conservative War Hawks to launch five investigation into Trump/Russia campaign connections. The Russia narrative has been one of the UGLIEST and most dishonest political manipulations in modern political history. Taking down Trump by promoting war and covering for their own corruption is traitorous behavior. Put quite plainly, this is lunatic.
Corporate Media’s FREE Campaign to Donald Trump:
https://www.nytimes.com/2016/03/16/up…
Pied Piper Email:
http://www.salon.com/2016/11/09/the-h…
Glenn Greenwald Five Points on Russia Article:
https://theintercept.com/2017/02/28/t…
Full Article on How No Real Case Has Been Made On Russia:
https://theintercept.com/2016/12/14/h…
https://t.co/sAwvNAtUh6
These are Sane Progressive Videos Covering the Russia Spin/Each has a LONG list of sources in description relevant to today’s content:
https://www.youtube.com/watch?v=Yh0EA…
On the Election Hacking & Dem Primary Fraud:
https://www.youtube.com/watch?v=nOpkN…
On John McCain & the Lie of Russia Hacking Grid:
https://www.youtube.com/watch?v=c9zwJ…
Michael Flynn Story:
https://www.youtube.com/watch?v=YsF-t…
On the Geo-Political Motivations of Russia Sanctions by Obama:
https://www.youtube.com/watch?v=ZRuFu…
On Hillary Clinton’s Russia Connections MUCH Deeper than Trumps:
https://www.youtube.com/watch?v=CbBxr…
Example of Absurdity of Russia Insanity, Russia was GOing to Frame Clinton for Election Fraud from Washington Post:
https://www.youtube.com/watch?v=K0kA2…
Russia Lies were Used to Unconstitutionally Place Elections Under Critical Infrastructure of Department of Homeland Security:
https://www.youtube.com/watch?v=FN-cY…

MUST WATCH NOW… Tucker Carlson Goes Thermonuclear On Rep Adam Schiff … Over Russian Hacking

Tucker Carlson DESTROYS Far Left Crank on Russian Hacking ‘Scandal’

Tucker Carlson – Glenn Greenwald Slams Washington Post Coverage of Russia Threat

How the Obama Palace Guard and Deep State Torpedoed Sessions to Dilute Trump’s Post-Address Euphoria 

Ben Shapiro DESTROYS Dan Rather, ‘The Godfather of Modern Media Fake News’

Trump Slams ‘Fake News’ CNN! | Louder With Crowder

Ben Stein DESTROYS CNN on CNN, “Dumping all over the mainstream of America”

Paul Joseph Watson About CNN Tapes And Other News

Professor: Obama admin determined to cripple Trump

TUCKER CARLSON INTERVIEWS ANN COULTER USA

Tucker Foaming At The Mouth As He Slams Professor! Brutal,Yet Funny! Clapper “No Proof Russia Hack”

Tucker Carlson The Democrats Problem Was Not Hacking Or Fake News… It Was That We Knew Too Much

Tucker Carlson Gets to the Bottom of Russian Hacking Conspiracy with Huffpo Writer

Donald Trump brands Democrats ‘hypocrites’ over Russian links

 Sergey Kislyak, Russia's ambassador to the U.S.
 Sergey Kislyak, Russia’s ambassador to the U.S. CREDIT: CLIFF OWEN/AP

President Donald Trump branded Democrats “hypocrites” over calls for an investigation into his administration’s contacts with Russia, posting a photograph on the internet of one of the opposition party’s leaders sharing doughnuts and coffee with Vladimir Putin.

It came after half a dozen Trump officials and advisers were revealed to have met Sergey Kislyak, the Russian ambassador to Washington, in the six months before the president took office.

Mr Trump responded by posting the picture on Twitter showing Chuck Schumer, the Democratic leader in the US Senate, smiling alongside Mr Putin during his trip to New York in 2003.

The president said: “We should start an immediate investigation into Senator Schumer and his ties to Russia and Putin. A total hypocrite!”

View image on Twitter

We should start an immediate investigation into @SenSchumer and his ties to Russia and Putin. A total hypocrite!

Not satisfied with that, then president then pointed the finger at Democratic leader in the House of Representatives, Nancy Pelosi.

I hereby demand a second investigation, after Schumer, of Pelosi for her close ties to Russia, and lying about it. http://www.politico.com/story/2017/03/nancy-pelosi-sergey-kislyak-meeting-235653 

Photo published for Photo contradicts Pelosi's statement about not meeting Kislyak

Photo contradicts Pelosi’s statement about not meeting Kislyak

The Democratic House leader sat with the Russian ambassador and other officials in 2010.

politico.com

Mr Schumer said he would “happily talk under oath” about his encounter with Mr Putin, and asked Mr Trump: “Would you?”

It came as Jared Kushner, the president’s son-in-law and senior adviser,became the latest figure drawn into the web of entanglements with Russian officials that has plagued the new administration.

The 36-year-old husband of Mr Trump’s daughter Ivanka, was present at a previously undisclosed meeting between Michael Flynn, Mr Trump’s former national security adviser, and Mr Kislyak at Trump Tower in New York in December.

Mr Flynn resigned last month after it emerged he had misled Vice President Mike Pence about the extent of his communications with Mr Kislyak. In the December meeting the Russian diplomat reportedly entered Trump Tower by a back entrance and spoke for between 10 and 20 minutes.

The White House said the intention was to “establish a line of communication” with the Russian government. One official called it an “inconsequential hello” and said Mr Kushner had not met Mr Kislyak since.

On Thursday Attorney General Jeff Sessions recused himself from any future investigation examining communications between Trump officials and Moscow.

He did so after it was revealed he had himself spoken twice to Mr Kislyak and not revealed it during the confirmation hearing for his new post.

Mr Sessions was accused of “lying under oath” by Democrats in Congress who called on him to resign.

Several other Trump campaign advisers – national security advisers JD Gordon and Walifd Phares, and former foreign policy adviser Carter Page – also spoke with Mr Kislyak at the Republican National Convention in Cleveland last July, it emerged.

Mr Gordon said there was nothing inappropriate about them having done so.

The Kremlin indicated its disappointment and frustration at how the uproar was blocking progress on US-Russian relations, including on the issues of Syria and combating terrorism.

It furiously denied allegations that Mr Kislyak, who emerged as the central figure in a controversy, was a spy. Senior intelligence officials told CNN the amiable career diplomat, at one time the Russian envoy to Nato, was suspected of being one of Russia’s top espionage recruiters in Washington.

Russian Foreign Ministry spokeswoman Maria Zakharova responded by saying: “Recruiting? Oh my God! Stop spreading lies and false news. He is a well-known, world-class diplomat.

“I’ll open a military secret for you – it’s the diplomats’ jobs to have contacts in the country they are posted to.”

Russian Foreign Minister Sergey Lavrov said Mr Kislyak was doing his job meeting senior US officials.

He added: “This strongly resembles a witch hunt or the times of McCarthyism which we thought were long over in the United States as a civilised country.”

Steve Hall, former former chief of Russian operations for the CIA, said: “Ambassador Kislyak is clearly an aggressive guy, getting out there and talking to as many people as he possibly can, that’s what Vladimir Putin wants him to do.”

Mr Hall added: “It’s an interesting effect he had on people. They have meetings with him and then they forget. It’s pretty amazing.”

http://www.telegraph.co.uk/news/2017/03/03/donald-trump-brands-democrats-hypocrites-russian-links/

Story 2: Who Are Real Red Russian Agents of Influence?  — Who Lost The Crimea To Russia? — Who Gave Iran A Pathway To Nuclear Weapons? — Obama and Jarrett — Videos —

Image result for map of ukraine and crimera russia annexedImage result for map of ukraine and crimera russia annexed
Image result for map of ukraine and crimera russia annexed

NSA contractor reveals Obama’s Crimean Hypocrisy – Wayne Madsen

OBAMA IS BOILING MAD AFTER WHAT THIS CIA AGENT JUST REVEALED ABOUT PUTIN

OBAMA’s Intelligence Background Of His Family: Grandparents & OSS, Mother’s Job, Step-Father, Etc

Glenn Beck Exposes Obama’s Fraudulent History and Radicalized Beliefs

Obama’s Ex Secret Service Agent Dan Bongino “It’s Worse Than People Know”

Secret Service Agent: Obama Is Worse Than You Know

Wayne Madsen: The Covert Chronicles of Barack Hussein Obama

Wayne Madsen Bombshell: Barack Obama Conclusively Outed as CIA Creation – Alex Jones Tv 1/3

Wayne Madsen Bombshell: Barack Obama Conclusively Outed as CIA Creation – Alex Jones Tv 2/3

Wayne Madsen Bombshell: Barack Obama Conclusively Outed as CIA Creation – Alex Jones Tv 3/3

Iranian Super-Model Valerie Jarrett says Obama had NO scandals…lol

Image result for scandals of obama era

Image result for scandals of obama era

USA Vs Russia :The United States and NATO Are Preparing for a Major War With Russia

U.S. NATO troops surge in Europe after Russian aggression

The Truth About World War III | United States vs. Russia

Understanding Ukraine: The Problems Today and Some Historical Context

The Map That Shows Why Russia Fears War With USA – Mike Maloney

Putin’s Warning: Full Speech 2016

Putin warns Americans: You’re being distracted!

PUTIN just brought DOWN ROTHSCHILD SHADOW GOVERNMENT – TRUMP will FINNISH

How Dangerous is Russia?

Russia Vs. Ukraine – How Did this all Begin? In a Nutshell

Epic History: Russia Part 1

How Putin Annexed Crimea From Ukraine

Senator McCain Discusses Russian Aggression in Crimea with Mattis 

Defense secretary admits Obama lost Crimea

Russia Expert on Great Danger of New Cold War

Valerie Jarrett ~ The Iranian Islamo-Commie Plant in the White House!

The Empire Files: Stephen Cohen on US-Russia Relations (2017/01/19)

MUST-SEE: US Senator Attacks Defense Secretary for not Planning War With Russia

McCain And Graham CAUGHT ON VIDEO Pushing Ukraine War With Russia !!! Violation of Logan Act !!!

Russia scholar Stephen Cohen shuts down CNN shill host who tries to link Trump to Putin

Tucker Interview Stephen Cohen, Professor of Russian Studies at NYU and Princeton

Russia debate sparks fiery exchange between Amanpour and Cohen

Agent of influence

From Wikipedia, the free encyclopedia

An agent of influence is an agent of some stature who uses his or her position to influence public opinion or decision making to produce results beneficial to the country whose intelligence service operates the agent.[1] Agents of influence are often the most difficult agents to detect, as there is seldom material evidence that connects them with a foreign power,[2] but they can be among the most effective means of influencing foreign opinion and actions as they hold considerable credibility among the target audience.[3] Most commonly they serve the interests of a foreign power in one of three ways: either as a controlled agent directly recruited and controlled by a foreign power; as a “trusted contact” that consciously collaborates to advance foreign interests but are not directly recruited or controlled by a foreign power; or as a “useful idiot” that is completely unaware of how their actions further the interests of a foreign power.[4]

The term “agent of influence” is often used to describe both individuals and organizations engaged in influence operations. Individuals engaged in this type of influence operation may serve in the fields of journalism, government, art, labor, academia, or a number of other professional fields.[5] Cultural opinion makers, nationalists, and religious leaders have also been targeted to serve as individual agents of influence.[6]

In addition to individual agents of influence, front organizations can serve the interests of a foreign power in this capacity.[7] Some Cold War examples of front organizations serving as agents of influence, focusing largely on the Soviet side, were many “peace” groups: the Christian Peace Conference, the International Organization of Journalists, the World Federation of Scientific Workers, the World Federation of Trade Unions, the International Institute for Peace, and the World Peace Council.[8] When individuals join such organizations in good faith but are in fact serving the interests of a foreign elite, their affiliation becomes infiltration, and cumulatively the organization serves as an agent of influence.[9]

U.S. government definitions

  • An agent of some stature who uses his or her position to influence public opinion or decision making to produce results beneficial to the country whose intelligence service operates the agent (Air Force Office of Special Investigations Manual 71-142).[10]
  • A person who is directed by an intelligence organization to use his or her position to influence public opinion or decision-making in a manner that will advance the objective of the country for which that organization operates (Counterintelligence Glossary—Terms & Definitions of Interest for Department of Defense Counterintelligence Professionals).[10]
  • An individual who acts in the interest of an adversary without open declaration of allegiance and attempts to exercise influence covertly, but is not necessarily gathering intelligence or compromising classified material, is known as an agent of influence (Historical Dictionary of Cold War Counterintelligence).[10]
  • An agent operating under intelligence instructions who uses his or her officialdom or public position, and other means, to exert influence on policy, public opinion, the course of particular events, the activity of political organizations and state agencies in target countries (KGB Lexicon: The Soviet Intelligence Officer’s Handbook, edited by KGB archivist Vasiliy Mitrokhin).[10]
  • The Foreign Agents Registration Act (FARA) was enacted in 1938, and 22 U.S.Code § 611 et seq provides detailed definitions of what constitutes an agent of influence.[11]

Characteristics

text

Leon Trotsky, who popularized the term “fellow traveller” in 1924. Trotsky would state: “As regards a ‘fellow-traveller’, the question always comes up—how far will he go?”[12]

The primary characteristic that distinguishes agents of influence from spies is the lack of absolute control exercised by the foreign power on an agent of influence. According to Angelo Codevilla, the work of an agent of influence “can be far more valuable, subtle, and dangerous than that of a mere spy”.[13] As witnessed in the Cold War through “fellow travelers“, the best agents of influence were those whose interests paralleled that of the aggressor’s and needed little if any coordination.[14] A foreign power can rarely exercise complete control over an agent of influence, as these agents possess their own preferences and motivations; the most proven way to cultivate the desired results is for a foreign power to choose and develop an agent of influence whose interests already align with their own.[14]Overlooking an agent of influence’s different motivations can have negative consequences, as witnessed in World War I, when German political warfare strategists sent Vladimir Lenin back to St. Petersburg in an effort to foster domestic instability and get Russia out of the war in 1917.[14] Since Lenin had different motivations and interests than the German government at the time, he acted in a manner not suited to German interests, and grew so powerful that his party was instrumental to bringing down Imperial Germany.[14]

Excessive efforts to control or exploit agents of influence can also have negative consequences. Such agents are best seen as strategic or tactical allies, and efforts to exercise too much control over them may result in the loss of an influence asset.[14] Excessive exploitation of these agents can lead to their exposure by forcing them to take questionably one-sided positions, as witnessed in the exposure of Norwegian Arne Treholt.[15] Because these agents exercise influence, their positions and opinions are not wholly secret, but the level to which they coordinate activities with a hostile power is likely to be kept secret.[16]

Agents of influence are most effective because they bring with them a sense of credibility among the target audience, and they use this credibility to convey a story or manipulate a situation in favor of the foreign power with which they share common preferences and motivations.[3] This credibility makes agents of influence so effective that, according to Angelo Codevilla, using these agents is an act of war “in the same sense that armies crashing across border or airplanes dropping bombs are acts of war because their results can be as intrusive or conclusive as the results of armies or bombs.”[17]

Known Agents Of Influence

text

Accused agent of influence and convicted spy Arne Treholt

Individuals operating as an agent of influence may serve in the fields of journalism, government, art, labor, academia, or a number of other professional fields.[5] Cultural opinion makers, nationalists, and religious leaders have also been targeted to serve as individual agents of influence.[6] The following are some notable individuals that have been accused of being foreign agents of influence. The list is not exhaustive but is meant to show the wide range in which such agents can operate. As previously noted, proving someone is an agent of influence is among the most difficult endeavors, even for the most skilled counterintelligence officers.[2]

  • Alger Hiss – an agent of influence and spy.[18] At the time of his exposure he had significant support among US politicians and only went to jail for lying under oath about passing documents to the Soviet Union.[18]
  • Harry Hopkins – debate continues today over whether enough evidence persists to accuse him of being a Soviet agent of influence, but he was largely responsible for fostering pro-Soviet views within the Franklin D. Roosevelt administration.[19]
  • Arne Herløv Petersen – used as a Soviet agent of influence in Norway for over 10 years, he mainly focused on various means of manipulating Danish public opinion.[20]
  • Arne Treholt – he was exposed as a result of overuse as an agent of influence in taking blatantly one-sided arguments over Norway’s northern border.[15]
  • Rose O’Neal Greenhow – Confederate spy and accused agent of influence working among the British.[21]
  • William Stephenson – assumed British agent of influence working in the US in the era of World War II.[22]
  • Harry Dexter White – According to confessed spies and FBI informants Whitaker Chambers and Elizabeth Bentley, Harry Dexter White was accused of being a Soviet agent of influence working in the US as an Assistant Secretary of Treasury.[23] He was accused of fostering animosity between the US and Japan in an effort to advance Russian interests.[24] He was also accused of influencing the climate so that Russia could gain disproportional representation in the United Nations and delaying aid to the Chinese government of Chiang Kai-shek in an effort to facilitate the communist takeover of the government.[24]In his book Treasonable Doubt, R. Bruce Craig questions whether this accusation is true, largely relying on the White’s pivotal role in the founding of the Bretton Woods system to point that some key achievements of his career were staunchly anti-Communist in nature.[23] As mentioned earlier, however, it is among the most difficult tasks to prove someone is an agent of influence.[2] As noted by Dr. James C. Van Hool, joint historian of the US Department of State and the Central Intelligence Agency, debate over White’s status as an agent of influence continues to this day.[23]
  • Peter Matthiessen Writer and former covert CIA operative who admittedly established the Paris Review as a front for his agency activities.[25][26]

Organizational functioning

Main article: Communist front

In addition to individual agents of influence, front organizations can serve the interests of a foreign power in this capacity.[7] When individuals join such organizations in good faith but are in fact serving the interests of a foreign elite, their affiliation becomes infiltration, and cumulatively the organization serves as an agent of influence.[9] It is important to note, however, that not all front organizations focus exclusively on influence operations, as some have more specific objectives (intelligence collection, etc.). The Cold War is a recent example of increased use of not only front organizations, but of front organizations being used as agents of influence to alter the target nation’s belief system and policies on the international stage.[27]

The use of organizations as agents of influence during the Cold War is a recent example that serves to illustrate how frequently front organizations were used in an attempt to alter the perceptions and actions of a foreign nation and its public. A Communist front organization is an organization identified to be a front organization under the effective control of a Communist party, the Communist International or other Communist organizations.[28] Lenin originated the idea in his manifesto of 1902, “What Is to Be Done?“. Since the party was illegal in Russia, he proposed to reach the masses through “a large number of other organizations intended for wide membership and, which, therefore, can be as loose and as public as possible.”[29] Generally called “mass organizations” by the Communists themselves,[30] these groups were prevalent from the 1920s through the 1950s, with their use accelerating during the Popular Front period of the 1930s.

Starting in 1939, Attorney General Biddle began compiling a list of Fascist and Communist front organizations. It was called “Attorney General’s List of Subversive Organizations” (AGLOSO), but was not at first made public.[31]Political pressures from Congress forced President Harry S. Truman to act.[32] Truman’s Attorney General Tom C. Clark expanded the list, which was officially authorized by presidential Executive Order 9835 in 1947 and was administered by the new Loyalty Review Board. The Board became part of the Civil Service Commission.[33] The list was used by federal agencies to screen appointments during the Truman Administration. The program investigated over 3 million government employees, of whom 300 were dismissed as security risks. Adverse decisions could be appealed to the Loyalty Review Board, a government agency set up by President Truman.[34][35]

The Loyalty Review Board publicized the previously secret Attorney General’s list in March 1948 as a “List of Communist classified organizations.” The list gave the name and date founded, and (for active groups) the headquarters, and chief officers.[36]

text

This is a picture of the Ministry of Finance in East Berlin, adorned for a session of the World Peace Council on May 24, 1954. The German Federal Archive notes that the original caption, which describes the “extraordinary” session, may in retrospect be “erroneous, biased, obsolete or politically extreme.”

In 1955, SSIS published a list of what it described as the 82 most active and typical sponsors of communist fronts in the United States; some of those named had literally dozens of affiliations with groups that had either been cited as Communist fronts or had been labelled “subversive” by either the subcommittee or the House Committee on Un-American Activities.[39]

See also

https://en.wikipedia.org/wiki/Agent_of_influence

BOMBSHELL: BARACK OBAMA CONCLUSIVELY OUTED AS CIA CREATION

The Story of Obama: All in The CompanyPREFACEAlex Jones & Aaron Dykes
Infowars.com
August 18, 2010

“Tonight is a particular honor for me because, let’s face it, my presence on this stage is pretty unlikely. My father was a foreign student, born and raised in a small village in Kenya. He grew up herding goats, went to school in a tin-roof shack. His father — my grandfather — was a cook, a domestic servant to the British. But my grandfather had larger dreams for his son. Through hard work and perseverance my father got a scholarship to study in a magical place, America, that shone as a beacon of freedom and opportunity to so many who had come before.”
– Barack Obama, 2004 Democratic National Convention Keynote Address

Far from being the mere ‘son of a goat herder’ (as he deceptively paraded during and even before his candidacy), strong evidence has emerged that President Barack Obama is the product of the intelligence community. Investigative reporter and former NSA employee Wayne Madsen has put together an extensive three-part (and growing) series with conclusive proof and documentation that Barack Obama Sr., Stanley Ann Dunham, Lolo Soetoro and President Barack Obama himself all hold deep ties to the CIA and larger intelligence community. And that’s just the beginning.

After his election, President Obama quickly moved to seal off his records via an executive order. Now, after two years of hints and clues, there is substantial information to demonstrate that what Obama has omitted is that his rare rise to power can only be explained by his intelligence roots. However, this is more than the story of one man or his family. There is a long-term strategic plan to recruit promising candidates into intelligence and steer these individuals and their families into positions of influence and power. Consider that it is now declassified former British Prime Minister Tony Blair was recruited into MI5 before becoming a labour leader, or that George H. W. Bush not only became CIA director in 1976 but had a deeper past in the organization. While we may never know many pertinent details about these matters, one thing that is certain is that the American people have never been told the truth about who holds the real power, nor who this president– and likely many others– really is. Thus, we urge everyone to read Wayne Madsen’s deep report and seek the truth for yourself.

——————-

The Story of Obama: All in The Company (In Three Parts)

Wayne Madsen
Wayne Madsen Report
August 18, 2010

PART 1: The Story of Obama: All in The Company (Part I)

Investigative journalist Wayne Madsen has discovered CIA files that document the agency’s connections to institutions and individuals figuring prominently in the lives of Barack Obama and his mother, father, grandmother, and stepfather. The first part of his report highlights the connections between Barack Obama, Sr. and the CIA-sponsored operations in Kenya to counter rising Soviet and Chinese influence among student circles and, beyond, to create conditions obstructing the emergence of independent African leaders.

JPEG - 26.4 kb
From 1983-84, Barack Obama worked as Editor at Business Internation Corporation, a Business International Corporation, a known CIA front company.

President Obama’s own work in 1983 for Business International Corporation, a CIA front that conducted seminars with the world’s most powerful leaders and used journalists as agents abroad, dovetails with CIA espionage activities conducted by his mother, Stanley Ann Dunham in 1960s post-coup Indonesia on behalf of a number of CIA front operations, including the East-West Center at the University of Hawaii, the U.S. Agency for International Development (USAID), and the Ford Foundation. Dunham met and married Lolo Soetoro, Obama’s stepfather, at the East-West Center in 1965. Soetoro was recalled to Indonesia in 1965 to serve as a senior army officer and assist General Suharto and the CIA in the bloody overthrow of President Sukarno.

Barack Obama, Sr., who met Dunham in 1959 in a Russian language class at the University of Hawaii, had been part of what was described as an airlift of 280 East African students to the United States to attend various colleges — merely “aided” by a grant from the Joseph P. Kennedy Foundation, according to a September 12, 1960, Reuters report from London. The airlift was a CIA operation to train and indoctrinate future agents of influence in Africa, which was becoming a battleground between the United States and the Soviet Union and China for influence among newly-independent and soon-to-be independent countries on the continent.

The airlift was condemned by the deputy leader of the opposition Kenyan African Democratic Union (KADU) as favoring certain tribes — the majority Kikuyus and minority Luos — over other tribes to favor the Kenyan African National Union (KANU), whose leader was Tom Mboya, the Kenyan nationalist and labor leader who selected Obama, Sr. for a scholarship at the University of Hawaii. Obama, Sr., who was already married with an infant son and pregnant wife in Kenya, married Dunham on Maui on February 2, 1961 and was also the university’s first African student. Dunham was three month’s pregnant with Barack Obama, Jr. at the time of her marriage to Obama, Sr.

JPEG - 26.7 kb
The CIA allegedly recruited Tom M’Boya in a heavily funded “selective liberation” programme to isolate Kenya’s founding President Jomo Kenyatta, who the American spy agency labelled as “unsafe.”

KADU deputy leader Masinda Muliro, according to Reuters, said KADU would send a delegation to the United States to investigate Kenyan students who received “gifts” from the Americans and “ensure that further gifts to Kenyan students are administered by people genuinely interested in Kenya’s development.’”

Mboya received a $100,000 grant for the airlift from the Kennedy Foundation after he turned down the same offer from the U.S. State Department, obviously concerned that direct U.S. assistance would look suspicious to pro-Communist Kenyan politicians who suspected Mboya of having CIA ties. The Airlift Africa project was underwritten by the Kennedy Foundation and the African-American Students Foundation. Obama, Sr. was not on the first airlift but a subsequent one. The airlift, organized by Mboya in 1959, included students from Kenya, Uganda, Tanganyika, Zanzibar, Northern Rhodesia, Southern Rhodesia, and Nyasaland.

Reuters also reported that Muliro charged that Africans were “disturbed and embittered” by the airlift of the selected students. Muliro “stated that “preferences were shown to two major tribes [Kikuyu and Luo] and many U.S.-bound students had failed preliminary and common entrance examinations, while some of those left behind held first-class certificates.”

Obama, Sr. was a friend of Mboya and a fellow Luo. After Mboya was assassinated in 1969, Obama, Sr. testified at the trial of his alleged assassin. Obama, Sr. claimed he was the target of a hit-and-run assassination attempt after his testimony.

JPEG - 70.7 kb
CIA-airlifted to Hawaii, Barack Obama Sr., with leis, stands with Stanley Dunham, President Obama’s grandfather, on his right.

Obama, Sr., who left Hawaii for Harvard in 1962, divorced Dunham in 1964. Obama, Sr. married a fellow Harvard student, Ruth Niedesand, a Jewish-American woman, who moved with him to Kenya and had two sons. They were later divorced. Obama, Sr. worked for the Kenyan Finance and Transport ministries as well as an oil firm. Obama, Sr. died in a 1982 car crash and his funeral was attended by leading Kenyan politicians, including future Foreign Minister Robert Ouko, who was murdered in 1990.

CIA files indicate that Mboya was an important agent-of-influence for the CIA, not only in Kenya but in all of Africa. A formerly Secret CIA Current Intelligence Weekly Summary, dated November 19, 1959, states that Mboya served as a check on extremists at the second All-African People’s Conference (AAPC) in Tunis. The report states that “serious friction developed between Ghana’s Prime Minister Kwame Nkrumah and Kenyan nationalist Tom Mboya who cooperated effectively last December to check extremists at the AAPC’s first meeting in Accra.” The term “cooperated effectively” appears to indicate that Mboya was cooperating with the CIA, which filed the report from field operatives in Accra and Tunis. While “cooperating” with the CIA in Accra and Tunis, Mboya selected the father of the president of the United States to receive a scholarship and be airlifted to the University of Hawaii where he met and married President Obama’s mother.

An earlier CIA Current Intelligence Weekly Summary, secret, and dated April 3, 1958, states that Mboya “still appears to be the most promising of the African leaders.” Another CIA weekly summary, secret and dated December 18, 1958, calls Mboya the Kenyan nationalist an “able and dynamic young chairman” of the People’s Convention party who was viewed as an opponent of “extremists” like Nkrumah, supported by “Sino-Soviet representatives.”

In a formerly Secret CIA report on the All-Africa Peoples Conference in 1961, dated November 1, 1961, Mboya’s conservatism, along with that of Taleb Slim of Tunisia, are contrasted to the leftist policies of Nkrumah and others. Pro-communists who were elected to the AAPC’s steering committee at the March 1961 Cairo conference, attended by Mboya, are identified in the report as Abdoulaye Diallo, AAPC Secretary General, of Senegal; Ahmed Bourmendjel of Algeria; Mario de Andrade of Angola; Ntau Mokhele of Basutoland; Kingue Abel of Cameroun; Antoine Kiwewa of Congo (Leopoldville); Kojo Botsio of Ghana; Ismail Toure of Guinea; T. O. Dosomu Johnson of Liberia; Modibo Diallo of Mali; Mahjoub Ben Seddik of Morocco; Djibo Bakari of Niger; Tunji Otegbeya of Nigeria; Kanyama Chiume of Nyasaland; Ali Abdullahi of Somalia; Tennyson Makiwane of South Africa, and Mohamed Fouad Galal of the United Arab Republic.

The only attendees in Cairo who were given a clean bill of health by the CIA were Mboya, who appears to have been a snitch for the agency, and Joshua Nkomo of Southern Rhodesia, B. Munanka of Tanganyika, Abdel Magid Shaker of Tunisia, and John Kakonge of Uganda.

Nkrumah would eventually be overthrown in a 1966 CIA-backed coup while he was on a state visit to China and North Vietnam. The CIA overthrow of Nkrumah followed by one year the agency’s overthrow of Sukarno, another coup that was connected to President Obama’s family on his mother’s side. There are suspicions that Mboya was assassinated in 1969 by Chinese agents working with anti-Mboya factions in the government of Kenyan President Jomo Kenyatta in order to eliminate a pro-U.S. leading political leader in Africa. Upon Mboya’s death, every embassy in Nairobi flew its flag at half-mast except for one, the embassy of the People’s Republic of China.

JPEG - 26.8 kb
Jomo Kenyatta, first President of Kenya.

Mboya’s influence in the Kenyatta government would continue long after his death and while Obama, Sr. was still alive. In 1975, after the assassination of KANU politician Josiah Kariuki, a socialist who helped start KANU, along with Mboya and Obama, Sr., Kenyatta dismissed three rebellious cabinet ministers who “all had personal ties to either Kariuki or Tom Mboya.” This information is contained in CIA Staff Notes on the Middle East, Africa, and South Asia, formerly Top Secret Umbra, Handle via COMINT Channels, dated June 24, 1975. The intelligence in the report, based on its classification, indicate the information was derived from National Security Agency intercepts in Kenya. No one was ever charged in the assassination of Kariuki.

The intecepts of Mboya’s and Kariuki’s associates are an indication that the NSA and CIA also maintain intercepts on Barack Obama, Sr., who, as a non-U.S. person, would have been lawfully subject at the time to intercepts carried out by NSA and Britain’s Government Communications Headquarters (GCHQ).

(Continued below)

PART 2: Special Report. The Story of Obama: All in The Company – Part II

In Part I of this WMR special report, we revealed the connections between Barack Obama, Sr. and the CIA-affiliated Airlift Africa project to provide college degrees to and gain influence over a group of 280 eastern and southern African students from soon-to-be independent African nations to counter similar programs established by the Soviet Union and China. Barack Obama Sr. was the first African student to attend the University of Hawaii. Obama Sr. and Obama’s mother Stanley Ann Dunham met in a Russian language class in 1959 and they married in 1961.

The African airlift program was administered by Kenyan nationalist leader Tom Mboya, a fellow Luo tribe mentor and friend of the senior Obama. According to CIA documents described in Part I, Mboya also served the CIA in ensuring that pro-Soviet and pro-Chinese African nationalists were stymied in their attempt to dominate pan-African nationalist political, student, and labor movements.

One of Mboya’s chief opponents was Ghana’s first president, Kwame Nkrumah, who was ousted in a CIA-inspired coup in 1966, one year before to Obama Sr’s son, Barack Obama, Jr. and his mother joined Lolo Soetoro, an Indonesian who Obama’s mother met at the University of Hawaii in 1965, when President Obama was four years old.

In 1967, Obama and his mother joined her husband in Jakarta. In 1965, Lolo Soetoro had been called back from Hawaii by General Suharto to serve as an officer in the Indonesian military to help launch a bloody CIA-backed genocide of Indonesian Communists and Indonesian Chinese throughout the expansive country. Suharto consolidated his power in 1966, the same year that Barack Obama, Sr.’s friend, Mboya, had helped to rally pro-U.S. pan-African support for the CIA’s overthrow of Nkrumah in Ghana in 1966.

East-West Center, University of Hawaii,  and CIA coup against Sukarno

Ann Dunham met Soetoro at the East-West Center at the University of Hawaii. The center had long been affiliated with CIA activities in the Asia-Pacific region. In 1965, the year that Dunham met and married Soetoro, the center saw a new chancellor take over. He was Howard P. Jones who served a record seven years, from 1958 to 1965, as U.S. ambassador to Indonesia. Jones was present in Jakarta as Suharto and his CIA-backed military officers planned the 1965 overthrow of Sukarno, who was seen, along with the Indonesian Communist Party (PKI), as allies of China.

When Jones was chancellor of the East-West Center, he wrote an article for the Washington Post, dated October 10, 1965, in which he defended Suharto’s overthrow of Sukarno. Jones was “invited” by the Post to comment on the Suharto coup, described as a “counter-coup” against the Communists. Jones charged that Suharto was merely responding to an earlier attempted Communist-led coup against Sukarno launched by Lt. Col. Untung, “a relatively unknown battalion commander in the palace guard.”

Jones’s article, which mirrored CIA situation reports from the U.S. embassy in Jakarta, continued by stating that the alleged leftist coup on September 30 “came within an inch of succeeding through the assassination of six of the top military command. It might well have succeeded had not Defense Minister Nasution and a number of other senior generals also maked for assassination acted fast in a dramatic counter-coup.” Of course, what Jones did not inform the Post’s readers was that the Suharto “counter-coup” had been assisted with the strong help of the CIA.

Sukarno never blamed the Communists for the assassination of the army generals nor did the Indonesian Cabinet, where the second= and third-ranking leaders of the PKI were present. The possibility that the assassination of the generals was a CIA/Suharto “false flag” operation to affix blame on the PKI cannot be ruled out. Two days after Suharto’s coup, a CIA “rent-a-mob” burned down the PKI headquarters in Jakarta. As they marched past the U.S. Embassy, which was also the site of the CIA station, they yelled out, “Long live America!”

Untung later said that when he became aware that Suharto and the CIA were planning a coup on October 5, 1965 — Indonesian Armed Forces Day — forces loyal to him and Sukarno moved first. Jones described this as “typical Communist propaganda.” Suharto moved against Sukarno on October 1. Jones iterated that “there was not an iota of truth . . . in the accusation that the CIA was working against Sukarno.” History has proven otherwise. Jones accused the Communists of taking advantage of Sukarno’s failing health to beat out the other candidates to succeed him. The goal, according to Jones, was to have PKI boss D.N. Aidit succeed Sukarno. Sukarno did not die until 1970, while under house arrest.

  • A d v e r t i s e m e n t
  • {openx:49}

A CIA paper, formerly classified Secret and undated, states “Sukarno would like to return to the status quo ante-coup. He has refused to condemn the PKI or the 30th September Movement [of Lt. Col. Untung]; instead, he calls for unity of Indonesia and asks that no vengeance be taken by one group against the other. But, he has not succeeded in forcing the Army to abandon its anti-PKI activities and, on the other hand, he has bowed to their demand by appointing its single candidate General Suharto as head of the Army.” Suharto and Barry Obama Soetoro’s step-father Lolo Soetoro would ignore Sukarno’s call for no vengeance, as hundreds of thousands of Indonesians would soon discover.

The mass murder by Suharto of Indonesian Chinese is seen in the CIA paper’s description of the Baperki Party: “the leftist Baperki Party, with its major strength in rural areas, is largely Chinese-Indonesian in membership.” A CIA Intelligence Memorandum, dated October 6, 1966 and formerly classified Secret, shows the extent of the CIA’s monitoring of the anti-Sukarno coup from various CIA agents assigned as liaisons to Suharto’s army units surrounding the Presidential Palace in Bogor and at various diplomatic posts around the country, including the U.S. Consulate in Medan, which was keeping track of leftists in that Sumatran city and, which, in an October 2, 1965, Intelligence Memo, reported to the CIA that the “Soviet consul-general in Medan has a plane standing by that could be used for evacuation of Soviet citizens from Sumatra.” The October 6 memo also warns against allowing Untung from developing a following in Central Java.

A CIA formerly Secret “Weekly Summary Special Report” on Indonesia, dated August 11, 1967, and titled “The New Order in Indonesia,” reports that in 1966, Indonesia re-aligned its economy in order to receive International Monetary Fund (IMF) assistance. The CIA reports its is happy with the new triumvirate ruling Indonesia in 1967: Suharto, Foreign Minister Adam Malik, and the Sultan of Jogjakarta, who served as minister for economics and finance. The report also rejoices in the outlawing of the PKI, but states it “retains a significant following in East and Central Java,” where Ann Dunham Soetoro would largely concentrate her later efforts on behalf of USAID, the World Bank, and the Ford Foundation, all front activities for the CIA to “win the hearts and minds” of the Javanese farmers and artisans.

A CIA Intelligence Memorandum, formerly Secret and dated July 23, 1966, clearly sees the Muslim Nahdatul Ulama party {NU), the largest party in Indonesia and Muslim, as a natural ally of the United States and the Suharto regime. The report states that helped Suharto put down the Communists in the post-coup time frame, especially where the NU was strongest: East Java, where Obama’s mother would concentrate her activities, and North Sumatra and parts of Borneo. An April 29, 1966, formerly Secret CIA Intelligence Memorandum on the PKI states: “Moslem extremists in many instances outdid the army in hunting down and murdering members of the party [PKI] and its front groups.”

Dunham and Barry Soetoro in Jakarta and USAID front activities

Having A Supply Of Healthy Foods That Last Just Makes Sense

Dunham dropped out of the University of Hawaii in 1960 while pregnant with Barack Obama. Barack Obama Sr. left Hawaii in 1962 to study at Harvard. Dunham and Obama divorced in 1964. In the fall of 1961, Dunham enrolled at the University of Washington while caring for her infant son. Dunham was re-enrolled at the University of Hawaii from 1963 to 1966. Lolo Soetoro, who Dunham married in March 1965, departed Hawaii for Indonesia on July 20, 1965, some three months prior to the CIA’s coup against Sukarno. Soetoro, who served Suharto as an Army colonel, was clearly called back from the CIA-connected East-West Center to assist in the coup against Sukarno, one that would eventually cost the lives of some one million Indonesian citizens. It is a history that President Obama would like the press to ignore, which it certainly did during the 2008 primary and general election.

In 1967, after arriving in Indonesia with Obama, Jr., Dunham began teaching English at the American embassy in Jakarta, which also housed one of the largest CIA stations in Asia and had significant satellite stations in Surabaya in eastern Java and Medan on Sumatra. Jones left as East-West Center chancellor in 1968.

In fact, Obama’s mother was teaching English for the U.S. Agency for International Development (USAID), which was a major cover for CIA activities in Indonesia and throughout Southeast Asia, especially in Laos, South Vietnam, and Thailand. The USAID program was known as Lembaga Pendidikan Pembinaan Manajemen. Obama’s mother, painted as a free spirit and a “sixties child” by President Obama and people who claimed they knew her in Hawaii and Indonesia, had a curriculum vitae in Indonesia that contradicts the perception that Ann Dunham Soetoro was a “hippy.”

Dunham Soetoro’s Russian language training at the University of Hawaii may have been useful to the CIA in Indonesia. An August 2, 1966, formerly Secret memorandum from the National Security Council’s Executive Secretary Bromley Smith states that, in addition to Japan, Western Europe, Australia, New Zealand, Malaysia, and the Philippines, the Suharto coup was welcomed by the Soviet Union and its Eastern European allies because its created a non-aligned Indonesia that “represents an Asian counterweight to Communist China.” Records indicate that a number of CIA agents posted in Jakarta before and after the 1965 coup were, like Dunham Soetoro, conversant in Russian.

Dunham Soetoro worked for the elitist Ford Foundation, World Bank, Asian Development Bank, Bank Rakyat (the majority government-owned People’s Bank of Indonesia), and the CIA-linked USAID while she lived in Indonesia and later, Pakistan.

USAID was involved in a number of CIA covert operations in Southeast Asia. The February 9, 1971, Washington Star reported that USAID officials in Laos were aware that rice supplied to the Laotian Army by USAID was being re-sold to North Vietnamese army divisions in the country. The report stated that the U.S. tolerated the USAID rice sales to the North Vietnamese since the Laotian Army units that sold the rice found themselves protected from Communist Pathet Lao and North Vietnamese attack. USAID and the CIA also used the supply of rice to force Laotian Meo tribesmen to support the United States in the war against the Communists. USAID funds programmed for civilians injured in the war in Laos and public health care were actually diverted for military purposes.

In 1971, the USAID-funded Center for Vietnamese Studies at Southern Illinois University in Carbondale was accused of being a CIA front. USAID-funded projects through the Midwest Universities Consortium for International Activities (MUCIA) — comprising the Universities of Illinois, Wisconsin, Minnesota, Indiana and Michigan State — were accused of being CIA front projects, including those for “agricultural education” in Indonesia, as well as other “projects” in Afghanistan, Mali, Nepal, Nigeria, Thailand, and South Vietnam. The charge was made in 1971, the same year that Ann Dunham was working for USAID in the country.

In a July 10, 1971, New York Times report, USAID and the CIA were accused of “losing” $1.7 billion appropriated for the Civil Operations and Revolutionary Development Support (CORDS) program in South Vietnam. CORDS was part of the CIA’s Operation Phoenix program, which involved CIA assassination and torture of South Vietnamese village elders and Buddhist clerics. USAID money was also directed to the CIA’s proprietary airline in Southeast Asia, Air America. In Thailand, USAID funds for the Accelerated Rural Development Program in Thailand were actually masking a CIA anti-Communist counter-insurgency operation. USAID funds programmed for public works projects in East Pakistan in 1971 were used for East Pakistan’s military fortifications on its border with India, in the months before the outbreak of war with India, in contravention of U.S. law that prohibited USAID money for military purposes.

In 1972, USAID administrator Dr. John Hannah admitted to Metromedia News that USAID was being used as a cover for CIA covert operations in Laos. Hannah only admitted to Laos as a USAID cover for the CIA. However, it was also reported that USAID was being used by the CIA in Indonesia, Philippines, South Vietnam, Thailand, and South Korea. USAID projects in Southeast Asia had to be approved by the Southeast Asian Development Advisory Group (SEADAG), an Asia Society group that was, in fact, answerable to the CIA.

The U.S. Food for Peace program, jointly administered by USAID and the Department of Agriculture, was found in 1972 to be used for military purposes in Cambodia, South Korea, Turkey, South Vietnam, Spain, Taiwan, and Greece. In 1972, USAID funneled aid money only to the southern part of North Yemen, in order to aid North Yemeni forces against the government of South Yemen, then ruled by a socialist government opposed to U.S. hegemony in the region.

One of the entities affiliated with the USAID work in Indonesia was the Asia Foundation, a 1950s creation formed with the help of the CIA to oppose the expansion of communism in Asia. The East-West Center guest house in Hawaii was funded by the Asia Foundation. The guest house is also where Barack Obama Sr. first stayed after his airlift from Kenya to Hawaii, arranged by the one of the CIA’s major agents of influence in Africa, Mboya.

Dunham would also travel to Ghana, Nepal, Bangladesh, India, and Thailand working on micro-financing projects. In 1965, Barack Obama Sr. returned to Kenya from Harvard, with another American wife. The senior Obama linked up with his old friend and the CIA’s “golden boy” Mboya and other fellow Luo politicians. The CIA station chief in Nairobi from 1964 to 1967 was Philip Cherry. In 1975, Cherry was the CIA station chief in Dacca, Bangladesh. Cherry was linked by the then-U.S. ambassador to Bangladesh, Eugene Booster, to the 1975 assassination of Bangladesh’s first president, Sheikh Mujibur Rahman, and members of his family.

The hit on “Sheikh Mujib” and his family was reportedly ordered by then-Secretary of State Henry Kissinger. Bangladesh was also on the micro- and macro-financing travel itinerary of CIA-linked Ann Dunham.

CIA banking and Hawaii

Meanwhile, Dunham Soetoro’s mother, Madelyn Dunham, who raised young Obama when he returned to Hawaii in 1971 while his mother stayed in Indonesia, was the first female vice president at the Bank of Hawaii in Honolulu. Various CIA front entities used the bank. Madelyn Dunham handled escrow accounts used to make CIA payments to U.S.-supported Asian dictators like Philippines President Ferdinand Marcos, South Vietnamese President Nguyen van Thieu, and President Suharto in Indonesia. In effect, the bank was engaged in money laundering for the CIA to covertly prop up its favored leaders in the Asia-Pacific region.

One of the CIA’s major money laundering fronts in Honolulu was the firm of Bishop, Baldwin, Rewald, Dillingham & Wong (BBRDW). After the CIA allowed the firm to collapse in 1983  amid charges that BBRDW was merely a Ponzi scheme, Senator Daniel Inouye of the US Senate Intelligence Committee said the CIA’s role in the firm “wasn’t significant.” It would later be revealed that Inouye, who was one of the late Alaska Senator Ted Stevens’s best friends in the Senate, was lying. In fact, BBRDW was involved heavily in funding covert CIA programs throughout Asia, including economic espionage against Japan, providing arms for Afghan mujaheddin guerrillas in their war against the Soviets and covertly supplying weapons to Taiwan. One of BBRDW’s principals was John C. “Jack” Kindschi, who, before he retired in 1981, was the CIA station chief in Honolulu. BBRDW’s chairman Ron Rewald had a counterfeit college degree certificate provided for the wall of his office by the CIA’s forgery experts and his name was inserted in university records as an alumnus.

A false history for BBRDW was concocted by the CIA claiming the firm had operated in Hawaii since it was a territory. President Obama is currently plagued by allegations that he has fake college and university transcripts, a phony social security number issued in Connecticut, and other padded resume items. Did Hawaii’s fake BBRDW documents portend today’s questions about Obama’s past?

BBRDW conducted its business in the heart of Honolulu’s business district, where the Bank of Hawaii was located and where Obama grandmother Madelyn Dunham ran the escrow accounts. The bank would handle much of BBRDW’s covert financial transactions.

Obama/Soetoro and the “years of living dangerously” in Jakarta

It is clear that Dunham Soetoro and her Indonesian husband, President Obama’s step-father, were closely involved in the CIA’s operations to steer Indonesia away from the Sino-Soviet orbit during the “years of living dangerously” after the overthrow of Sukarno. WMR has discovered that some of the CIA’s top case officers were assigned to various official and non-official cover assignments in Indonesia during this time frame, including under the cover of USAID, the Peace Corps, and the U.S. Information Agency (USIA).

One of the closest CIA contacts for Suharto was former CIA Jakarta embassy officer Kent B. Crane. Crane was so close to Suharto after “retiring” from the CIA, he was reportedly one of the only “private” businessmen given an Indonesian diplomatic passport by Suharto’s government. Crane’s company, the Crane Group, was involved in supplying small arms to the military forces of the United States, Indonesia, and other nations. A foreign policy adviser to Vice President Spiro Agnew, Crane was later nominated as U.S. ambassador to Indonesia by President Ronald Reagan but the nomination was dead-on-arrival because of Crane’s dubious links to Suharto. The ambassadorship would instead go to John Holdridge, a close colleague of Kissinger. Holdridge was succeeded in Jakarta by Paul Wolfowitz.

Suharto’s cronies, who included Mochtar and James Riady of the Lippo Group, would later stand accused of funneling over $1 million of illegal foreign contributions to Bill Clinton’s 1992 presidential campaign.

President Obama has twice postponed official state visits to Indonesia, perhaps fearful of the attention such a trip would bring to the CIA connections of his mother and Indonesian step-father.

In the 1970s and 80s, Dunham was active in micro-loan projects for the Ford Foundation,  the CIA-linked East-West Center, and USAID in Indonesia. One of the individuals assigned to the U.S. embassy and helped barricade the compound during a violent anti-U.S. student demonstration during the 1965 Suharto coup against Sukarno was Dr. Gordon Donald, Jr. Assigned to the embassy’s Economic Section, Donald was responsible for USAID micro-financing for Indonesian farmers, the same project that Dunham Soetoro would work on for USAID in the 1970s, after her USAID job of teaching English in Indonesia. In a 1968 book, “Who’s Who in the CIA,” published in West Berlin, Donald is identified as a CIA officer who was also assigned to Lahore, Pakistan, where Dunham would eventually live for five years in the Hilton International Hotel while working on microfinancing for the Asian Development Bank.

Another “Who’s Who in the CIA” Jakarta alumnus is Robert F. Grealy, who later became the director for international relations for the Asia-Pacific for J P Morgan Chase and a director for the American-Indonesian Chamber of Commerce. J P Morgan Chase’s CEO Jamie Dimon is being mentioned as a potential replacement for Treasury Secretary Timothy Geithner, whose father, Peter Geithner, was the Ford Foundation’s Asia grant-selector who funneled the money to Ann Dunham’s Indonesian projects.

CIA Black Projects and Hawaii

While in Pakistan, Dunham’s son Barack visited her in 1980 and 1981. Obama visited Karachi, Lahore, and Hyderabad, India during his south Asia visits. It was during the time period that the CIA was beefing up its anti-Soviet operations in Afghanistan from Pakistan.

A January 31, 1958, heavily-redacted formerly Secret NOFORN [no foreign dissemination] memorandum for CIA Director Allen Dulles from the Deputy Assistant Director of the CIA for Research and Reports [name redacted] reports on a fact-finding mission to the Far East, Southeast Asia, and the Middle East from November 17 through December 21, 1957.

The CIA Office of Research and Reports (ORR) chief reports a meeting with the staff of retired Army General Jesmond Balmer, a senior CIA official in Hawaii, about requests by the Commander-in-Chief Pacific (CINCPAC) for “a number of detailed, time-consuming research studies.” The ORR chief then reports about a CIA “survey of students at the University of Hawaii who have both Chinese language and research ability.” The ORR chief also reports that at a South-East Asia Treaty Organization (SEATO) Counter Subversion Seminar at Baguio, Philippines held from November 26-29, 1957, the Economic Subcommittee discussed an “economic development fund” to combat “Sino-Soviet Bloc subversive activities in the area and a consideration of possible counter-measures which might be employed.”

The Thailand and Philippines delegations were pushing hard for U.S. funding for an economic development fund, which may have provided the impetus for later USAID projects in the region, including those with which Peter Geithner and Obama’s mother were intimately involved.

Although CIA geo-political covert operations at the University of Hawaii are well-documented, the agency’s darker side of research and MK-UKTRA type operations has not generally been associated with the University of Hawaii.

A series of formerly Confidential CIA memoranda, dated May 15, 1972, points to the involvement of both the Defense Department’s Advanced Research Projects Agency (ARPA), the CIA, and the University of Hawaii in the CIA’s behavioral science program. The memos are signed by then-Deputy Director of the CIA Bronson Tweedy, the chief of the Intelligence Community’s Program Review Group (PRG) [name redacted], and CIA Director Richard Helms. The subject of the memos is “ARPA Supported Research Relating to Intelligence Product,” The memo from the PRG chief discusses a conference held on May 11, 1972, attended by Lt. Col. Austin Kibler, ARPA’s Director of Behavioral Research. Kibler was the chief for ARPA research into behavior modification and remote viewing. Others mentioned in the PRG chief’s memo include CIA Deputy Director for Intelligence Edward Proctor, the CIA Deputy Director for Science and Technology Carl Duckett, and Director of the Office of National Estimates John Huizenga.

In 1973, after CIA Director James Schlesinger ordered a review of all CIA programs, the CIA developed a set of documents on various CIA programs collectively called the “Family Jewels.” Most of these documents were released in 2007 but it was also revealed that Dr. Sidney Gottlieb, the CIA’s director of MKULTRA, the agency’s behavior modification, brainwashing, and drug testing component, had been ordered by Helms, before he resigned as CIA director, to be destroyed. Duckett, in one memo from Ben Evans of the CIA to CIA Director William Colby, dated May 8, 1973, conveys that he “thinks the Director would be ill-advised to say he is acquainted with this program,” meaning Gottlieb’s drug testing program under MKULKTRA.

Senior Gerald Ford administration officials, including Chief of Staff Dick Cheney and Defense Secretary Donald Rumsfeld, ensured that after the production of the “Family Jewels” documents, no CIA revelations were made about CIA psychological behavior-altering programs, including MKULTRA and Project ARTICHOKE.

The May 15, 1972, set of memos appears to be related to the CIA’s initial research, code named SCANATE, in 1972 into psychic warfare, including the use of psychics for purposes of remote viewing espionage and mind control. The memo discussed Kibler from ARPA and “his contractor,” which was later discovered to be Stanford Research Institute (SRI) in Menlo Park, California.

In a memo from CIA Director Helms to, among others, Duckett, Huizenga, Proctor, and the Director of the Defense Intelligence Agency, which later inherited reote viewing from the CIA under the code name GRILL FLAME, Helms insists that ARPA had been supporting research into behavioral science and its potential for intelligence production “for a number of years” at “M.I.T., Yale, the University of Michigan, U.C.L.A., and University of Hawaii and other institutions as well as in corporate research facilities.”

The role of the University of Hawaii in CIA psych-war operations continues to this day.  The chief of research for DIA’s Defense Counterintelligence and Human Intelligence Center (DCHC) Behavioral Sciences Program, Dr. Susan Brandon, who was reportedly involved in a covert program run by the American Psychological Association (APA), Rand Corporation, and the CIA to employ “enhanced interrogation” techniques, including sleep and sensory deprivation, intense pain, and extreme isolation on prisoners held at Bagram airbase in Afghanistan and other “black prisons,” received her PhD in Psychology from the University of Hawaii. Brandon also served as assistant director of Social, Behavioral, and Educational Sciences for the Office of Science and Technology Policy in the George W. Bush White House.

The CIA’s close connections to the University of Hawaii continued to the late 1970s, when the former President of the University of Hawaii from 1969 to 1974, Harlan Cleveland, was a special invited speaker at CIA headquarters on May 10, 1977. Cleveland served as Assistant Secretary of State for International Organization Affairs from 1961 to 1965 and Lyndon Johnson’s ambassador to NATO from 1965 to 1969 before taking up his position at the University of Hawaii.

A CIA Director of Training memo dated May 21, 1971, reports on the active recruitment of a U.S. Marine officer who was entering graduate school at the University of Hawaii.

The Family of Obama and the CIA

There are volumes of written material on the CIA backgrounds of George H. W. Bush and CIA-related activities by his father and children, including former President George W. Bush. Barack Obama, on the other hand, cleverly masked his own CIA connections as well as those of his mother, father, step-father, and grandmother (there is very little known about Obama’s grandfather, Stanley Armour Dunham, who was supposedly in the furniture business in Hawaii after serving in Europe during World War II). Presidents and vice presidents do not require security background checks, unlike other members of the federal government, to hold office. That job is left up to the press. In 2008, the press failed miserably in its duty to vet the man who would win the White House. With the ties of Obama’s parents to the University of Hawaii and its links to MKULTRA and ARTICHOKE, a nagging question remains: Is Barack Obama a real-life “Manchurian Candidate?”

(Continued below)

PART 3: August 19, 2010 — SPECIAL REPORT. The Story of Obama: All in the Company — Add one more Obama family member to the CIA payroll. Part III

WMR previously reported on the CIA links of President Obama’s mother, father, step-father, grandmother to the CIA. Not much is known about Obama’s grandfather, Stanley Armour Dunham, who Obama mistakenly referred to as “his father” in two speeches, one recently to the Disabled American Veterans.

What is officially known about Stanley Armour Dunham is that he served with the 9th Air Force in Britain and France prior to and after the D-Day invasion. After the war, Dunham and his wife, Madelyn and his daughter Stanley Ann — Obama’s mother — moved to Berkeley, California; El Dorado, Kansas; Seattle; and Honolulu. Armour Dunham is said to have worked for a series of furniture stores.

Obama maintains that his mother and father first met in a Russian-language class at the University of Hawaii in 1959. However, a photograph has emerged of Stanley Armour welcoming Barack Obama, Sr., complete with traditional Hawaiian welcoming leis, from Kenya. Obama, Sr. was the only Kenyan student airlifted to Hawaii as part of the CIA-inspired Airlift Africa project that saw Obama and 279 other students from British eastern and southern African colonies brought to the United States for college degrees prior to their homelands gaining independence from Britain. The students were selected by Kenyan nationalist leader Tom Mboya who would later conduct surveillance for the CIA at pan-African nationalist meetings. Mboya was particularly focused on two African leaders who were seen as too close to the Sino-Soviet bloc, Kwame Nkrumah of Ghana and Sekout Toure of Guinea.

Stanley Armour Dunham with Barack Obama, Sr. at welcoming ceremony to Hawaii. The presence of two US Navy personnel indicates the plane may have landed at Hickam Air Force Base, an indication of the U.S. government’s and CIA’s role in the Airlift Africa project.

The photograph of Armour Dunham with Barack Obama, Sr., indicates that the “furniture salesman” in Hawaii was, in fact, working with a CIA-funded project to rapidly educate aspiring politicians to serve in post-independence African governments to counter Soviet- and Chinese-backed political leaders in the region.

There is a strong reason to believe that Armour Dunham worked in the 1950s for the CIA in the Middle East. An FBI file on Armour Dunham existed but the bureau claimed it destroyed the file on May 1, 1997. Considering the sour relations between the FBI and CIA during the Cold War, it is likely that Armour Dunham was being monitored by FBI director J. Edgar Hoover in the same manner as a number of other CIA officials and agents were being surveilled. Similarly, the pre-1968 passport records of Obama’s mother, Stanley Ann Dunham, were destroyed by the State Department.

There is a photographic clue that the Dunhams may have been assigned by the CIA to Beirut, Lebanon in the early 1950s. A photograph of Obama’s mother and grandparents has emerged that shows Stanley Ann Dunham wearing what may be a school uniform with the insignia of “NdJ,” which stands for the College Notre-Dame de Jamhour, a private Jesuit Catholic French language school in Beirut, Lebanon. Graduates of the school include three former presidents of Lebanon, Amine Gemayel, Bashir Gemayel, and Charles Helou, all of whom maintained close relations with Washington.

Did Obama’s mother [left] go to a private school in Lebanon in the early 1950s while her father [middle] worked for the CIA in Beirut?

There is also the curious nature of President Obama’s Social Security Number, issued in Connecticut, a state where there is no other evidence of his ever being a resident. Adding to the mystery is a New York City address for a “male” named Stanley Ann Dunham,  235 E. 40th St Apt 8F, New York NY 10016-1747. The address is a few blocks away from the address of the Ford Foundation. Ann Dunham did work briefly in New York for the Ford Foundation.

On August 9, 2010, WMR reported, “In a December 19, 1971, article in the Boston Globe by Dan Pinck, [a historian and former OSS officer] titled ‘Is everyone in the CIA?’ it is alleged that identifying US Agency for International Development (USAID) officers as CIA agents was a ‘reasonably accurate accounting of certain leading operatives and associates of the CIA.’ President Obama’s mother, Stanley Ann Dunham Soetoro worked for USAID in rural Java in Indonesia. Pinck’s article was a review of a 1968 book, ‘Who’s Who in the CIA’ published in Berlin.”

WMR has obtained a rare copy of “Who’s Who in the CIA,” from England. The book, published in West Berlin in 1968, lists some 3,000 CIA agents and agents-of-influence around the world.

The book also contains a reference to one CIA operative whose area of primary place of operation was Mercer Island, Washington. He was retired Air Force General Don Zabriskie Zimmermann, who was the Chief Engineer for the Boeing Company in Seattle. Before retiring from the Air Force, Zimmermann was the Air Force Assistant Deputy Chief of Staff for Development in Foreign Countries. Ann Stanley Dunham reportedly graduated from Mercer Island High School in 1960 and met Obama later that year in a Russian language class after  her parents moved to Hawaii. Stanley Ann’s mother, Madelyn Dunham, worked at a Boeing plant in Wichita, Kansas during World War II.

The book lists the number of CIA agents in countries during the 1950s and 60s where Obama’s father, mother, step-father Lolo Soetori, and allegedly, his grandmother and grandfather worked:

Indonesia  

Jakarta   64

Surabaya  12

Medan  8

Hollandia  1

Kenya

Nairobi  19

Mombassa  2

Lebanon

Beirut  61     (including one agent also assigned to Jakarta, Lahore, and Karachi and another assigned to Lahore)

Hawaii

Honolulu   6  (one agent also assigned to Canton Island and another was fluent in French, Stanley Ann Dunham spoke French, Urdu, Bahasa Indonesian, and she studied Javanese at the University of Hawaii, in addition to Russian).

COMMENT: We commend Wayne Madsen for his vast exposé of Barack Obama’s true background. Madsen will appear on the Alex Jones Show tomorrow THURSDAY AUGUST 19 at 1 PM EST / 12 NOON CST, to reveal even more bombshell details of his deep research into this matter. Tune in for this vital info and visit the Wayne Madsen Report for further details.

http://www.infowars.com/bombshell-barack-obama-conclusively-outed-as-cia-creation/

Story 3: Real News, Real Crimes of Destruction of Government Document, Mishandling of Classified Documents, Obstruction of Justice, Conspiracy, Public Corruption of Hillary Clinton — Awaiting Trump Telephone To Attorney General Jeff Session To Appoint Special Prosecutor — Videos 

Image result for banco cartoons scandals of obama era

Trump vows to get special prosecutor to investigate Clinton

When Jeff Sessions called for special prosecutor on Fox

Trey Gowdy on Hillary Clinton’s Scandal She will Be In Jail this 2017

Hillary Clinton’s MASSIVE MELTDOWN If that f ing bastard wins, we all hang from nooses!

Special prosecutor

From Wikipedia, the free encyclopedia

A special prosecutor generally is a lawyer from outside the government appointed by an attorney general or, in the United States, by Congress to investigate a government official for misconduct while in office. A reasoning for such an appointment is that the governmental branch or agency may have political connections to those it might be asked to investigate. Inherently, this creates a conflict of interest and a solution is to have someone from outside the department lead the investigation. The term “special prosecutor” may have a variety of meanings from one country to the next, from one government branch to the next within the same country, and within different agencies within each government branch. Critics of the use of special prosecutors argue that these investigators act as a “fourth branch” to the government because they are not subject to limitations in spending, nor do they have deadlines to meet[citation needed].

United States[edit]

Attorneys carrying out special prosecutor functions in either federal or state courts of the United States are typically appointed ad hoc with representation limited to one case or a delineated series of cases that implicate compelling governmental interests, such as: Fraud (SEC, Complex, Cybercrime, Mortgages), Public Corruption, Money Laundering & Asset Forfeiture, Civil Rights, Racketeering Across State lines, Environmental Protection, National Security, Tax & Bankruptcy, Organized Crime, or International cases where the US is a party).see, USDOJ (SDNY) website.

Federal appointment[edit]

Special prosecutors in courts of the United States may either be appointed formally by one of the three branches of government in a criminal proceeding, or when dictated by federal law or regulation, or informally in civil proceedings, and also by one of the three branches of government, or by a non-governmental entity to prosecute alleged unlawful conduct by government agents. When appointed by the judicial branch to investigate and, if justified, seek indictments in a particular judicial branch case, the attorney is called special prosecutor.[1] When appointed/hired particularly by a governmental branch or agency to investigate alleged misconduct within that branch or agency, the attorney is called independent counsel.[2] When appointed/hired by the state or political subdivision to assist in a particular judicial branch case when the public interest so requires, the attorney is called special counsel.[2] When appointed/hired by an organization, corporation, person or other non-governmental entity to investigate and, if justified, seek indictments against one or more government officials for acts committed under color of law, the attorney may be called special counsel or special prosecutor, but not independent counsel.[2]

On January 3, 1983, the United States federal government substituted the term independent counsel for special prosecutor.[3] Archibald Cox was one of the most notable special prosecutors. However, special prosecutor Archibald Cox today would be called independent counsel Archibald Cox in the United States.

The term is sometimes used as a synonym for independent counsel, but under the former law authorizing the independent counsel, the appointment was made by a special panel of the United States Court of Appeals for the District of Columbia Circuit. The Ethics in Government Act expired in 1999, and was effectively replaced by Department of Justice regulation 28 CFR Part 600, under which Special Counsel Patrick Fitzgerald was appointed to look into the Plame affair.

State appointment[edit]

Special prosecutors are required and utilized by local State governments in circumstances similar to those requiring their need in federal jurisdictions, but are appointed at the state level with greater frequency and often in cases where a conflict of interest arises, and at times to avoid even the mere appearance that one or more conflict of interests exists. Special prosecutors in local state governments may be appointed by a judge, government official, organization, company or citizens to prosecute governmental malfeasance and seek indictments for individual acts taken under color of state law.[4] Unlike courts with federal jurisdiction where terms such as “special counsel” and “independent counsel” specifically appear and are uniformly defined by law & regulations, in state jurisdictions where legal terms & definitions inherently vary from state to state, the umbrella term special prosector is generally accepted and the term most often used by state courts and tribunals.

References[edit]

  1. Jump up^ Black’s Law Dictionary (8th ed. 2004) Prosecutor.
  2. ^ Jump up to:a b c Black’s Law Dictionary (8th ed. 2004) Counsel.
  3. Jump up^ United States Public Law 97-409 (January 3, 1983) as enacted from A bill to change the coverage of officials and the standards for the appointment of a special prosecutor in the special prosecutor provisions of the Ethics in Government Act of 1978, and for other purposes.
  4. Jump up^ Black’s Law Dictionary (8th ed. 2004) Prosecutor.

Further reading[edit]

  • Doyle, James (1977). Not Above the Law: the battles of Watergate prosecutors Cox and Jaworski. New York: William Morrow and Company. ISBN 0-688-03192-7.

External links[edit]

The Pronk Pops Show Podcasts Portfolio

Listen To Pronk Pops Podcast or Download Shows 850-851

Listen To Pronk Pops Podcast or Download Shows 845-849

Listen To Pronk Pops Podcast or Download Shows 840-844

Listen To Pronk Pops Podcast or Download Shows 833-839

Listen To Pronk Pops Podcast or Download Shows 827-832

Listen To Pronk Pops Podcast or Download Shows 821-826

Listen To Pronk Pops Podcast or Download Shows 815-820

Listen To Pronk Pops Podcast or Download Shows 806-814

Listen To Pronk Pops Podcast or Download Shows 800-805

Listen To Pronk Pops Podcast or Download Shows 793-799

Listen To Pronk Pops Podcast or Download Shows 785-792

Listen To Pronk Pops Podcast or Download Shows 777-784

Listen To Pronk Pops Podcast or Download Shows 769-776

Listen To Pronk Pops Podcast or Download Shows 759-768

Listen To Pronk Pops Podcast or Download Shows 751-758

Listen To Pronk Pops Podcast or Download Shows 745-750

Listen To Pronk Pops Podcast or Download Shows 738-744

Listen To Pronk Pops Podcast or Download Shows 732-737

Listen To Pronk Pops Podcast or Download Shows 727-731

Listen To Pronk Pops Podcast or Download Shows 720-726

Listen To Pronk Pops Podcast or DownloadShows 713-719

Listen To Pronk Pops Podcast or DownloadShows 705-712

Listen To Pronk Pops Podcast or Download Shows 695-704

Listen To Pronk Pops Podcast or Download Shows 685-694

Listen To Pronk Pops Podcast or Download Shows 675-684

Listen To Pronk Pops Podcast or Download Shows 668-674

Listen To Pronk Pops Podcast or Download Shows 660-667

Listen To Pronk Pops Podcast or Download Shows 651-659

Listen To Pronk Pops Podcast or Download Shows 644-650

Listen To Pronk Pops Podcast or Download Shows 637-643

Listen To Pronk Pops Podcast or Download Shows 629-636

Listen To Pronk Pops Podcast or Download Shows 617-628

Listen To Pronk Pops Podcast or Download Shows 608-616

Listen To Pronk Pops Podcast or Download Shows 599-607

Listen To Pronk Pops Podcast or Download Shows 590-598

Listen To Pronk Pops Podcast or Download Shows 585- 589

Listen To Pronk Pops Podcast or Download Shows 575-584

Listen To Pronk Pops Podcast or Download Shows 565-574

Listen To Pronk Pops Podcast or Download Shows 556-564

Listen To Pronk Pops Podcast or Download Shows 546-555

Listen To Pronk Pops Podcast or Download Shows 538-545

Listen To Pronk Pops Podcast or Download Shows 532-537

Listen To Pronk Pops Podcast or Download Shows 526-531

Listen To Pronk Pops Podcast or Download Shows 519-525

Listen To Pronk Pops Podcast or Download Shows 510-518

Listen To Pronk Pops Podcast or Download Shows 500-509

Listen To Pronk Pops Podcast or Download Shows 490-499

Listen To Pronk Pops Podcast or Download Shows 480-489

Listen To Pronk Pops Podcast or Download Shows 473-479

Listen To Pronk Pops Podcast or Download Shows 464-472

Listen To Pronk Pops Podcast or Download Shows 455-463

Listen To Pronk Pops Podcast or Download Shows 447-454

Listen To Pronk Pops Podcast or Download Shows 439-446

Listen To Pronk Pops Podcast or Download Shows 431-438

Listen To Pronk Pops Podcast or Download Shows 422-430

Listen To Pronk Pops Podcast or Download Shows 414-421

Listen To Pronk Pops Podcast or Download Shows 408-413

Listen To Pronk Pops Podcast or Download Shows 400-407

Listen To Pronk Pops Podcast or Download Shows 391-399

Listen To Pronk Pops Podcast or Download Shows 383-390

Listen To Pronk Pops Podcast or Download Shows 376-382

Listen To Pronk Pops Podcast or Download Shows 369-375

Listen To Pronk Pops Podcast or Download Shows 360-368

Listen To Pronk Pops Podcast or Download Shows 354-359

Listen To Pronk Pops Podcast or Download Shows 346-353

Listen To Pronk Pops Podcast or Download Shows 338-345

Listen To Pronk Pops Podcast or Download Shows 328-337

Listen To Pronk Pops Podcast or Download Shows 319-327

Listen To Pronk Pops Podcast or Download Shows 307-318

Listen To Pronk Pops Podcast or Download Shows 296-306

Listen To Pronk Pops Podcast or Download Shows 287-295

Listen To Pronk Pops Podcast or Download Shows 277-286

Listen To Pronk Pops Podcast or Download Shows 264-276

Listen To Pronk Pops Podcast or Download Shows 250-263

Listen To Pronk Pops Podcast or Download Shows 236-249

Listen To Pronk Pops Podcast or Download Shows 222-235

Listen To Pronk Pops Podcast or Download Shows 211-221

Listen To Pronk Pops Podcast or Download Shows 202-210

Listen To Pronk Pops Podcast or Download Shows 194-201

Listen To Pronk Pops Podcast or Download Shows 184-193

Listen To Pronk Pops Podcast or Download Shows 174-183

Listen To Pronk Pops Podcast or Download Shows 165-173

Listen To Pronk Pops Podcast or Download Shows 158-164

Listen To Pronk Pops Podcast or Download Shows151-157

Listen To Pronk Pops Podcast or Download Shows 143-150

Listen To Pronk Pops Podcast or Download Shows 135-142

Listen To Pronk Pops Podcast or Download Shows 131-134

Listen To Pronk Pops Podcast or Download Shows 124-130

Listen To Pronk Pops Podcast or Download Shows 121-123

Listen To Pronk Pops Podcast or Download Shows 118-120

Listen To Pronk Pops Podcast or Download Shows 113 -117

Listen To Pronk Pops Podcast or Download Show 112

Listen To Pronk Pops Podcast or Download Shows 108-111

Listen To Pronk Pops Podcast or Download Shows 106-108

Listen To Pronk Pops Podcast or Download Shows 104-105

Listen To Pronk Pops Podcast or Download Shows 101-103

Listen To Pronk Pops Podcast or Download Shows 98-100

Listen To Pronk Pops Podcast or Download Shows 94-97

Listen To Pronk Pops Podcast or Download Show 93

Listen To Pronk Pops Podcast or Download Show 92

Listen To Pronk Pops Podcast or Download Show 91

Listen To Pronk Pops Podcast or Download Shows 88-90

Listen To Pronk Pops Podcast or Download Shows 84-87

Listen To Pronk Pops Podcast or Download Shows 79-83

Listen To Pronk Pops Podcast or Download Shows 74-78

Listen To Pronk Pops Podcast or Download Shows 71-73

Listen To Pronk Pops Podcast or Download Shows 68-70

Listen To Pronk Pops Podcast or Download Shows 65-67

Listen To Pronk Pops Podcast or Download Shows 62-64

Listen To Pronk Pops Podcast or Download Shows 58-61

Listen To Pronk Pops Podcast or Download Shows 55-57

Listen To Pronk Pops Podcast or Download Shows 52-54

Listen To Pronk Pops Podcast or Download Shows 49-51

Listen To Pronk Pops Podcast or Download Shows 45-48

Listen To Pronk Pops Podcast or Download Shows 41-44

Listen To Pronk Pops Podcast or Download Shows 38-40

Listen To Pronk Pops Podcast or Download Shows 34-37

Listen To Pronk Pops Podcast or Download Shows 30-33

Listen To Pronk Pops Podcast or Download Shows 27-29

Listen To Pronk Pops Podcast or Download Shows 17-26

Listen To Pronk Pops Podcast or Download Shows 16-22

Listen To Pronk Pops Podcast or Download Shows 10-15

Listen To Pronk Pops Podcast or Download Shows 1-9

Read Full Post | Make a Comment ( None so far )

The Pronk Pops Show 840, February 16, 2017, Story 1: President Trump’s First Press Conference Part 1: President Trump Speaks Directly To The American People — Videos — Story 2: President Trump Educates The Big Lie Media (Democratic Newspapers and Television Networks) with Fake News Spinning Propaganda — Videos

Posted on February 16, 2017. Filed under: American History, Benghazi, Blogroll, Bombs, Breaking News, British Pound, Budgetary Policy, Business, City, College, Communications, Constitutional Law, Corruption, Countries, Crime, Cruise Missiles, Currencies, Defense Spending, Donald J. Trump, Donald Trump, Donald Trump, Drones, Drugs, Economics, Education, Elections, Empires, Employment, Energy, Environment, Euro, Federal Government, Fiscal Policy, Foreign Policy, Free Trade, Freedom of Speech, Gangs, Government, Government Dependency, Government Spending, Health, Health Care, Health Care Insurance, High Crimes, Hillary Clinton, Hillary Clinton, Hillary Clinton, History, Housing, Human, Human Behavior, Illegal Drugs, Illegal Immigration, Illegal Immigration, Immigration, Impeachment, Independence, Insurance, Investments, Iran Nuclear Weapons Deal, IRS, Israel, Labor Economics, Language, Law, Legal Drugs, Legal Immigration, Life, Lying, Media, Medicare, Medicine, Monetary Policy, Networking, News, Obama, Philosophy, Photos, Politics, Polls, President Barack Obama, President Trump, Presidential Appointments, Prime Minister, Private Sector Unions, Progressives, Public Sector Unions, Radio, Raymond Thomas Pronk, Regulation, Resources, Scandals, Security, Senator Jeff Sessions, Social Science, Social Security, Spying, Success, Tax Policy, Taxation, Taxes, Technology, Terror, Terrorism, Trade Policy, Transportation, U.S. Dollar, Unemployment, Unions, United States of America, Videos, Violence, War, Wealth, Weapons, Weather, Welfare Spending, Wisdom | Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , |

Project_1

The Pronk Pops Show Podcasts

Pronk Pops Show 840: February 16, 2017

Pronk Pops Show 839: February 15, 2017

Pronk Pops Show 838: February 14, 2017

Pronk Pops Show 837: February 13, 2017

Pronk Pops Show 836: February 10, 2017

Pronk Pops Show 835: February 9, 2017

Pronk Pops Show 834: February 8, 2017

Pronk Pops Show 833: February 7, 2017

Pronk Pops Show 832: February 6, 2017

Pronk Pops Show 831: February 3, 2017

Pronk Pops Show 830: February 2, 2017

Pronk Pops Show 829: February 1, 2017

Pronk Pops Show 828: January 31, 2017

Pronk Pops Show 827: January 30, 2017

Pronk Pops Show 826: January 27, 2017 

Pronk Pops Show 825: January 26, 2017

Pronk Pops Show 824: January 25, 2017 

Pronk Pops Show 823: January 24, 2017

Pronk Pops Show 822: January 23, 2017

Pronk Pops Show 821: January 20, 2017

Pronk Pops Show 820: January 19, 2017

Pronk Pops Show 819: January 18, 2017

Pronk Pops Show 818: January 17, 2017

Pronk Pops Show 817: January 13, 2017

Pronk Pops Show 816: January 12, 2017

Pronk Pops Show 815: January 11, 2017

Pronk Pops Show 814: January 10,  2017

Pronk Pops Show 813: January 9, 2017

Pronk Pops Show 812: December 12, 2016

Pronk Pops Show 811: December 9, 2016

Pronk Pops Show 810: December 8, 2016

Pronk Pops Show 809: December 7, 2016

Pronk Pops Show 808: December 6, 2016

Pronk Pops Show 807: December 5, 2016

Pronk Pops Show 806: December 2, 2016

Pronk Pops Show 805: December 1, 2016

Pronk Pops Show 804: November 30, 2016

Pronk Pops Show 803: November 29, 2016

Pronk Pops Show 802: November 28, 2016

Pronk Pops Show 801: November 22, 2016

Pronk Pops Show 800: November 21, 2016

Pronk Pops Show 799: November 18, 2016

Pronk Pops Show 798: November 17, 2016

Pronk Pops Show 797: November 16, 2016

Pronk Pops Show 796: November 15, 2016

Pronk Pops Show 795: November 14, 2016

Pronk Pops Show 794: November 10, 2016

Pronk Pops Show 793: November 9, 2016

Pronk Pops Show 792: November 8, 2016

Pronk Pops Show 791: November 7, 2016

Pronk Pops Show 790: November 4, 2016

Pronk Pops Show 789: November 3, 2016

Pronk Pops Show 788: November 2, 2016

 Story 1: President Trump’s First Press Conference Part 1: President Trump Speaks Directly To The American People — Videos — 

Image result for cartoons president trump press conference

Image result for cartoons president trump press conference

Image result for cartoons president trump press conference

Image result for cartoons 2017 branco president trump press conference

Image result for cartoons president trump press conference

Image result for cartoons 2017 branco president trump press conference

Image result for cartoons 2017 branco president trump press conference

President Donald Trump Full Press Conference Addresses Ties to Russia, Leaks, and “Fake News” 2/16

President Trump scolds media at news conference

Trump to news media: The public doesn’t believe you anymore

President dismisses negative reporting in a media massacre

Rush Limbaugh Podcast 2/16/17 | Trump blasts ‘out of control’ media, defends agenda, administration

Laura Ingraham Show 2/16/17 | Media freaks out as some come to the conclusion that Flynn

Trump Says General Flynn Did Nothing Wrong

Tucker Carlson Tonight & Hannity Special – 2/16/2017 Donald Trump, Paul Ryan, Netanyahu Interview

Scott Pelley: Trump’s “bluster, bravado, exaggeration” on display at news conference

John Dickerson on Beltway’s reaction to Trump’s press conference

Is The Intelligence Community At War With Trump?

Roger Stone Panicked Left Launching Civil War

Story 2: President Trump Educates The Big Lie Media (Democratic Newspapers and Television Networks) with Fake News Spinning Propaganda — Videos

Trump boasts approval rating, attacks media

President Trump scolds media at news conference

President Trump criticizes administration coverage

Sorry media — this press conference played very different with Trump’s supporters

 Far from dead, he was positively exuberant. His performance at a marathon press conference was a must-see-tv spectacle as he mixed serious policy talk with stand-up comedy and took repeated pleasure in whacking his favorite pinata, the “dishonest media.”

“Russia is a ruse,” he insisted, before finally saying under questioning he was not aware of anyone on his campaign having contact with Russian officials.

Trump’s detractors immediately panned the show as madness, but they missed the method behind it and proved they still don’t understand his appeal. Facing his first crisis in the Oval Office, he was unbowed in demonstrating his bare-knuckled intention to fight back.

He did it his way. Certainly no other president, and few politicians at any level in any time, would dare put on a show like that.

In front of cameras, and using the assembled press corps as props, he conducted a televised revival meeting to remind his supporters that he is still the man they elected. Ticking off a lengthy list of executive orders and other actions he has taken, he displayed serious fealty to his campaign promises.

Trump goes on marathon rant against the media

Sure, sentences didn’t always end on the same topic they started with, and his claim to have won the election by the largest electoral college margin since Ronald Reagan wasn’t close to true.

Fair points, but so what? Fact-checkers didn’t elect him, nor did voters who were happy with the status quo.

Trump, first, last and always, matches the mood of the discontented. Like them, he is a bull looking for a china shop. That’s his ace in the hole and he played it almost to perfection.

The immediate impact of his performance is likely to calm some of the jitters among Republicans in congress and supporters elsewhere, especially after the beating he took in the last few days.

On Monday night, Trump suddenly removed Gen. Michael Flynn, his national security adviser, over circumstances that still are not entirely clear. And on Wednesday, his nominee for Secretary of Labor, Andrew Puzder, withdrew after Republicans said he didn’t have the votes to be confirmed.

Combined with courts blocking his immigration and refugee order, unflattering leaks of confidential material from intelligence agencies and numerous demands for investigations into any Russian connections, Trump’s fast start suddenly hit a wall.

Just three weeks into his term, Democrats, in and out of the media, smelled blood. Many already were going for the kill.

They won’t get it, at least now. Trump bought himself time yesterday.

Yet those determined to bring him down won’t give up, and the insidious leaks of secret material suggest some opponents are members of the permanent government who are willing to use their position and the media to undermine him.

Indeed, the most serious leaks seem to vindicate a warning that Democratic Sen. Chuck Schumer made in early January after Trump criticized leaders of the spook agencies.

“Let me tell you, you take on the intelligence community, they have six ways from Sunday at getting back at you,” Schumer told an interviewer. “So even for a practical, supposedly hard-nosed businessman, he’s being really dumb to do this.”

That incredible statement reflects what a dangerous game rogue agents are playing. The world is on fire yet the president is the target of partisan revenge in his own government. It’s a scandal and it’s outrageous, but it’s a fact that Trump must confront.

Finding the leakers and prosecuting them, which he promises to do, is part of the solution.

rAnother part comes Saturday, when Trump takes his solo act to Florida for a massive public rally. It’s smart for him to get out of Washington and soak in the enthusiasm of the populist movement he leads.

He should do it regularly, and also hold smaller, town-hall style forums where ordinary citizens can ask him questions in more intimate settings. Any way he can speak directly to the American people and hear from them democratizes his presidency and reduces the power of big biased media and the Washington establishment.

Yet the only sure and lasting way to keep ahead of the lynch mob is by producing results. Success will be Trump’s savior.

And nothing says success like jobs, jobs, jobs. Getting the economy to reach lift-off speed is essential so it can deliver the good-paying jobs and prosperity that he promised and the nation needs.

While Republican honchos in congress say they’re getting ready to move on tax cuts and replacing ObamaCare, nothing will happen without presidential leadership. That means Trump’s fate is in his own hands and he must keep himself and his White House team focused on delivering an economic revival.

If he does that, the lynch mob will be left holding an empty rope.

http://nypost.com/2017/02/16/sorry-media-this-press-conference-played-very-different-with-trumps-supporters/

The Pronk Pops Show Podcasts Portfolio

Listen To Pronk Pops Podcast or Download Shows 840

Listen To Pronk Pops Podcast or Download Shows 833-839

Listen To Pronk Pops Podcast or Download Shows 827-832

Listen To Pronk Pops Podcast or Download Shows 821-826

Listen To Pronk Pops Podcast or Download Shows 815-820

Listen To Pronk Pops Podcast or Download Shows 806-814

Listen To Pronk Pops Podcast or Download Shows 800-805

Listen To Pronk Pops Podcast or Download Shows 793-799

Listen To Pronk Pops Podcast or Download Shows 785-792

Listen To Pronk Pops Podcast or Download Shows 777-784

Listen To Pronk Pops Podcast or Download Shows 769-776

Listen To Pronk Pops Podcast or Download Shows 759-768

Listen To Pronk Pops Podcast or Download Shows 751-758

Listen To Pronk Pops Podcast or Download Shows 745-750

Listen To Pronk Pops Podcast or Download Shows 738-744

Listen To Pronk Pops Podcast or Download Shows 732-737

Listen To Pronk Pops Podcast or Download Shows 727-731

Listen To Pronk Pops Podcast or Download Shows 720-726

Listen To Pronk Pops Podcast or DownloadShows 713-719

Listen To Pronk Pops Podcast or DownloadShows 705-712

Listen To Pronk Pops Podcast or Download Shows 695-704

Listen To Pronk Pops Podcast or Download Shows 685-694

Listen To Pronk Pops Podcast or Download Shows 675-684

Listen To Pronk Pops Podcast or Download Shows 668-674

Listen To Pronk Pops Podcast or Download Shows 660-667

Listen To Pronk Pops Podcast or Download Shows 651-659

Listen To Pronk Pops Podcast or Download Shows 644-650

Listen To Pronk Pops Podcast or Download Shows 637-643

Listen To Pronk Pops Podcast or Download Shows 629-636

Listen To Pronk Pops Podcast or Download Shows 617-628

Listen To Pronk Pops Podcast or Download Shows 608-616

Listen To Pronk Pops Podcast or Download Shows 599-607

Listen To Pronk Pops Podcast or Download Shows 590-598

Listen To Pronk Pops Podcast or Download Shows 585- 589

Listen To Pronk Pops Podcast or Download Shows 575-584

Listen To Pronk Pops Podcast or Download Shows 565-574

Listen To Pronk Pops Podcast or Download Shows 556-564

Listen To Pronk Pops Podcast or Download Shows 546-555

Listen To Pronk Pops Podcast or Download Shows 538-545

Listen To Pronk Pops Podcast or Download Shows 532-537

Listen To Pronk Pops Podcast or Download Shows 526-531

Listen To Pronk Pops Podcast or Download Shows 519-525

Listen To Pronk Pops Podcast or Download Shows 510-518

Listen To Pronk Pops Podcast or Download Shows 500-509

Listen To Pronk Pops Podcast or Download Shows 490-499

Listen To Pronk Pops Podcast or Download Shows 480-489

Listen To Pronk Pops Podcast or Download Shows 473-479

Listen To Pronk Pops Podcast or Download Shows 464-472

Listen To Pronk Pops Podcast or Download Shows 455-463

Listen To Pronk Pops Podcast or Download Shows 447-454

Listen To Pronk Pops Podcast or Download Shows 439-446

Listen To Pronk Pops Podcast or Download Shows 431-438

Listen To Pronk Pops Podcast or Download Shows 422-430

Listen To Pronk Pops Podcast or Download Shows 414-421

Listen To Pronk Pops Podcast or Download Shows 408-413

Listen To Pronk Pops Podcast or Download Shows 400-407

Listen To Pronk Pops Podcast or Download Shows 391-399

Listen To Pronk Pops Podcast or Download Shows 383-390

Listen To Pronk Pops Podcast or Download Shows 376-382

Listen To Pronk Pops Podcast or Download Shows 369-375

Listen To Pronk Pops Podcast or Download Shows 360-368

Listen To Pronk Pops Podcast or Download Shows 354-359

Listen To Pronk Pops Podcast or Download Shows 346-353

Listen To Pronk Pops Podcast or Download Shows 338-345

Listen To Pronk Pops Podcast or Download Shows 328-337

Listen To Pronk Pops Podcast or Download Shows 319-327

Listen To Pronk Pops Podcast or Download Shows 307-318

Listen To Pronk Pops Podcast or Download Shows 296-306

Listen To Pronk Pops Podcast or Download Shows 287-295

Listen To Pronk Pops Podcast or Download Shows 277-286

Listen To Pronk Pops Podcast or Download Shows 264-276

Listen To Pronk Pops Podcast or Download Shows 250-263

Listen To Pronk Pops Podcast or Download Shows 236-249

Listen To Pronk Pops Podcast or Download Shows 222-235

Listen To Pronk Pops Podcast or Download Shows 211-221

Listen To Pronk Pops Podcast or Download Shows 202-210

Listen To Pronk Pops Podcast or Download Shows 194-201

Listen To Pronk Pops Podcast or Download Shows 184-193

Listen To Pronk Pops Podcast or Download Shows 174-183

Listen To Pronk Pops Podcast or Download Shows 165-173

Listen To Pronk Pops Podcast or Download Shows 158-164

Listen To Pronk Pops Podcast or Download Shows151-157

Listen To Pronk Pops Podcast or Download Shows 143-150

Listen To Pronk Pops Podcast or Download Shows 135-142

Listen To Pronk Pops Podcast or Download Shows 131-134

Listen To Pronk Pops Podcast or Download Shows 124-130

Listen To Pronk Pops Podcast or Download Shows 121-123

Listen To Pronk Pops Podcast or Download Shows 118-120

Listen To Pronk Pops Podcast or Download Shows 113 -117

Listen To Pronk Pops Podcast or Download Show 112

Listen To Pronk Pops Podcast or Download Shows 108-111

Listen To Pronk Pops Podcast or Download Shows 106-108

Listen To Pronk Pops Podcast or Download Shows 104-105

Listen To Pronk Pops Podcast or Download Shows 101-103

Listen To Pronk Pops Podcast or Download Shows 98-100

Listen To Pronk Pops Podcast or Download Shows 94-97

Listen To Pronk Pops Podcast or Download Show 93

Listen To Pronk Pops Podcast or Download Show 92

Listen To Pronk Pops Podcast or Download Show 91

Listen To Pronk Pops Podcast or Download Shows 88-90

Listen To Pronk Pops Podcast or Download Shows 84-87

Listen To Pronk Pops Podcast or Download Shows 79-83

Listen To Pronk Pops Podcast or Download Shows 74-78

Listen To Pronk Pops Podcast or Download Shows 71-73

Listen To Pronk Pops Podcast or Download Shows 68-70

Listen To Pronk Pops Podcast or Download Shows 65-67

Listen To Pronk Pops Podcast or Download Shows 62-64

Listen To Pronk Pops Podcast or Download Shows 58-61

Listen To Pronk Pops Podcast or Download Shows 55-57

Listen To Pronk Pops Podcast or Download Shows 52-54

Listen To Pronk Pops Podcast or Download Shows 49-51

Listen To Pronk Pops Podcast or Download Shows 45-48

Listen To Pronk Pops Podcast or Download Shows 41-44

Listen To Pronk Pops Podcast or Download Shows 38-40

Listen To Pronk Pops Podcast or Download Shows 34-37

Listen To Pronk Pops Podcast or Download Shows 30-33

Listen To Pronk Pops Podcast or Download Shows 27-29

Listen To Pronk Pops Podcast or Download Shows 17-26

Listen To Pronk Pops Podcast or Download Shows 16-22

Listen To Pronk Pops Podcast or Download Shows 10-15

Listen To Pronk Pops Podcast or Download Shows 1-9

Read Full Post | Make a Comment ( None so far )

The Pronk Pops Show 834, February 8, 2017, Story 1: President Trump’s Order To John Kelly, Department of Homeland Security, –“Secure the Borders” — Pause For Vigorous Vetting — Videos — Story 2: Senator Warren Defames and Lies As Did Coretta Scott King In Her Letter About Senator Sessions — Rule 19 — Objection — Senator Take You Seat — Three Cheers! — Story 3: Awaiting 9th Circuit Three Judge Panel Decision –Videos

Posted on February 8, 2017. Filed under: American History, Blogroll, Breaking News, Business, College, Communications, Congress, Consitutional Law, Countries, Culture, Defense Spending, Donald J. Trump, Donald J. Trump, Donald Trump, Donald Trump, Education, Empires, Employment, Foreign Policy, Government, Government Spending, History, House of Representatives, Human, Illegal Immigration, Illegal Immigration, Immigration, Iraq, Islamic Republic of Iran, Islamic State, Language, Law, Legal Immigration, Libya, Life, Media, Obama, Philosophy, Photos, Polls, Progressives, Radio, Raymond Thomas Pronk, Regulation, Rule of Law, Security, Senate, Social Science, Somalia, Success, Sudan, Syria, Taxation, Taxes, Unemployment, United States of America, Videos, Violence, War, Wealth, Wisdom, Yemen | Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , |

Project_1

The Pronk Pops Show Podcasts

Pronk Pops Show 834: February 8, 2017

Pronk Pops Show 833: February 7, 2017

Pronk Pops Show 832: February 6, 2017

Pronk Pops Show 831: February 3, 2017

Pronk Pops Show 830: February 2, 2017

Pronk Pops Show 829: February 1, 2017

Pronk Pops Show 828: January 31, 2017

Pronk Pops Show 827: January 30, 2017

Pronk Pops Show 826: January 27, 2017 

Pronk Pops Show 825: January 26, 2017

Pronk Pops Show 824: January 25, 2017 

Pronk Pops Show 823: January 24, 2017

Pronk Pops Show 822: January 23, 2017

Pronk Pops Show 821: January 20, 2017

Pronk Pops Show 820: January 19, 2017

Pronk Pops Show 819: January 18, 2017

Pronk Pops Show 818: January 17, 2017

Pronk Pops Show 817: January 13, 2017

Pronk Pops Show 816: January 12, 2017

Pronk Pops Show 815: January 11, 2017

Pronk Pops Show 814: January 10,  2017

Pronk Pops Show 813: January 9, 2017

Pronk Pops Show 812: December 12, 2016

Pronk Pops Show 811: December 9, 2016

Pronk Pops Show 810: December 8, 2016

Pronk Pops Show 809: December 7, 2016

Pronk Pops Show 808: December 6, 2016

Pronk Pops Show 807: December 5, 2016

Pronk Pops Show 806: December 2, 2016

Pronk Pops Show 805: December 1, 2016

Pronk Pops Show 804: November 30, 2016

Pronk Pops Show 803: November 29, 2016

Pronk Pops Show 802: November 28, 2016

Pronk Pops Show 801: November 22, 2016

Pronk Pops Show 800: November 21, 2016

Pronk Pops Show 799: November 18, 2016

Pronk Pops Show 798: November 17, 2016

Pronk Pops Show 797: November 16, 2016

Pronk Pops Show 796: November 15, 2016

Pronk Pops Show 795: November 14, 2016

Pronk Pops Show 794: November 10, 2016

Pronk Pops Show 793: November 9, 2016

Pronk Pops Show 792: November 8, 2016

Pronk Pops Show 791: November 7, 2016

Pronk Pops Show 790: November 4, 2016

Pronk Pops Show 789: November 3, 2016

Pronk Pops Show 788: November 2, 2016

Story 1: President Trump’s Order To John Kelly, Department of Homeland Security, –“Secure the Borders” — Pause For Vigorous Vetting — Videos —

Image result for john kelly dhs

Image result for cartoons about ban travel 7 countriesImage result for john kelly dhs
Image result for john kelly dhs

Image result for john kelly dhs

President Trump Interview With Bill O’Reilly Super Bowl Sunday

DHS: Trump’s travel ban is necessary, lawful

DHS Secretary John Kelly: ‘This Is All On Me’…Should Have Talked To Congress About Immigration Order

Published on Feb 7, 2017

The abrupt rollout of President Trump’s executive order temporarily suspending immigration from seven terror-prone countries “is all on me,” Homeland Security Secretary Jack Kelly told a congressional hearing on Tuesday. Although the executive order was developed before his confirmation, Kelly told the House Homeland Security Committee that just after his inauguration, he met with his (small) staff and made some changes. The order took effect on Friday evening, and “the thinking was to get it out quick,” so people with bad intentions would not have time to “jump on an airplane and get here.”

Kelly told the committee, “In retrospect, I should have — this is all on me, by the way — I should have delayed it just a bit, so that I could talk to members of Congress, particularly the leadership of committees like this, to prepare them for what was coming, although I think most people would agree that this has been a topic of President Trump, certainly during his campaign and during the transition process.” Kelly also noted that as Customs and Border Patrol officials began to implement the order, adjustments were quickly made to “fine-tune it.”

“Although the immigration pause has been an “inconvenience,” Kelly said everyone delayed or denied entry was treated “humanely.” He denied reports that people were made to stand up for hours on end or that people were insulted. “But going forward, I would have certainly taken some time to inform the Congress, and that’s certainly — that’s something I’ll certainly do in the future.” Kelly said the Trump administration is not contemplating adding additional countries to the list of seven, but the administration is looking at additional vetting processes to be sure they know who is coming into the country.

Homeland Secretary John Kelly I should have consulted Congress on travel ban

Homeland Security Secretary John Kelly Defends Travel Ban

Kelly: ‘Thousands’ Of ISIS Could Enter US; 2-7-2017

Homeland Security Secretary John Kelly testifies before a congressional committee on US border security, explaining that Islamic terrorists have access to fake documents (and counterfeit document production tools) to enter Europe and then the US.

Homeland Security Secretary John Kelly Testifies on Border Security. Feb. 7. 2017.

Secretary of Homeland Security John Kelly will appear before the House Homeland Security Committee w

FULL – Homeland Security Nominee General John Kelly CRUSHES IT at Confirmation Hearing

Gen Kelly Briefs Press on SOUTHCOM Issues

Gen Kelly Briefs Pentagon Press

Published on Mar 12, 2015

℠2015 – General John Kelly, Commander of U.S. Southern Command briefs the Pentagon press corps on issues such as fiscal readiness, the drug trade, and terrorism.

2014 California Gold Star Parents – General John F. Kelly, USMC – Full Version

Donald Trump launches blistering attack on judges in ‘disgraceful’ travel ban hearing and calls it ‘a sad day’

Watch | Donald Trump launches blistering attack on judges

 By 

Donald Trump has angrily denounced the three judges hearing his travel ban appeal, describing the process as “disgraceful” and saying it was a “sad day” for the United States.

Addressing a conference of police chiefs, Mr Trump told the crowd he had listened to Tuesday’s hearing with dismay.

“I won’t say the court was biased. But so political,” he said.

Mr Trump attempted to litigate the case himself, reading at length from a document and commenting on how it proved the legal foundations of his travel ban – which was halted on Friday.

Mr Trump went on: “I listened to lawyers on both sides last night, they were talking about things that had nothing to do with it.

“It’s so sad when you read something so perfectly written and so clear to anybody. I watched last night in amazement and I heard things I couldn’t believe.

“I don’t ever want to call a court biased so I won’t call it biased, and we haven’t had a decision yet, but courts seem to be so political. “But it would be so great for our sysem if they could read something and do what’s right.”

http://www.telegraph.co.uk/news/2017/02/08/donald-trump-dismisses-travel-ban-hearing-politics-us-waits/

Homeland Security secretary says a border wall won’t be built all at once

The nation’s top Homeland Security official portrayed himself Tuesday as a steward of President Trump’s vision for border security as he laid out a path to fruition for some of Trump’s most bombastic campaign promises.

In his first appearance on Capitol Hill, Homeland Security Secretary John F. Kelly described plans for safeguards along the border that were more piecemeal than the “big, beautiful wall” Trump has touted.

Kelly said his agency would first build sections of wall and fencing where border agents see an immediate need and fill in gaps with ground sensors, surveillance blimps and other technologies that help detect illegal border crossings, emphasizing that the government lives in “a world of finite time [and] resources.”

“We’re not going to be able to build a wall everywhere all at once,” Kelly told the House Homeland Security Committee, adding that Border Patrol agents told him they preferred barriers they could see through rather than a solid wall.

But Kelly also said measures for the “extreme vetting” of travelers were under consideration that go further than visa officers ever have. The Homeland Security Department may demand that some visa applicants trying to enter legally hand over passwords to their social media accounts before flying to the U.S.

“They don’t want to cooperate, they don’t come in,” Kelly said.

In three hours of testimony, Kelly filled in specifics on several national security goals Trump has broadly set. And like a soldier carrying out orders, Kelly, a retired Marine general, shouldered the blame for the haphazard rollout of the president’s order temporarily blocking entry for refugees and all travelers from seven predominantly Muslim countries, even though he was largely left out of crafting the decree.

“The thinking was to get it out quick so that potentially people that might be coming here to harm us would not take advantage of some period of time that they could jump on an airplane,” Kelly said.

In retrospect, he said, “I should have delayed it just a bit” to prepare lawmakers and the public for the changes that were coming.

The confusion surrounding its implementation is “all on me,” Kelly said, putting himself in the awkward position of apologizing for the execution of a directive he didn’t see until the week it was issued and wasn’t told was coming until the day before it was signed.

Live coverage: 9th Circuit Court of Appeals hearing over Trump’s travel bans »

The writing of Trump’s order was limited chiefly to a handful of senior White House advisors, including Stephen K. Bannon and Stephen Miller, and agency lawyers. Lawmakers of both parties condemned the White House over its implementation.

The White House officials who directed the rollout should have come before the committee to “answer for this debacle” rather than Kelly, said Rep. Bennie Thompson of Mississippi, the top Democrat on the panel.

Even committee Chairman Michael McCaul (R-Texas), who advised Trump on the travel restrictions during the transition and defended the president’s decision to implement them, criticized how the directive was put into action.

“The rollout of this executive order has been problematic. It has caused confusion here in Congress, across the country and around the world,” McCaul said.

Homeland Security officials were forced in the hours after the order was signed to scramble to issue instructions to border agents. Amid the uncertainty, some border agents blocked lawful permanent residents from entering the country.

Kelly defended his department’s work and insisted that Customs and Border Protection officers were not to blame for the chaos that unfolded at airports, saying the turmoil was not in immigration lines but in arrival halls flooded with protesters and frustrated relatives of people blocked by the order.

Civil liberties advocates and Democrats have criticized the president’s order as unfairly targeting Muslims, pointing to Trump’s repeated calls during the campaign to block Muslims from the U.S.

A lawsuit attempting to overturn Trump’s travel ban appeared to be on the fast track to the Supreme Court. Judges on the San Francisco-based U.S. 9th Circuit Court of Appeals heard arguments Tuesday.

Travelers from the countries targeted by Trump’s temporary ban — Iraq, Syria, Iran, Libya, Somalia, Sudan and Yemen — have hurried to board flights to the U.S. during what might be a brief window to enter the country while the legal challenges play out.

McCaul was adamant the order didn’t target a religious group. “This is not a Muslim ban, and even the suggestion that it is will alienate our allies and embolden” terrorists, he said.

Nonetheless, the administration is also looking at ways to step up background checks on citizens from the seven countries before they travel, such as demanding social media account passwords, Kelly said. Most of those nations have unreliable police forces or lack identity systems to help confirm travelers are who they say they are, he said.

“It is very hard to truly vet these people in these countries,” Kelly said.

Trump’s Jan. 27 order also required the Homeland Security Department to give him a list within 30 days of other countries that do not provide adequate information to border officials, but the agency has stopped work on that part of the order while the courts review it.

“There is no additional list,” Kelly said after the hearing.

Kelly also laid out for lawmakers the lengthy timeline needed to build a wall along the U.S. border with Mexico. Kelly said he wanted to see construction of a wall “well underway” within two years. Costs have been estimated at $12 billion to $38 billion.

And echoing White House complaints, Kelly strongly denied a report in the Washington Post that Bannon had asked him to keep in place the temporary ban on green-card holders being allowed into the U.S.

“Every paragraph, every sentence … was wrong,” Kelly said. “It was a fantasy story.”

Rep. Kathleen Rice (D-N.Y.) asked whether Kelly had concerns about political advisors pressuring him to act.

“I work for one man. His name is Donald Trump,” Kelly said. “He has told me one thing: ‘Secure the border.’”

http://www.latimes.com/politics/la-na-pol-kelly-travel-ban-20170207-story.html

John F. Kelly

From Wikipedia, the free encyclopedia
For other people named John F. Kelly, see John F. Kelly (disambiguation).
John F. Kelly
John Kelly official DHS portrait.jpg
5th United States Secretary of Homeland Security
Assumed office
January 20, 2017
President Donald Trump
Preceded by Jeh Johnson
Commander of the United States Southern Command
In office
November 19, 2012 – January 16, 2016
President Barack Obama
Preceded by Douglas Fraser
Succeeded by Kurt Tidd
Personal details
Born John Francis Kelly
May 11, 1950 (age 66)
Boston, Massachusetts, U.S.
Spouse(s) Karen Hernest
Children 3
Education University of Massachusetts, Boston(BA)
Georgetown University(MA)
National Defense University(MS)
Military service
Allegiance  United States
Service/branch  United States Marine Corps
Years of service 1970–1972
1972–1976 (inactive reserves)
1976–2016
Rank US Marine 10 shoulderboard.svgGeneral
Commands United States Southern Command
1st Light Armored Reconnaissance Battalion
Multinational Force West
Battles/wars Persian Gulf War
Operation Desert Storm
Iraq War
1992 Los Angeles Riots
Awards Defense Distinguished Service Medal
Defense Superior Service Medal
Legion of Merit (2) with Valor

John Francis Kelly (born May 11, 1950) is the fifth and current United States Secretary of Homeland Security. He is a retired United States Marine Corpsgeneral and the former commander of United States Southern Command, the Unified Combatant Command responsible for American military operations in Central America, South America and the Caribbean. Kelly previously served as the commanding general of the Multi-National Force—West in Iraq from February 2008 to February 2009, and as the commander of Marine Forces Reserve and Marine Forces North in October 2009.[1] Kelly succeeded General Douglas M. Fraser as commander of U.S. Southern Command on November 19, 2012.[2] Kelly was succeeded by Navy Admiral Kurt W. Tidd on January 14, 2016.

Kelly became Secretary of Homeland Security in January 2017 under PresidentDonald Trump.

Early life and education

Kelly was born on May 11, 1950 in Boston, Massachusetts into an Irish Catholic family.[3][4] He grew up in the Brighton neighborhood of Boston.[4] Before he reached the age of 16, he hitchhiked to Washington State and rode the trains back, including a freight-hop from Seattle to Chicago.[4][5] He then served for one year as a United States Merchant Marine, where he says “my first time overseas was taking 10,000 tons of beer to Vietnam“.[6][5]

In 1970, when his mother told him that his draft number was coming up, he enlisted in the U.S. Marine Corps.[3][4][5] He was discharged from active duty as a sergeant in 1972, after serving in an infantry company with the 2nd Marine Division, Camp Lejeune, North Carolina.[3][4][5] He was commissioned on December 27, 1975[3] as a second lieutenant in the Marine Corps via Officer Candidates School.[1] In 1976, he graduated from the University of Massachusetts Boston and, in 1984, he received a Master of Science degree in National Security Studies from the Georgetown School of Foreign Service.[3][7]

Career

Kelly returned to the Second Marine Division where he served as a rifle and weapons platoon commander, company executive officer, assistant operations officer, and infantry company commander. Sea duty in Mayport, Florida, followed, at which time he served aboard aircraft carriers USS Forrestal (CV-59) and USS Independence (CV-62). In 1980, then-Captain Kelly attended the U.S. Army’s Infantry Officer Advanced Course at Fort Benning, Georgia. After graduation, he was assigned to Headquarters Marine Corps in Washington, D.C., serving there from 1981 through 1984, as an assignment monitor. Kelly returned to the Second Marine Division in 1984, to command a rifle and weapons company. Promoted to major in 1987, he then served as a battalion operations officer.[1]

Kelly’s official U.S. Southern Command portrait

In 1987, Kelly transferred to the Basic School in Quantico, Virginia, serving first as the head of the Offensive Tactics Section, Tactics Group, and later assuming the duties of the Director of the Infantry Officer Course. After three years of instructing young officers, he attended the Marine Corps Command and Staff College, and the School for Advanced Warfare, both located at Quantico.[1]

Completing duty under instruction and selected for lieutenant colonel, he was assigned as commanding officer, 1st Light Armored Reconnaissance Battalion (1st LAR), 1st Marine Division, Camp Pendleton, California. During his tenure, 1st LAR was called in to provide augmentation support for police in the city of Long Beach, California during the Los Angeles riots of 1992. Holding this command position for two years, Kelly returned to the East Coast in 1994, to attend the National War College in Washington, D.C. He graduated in 1995 and was selected to serve as the Commandant‘s Liaison Officer to the U.S. House of Representatives, Capitol Hill, where he was promoted to colonel.[1]

Kelly testifying before the Senate Armed Services Committee

In 1999, Kelly transferred to joint duty and served as the special assistant to the Supreme Allied Commander, Europe, in Mons, Belgium. He returned to the United States in 2001 and was assigned to a third tour of duty at Camp Lejeune, now as the assistant chief of staff G-3 with the Second Marine Division. In 2002, Kelly again served with the 1st Marine Division, this time as the assistant division commander. Much of Kelly’s two-year assignment was spent deployed in Iraq.[1] In March 2003, while in Iraq, Kelly was promoted to brigadier general, which was the first known promotion of a Marine Corps colonel in an active combat zone since that of another First Marine Division assistant division commander, Chesty Puller, in January 1951.[8]

In mid-April Gen. Kelly took command of the newly formed Task Force Tripoli and drove it north from Baghdad into Samarra and Tikrit.[9] During the initial assault on Baghdad, Kelly was asked by a reporter of The Los Angeles Times if (considering the size of the Iraqi Army and the vast supplies of tanks, artillery and chemical weapons available to Saddam’s forces) if he would ever consider defeat. Kelly’s archetypal response was, “Hell these are Marines. Men like them held Guadalcanal and took Iwo Jima. Baghdad ain’t shit.” [10]

Kelly briefing reporters at the Pentagon in Arlington, Virginia

His next assignment was as legislative assistant to the Commandant of the Marine Corps, Michael Hagee. In January 2007 Kelly was nominated for major general,[11] and confirmed by the U.S. Senate on September 11, 2007.[12]

Kelly’s next assignment, in July 2007, was as commanding general, I Marine Expeditionary Force (Forward).[13] On February 9, 2008 Kelly assumed command of the Multi-National Force–West in Iraq, replacing Major General Walter E. Gaskin.[14] After a year in Iraq Kelly returned to the States in February 2009.[15]

Kelly was the senior military assistant to the Secretary of Defense and personally greeted Secretary Panetta at the entrance to the Pentagon on July 1, 2011, Panetta’s first day as secretary.[16] Kelly succeeded General Douglas M. Fraser as commander of U.S. Southern Command on November 19, 2012.[2]

In a 2014 speech regarding the War on Terror, Kelly said:

“If you think this war against our way of life is over because some of the self-appointed opinion-makers and chattering class grow ‘war weary,’ because they want to be out of Iraq or Afghanistan, you are mistaken. This enemy is dedicated to our destruction. He will fight us for generations, and the conflict will move through various phases as it has since 9/11.”[17]

Kelly was succeeded by Navy Admiral Kurt W. Tidd on January 14, 2016.

Secretary of Homeland Security

Kelly is ceremonially sworn in prior to President Trump’s speech at DHS Headquarters on January 25, 2017. Kelly was actually sworn in a five days earlier.

On December 7, 2016, then President-electDonald Trump nominated Kelly to head the Department of Homeland Security (DHS), a cabinet-level position.[18] People familiar with the transition said that Trump’s team was drawn to Kelly because of his southwest border expertise.[19] On January 20, 2017, Kelly was confirmed as Secretary of Homeland Security by the United States Senate with a vote of 88-11.[20] On that evening, he was sworn in by Vice PresidentMike Pence.[21]

Personal life

In 1976, Kelly married Karen Hernest. They had three children: Robert M, John Jr, and Kathleen.[22]

In 2010, Kelly’s 29-year-old son, First Lieutenant Robert Kelly, was killed in action when he stepped on a landmine while leading a platoon of Marines on a patrol in Sangin, Afghanistan. The younger Kelly was a former enlisted Marine and was on his third combat tour, and his first combat tour as a U.S. Marine Corps infantry officer. At the time of his death, Robert Kelly was with Lima Company, 3rd Battalion, 5th Marines. Robert Kelly’s death made John Kelly the highest-ranking military officer to lose a son or daughter in Iraq or Afghanistan.[23] Kelly’s other son is a Marine Corps major.[24][25][26]

Awards and decorations

Combat Distinguishing Device.pngAward star (gold).png
Gold star

Award star (gold).pngAward star (gold).pngAward star (gold).png
Bronze oak leaf cluster

Bronze-service-star-3d.pngBronze-service-star-3d.png Bronze-service-star-3d.pngBronze-service-star-3d.png
Bronze star

Bronze-service-star-3d.pngBronze-service-star-3d.pngBronze-service-star-3d.png
Bronze-service-star-3d.pngBronze-service-star-3d.pngBronze-service-star-3d.pngBronze-service-star-3d.png Order of San Carlos - Grand Officer (Colombia) - ribbon bar.png
Office of the Secretary of Defense Identification Badge.png
Defense Distinguished Service Medal
Defense Superior Service Medal Legion of Merit w/ 1 award star and Combat V Meritorious Service Medal w/ 1 award star Navy and Marine Corps Commendation Medal w/ 3 award stars
Navy and Marine Corps Achievement Medal Combat Action Ribbon Presidential Unit Citation (United States) Joint Meritorious Unit Award w/ 1 oak leaf cluster
Navy Unit Commendation Navy Meritorious Unit Commendation w/ 2 service stars Marine Corps Expeditionary Medal National Defense Service Medal w/ 2 service stars
Southwest Asia Service Medal w/ 1 service star Iraq Campaign Medal w/ 3 service stars Global War on Terrorism Expeditionary Medal Global War on Terrorism Service Medal
Navy Sea Service Deployment Ribbon w/ 4 service stars Navy & Marine Corps Overseas Service Ribbon Grand Officer of the Order of San Carlos (Colombia)[27] Kuwait Liberation Medal (Kuwait)
Office of the Secretary of Defense Identification Badge

See also

Immigration policy of Donald Trump

From Wikipedia, the free encyclopedia

Illegal immigration was a signature issue of President Donald Trump‘s presidential campaign, and his proposed reforms and remarks about this issue have generated headlines.[1] A hallmark promise of his campaign was to build a substantial wall on the United States-Mexico border. Trump has also expressed support for a variety of “limits on legal immigration and guest-worker visas”,[1][2] including a “pause” on granting green cards, which Trump says will “allow record immigration levels to subside to more moderate historical averages”.[3][4][5] Trump’s proposals regarding H-1B visas have frequently changed throughout his presidential campaign, but as of late July 2016, he appears to oppose the H-1B visa program.[6] Trump has questioned official estimates of the number of illegal immigrants in the United States (between 11 and 12 million), insisting the number is much higher (between 30 and 34 million).

Positions on immigration

Trump has questioned official estimates of the number of illegal immigrants in the United States (between 11 and 12 million), asserting that the number is actually between 30 and 34 million.[7] PolitiFact ruled that his statement was “Pants on Fire”, citing experts who noted that no evidence supported an estimate in that range.[7] For example, the Pew Research Center reported in March 2015 that the number of illegal immigrants overall declined from 12.2 million in 2007 to 11.2 million in 2012. The number of illegal immigrants in the U.S. labor force ranged from 8.1 million to 8.3 million between 2007 and 2012, approximately 5% of the U.S. labor force.[8]

Birthright citizenship

Trump proposes rolling back birthright citizenship – a historically broadened interpretation of the Citizenship Clause of the Fourteenth Amendment that all persons born on U.S. soil are citizens – so as not to grant citizenship to US-born children of illegal immigrants (whom he refers to as “anchor babies“). The mainstream view of the Fourteenth Amendment among legal experts is that everyone born on U.S. soil, regardless of parents’ citizenship, is automatically an American citizen. [9][10]

Kate’s Law

Trump during his campaign promised to ask Congress to pass Kate’s Law to ensure that criminal aliens convicted of illegal reentry receive strong, mandatory minimum sentences. The law is named after Kate Steinle who was allegedly shot and killed in July 2015 by Juan Francisco Lopez-Sanchez, who was deported by from the US a total of five times.[11]

A law authored in the House was referred to the Subcommittee on Immigration and Border Security on July 29, 2015.[12] The Senate version of the bill was filibustered by the senate in July 2016.[13][14]

Border security

Trump has emphasized U.S. border security and illegal immigration to the United States as a campaign issue.[15][16] During his announcement speech he stated in part, “When Mexico sends its people, they’re not sending their best. They’re not sending you. They’re sending people that have lots of problems, and they’re bringing those problems…. They’re bringing drugs. They’re bringing crime. They’re rapists. And some, I assume, are good people.”[17] On July 6, 2015, Trump issued a written statement[18] to clarify his position on illegal immigration, which drew a reaction from critics. It read in part:

The Mexican Government is forcing their most unwanted people into the United States. They are, in many cases, criminals, drug dealers, rapists, etc. This was evident just this week when, as an example, a young woman in San Francisco was viciously killed by a 5-time deported Mexican with a long criminal record, who was forced back into the United States because they didn’t want him in Mexico. This is merely one of thousands of similar incidents throughout the United States. In other words, the worst elements in Mexico are being pushed into the United States by the Mexican government. The largest suppliers of heroin, cocaine and other illicit drugs are Mexican cartels that arrange to have Mexican immigrants trying to cross the borders and smuggle in the drugs. The Border Patrol knows this. Likewise, tremendous infectious disease is pouring across the border. The United States has become a dumping ground for Mexico and, in fact, for many other parts of the world. On the other hand, many fabulous people come in from Mexico and our country is better for it. But these people are here legally, and are severely hurt by those coming in illegally. I am proud to say that I know many hard working Mexicans—many of them are working for and with me … and, just like our country, my organization is better for it.”[19]

A study published in Social Science Quarterly in May 2016 tested Trump’s claim that immigrants are responsible for higher levels of violent and drug-related crime in the United States.[20] It found no evidence that links Mexican or illegal Mexican immigrants specifically to violent or drug-related crime.[20] It did however find a small but significant association between illegal immigrant populations (including non-Mexican illegal immigrants) and drug-related arrests.[20]

In addition to his proposals to construct a border wall (see below), Trump has called for tripling the number of Border Patrol agents.[21]

U.S.–Mexico border wall proposal

Main article: Executive Order 13767
Further information: Mexico–United States barrier

Trump speaking about his immigration policy in Phoenix, Arizona, August 31, 2016.

Trump has repeatedly pledged to build a wall along the U.S.’s southern border, and has said that Mexico would pay for its construction through increased border-crossing fees and NAFTA tariffs.[22] In his speech announcing his candidacy, Trump pledged to “build a great, great wall on our southern border. And I will have Mexico pay for that wall. Mark my words.”[23][24] Trump also said “nobody builds walls better than me, believe me, and I’ll build them very inexpensively.”[24] The concept for building a barrier to keep illegal immigrants out of the U.S. is not new; 670 miles of fencing (about one-third of the border) was erected under the Secure Fence Act of 2006, at a cost of $2.4 billion.[24] Trump said later that his proposed wall would be “a real wall. Not a toy wall like we have now.”[25] In his 2015 book, Trump cites the Israeli West Bank barrier as a successful example of a border wall.[26] “Trump has at times suggested building a wall across the nearly 2,000-mile border and at other times indicated more selective placement.”[27] After a meeting with Mexican President Enrique Peña Nieto on August 31, 2016, Trump said that they “didn’t discuss” who would pay for the border wall that Trump has made a centerpiece of his presidential campaign.[28] Nieto contradicted that later that day, saying that he at the start of the meeting “made it clear that Mexico will not pay for the wall”.[29] Later that day, Trump reiterated his position that Mexico will pay to build an “impenetrable” wall on the Southern border.[30]

John Cassidy of The New Yorker wrote that Trump is “the latest representative of an anti-immigrant, nativist American tradition that dates back at least to the Know-Nothings” of the 1840s and 1850s.[31] Trump says “it was legal immigrants who made America great,”[32] that the Latinos who have worked for him have been “unbelievable people”, and that he wants a wall between the U.S. and Mexico to have a “big, beautiful door” for people to come legally and feel welcomed in the United States.[33]

According to experts and analyses, the actual cost to construct a wall along the remaining 1,300 miles of the border could be as high as $16 million per mile, with a total cost of up to $25 billion, with the cost of private land acquisitions and fence maintenance pushing up the total cost further.[27] Maintenance of the wall cost could up to $750 million a year, and if the Border Patrol agents were to patrol the wall, additional funds would have to be expended.[27] Rough and remote terrain on many parts of the border, such as deserts and mountains, would make construction and maintenance of a wall expensive, and such terrain may be a greater deterrent than a wall in any case.[27] Experts also note that on federally protected wilderness areas and Native American reservations, the Department of Homeland Security may have only limited construction authority, and a wall could cause environmental damage.[27]

Critics of Trump’s plan question whether a wall would be effective at stopping unauthorized crossings, noting that walls are of limited use unless they are patrolled by agents and to intercept those climbing over or tunneling under the wall.[27] Experts also note that approximately half of illegal immigrants in the U.S. did not surreptitiously enter, but rather “entered through official crossing points, either by overstaying visas, using fraudulent documents, or being smuggled past the border”.[27]

Mass deportation of illegal immigrants

Foreign born in US labor-force 1900-2015. Approximately 8 million of the foreign-born in the labor force were illegal immigrants in 2012.

Early in his campaign, in 2015, Trump proposed the mass deportation of illegal immigrants.[34][35][36] During his first town hall campaign meeting in Derry, New Hampshire, Trump said that if he were to win the election, then on “[d]ay 1 of my presidency, illegal immigrants are getting out and getting out fast”.[37]In June 2016, he stated that he would not characterize his immigration policies as including “mass deportations”.[38][39][40] However, on August 31, 2016, contrary to earlier reports of a “softening” in his stance[22][41][42][43][44], Trump laid out a 10-step plan reaffirming his hardline positions. He reiterated that all illegal immigrants are “subject to deportation” with priority given to illegal immigrants who have committed significant crimes and those who have overstayed visas. He noted that all those seeking legalization would have to go home and re-enter the country legally. [30][45]

Trump’s proposals for deportation also include a “Deportation Force”, modeled after the 1950s-era “Operation Wetback” program during the Eisenhower administration that ended following a congressional investigation.[46][36][46] Historian Mae Ngai of Columbia University, who has studied the program, has said that the military-style operation was both inhumane and ineffective.[36][46] Trump has said of his proposal: “We would do it in a very humane way.”[35]

According to a Washington Post analysis, if Trump’s criteria for immediate deportation as of September 2016 are met, the number of individuals prioritized for removal by ICE agents would range between about 5.0 and 6.5 million.[47] Analysts also noted that Trump’s mass-deportation plan would encounter legal and logistical difficulties, since U.S. immigration courts already face large backlogs.[35] Such a program would also impose a fiscal cost; the fiscally conservative American Action Forum policy group estimates that deporting every illegal immigrant would cause a slump of $381.5 billion to $623.2 billion in private sector output, amounting to roughly a loss of 2% of U.S. GDP.[48]Doug Holtz-Eakin, the group’s president, has said that the mass deportation of 11 million people would “harm the economy in ways it would normally not be harmed”.[35]

Proposed Muslim immigration ban

Trump frequently revised proposals to ban Muslim immigration to the United States in the course of his presidential campaign.[6] In late July 2016, NBC News characterized his position as: “Ban all Muslims, and maybe other people from countries with a history of terrorism, but just don’t say ‘Muslims’.”[6](Rudy Giuliani said on Fox News that Trump tasked him to craft a “Muslim ban” and asked Giuliani to form a committee to show him “the right way to do it legally”.[49][50] The committee, which included former U.S. Attorney General and Chief Judge of the Southern District of New YorkMichael Mukasey, and Reps. Mike McCaul and Peter T. King, decided to drop the religious basis and instead focused on regions where Giuliani says that there is “substantial evidence that people are sending terrorists” to the United States.[50])

Trump proposed a temporary ban on foreign Muslims entering the United States (the U.S. admits approximately 100,000 Muslim immigrants each year)[51] “until we can figure out what’s going on” in December 2015.[52][53][54][55] In response to the 2015 San Bernardino shooting, Trump released a statement on “Preventing Muslim Immigration” and called for “a total and complete shutdown of Muslims entering the United States until our country’s representatives can figure out what the hell is going on”.[56] Trump clarified how this would work in an interview with Willie Geist on in December 2015:

Geist: “Would airline representatives, customs agents or border guards ask a person’s religion?”
Trump: “They would say: ‘Are you Muslim?'”
Geist: “And if they said, ‘yes’, they would not be allowed in the country?”
Trump: “That’s correct.”[57]

Trump cited President Franklin Delano Roosevelt‘s use during World War II of the Alien and Sedition Acts to issue presidential proclamations for rounding up, holding, and deporting German, Japanese, and Italian alien immigrants, and noted that Roosevelt was highly respected and had highways named after him.[58][59][60][61] Trump stated that he did not agree with Roosevelt’s internment of Japanese Americans, and clarified that the proposal would not apply to Muslims who were U.S. citizens or to Muslims who were serving in the U.S. military.[62][63] The measure proposed by Trump would be temporary,[53] until better screening methods are devised,[54] although the proposal had also been phrased in more controversial ways.[55]

In May 2016, Trump retreated slightly from his call for a Muslim ban, calling it “merely an idea, not a proposal”.[64] On June 13, 2016, he reformulated the ban so that it would be geographical, not religious, applying to “areas of the world where there is a proven history of terrorism against the United States, Europe or our allies”.[64][65] Two hours later, he claimed that ban was only for nations “tied to Islamic terror”.[64] In June 2016, he also stated that he would allow Muslims from allies like the United Kingdom to enter the United States.[64] In May 2016, Trump said “There will always be exceptions” to the ban, when asked how the ban would apply to London’s newly-elected mayor Sadiq Khan.[66] A spokesman for Sadiq Khan said in response that Trump’s views were “ignorant, divisive and dangerous” and play into the hands of extremists.[67]

In June 2016, Trump expanded his proposed ban on Muslim immigration to the United States to cover immigration from areas with a history of terrorism.[68] Specifically, Trump stated, “When I am elected, I will suspend immigration from areas of the world when there is a proven history of terrorism against the United States, Europe, or our allies, until we understand how to end these threats.”[68] According to lawyers and legal scholars cited in a New York Times report, the president has the power to carry out the plan but it would take an ambitious and likely time-consuming bureaucratic effort, and make sweeping use of executive authority.[69] Immigration analysts also noted that the implementation of Trump’s plan could “prompt a wave of retaliation against American citizens traveling and living abroad”.[69] In July 2016, Trump described his proposal as encompassing “any nation that has been compromised by terrorism”.[70] Trump later referred to the reformulation as “extreme vetting”.[71]

When asked in July 2016 about his proposal to restrict immigration from areas with high levels of terrorism, Trump insisted that it was not a “rollback” of his initial proposal to ban all Muslim immigrants.[72] He said, “In fact, you could say it’s an expansion. I’m looking now at territory.”[72] When asked if his new proposal meant that there would be greater checks on immigration from countries that have been compromised by terrorism, such as France, Germany and Spain, Trump answered, “It’s their own fault, because they’ve allowed people over years to come into their territory.”[73][74]

On August 15, 2016, Trump suggested that “extreme views” would be grounds to be thrown out of the U.S., saying he would deport Seddique Mateen, the father of Omar Mateen (the gunman in the 2016 Orlando nightclub shooting), who has expressed support for the Taliban.[75][76][77] On 31 August in Phoenix Trump would make a speech billed by then running-mate Pence as important and offering many details.[78] In the speech, Trump vowed “places like Syria and Libya” were “places from which immigration would be suspended” under his immigration plan.[79][80] Jeff Sessions at the time said the Trump campaign’s plan was “the best laid out law enforcement plan to fix this country’s immigration system that’s been stated in this country maybe forever”. [81]

Sessions is Trump’s nominee to be Attorney General of the Department of Justice. During confirmation-hearing testimony, he acknowledged supporting vetting based on “areas where we have an unusually high risk of terrorists coming in”; Sessions acknowledged the DOJ would need to evaluate such a plan if it were outside the “Constitutional order.”[82]

Other proposals

Trump has proposed making it more difficult for asylum-seekers and refugees to enter the United States, and making the e-Verify system mandatory for employers.[21]

Syrian refugees

Trump has on several occasions expressed opposition to allowing Syrian refugees into the U.S.—saying they could be the “ultimate Trojan horse[83]—and has proposed deporting back to Syria refugees settled in the U.S.[84][85] By September 2015, Trump had expressed support for taking in some Syrian refugees[84][86] and praised Germany’s decision to take in Syrian refugees.[87]

On a number of occasions in 2015, Trump asserted that “If you’re from Syria and you’re a Christian, you cannot come into this country, and they’re the ones that are being decimated. If you are Islamic … it’s hard to believe, you can come in so easily.” PolitiFact rated Trump’s claim as “false” and found it to be “wrong on its face”, citing the fact that 3 percent of the refugees from Syria have been Christian (although they represent 10 percent of the Syrian population) and finding that the U.S. government is not discriminating against Christians as a matter of official policy.[88]

In May 2016 interview with Bill O’Reilly, Trump stated “Look, we are at war with these people and they don’t wear uniforms….. This is a war against people that are vicious, violent people, that we have no idea who they are, where they come from. We are allowing tens of thousands of them into our country now.” Politifact ruled this statement “pants on fire”, stating that the U.S. is on track to accept 100,000 refugees in 2017, but there is no evidence that tens of thousands of them are terrorists.[89]

Presidential actions

On January 27, 2017, as part of a plan to keep out radical Islamic terrorism, Trump signed an executive order, titled “Protecting the Nation From Terrorist Attacks by Foreign Nationals“, that suspended entry for citizens of seven countries for 90 days: Iraq, Iran, Libya, Somalia, Sudan, Syria and Yemen, totaling more than 134 million people.[90] The order also stopped the admission of refugees of the Syrian Civil War indefinitely, and the entry of all refugees to the United States for 120 days.[91] Refugees who were on their way to the United States when the order was signed were stopped and detained at airports.[92]

Implicated by this order is 8 U.S.C. Sec. 1182 “Whenever the President finds that the entry of any aliens or of any class of aliens into the United States would be detrimental to the interests of the United States, he may by proclamation, and for such period as he shall deem necessary, suspend the entry of all aliens or any class of aliens as immigrants or nonimmigrants, or impose on the entry of aliens any restrictions he may deem to be appropriate.” 8 U.S. Code § 1182 (Section 212(f) of the Immigration and Nationality Act of 1952).

Critics argue that Congress later restricted this power in 1965, stating plainly that no person could be “discriminated against in the issuance of an immigrant visa because of the person’s race, sex, nationality, place of birth or place of residence.” (8 U.S. Code § 1152) The only exceptions are those provided for by Congress (such as the preference for Cuban asylum seekers).[93]

Many legal challenges to the order were brought immediately after its issuance: from January 28 to January 31, almost 50 cases were filed in federal courts.[94] Some courts, in turn, granted temporary relief, including a nationwide temporary restraining order (TRO) that bars the enforcement of major parts of the executive order.[95][96] The Trump administration is appealing the TRO.[96]

See also

https://en.wikipedia.org/wiki/Immigration_policy_of_Donald_Trump

Story 2: Senator Warren Defames and Lies As Did Coretta Scott King In Her Letter About Senator Sessions — Rule 19 — Object — Senator Take You Seat — Three Cheers! — Videos

Elizabeth Warren rebuked on Senate floor

Published on Feb 8, 2017

Elizabeth Warren rebuked on Senate floor while reading a letter written by Coretta Scott King to criticize Jeff Sessions.

Senator Warren On Jeff Sessions – Full Floor Speech

Story 3: Awaiting 9th Circuit Three Judge Panel Decision –Videos

Trump’s Immigration Ban Faces Contentious Court hearing (Common Sense)

Justice Department Argues Case To Reinstate President Trump’s Travel Ban To Appeals Court Judges

Judge James Robart stops Trumps Not A Muslim Ban

Washington v. Trump: Courtroom Highlights

The Pronk Pops Show Podcasts Portfolio

Listen To Pronk Pops Podcast or Download Shows 833-834

Listen To Pronk Pops Podcast or Download Shows 827-832

Listen To Pronk Pops Podcast or Download Shows 821-826

Listen To Pronk Pops Podcast or Download Shows 815-820

Listen To Pronk Pops Podcast or Download Shows 806-814

Listen To Pronk Pops Podcast or Download Shows 800-805

Listen To Pronk Pops Podcast or Download Shows 793-799

Listen To Pronk Pops Podcast or Download Shows 785-792

Listen To Pronk Pops Podcast or Download Shows 777-784

Listen To Pronk Pops Podcast or Download Shows 769-776

Listen To Pronk Pops Podcast or Download Shows 759-768

Listen To Pronk Pops Podcast or Download Shows 751-758

Listen To Pronk Pops Podcast or Download Shows 745-750

Listen To Pronk Pops Podcast or Download Shows 738-744

Listen To Pronk Pops Podcast or Download Shows 732-737

Listen To Pronk Pops Podcast or Download Shows 727-731

Listen To Pronk Pops Podcast or Download Shows 720-726

Listen To Pronk Pops Podcast or DownloadShows 713-719

Listen To Pronk Pops Podcast or DownloadShows 705-712

Listen To Pronk Pops Podcast or Download Shows 695-704

Listen To Pronk Pops Podcast or Download Shows 685-694

Listen To Pronk Pops Podcast or Download Shows 675-684

Listen To Pronk Pops Podcast or Download Shows 668-674

Listen To Pronk Pops Podcast or Download Shows 660-667

Listen To Pron