The Pronk Pops Show 841, February 17, Story 1: President Trump’s First Press Conference Part 2: President Trump Speaks Directly To The American People — Videos — Story 2: President Trump Educates The Big Lie Media (Democratic Newspapers and Television Networks) with Fake News Spinning Propaganda — Trump to news media: The public doesn’t believe you anymore! — Trump On Offense vs. Big Lie Media On Defense — President Trump Wins With Working Americans — Buy American and Hire American — Videos

Posted on February 17, 2017. Filed under: American History, Banking System, Blogroll, Books, Breaking News, Budgetary Policy, Cartoons, Coal, College, Communications, Computers, Congress, Constitutional Law, Corruption, Countries, Crime, Culture, Currencies, Defense Spending, Donald J. Trump, Donald J. Trump, Donald Trump, Donald Trump, Economics, Education, Empires, Employment, Federal Bureau of Investigation (FBI), Federal Communications Commission, Federal Government, Fiscal Policy, Foreign Policy, Fourth Amendment, Free Trade, Freedom of Speech, Genocide, Government, Government Dependency, Government Spending, High Crimes, Hillary Clinton, Hillary Clinton, History, House of Representatives, Human, Human Behavior, Illegal Immigration, Illegal Immigration, Immigration, Impeachment, Independence, Investments, Iran Nuclear Weapons Deal, Labor Economics, Language, Legal Immigration, Life, Lying, Media, Mike Pence, Monetary Policy, National Security Agency, Natural Gas, News, Obama, Oil, Philosophy, Photos, Politics, Polls, President Barack Obama, President Trump, Presidential Appointments, Pro Life, Progressives, Public Sector Unions, Radio, Raymond Thomas Pronk, Resources, Rule of Law, Russia, Scandals, Security, Senate, Senator Jeff Sessions, Social Networking, Social Security, Success, Tax Policy, Taxation, Taxes, Terror, Terrorism, Trade Policy, U.S. Dollar, Unemployment, Unions, United States Constitution, United States of America, United States Supreme Court, Videos, Violence, Wall Street Journal, War, Wealth, Weather, Welfare Spending, Wisdom | Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , |

Project_1

The Pronk Pops Show Podcasts

Pronk Pops Show 841: February 17, 2017

Pronk Pops Show 840: February 16, 2017

Pronk Pops Show 839: February 15, 2017

Pronk Pops Show 838: February 14, 2017

Pronk Pops Show 837: February 13, 2017

Pronk Pops Show 836: February 10, 2017

Pronk Pops Show 835: February 9, 2017

Pronk Pops Show 834: February 8, 2017

Pronk Pops Show 833: February 7, 2017

Pronk Pops Show 832: February 6, 2017

Pronk Pops Show 831: February 3, 2017

Pronk Pops Show 830: February 2, 2017

Pronk Pops Show 829: February 1, 2017

Pronk Pops Show 828: January 31, 2017

Pronk Pops Show 827: January 30, 2017

Pronk Pops Show 826: January 27, 2017 

Pronk Pops Show 825: January 26, 2017

Pronk Pops Show 824: January 25, 2017 

Pronk Pops Show 823: January 24, 2017

Pronk Pops Show 822: January 23, 2017

Pronk Pops Show 821: January 20, 2017

Pronk Pops Show 820: January 19, 2017

Pronk Pops Show 819: January 18, 2017

Pronk Pops Show 818: January 17, 2017

Pronk Pops Show 817: January 13, 2017

Pronk Pops Show 816: January 12, 2017

Pronk Pops Show 815: January 11, 2017

Pronk Pops Show 814: January 10,  2017

Pronk Pops Show 813: January 9, 2017

Pronk Pops Show 812: December 12, 2016

Pronk Pops Show 811: December 9, 2016

Pronk Pops Show 810: December 8, 2016

Pronk Pops Show 809: December 7, 2016

Pronk Pops Show 808: December 6, 2016

Pronk Pops Show 807: December 5, 2016

Pronk Pops Show 806: December 2, 2016

Pronk Pops Show 805: December 1, 2016

Pronk Pops Show 804: November 30, 2016

Pronk Pops Show 803: November 29, 2016

Pronk Pops Show 802: November 28, 2016

Pronk Pops Show 801: November 22, 2016

Pronk Pops Show 800: November 21, 2016

Pronk Pops Show 799: November 18, 2016

Pronk Pops Show 798: November 17, 2016

Pronk Pops Show 797: November 16, 2016

Pronk Pops Show 796: November 15, 2016

Pronk Pops Show 795: November 14, 2016

Pronk Pops Show 794: November 10, 2016

Pronk Pops Show 793: November 9, 2016

Pronk Pops Show 792: November 8, 2016

Pronk Pops Show 791: November 7, 2016

Pronk Pops Show 790: November 4, 2016

Pronk Pops Show 789: November 3, 2016

Pronk Pops Show 788: November 2, 2016

 Story 1: President Trump’s First Press Conference Part 1: President Trump Speaks Directly To The American People — Videos — 

Image result for cartoons president trump press conference

Image result for cartoons 2017 branco president trump press conferenceImage result for cartoons president trump press conference
Image result for cartoons president trump press conferenceImage result for cartoons 2017 branco president trump press conference

Image result for cartoons 2017 branco president trump press conference
Image result for cartoons president trump press conferenceImage result for cartoons president trump coal miners

Image result for president trump with boeing rolloutImage result for president trump with boeing rolloutImage result for president trump with boeing rolloutImage result for president trump with boeing rolloutImage result for president trump with boeing rolloutImage result for president trump with boeing rolloutImage result for president trump with boeing rolloutImage result for president trump with boeing rolloutImage result for president trump with boeing rollout

Image result for president trump with coal minersImage result for president trump with coal minersImage result for president trump with coal minersImage result for president trump with coal minersImage result for president trump with coal miners

President Donald Trump Full Press Conference Addresses Ties to Russia, Leaks, and “Fake News” 2/16

President Trump scolds media at news conference

Trump to news media: The public doesn’t believe you anymore

Bill Bennett: Press can’t stand that Trump doesn’t fear them

President Trump helps Boeing debut it’s new 787

Trump Full Speech at Boeing 787 Dreamliner Unveiling | ABC News

Coal Miner Thanks President Trump for Removing Regulations

Published on Feb 17, 2017

Coal miner thanks President Trump for removing regulations

President dismisses negative reporting in a media massacre

Rush Limbaugh Podcast 2/16/17 | Trump blasts ‘out of control’ media, defends agenda, administration

Laura Ingraham Show 2/16/17 | Media freaks out as some come to the conclusion that Flynn

Trump Says General Flynn Did Nothing Wrong

Tucker Carlson Tonight & Hannity Special – 2/16/2017 Donald Trump, Paul Ryan, Netanyahu Interview

Scott Pelley: Trump’s “bluster, bravado, exaggeration” on display at news conference

John Dickerson on Beltway’s reaction to Trump’s press conference

Is The Intelligence Community At War With Trump?

Roger Stone Panicked Left Launching Civil War

Story 2: President Trump Educates The Big Lie Media (Democratic Newspapers and Television Networks) with Fake News Spinning Propaganda — Videos

Trump boasts approval rating, attacks media

President Trump scolds media at news conference

President Trump criticizes administration coverage

The Source of Leaks — Obama and Obama Partisians in Intelligence Community

BREAKING: Obama Gave NSA New Powers On His Way Out & They’re Using Them On Trump!

Before Obama Left Office, He Gave Domestic Agencies Warrantless Access to NSA Surveillance

Obama Expands NSA Spying On His Way Out The Door

Mike Flynn, Trump, Russia, CIA and what the HELL is actually going on!!!!

Flynn Resignation A Deep State Sabotage Of Trump

Sorry media — this press conference played very different with Trump’s supporters

 Far from dead, he was positively exuberant. His performance at a marathon press conference was a must-see-tv spectacle as he mixed serious policy talk with stand-up comedy and took repeated pleasure in whacking his favorite pinata, the “dishonest media.”

“Russia is a ruse,” he insisted, before finally saying under questioning he was not aware of anyone on his campaign having contact with Russian officials.

Trump’s detractors immediately panned the show as madness, but they missed the method behind it and proved they still don’t understand his appeal. Facing his first crisis in the Oval Office, he was unbowed in demonstrating his bare-knuckled intention to fight back.

He did it his way. Certainly no other president, and few politicians at any level in any time, would dare put on a show like that.

In front of cameras, and using the assembled press corps as props, he conducted a televised revival meeting to remind his supporters that he is still the man they elected. Ticking off a lengthy list of executive orders and other actions he has taken, he displayed serious fealty to his campaign promises.

Trump goes on marathon rant against the media

Sure, sentences didn’t always end on the same topic they started with, and his claim to have won the election by the largest electoral college margin since Ronald Reagan wasn’t close to true.

Fair points, but so what? Fact-checkers didn’t elect him, nor did voters who were happy with the status quo.

Trump, first, last and always, matches the mood of the discontented. Like them, he is a bull looking for a china shop. That’s his ace in the hole and he played it almost to perfection.

The immediate impact of his performance is likely to calm some of the jitters among Republicans in congress and supporters elsewhere, especially after the beating he took in the last few days.

On Monday night, Trump suddenly removed Gen. Michael Flynn, his national security adviser, over circumstances that still are not entirely clear. And on Wednesday, his nominee for Secretary of Labor, Andrew Puzder, withdrew after Republicans said he didn’t have the votes to be confirmed.

Combined with courts blocking his immigration and refugee order, unflattering leaks of confidential material from intelligence agencies and numerous demands for investigations into any Russian connections, Trump’s fast start suddenly hit a wall.

Just three weeks into his term, Democrats, in and out of the media, smelled blood. Many already were going for the kill.

They won’t get it, at least now. Trump bought himself time yesterday.

Yet those determined to bring him down won’t give up, and the insidious leaks of secret material suggest some opponents are members of the permanent government who are willing to use their position and the media to undermine him.

Indeed, the most serious leaks seem to vindicate a warning that Democratic Sen. Chuck Schumer made in early January after Trump criticized leaders of the spook agencies.

“Let me tell you, you take on the intelligence community, they have six ways from Sunday at getting back at you,” Schumer told an interviewer. “So even for a practical, supposedly hard-nosed businessman, he’s being really dumb to do this.”

That incredible statement reflects what a dangerous game rogue agents are playing. The world is on fire yet the president is the target of partisan revenge in his own government. It’s a scandal and it’s outrageous, but it’s a fact that Trump must confront.

Finding the leakers and prosecuting them, which he promises to do, is part of the solution.

rAnother part comes Saturday, when Trump takes his solo act to Florida for a massive public rally. It’s smart for him to get out of Washington and soak in the enthusiasm of the populist movement he leads.

He should do it regularly, and also hold smaller, town-hall style forums where ordinary citizens can ask him questions in more intimate settings. Any way he can speak directly to the American people and hear from them democratizes his presidency and reduces the power of big biased media and the Washington establishment.

Yet the only sure and lasting way to keep ahead of the lynch mob is by producing results. Success will be Trump’s savior.

And nothing says success like jobs, jobs, jobs. Getting the economy to reach lift-off speed is essential so it can deliver the good-paying jobs and prosperity that he promised and the nation needs.

While Republican honchos in congress say they’re getting ready to move on tax cuts and replacing ObamaCare, nothing will happen without presidential leadership. That means Trump’s fate is in his own hands and he must keep himself and his White House team focused on delivering an economic revival.

If he does that, the lynch mob will be left holding an empty rope.

http://nypost.com/2017/02/16/sorry-media-this-press-conference-played-very-different-with-trumps-supporters/

At Boeing, Trump returns to an economic message after a week of controversy

February 17 at 2:35 PM

Trump promises focus on jobs, lower taxes in speech at Boeing factory

President Trump promised to work to keep manufacturing companies in the U.S., and to lower taxes for businesses, speaking at the unveiling of the Boeing 787 Dreamliner on Feb. 17 in North Charleston, S.C. (The Washington Post)

NORTH CHARLESTON, S.C. — When President Trump took the stage here Friday to mark the launch of Boeing’s newest aircraft, it was a scene reminiscent of his airplane hangar rallies during the presidential campaign.

Except, instead of his “Trump” branded Boeing 757 parked in the background, Boeing’s newest product, the Dreamliner 787-10, glittered in the sun behind him, and off to the side stood Trump’s new ride, Air Force One.

Trump’s somewhat unusual appearance at the launch event for the company’s highly anticipated version 10 of the Dreamliner wasn’t to roll out new economic policy or even push a specific economic agenda item. Instead, it seemed that Trump was there to boost the company with a presidential endorsement for its American-made fleet, and he in turn would be the face of a major milestone for one of the country’s largest job creators.

“We’re here today to celebrate American engineering and American manufacturing,” Trump said. “We’re also here today to celebrate jobs. Jobs!”

“Jobs is one of the primary reasons I’m standing here as president, and I will never ever disappoint you. Believe me,” he added.

Trump’s visit to the Boeing plant also comes at a time when the Trump administration is struggling to establish a greater sense of order and focus after weeks of distractions and negative headlines.

The White House has aimed to structure his daily schedule with at least one jobs-focused meeting each day. But much of that has been overshadowed by several all-consuming stories, the most damaging of which was the ouster of Trump’s national security adviser, Michael Flynn, on Monday.

Questions about the Trump administration and campaign’s ties to Russia have only intensified after multiple media reports revealed that Flynn discussed sanctions with Russian Ambassador Sergey Kislyak, despite Flynn’s statements to the contrary.

Friday’s event on the manufacturing floor of Boeing’s South Carolina plant offered Trump a much-needed opportunity to reset his administration and refocus an economic-based message.

“You look at what’s happening with jobs. You look at what’s happening with plants moving back to this country. All of a sudden they’re coming back,” Trump said. “As your president, I’m going to do everything that I can to unleash the power of the American spirit and put our great people back to work.

“This is our mantra, buy American and hire American.”

A few months ago, it seemed that Trump’s relationship with Boeing was on the rocks before it even really began.

As president-elect, Trump launched into a Twitter fight with the company and its chief executive, Dennis Muilenburg, over the cost of a new fleet of presidential airplanes that would be used as Air Force One. Quickly, Boeing relented, promising to bring down the plane’s costs after meetings with Trump.

Less than a month into his presidency, Trump is back to Boeing on a decidedly more positive note.

“That plane, as beautiful as it looks, is 30 years old,” Trump said, pointing to the Boeing 747 that serves as Air Force One. “What can look so beautiful at 30?”

The turnabout is emblematic of Trump’s preferred mode of dealing with America’s largest and most powerful businesses. It reflects the degree to which Trump has already changed the terms of engagement with the business community, quickly creating an incentive structure where businesses are rewarded with praise from the highest office in the land when they roll out jobs or cost savings for taxpayers — and credit him for influencing their decision-making.

Over the past several weeks, chief executives including Intel’s Brian Krzanich traveled to the White House to announce new American jobs, thanks to fresh “confidence” in the economy spurred by the new administration.

“They’re keeping and bringing thousands of jobs back to our country because the business climate, they know, has already changed,” Trump said, highlighting jobs announcements from automakers Ford, General Motors and Fiat Chrysler. “We will see more and more of that across the country as we continue to work on reducing regulations, cutting taxes — including for the middle class, including for everyone, and including for businesses.”

In this setting, Trump seems at his most comfortable.

Here, Trump reveled in his electoral victory and the adulation of a supportive crowd in a state that he won in both the Republican primary and the general election.

“This was going to be a place that was tough to win, and we won in a landslide,” Trump declared.

As the restive crowd of Boeing employees waited for hours for Trump to arrive, some cheered when his name was mentioned in the preshow. “Make America Great Again” hats and T-shirts dotted the sea of people on the plant’s manufacturing floor where more than 5,000 employees were gathered.

He toured the new Dreamliner with Boeing executives and could be seen sitting in the plane’s cockpit after his speech.

On Saturday, Trump plans something of a repeat performance in what the White House is dubbing the first “campaign” event of his presidency, at an airplane hangar rally in Melbourne, Fla.

Among some Boeing employees, the reception to Trump was reserved, but optimistic.

Leif Anderson, who started working at the factory six years ago after leaving the Air Force, sat Thursday night at the bar at Domino Lounge, a pool hall three miles from the Boeing plant, smoking cigarillos and sipping a shot of Crown Royal apple whiskey alongside a glass of Bud Lite.

Anderson said he voted for Trump more out of loyalty to the Republican Party, but is “not jumping to conclusions” about the president as a leader.

“I’m really curious to see what he does,” said Anderson, who leads a group of workers at the Boeing plant installing the planes’ interiors. He hopes that Trump’s economic policies succeed, which he said would help his own career along with the country as a whole.

“If he does good, then I’m going to do good,” Anderson said.

Elliott Slater, a Boeing mechanic, took the day off Friday and did not attend Trump’s speech, saying he wanted to avoid the traffic.

“I didn’t vote for him, either.” said Slater, a veteran of the Navy. “He’s not my president. He’s got to earn my respect.”

Slater, who supported the union’s unsuccessful vote to organize the plant in Wednesday’s election, said that Trump would support companies over workers. “He’s definitely pro businesses, being a business man himself. … That’s fine, but you know, how does the business treat its workers?”

https://www.washingtonpost.com/news/post-politics/wp/2017/02/17/at-boeing-trump-returns-to-an-economic-message-after-a-week-of-controversy/?utm_term=.208a463653aa

Trump signs bill undoing Obama coal mining rule

Trump signs bill undoing Obama coal mining rule
Autoplay: On | Off

President Trump on Thursday signed legislation ending a key Obama administration coal mining rule.

The bill quashes the Office of Surface Mining’s Stream Protection Rule, a regulation to protect waterways from coal mining waste that officials finalized in December.

The legislation is the second Trump has signed into law ending an Obama-era environmental regulation. On Tuesday, he signed a Congressional Review Act (CRA) resolution undoing a financial disclosure requirement for energy companies.

Both the mining and financial disclosure bills are the tip of a GOP push to undo a slate of regulations instituted in the closing days of the Obama administration. The House has passed several CRA resolutions, and the Senate has so far sent three of them to President Trump for his signature.

Regulators finalized the stream protection rule in December, but they spent most of Obama’s tenure writing it.The rule is among the most controversial environment regulations the former administration put together. The coal mining industry said it would be costly to implement and lead to job losses across the sector, which is already suffering from a market-driven downturn in demand for its product.

At the signing, Trump called the regulation “another terrible job killing rule” and said ending it would save “many thousands American jobs, especially in the mines, which, I have been promising you — the mines are a big deal.”

“This is a major threat to your jobs and we’re going to get rid of this threat,” he added. “We’re going to fight for you.”

Republicans on Congress, especially from Appalachia, supported that argument and sought to block the rule several times before finally passing the CRA resolution this month.

“In my home state of Kentucky and others across the nation, the stream buffer rule will cause major damage to communities and threaten coal jobs,” Senate Majority Leader Mitch McConnell (R-Ky.) said before the bill passed. “We should heed their call now and begin bringing relief to coal country.”

Environmentalists supported the administration rule, saying it would protect waterways from pollution and preserve public health. They have criticized the GOP for repealing environmental rules in the name of supporting coal mining jobs, but doing little else to help displaced workers in mining areas.

“If you want to help miners, then come address their health and safety and their pension program,” Sen. Maria Cantwell (D-Wash.), the ranking member of the Energy and Natural Resources Committee, said during floor debate on the measure.

“You can protect the coal industry here with special interests and the amount of lobbying they do, or you can step up in a process and have a regulation that works for the United States of America so the outdoor industry and sportsman and fishermen can continue to thrive.”

The Senate this week sent Trump a CRA resolution blocking a gun sales regulation. Members could soon take up a measure undoing a methane rule for natural gas drilling operations on public land.

http://thehill.com/policy/energy-environment/319938-trump-signs-bill-undoing-obama-coal-mining-rule

Dan Coats Announced as Trump’s Pick for Director of National Intelligence

President-Elect Trump Goes on Tweetstorm for Better Russia Relations 1:38

President-elect Donald Trump intends to nominate former Indiana Sen. Dan Coats to serve as national intelligence director, his transition team announced Saturday.

Coats, would need to be confirmed by Senate for the role, served eight years in the House of Representatives and two years in the Senate. During the George W. Bush administration, he served as U.S. ambassador to Germany.

“I’m very confident that Senator Dan Coats is the right choice to serve as Director of National Intelligence,” President-elect Trump said in a statement. “Dan has clearly demonstrated the deep subject matter expertise and sound judgment required to lead our intelligence community.”

As director of national intelligence, Coats would serve as the head of the United States’ intelligence community and be the president’s principal adviser on the issue.

Image: Trump to name Dan Coats as Director of national intelligence
Indiana Senator Dan Coats speaks briefly with the press following his meeting with US President-elect Donald Trump at Trump Tower in New York, New York, USA, 30 November 2016 AALBIN LOHR-JONES / POOL / EPA

Coats will succeed James Clapper, who recently testified in front of Congress that Russia had stepped up its cyber espionage operation in an attempt to undermine the election. A redacted report about the hack and its goals was released on Friday.

First elected to the Senate in 1990 in a special election that filled the seat vacated by Dan Quayle — who departed the Senate to serve as George H. W. Bush’s vice president — Coats won reelection in 1992 before retiring from the Senate in 1998. He then was nominated to serve as U.S. ambassador to Germany in 2001, arriving there mere days before the Sept. 11 terrorism attack.

After departing as ambassador four years later, Coats worked as a prominent lobbyist in Washington D.C. and then decided to run for his former Senate seat in 2010 — an election he won.

Coats again announced his retirement from government in November 2015.

Most recently while in the Senate, Coats served as the chairman of the Joint Economic Committee and as a member of the Senate Committee on Finance and the Senate Select Committee on Intelligence.

“If confirmed as Director of National Intelligence, he will provide unwavering leadership that the entire intelligence community can respect, and will spearhead my administration’s ceaseless vigilance against those who seek to do us harm,” Trump added in his statement.

“I’m pleased to hear the President-elect has nominated my colleague and friend Dan Coats to be the next head of our Intelligence Community,” said Senator Richard Burr (R-NC), chairman of the Senate Select Committee on Intelligence. “Dan’s experience as a valued member of the Senate Intelligence Committee will help to guide him as the next Director of National Intelligence.”

In the past year as a senator, Coats has introduced six bills. Only two simple resolutions passed: The first recognized the 100th running of the Indianapolis 500 Mile Race and the other commemorated the bicentennial of the state of Indiana.

Coats will lead an intelligence community that already has a rocky relationship with the president-elect, as Trump has continued to float doubts about the community’s findings in the Russia hacking investigation.

While testifying before the Armed Services Committee, Clapper stopped short of calling Russia’s interference in the election an act of war, saying that was something for lawmakers to discern.

However, the committee’s chairman, John McCain (R-AZ), maintained that the attack was alarming.

“Every American should be alarmed by Russia’s attacks on our nation. There is no national security interest more vital to the United States of America than the ability to hold free and fair elections without foreign interference,” McCain said in his opening statement during the hearing. “That is why Congress must set partisanship aside, follow the facts, and work together to devise comprehensive solutions to deter, defend against, and, when necessary, respond to foreign cyberattacks.”

On Twitter, Donald Trump seemed more concerned with the intelligence community’s findings that pertained to the legitimacy of his election rather than Russia’s involvement.

Having a good relationship with Russia is a good thing, not a bad thing. Only “stupid” people, or fools, would think that it is bad! We…..

The president-elect has maintained a belief that the United States should “move on” from the attack, adding on Saturday that the country will have a good relationship and will work together with Russia under his administration.

http://www.nbcnews.com/news/us-news/dan-coats-announced-trump-s-pick-director-national-intelligence-n704231

CNN’s Jeff Zucker on Covering Donald Trump — Past, Present, and Future

By Gabriel Sherman

At his press conference last week, President-elect Trump refused to take a question from CNN reporter Jim Acosta, denouncing the network as a purveyor of “fake news.” Trump’s ire was in response to CNN’s explosive report that U.S. intelligence chiefs had briefed Trump on claims that the Kremlin had collected compromising information on him. In the wake of CNN’s report, BuzzFeed published the unedited, and unverified, opposition-research dossier referenced in the intel briefing, which included lurid allegations about Trump’s behavior and his campaign’s ties to Russia.

On Tuesday morning, I sat down with CNN Worldwide president Jeff Zucker for a wide-ranging discussion about that controversial scoop, Trump’s threat to press freedom, and why he’s not worried about losing access to the White House.

After Trump attacked CNN for reporting on the intelligence chiefs’ briefing on the Russian dossier, you issued a strongly worded statement defending your story. What made CNN decide to publish reporting on the existence of the dossier?
I actually think this was a pretty easy call in terms of its news value. The fact is, the top four intelligence chiefs of the United States decided to include in their briefing to the president and president-elect a two-page summary of allegations involving the president-elect. That is newsworthy by any definition.

Even if the allegations themselves weren’t verified?
We didn’t pass judgment on the allegations. We reported we had not been able to corroborate them. But the news was that the two most powerful people in the world had been briefed on the existence of these allegations.

I was at the press conference at Trump Tower, where Trump’s incoming press secretary Sean Spicer and Trump himself denounced CNN and BuzzFeed as fake news. What do you think of BuzzFeed’s decision to publish the complete dossier?
They made a decision for themselves, and they have to live with it. I’m not going to pass judgment on their decision. We did not think it was appropriate for us given that we had not been able to corroborate the allegations.

It’s just unfortunate that the most powerful person in the world is trying to delegitimizejournalism.

When you have the president-elect saying, “Don’t trust CNN, it’s fake news,” is that harmful?
It’s just unfortunate that the most powerful person in the world is trying to delegitimize journalism and an organization that plays such a vital role in our democracy. I think he’s entitled to his opinion, but it’s — to use one of his favorite words — sad.

Over the weekend, it was reported that Trump is considering moving reporters out of the West Wing. How worried are you about Trump’s attacks on the press?
As Tim Russert said, the role of the media is the accountability of government. I think the press plays a much more important role in this administration. Their willingness and inclination to cherry-pick facts, conflate and inflate things, will make covering this administration very challenging. That means our role is more important than ever. We think that CNN has a job to do, which is to hold their feet to the fire. They may not like it, but they should respect it.

Acosta didn’t get to ask a question at last week’s press conference. The first question went to Fox News, and Breitbart got to ask a question. Are you concerned about getting access to Trump?
I think the era of access journalism as we’ve known it is over. It doesn’t worry me that Donald Trump hasn’t done an interview with CNN in eight months. I think our credibility is higher than ever, and our viewership is higher than ever, and our reporting is as strong as ever. One of the things I think this administration hasn’t figured out yet is that there’s only one television network that is seen in Beijing, Moscow, Seoul, Tokyo, Pyongyang, Baghdad, Tehran, and Damascus — and that’s CNN. The perception of Donald Trump in capitals around the world is shaped, in many ways, by CNN. Continuing to have an adversarial relationship with that network is a mistake.

Wouldn’t Trump say that’s what Twitter is for? He can shape his own perception.
If he’s relying on Twitter to shape his own perception in the capitals of the world then I think he’s making a big mistake.

How does CNN plan to cover Trump’s tweets?
I think we should look at his tweets on a case-by-case basis, just like we’d look at the comments of any president, and make an editorial decision on which ones to report, discuss, and cover. So I don’t think we should knee-jerk-cover every tweet just as we didn’t knee-jerk-cover every comment Barack Obama made. We should use our editorial judgment.

I noticed that Trump is sitting down with Fox & Friends. And in recent days, he’s given interviews to The Wall Street Journal and the Times of London, both Murdoch papers. What do you think of Trump’s alliance with Murdoch?
I think you’re trying to goad me here. But you’ve made the right observation. Look, I don’t think it’s any coincidence that friendly outlets have been the ones that have ended up with the interviews with Donald Trump. Fox News, The Wall Street Journal, the Times of London — the fact that they’re all Rupert’s publications — I don’t think it’s any coincidence those are the outlets that ended up with the interviews.

It was reported that MSNBC’s Joe Scarborough and Mika Brzezinski were at Mar-a-Lago on New Year’s Eve. They said it was because they were trying to get an interview with Trump. Was it appropriate for journalists to attend the president-elect’s private party?
I think in that case, optically, it would have been a lot better to have just made a phone call and ask for the interview.

Trump’s feud with CNN is ironic, in a way, because you have perhaps more history with him than any media executive. Some people say you made Trump’s presidential run possible with The Apprentice. Did you?
It’s true I put him on television with The Apprentice in 2004. I’ve never run away from that. But in no way do I think that’s why he’s the president. You have to give the guy credit. He ran a campaign that worked.

So you don’t ever regret that the Trump phenomenon arguably started with you?
No. Listen, I don’t regret putting The Apprentice on television.

Another irony of the current antagonism is that CNN has sometimes been perceived as being too close to Trump. You got a lot of flak for covering his speeches in full during the primaries and for hiring his former campaign chairman Corey Lewandowski. What do you think of the criticism?
We didn’t bend over backward for Trump; we did what we felt was in the best interest of our viewers and readers to understand the story. The reason we hired a number of voices to reflect the Trump point of view was to help the audience understand who he was, where he was coming from, and what he was thinking. Given the results of the election, it turns out we were exactly right to do so. We had a much better sense on our air what the Trump point of view was than most others.

Were you in touch with Trump regularly throughout the campaign?
Obviously we’ve known each other for a long time. Just because I’ve known somebody for more than 15 years doesn’t mean they get a pass.

So how often did you talk to him?
Probably once a month?

Do you still talk to him?
I haven’t talked to him in more than a month.

Some criticized the Ivanka Trump special that aired on CNN as an effort to curry favor with the White House. Was it?
I don’t think we’re the only news organization that did a profile of Ivanka Trump. That’s silly. Let’s remember the stories we’ve broken in the last week: the original story on the intelligence briefing; the fact that Monica Crowley was a plagiarist; the fact that Congressman Price may have broken the law on his stocks; the fact that Trump’s pick for Labor was having second thoughts … All those stories were broken by CNN. Tell me another news organization that’s broken more news on Donald Trump in the last week? Please.

Your corporate owner Time Warner is currently going through an $85 billion merger with telecom giant AT&T. Trump has suggested he may try to block the deal because it would concentrate too much media power in one company. Have you spoken with Time Warner CEO Jeff Bewkes about that?
No. It’s one of the things I respect about Time Warner and Turner: their understanding of CNN’s independence. There’s been absolutely no conversations or anything of the sort between us and Time Warner.

Some have suggested that CNN might have to be spun off in order to have the deal approved by Trump’s Justice Department. Are you worried about that?
No.

You had the biggest night in cable-news history on Election Night, 13 million viewers. What’s your plan to maintain ratings in 2017?
Our viewership continues to be significantly higher than it was a year ago and frankly much higher than we expected it to be. There’s been no evidence of any falloff at all. I think people are coming to us because they know we’ll report both sides of the story. We expected we’d be down 25 percent from last year because you had all the election nights, debates, and conventions, but if the first three weeks of this year are any indication, I’m not so sure it will be down that much.

In December, the Drudge Report reported you were wooing Megyn Kelly. Did you try to hire her?
I had one conversation with Megyn about coming to CNN in prime time. It never got serious, it never got real.

What do you think of her move to NBC?
I wish her nothing but success. I think NBC News is a great fit for her and she’ll be a big star there.

During the Bush years, MSNBC saw its ratings skyrocket by being the voice of opposition. Since Election Day, MSNBC has held on to much of its election-year audience, suggesting the network might enjoy similar success during the Trump years. What’s your assessment of MSNBC?
I think all of the cable-news networks are healthy and vibrant and at a good place in the history of cable news. In terms of audience, there’s a clear No. 1, a clear No. 2, and a clear No. 3. In terms of reporting and breaking news, there’s only one true cable-news network.

So, what would be the best scoop now? If CNN got Trump’s tax returns would you report them?
If we could verify they were real and legitimate, just like any other news organization, we would report on them. Sure.

* This interview has been lightly edited for clarity and length.

** Disclosure: I am an MSNBC contributor.

http://nymag.com/daily/intelligencer/2017/01/cnns-zucker-on-covering-trump-past-present-and-future.html

The Reason Why There Are More Leaks Traced To Former President Obama and Violating American Citizens Right To Privacy Under The Fourth Amendment To U.S. Constitution

WASHINGTON — In its final days, the Obama administration has expanded the power of the National Security Agency to share globally intercepted personal communications with the government’s 16 other intelligence agencies before applying privacy protections.

The new rules significantly relax longstanding limits on what the N.S.A. may do with the information gathered by its most powerful surveillance operations, which are largely unregulated by American wiretapping laws. These include collecting satellite transmissions, phone calls and emails that cross network switches abroad, and messages between people abroad that cross domestic network switches.

The change means that far more officials will be searching through raw data. Essentially, the government is reducing the risk that the N.S.A. will fail to recognize that a piece of information would be valuable to another agency, but increasing the risk that officials will see private information about innocent people.

Attorney General Loretta E. Lynch signed the new rules, permitting the N.S.A. to disseminate “raw signals intelligence information,” on Jan. 3, after the director of national intelligence, James R. Clapper Jr., signed them on Dec. 15, according to a 23-page, largely declassified copy of the procedures.

Previously, the N.S.A. filtered information before sharing intercepted communications with another agency, like the C.I.A. or the intelligence branches of the F.B.I. and the Drug Enforcement Administration. The N.S.A.’s analysts passed on only information they deemed pertinent, screening out the identities of innocent people and irrelevant personal information.

Now, other intelligence agencies will be able to search directly through raw repositories of communications intercepted by the N.S.A. and then apply such rules for “minimizing” privacy intrusions.

“This is not expanding the substantive ability of law enforcement to get access to signals intelligence,” said Robert S. Litt, the general counsel to Mr. Clapper. “It is simply widening the aperture for a larger number of analysts, who will be bound by the existing rules.”

But Patrick Toomey, a lawyer for the American Civil Liberties Union, called the move an erosion of rules intended to protect the privacy of Americans when their messages are caught by the N.S.A.’s powerful global collection methods. He noted that domestic internet data was often routed or stored abroad, where it may get vacuumed up without court oversight.

“Rather than dramatically expanding government access to so much personal data, we need much stronger rules to protect the privacy of Americans,” Mr. Toomey said. “Seventeen different government agencies shouldn’t be rooting through Americans’ emails with family members, friends and colleagues, all without ever obtaining a warrant.”

The N.S.A. has been required to apply similar privacy protections to foreigners’ information since early 2014, an unprecedented step that President Obama took after the disclosures of N.S.A. documents by the former intelligence contractor Edward J. Snowden. The other intelligence agencies will now have to follow those rules, too.

Under the new system, agencies will ask the N.S.A. for access to specific surveillance feeds, making the case that they contain information relevant and useful to their missions. The N.S.A. will grant requests it deems reasonable after considering factors like whether large amounts of Americans’ private information might be included and, if so, how damaging or embarrassing it would be if that information were “improperly used or disclosed.”

The move is part of a broader trend of tearing down bureaucratic barriers to sharing intelligence between agencies that dates back to the aftermath of the terrorist attacks of Sept. 11, 2001. In 2002, the Foreign Intelligence Surveillance Court secretly began permitting the N.S.A., the F.B.I. and the C.I.A. to share raw intercepts gathered domestically under the Foreign Intelligence Surveillance Act.

After Congress enacted the FISA Amendments Act — which legalized warrantless surveillance on domestic soil so long as the target is a foreigner abroad, even when the target is communicating with an American — the court permitted raw sharing of emails acquired under that program, too.

In July 2008, the same month Congress passed the FISA Amendments Act, President George W. Bush modified Executive Order 12333, which sets rules for surveillance that domestic wiretapping statutes do not address, including techniques that vacuum up vast amounts of content without targeting anybody.

After the revision, Executive Order 12333 said the N.S.A. could share the raw fruits of such surveillance after the director of national intelligence and the attorney general, coordinating with the defense secretary, agreed on procedures. It took another eight years to develop those rules.

The Times first reported the existence of those deliberations in 2014 and later filed a Freedom of Information Act lawsuit for documents about them. It ended that case last February, and Mr. Litt discussed the efforts in an interview at that time, but declined to divulge certain important details because the rules were not yet final or public.

Among the most important questions left unanswered in February was when analysts would be permitted to use Americans’ names, email addresses or other identifying information to search a 12333 database and pull up any messages to, from or about them that had been collected without a warrant.

There is a parallel debate about the FISA Amendments Act’s warrantless surveillance program. National security analysts sometimes search that act’s repository for Americans’ information, as do F.B.I. agents working on ordinary criminal cases. Critics call this the “backdoor search loophole,” and some lawmakers want to require a warrant for such searches.

By contrast, the 12333 sharing procedures allow analysts, including those at the F.B.I., to search the raw data using an American’s identifying information only for the purpose of foreign intelligence or counterintelligence investigations, not for ordinary criminal cases. And they may do so only if one of several other conditions are met, such as a finding that the American is an agent of a foreign power.

However, under the rules, if analysts stumble across evidence that an American has committed any crime, they will send it to the Justice Department.

The limits on using Americans’ information gathered under Order 12333 do not apply to metadata: logs showing who contacted whom, but not what they said. Analysts at the intelligence agencies may study social links between people, in search of hidden associates of known suspects, “without regard to the location or nationality of the communicants.”

WASHINGTON — The Obama administration is on the verge of permitting the National Security Agency to share more of the private communications it intercepts with other American intelligence agencies without first applying any privacy protections to them, according to officials familiar with the deliberations.

The change would relax longstanding restrictions on access to the contents of the phone calls and email the security agency vacuums up around the world, including bulk collection of satellite transmissions, communications between foreigners as they cross network switches in the United States, and messages acquired overseas or provided by allies.

The idea is to let more experts across American intelligence gain direct access to unprocessed information, increasing the chances that they will recognize any possible nuggets of value. That also means more officials will be looking at private messages — not only foreigners’ phone calls and emails that have not yet had irrelevant personal information screened out, but also communications to, from, or about Americans that the N.S.A.’s foreign intelligence programs swept in incidentally.

Civil liberties advocates criticized the change, arguing that it will weaken privacy protections. They said the government should disclose how much American content the N.S.A. collects incidentally — which agency officials have said is hard to measure — and let the public debate what the rules should be for handling that information.

“Before we allow them to spread that information further in the government, we need to have a serious conversation about how to protect Americans’ information,” said Alexander Abdo, an American Civil Liberties Union lawyer.

Robert S. Litt, the general counsel in the office of the Director of National Intelligence, said that the administration had developed and was fine-tuning what is now a 21-page draft set of procedures to permit the sharing.

The goal for the final rules, Brian P. Hale, a spokesman for the office, said in a statement, is “to ensure that they protect privacy, civil liberties and constitutional rights while enabling the sharing of information that is important to protect national security.”

Until now, National Security Agency analysts have filtered the surveillance information for the rest of the government. They search and evaluate the information and pass only the portions of phone calls or email that they decide is pertinent on to colleagues at the Central Intelligence Agency, the Federal Bureau of Investigation and other agencies. And before doing so, the N.S.A. takes steps to mask the names and any irrelevant information about innocent Americans.

The new system would permit analysts at other intelligence agencies to obtain direct access to raw information from the N.S.A.’s surveillance to evaluate for themselves. If they pull out phone calls or email to use for their own agency’s work, they would apply the privacy protections masking innocent Americans’ information — a process known as “minimization” — at that stage, Mr. Litt said.

Executive branch officials have been developing the new framework and system for years. President George W. Bush set the change in motion through a little-noticed line in a 2008 executive order, and the Obama administration has been quietly developing a framework for how to carry it out since taking office in 2009.

The executive branch can change its own rules without going to Congress or a judge for permission because the data comes from surveillance methods that lawmakers did not include in the main law that governs national security wiretapping, the Foreign Intelligence Surveillance Act, or FISA.

FISA covers a narrow band of surveillance: the collection of domestic or international communications from a wire on American soil, leaving most of what the N.S.A. does uncovered. In the absence of statutory regulation, the agency’s other surveillance programs are governed by rules the White House sets under a Reagan-era directive called Executive Order 12333.

Mr. Litt declined to make available a copy of the current draft of the proposed procedures.

“Once these procedures are final and approved, they will be made public to the extent consistent with national security,” Mr. Hale said. “It would be premature to draw conclusions about what the procedures will provide or authorize until they are finalized.”

Among the things they would not address is what the draft rules say about searching the raw data using names or keywords intended to bring up Americans’ phone calls or email that the security agency gathered “incidentally” under the 12333 surveillance programs — including whether F.B.I. agents may do so when working on ordinary criminal investigations.

Under current rules for data gathered under a parallel program — the no-warrant surveillance program governed by the FISA Amendments Act — N.S.A. and C.I.A. officials may search for Americans’ information only if their purpose is to find foreign intelligence, but F.B.I. agents may conduct such a search for intelligence or law enforcement purposes. Some lawmakers have proposed requiring the government to obtain a warrant before conducting such a search.

In 2013, The Washington Post reported, based on documents leaked by the former intelligence contractor Edward J. Snowden, that the N.S.A. and its British counterpart, Government Communications Headquarters, had tapped into links connecting Google’s and Yahoo’s data centers overseas and that the American spy agency had collected millions of records a day from them. The companies have since taken steps to encrypt those links.

That collection occurred under 12333 rules, which had long prohibited the N.S.A. from sharing raw information gathered from the surveillance it governed with other members of the intelligence community before minimization. The same rule had also long applied to sharing information gathered with FISA wiretaps.

But after the attacks of Sept. 11, 2001, the Bush administration began an effort to tear down barriers that impeded different parts of the government from working closely and sharing information, especially about terrorism.

In 2002, for example, it won permission, then secret, from the intelligence court permitting the C.I.A., the F.B.I. and the N.S.A. to share raw FISA wiretap information. The government did not disclose that change, which was first reported in a 2014 New York Times article based on documents disclosed by Mr. Snowden.

In August 2008, Mr. Bush change d 12333 to permit the N.S.A. to share unevaluated surveillance information with other intelligence agencies once procedures were developed.

Intelligence officials began working in 2009 on how the technical system and rules would work, Mr. Litt said, eventually consulting the Defense and Justice Departments. This month, the administration briefed the Privacy and Civil Liberties Oversight Board, an independent five-member watchdog panel, seeking input. Before they go into effect, they must be approved by James R. Clapper, the intelligence director; Loretta E. Lynch, the attorney general; and Ashton B. Carter, the defense secretary.

“We would like it to be completed sooner rather than later,” Mr. Litt said. “Our expectation is months rather than weeks or years.”

The Pronk Pops Show Podcasts Portfolio

Listen To Pronk Pops Podcast or Download Shows 840-841

Listen To Pronk Pops Podcast or Download Shows 833-839

Listen To Pronk Pops Podcast or Download Shows 827-832

Listen To Pronk Pops Podcast or Download Shows 821-826

Listen To Pronk Pops Podcast or Download Shows 815-820

Listen To Pronk Pops Podcast or Download Shows 806-814

Listen To Pronk Pops Podcast or Download Shows 800-805

Listen To Pronk Pops Podcast or Download Shows 793-799

Listen To Pronk Pops Podcast or Download Shows 785-792

Listen To Pronk Pops Podcast or Download Shows 777-784

Listen To Pronk Pops Podcast or Download Shows 769-776

Listen To Pronk Pops Podcast or Download Shows 759-768

Listen To Pronk Pops Podcast or Download Shows 751-758

Listen To Pronk Pops Podcast or Download Shows 745-750

Listen To Pronk Pops Podcast or Download Shows 738-744

Listen To Pronk Pops Podcast or Download Shows 732-737

Listen To Pronk Pops Podcast or Download Shows 727-731

Listen To Pronk Pops Podcast or Download Shows 720-726

Listen To Pronk Pops Podcast or DownloadShows 713-719

Listen To Pronk Pops Podcast or DownloadShows 705-712

Listen To Pronk Pops Podcast or Download Shows 695-704

Listen To Pronk Pops Podcast or Download Shows 685-694

Listen To Pronk Pops Podcast or Download Shows 675-684

Listen To Pronk Pops Podcast or Download Shows 668-674

Listen To Pronk Pops Podcast or Download Shows 660-667

Listen To Pronk Pops Podcast or Download Shows 651-659

Listen To Pronk Pops Podcast or Download Shows 644-650

Listen To Pronk Pops Podcast or Download Shows 637-643

Listen To Pronk Pops Podcast or Download Shows 629-636

Listen To Pronk Pops Podcast or Download Shows 617-628

Listen To Pronk Pops Podcast or Download Shows 608-616

Listen To Pronk Pops Podcast or Download Shows 599-607

Listen To Pronk Pops Podcast or Download Shows 590-598

Listen To Pronk Pops Podcast or Download Shows 585- 589

Listen To Pronk Pops Podcast or Download Shows 575-584

Listen To Pronk Pops Podcast or Download Shows 565-574

Listen To Pronk Pops Podcast or Download Shows 556-564

Listen To Pronk Pops Podcast or Download Shows 546-555

Listen To Pronk Pops Podcast or Download Shows 538-545

Listen To Pronk Pops Podcast or Download Shows 532-537

Listen To Pronk Pops Podcast or Download Shows 526-531

Listen To Pronk Pops Podcast or Download Shows 519-525

Listen To Pronk Pops Podcast or Download Shows 510-518

Listen To Pronk Pops Podcast or Download Shows 500-509

Listen To Pronk Pops Podcast or Download Shows 490-499

Listen To Pronk Pops Podcast or Download Shows 480-489

Listen To Pronk Pops Podcast or Download Shows 473-479

Listen To Pronk Pops Podcast or Download Shows 464-472

Listen To Pronk Pops Podcast or Download Shows 455-463

Listen To Pronk Pops Podcast or Download Shows 447-454

Listen To Pronk Pops Podcast or Download Shows 439-446

Listen To Pronk Pops Podcast or Download Shows 431-438

Listen To Pronk Pops Podcast or Download Shows 422-430

Listen To Pronk Pops Podcast or Download Shows 414-421

Listen To Pronk Pops Podcast or Download Shows 408-413

Listen To Pronk Pops Podcast or Download Shows 400-407

Listen To Pronk Pops Podcast or Download Shows 391-399

Listen To Pronk Pops Podcast or Download Shows 383-390

Listen To Pronk Pops Podcast or Download Shows 376-382

Listen To Pronk Pops Podcast or Download Shows 369-375

Listen To Pronk Pops Podcast or Download Shows 360-368

Listen To Pronk Pops Podcast or Download Shows 354-359

Listen To Pronk Pops Podcast or Download Shows 346-353

Listen To Pronk Pops Podcast or Download Shows 338-345

Listen To Pronk Pops Podcast or Download Shows 328-337

Listen To Pronk Pops Podcast or Download Shows 319-327

Listen To Pronk Pops Podcast or Download Shows 307-318

Listen To Pronk Pops Podcast or Download Shows 296-306

Listen To Pronk Pops Podcast or Download Shows 287-295

Listen To Pronk Pops Podcast or Download Shows 277-286

Listen To Pronk Pops Podcast or Download Shows 264-276

Listen To Pronk Pops Podcast or Download Shows 250-263

Listen To Pronk Pops Podcast or Download Shows 236-249

Listen To Pronk Pops Podcast or Download Shows 222-235

Listen To Pronk Pops Podcast or Download Shows 211-221

Listen To Pronk Pops Podcast or Download Shows 202-210

Listen To Pronk Pops Podcast or Download Shows 194-201

Listen To Pronk Pops Podcast or Download Shows 184-193

Listen To Pronk Pops Podcast or Download Shows 174-183

Listen To Pronk Pops Podcast or Download Shows 165-173

Listen To Pronk Pops Podcast or Download Shows 158-164

Listen To Pronk Pops Podcast or Download Shows151-157

Listen To Pronk Pops Podcast or Download Shows 143-150

Listen To Pronk Pops Podcast or Download Shows 135-142

Listen To Pronk Pops Podcast or Download Shows 131-134

Listen To Pronk Pops Podcast or Download Shows 124-130

Listen To Pronk Pops Podcast or Download Shows 121-123

Listen To Pronk Pops Podcast or Download Shows 118-120

Listen To Pronk Pops Podcast or Download Shows 113 -117

Listen To Pronk Pops Podcast or Download Show 112

Listen To Pronk Pops Podcast or Download Shows 108-111

Listen To Pronk Pops Podcast or Download Shows 106-108

Listen To Pronk Pops Podcast or Download Shows 104-105

Listen To Pronk Pops Podcast or Download Shows 101-103

Listen To Pronk Pops Podcast or Download Shows 98-100

Listen To Pronk Pops Podcast or Download Shows 94-97

Listen To Pronk Pops Podcast or Download Show 93

Listen To Pronk Pops Podcast or Download Show 92

Listen To Pronk Pops Podcast or Download Show 91

Listen To Pronk Pops Podcast or Download Shows 88-90

Listen To Pronk Pops Podcast or Download Shows 84-87

Listen To Pronk Pops Podcast or Download Shows 79-83

Listen To Pronk Pops Podcast or Download Shows 74-78

Listen To Pronk Pops Podcast or Download Shows 71-73

Listen To Pronk Pops Podcast or Download Shows 68-70

Listen To Pronk Pops Podcast or Download Shows 65-67

Listen To Pronk Pops Podcast or Download Shows 62-64

Listen To Pronk Pops Podcast or Download Shows 58-61

Listen To Pronk Pops Podcast or Download Shows 55-57

Listen To Pronk Pops Podcast or Download Shows 52-54

Listen To Pronk Pops Podcast or Download Shows 49-51

Listen To Pronk Pops Podcast or Download Shows 45-48

Listen To Pronk Pops Podcast or Download Shows 41-44

Listen To Pronk Pops Podcast or Download Shows 38-40

Listen To Pronk Pops Podcast or Download Shows 34-37

Listen To Pronk Pops Podcast or Download Shows 30-33

Listen To Pronk Pops Podcast or Download Shows 27-29

Listen To Pronk Pops Podcast or Download Shows 17-26

Listen To Pronk Pops Podcast or Download Shows 16-22

Listen To Pronk Pops Podcast or Download Shows 10-15

Listen To Pronk Pops Podcast or Download Shows 1-9

Advertisements
Read Full Post | Make a Comment ( None so far )

The Pronk Pops Show 559, October 22, 2015, Story 1: House Select Committee investigating Benghazi — The Unintended Consequences Of President Obama’s Undeclared War on Libya and Central Intelligence Agency Covert Operations in Libya and Syria — Congress Did Nothing To Stop An Imperial President — The Lying and Blame Game On Display — “Disgusting and Reprehensible” — Videos

Posted on October 22, 2015. Filed under: 2016 Presidential Campaign, 2016 Presidential Candidates, American History, Benghazi, Blogroll, Bombs, Communications, Congress, Constitutional Law, Corruption, Crime, Cruise Missiles, Defense Spending, Disasters, Drones, Employment, Energy, European History, Federal Government, Government, Government Spending, High Crimes, Hillary Clinton, History, Homicide, House of Representatives, Illegal Immigration, Immigration, Impeachment, Independence, Law, Legal Immigration, Media, Middle East, MIssiles, Natural Gas, News, Nuclear, Nuclear Weapons, Obama, Oil, Philosophy, Photos, Pistols, Politics, Polls, Radio, Rand Paul, Raymond Thomas Pronk, Resources, Rifles, Scandals, Security, Senate, Spying, Success, Technology, Terror, Terrorism, Videos, Violence, War, Wealth, Weapons, Weapons of Mass Destruction, Wisdom | Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , |

Project_1

The Pronk Pops Show Podcasts

Pronk Pops Show 559: October 22, 2015 

Pronk Pops Show 558: October 21, 2015

Pronk Pops Show 557: October 20, 2015 

Pronk Pops Show 556: October 19, 2015

Pronk Pops Show 555: October 16, 2015

Pronk Pops Show 554: October 15, 2015 

Pronk Pops Show 553: October 14, 2015

Pronk Pops Show 552: October 13, 2015 

Pronk Pops Show 551: October 12, 2015 

Pronk Pops Show 550: October 9, 2015 

Pronk Pops Show 549: October 8, 2015 

Pronk Pops Show 548: October 7, 2015 

Pronk Pops Show 547: October 5, 2015

Pronk Pops Show 546: October 2, 2015 

Pronk Pops Show 545: October 1, 2015 

Pronk Pops Show 544: September 30, 2015 

Pronk Pops Show 543: September 29, 2015 

Pronk Pops Show 542: September 28, 2015 

Pronk Pops Show 541: September 25, 2015 

Pronk Pops Show 540: September 24, 2015 

Pronk Pops Show 539: September 23, 2015 

Pronk Pops Show 538: September 22, 2015 

Pronk Pops Show 537: September 21, 2015 

Pronk Pops Show 536: September 18, 2015 

Pronk Pops Show 535: September 17, 2015 

Pronk Pops Show 534: September 16, 2015 

Pronk Pops Show 533: September 15, 2015  

Pronk Pops Show 532: September 14, 2015 

Pronk Pops Show 531: September 11, 2015

Pronk Pops Show 530: September 10, 2015 

Pronk Pops Show 529: September 9, 2015 

Pronk Pops Show 528: September 8, 2015 

Pronk Pops Show 527: September 4, 2015 

Pronk Pops Show 526: September 3, 2015  

Pronk Pops Show 525: September 2, 2015 

Pronk Pops Show 524: August 31, 2015  

Pronk Pops Show 523: August 27, 2015  

Pronk Pops Show 522: August 26, 2015 

Pronk Pops Show 521: August 25, 2015 

Pronk Pops Show 520: August 24, 2015 

Pronk Pops Show 519: August 21, 2015 

Pronk Pops Show 518: August 20, 2015  

Pronk Pops Show 517: August 19, 2015 

Pronk Pops Show 516: August 18, 2015

Pronk Pops Show 515: August 17, 2015

Pronk Pops Show 514: August 14, 2015

Pronk Pops Show 513: August 13, 2015

Pronk Pops Show 512: August 12, 2015

Pronk Pops Show 511: August 11, 2015

Pronk Pops Show 510: August 10, 2015

Pronk Pops Show 509: July 24, 2015

Pronk Pops Show 508: July 20, 2015

Pronk Pops Show 507: July 17, 2015

Pronk Pops Show 506: July 16, 2015

Pronk Pops Show 505: July 15, 2015

Pronk Pops Show 504: July 14, 2015

Pronk Pops Show 503: July 13, 2015

Pronk Pops Show 502: July 10, 2015

Pronk Pops Show 501: July 9, 2015

Pronk Pops Show 500: July 8, 2015

Pronk Pops Show 499: July 6, 2015

Pronk Pops Show 498: July 2, 2015

Pronk Pops Show 497: July 1, 2015

Story 1: House Select Committee investigating Benghazi — The Unintended Consequences Of President Obama’s Undeclared War on Libya and Central Intelligence Agency Covert Operations in Libya and Syria — Congress Did Nothing To Stop An Imperial President — The Lying and Blame Game On Display — “Disgusting and Reprehensible” — Videos

benghazi-four obama_hillary_liars_benghazi_treason

Background Information

Obama and Hillary Blame Youtube Video for Benghazi Terrorist Attack as Coffins Arrive

Our Fallen Heroes

Published on Sep 15, 2012

President Obama speaks about the tragic loss of four of our fellow Americans who were serving in our diplomatic post in Benghazi, Libya. These Americans represented the best of our country; without people like them, we could not sustain our freedoms or security, or provide the leadership that the entire world depends on. During this time of turmoil in many different countries, the President makes it clear that the United States has a profound respect for people of all faiths, but as Commander in Chief, he will never tolerate efforts to harm our fellow Americans and will ensure that those who attack our people find no escape from justice.

Obama and Press Secretary Carney Blame a Video for the Benghazi Attack

YouTube Video Maker Blamed for Benghazi Attacks Breaks Silence on CNN

White House Covers Up Benghazi Terrorist Attack

13 hours in Benghazi FULL VERSION INTERVIEW 5 parts combined.

ABC News’ Jon Karl hammers Jay Carney over New bombshell Benghazi emails

Benghazi Whistleblower Embarrassed by Obama Admin Placing Blame on a YouTube Video

Benghazi Gate – Rand Paul and Hillary Clinton – Question & Answer

Email Reveals Obama Advisor Urged Susan Rice to Blame Video for Benghazi

Exclusive: Docs Show Weapons Going From Benghazi To Syria – Benghazi Gate – Happening Now

Breaking: Hillary Clinton Knew About Libyan Arms Shipments to Syria in 2011

Secretary of State Hillary Clinton knew that the US was sending arms from Libya to Syria back in 2011. She denied this during public testimony (under oath) in early 2013 after the Benghazi terrorist attack.

Melvin Goodman on why CIA Director Brennan is dangerous

The show is going to be about the response to CIA director Brennan’s press conference two weeks ago and then an appearance at the Council on Foreign Relations last week, an on the record interview with Charlie Rose in New York about his plans to restructure the CIA to try to bring a more integrity to intelligence and make it less politicized. We are going to hear from today Melvin Goodman. Goodman is a senior fellow at the Center for International Policy and a professor of government at Johns Hopkins University. He is he is a former CIA analyst. Melvin Goodman is the author of Failure of Intelligence: the Decline and Fall of the CIA and the forthcoming book On the Path to Dissent: A Whistleblower at the CIA. Goodman is the national security columnist for Counterpunch, and he said of CIA director ‘s plan to restructure the CIA and I quote “Simply, it takes the CIA further from Truman’s concept and closer to the ability to politicize intelligence. Operations are part of the policy world and not the intelligence world. The Centers have made it too easy to provide the intelligence that the ‘masters’ desire, whether they are the masters on CIA’s 7th floor or the policy masters. Brennan’s world was the Center for Counterintelligence and Counterterrorism, and many of the intelligence errors and operational errors of the past 15 years have emanated from those centers. Organizationally, it makes no sense — what are the directorates of operations and analysis — they sound as if they are HR experts.”

CNN Benghazi Claims: Report alleges CIA operatives in Libya were sending weapons to Syrian rebels

Retired Lt. Gen. Jerry Boykin suspects US Was Running Guns To Syrian Rebels Via Benghazi

Clinton Donors Got Weapons Deals From Hillary

Even by the standards of arms deals between the United States and Saudi Arabia, this one was enormous. A consortium of American defense contractors led by Boeing would deliver $29 billion worth of advanced fighter jets to the United States’ oil-rich ally in the Middle East…E

Why is Benghazi still a big issue for Hillary Clinton? BBC News

General Petraeus Testifies Before Congress For The First Time Since Resigning As Director Of CIA

Select Committee on Benghazi Holds First Hearing

Former CIA Director and General David Petraeus (Ret.) testified at a hearing on U.S. policy toward the Middle East and combating ISIS* in the region. He talked about his support for military enclaves in Syria and for greater military action against Syrian President Bashar al-Assad and ISIS. He also gave his assessment of the Russian military build-up in Syria and of the Iran nuclear agreement.

At the beginning of his testimony, General Petraeus apologized for what what he called his “serious mistake” of sharing classified information with his biographer, with whom he also had an extramarital affair.

Select Committee on Benghazi Holds Second Hearing

Select Committee on Benghazi Holds Third Hearing

Rep. Gowdy: Either Petraeus Will Come Before Congressional Committee Or He Will Be Subpoenaed



Benghazi Select Committee (Hearing 4)

House Select Committee on Benghazi

Trey Gowdy Opening Statement Benghazi Committee Hearing. 10/22/2015

Rep. Trey Gowdy addresses Former Secretary of State Hillary Clinton during his opening statement at a hearing Thursday by the House Select Committee on Benghazi. trey gowdy elivers opening statement of benghazi committee hearing with hillary clinton. trey gowdy says ‘We are going to find the #Truth because there is no expiration of it.’ Chairman Trey Gowdy opens #Benghazi hearing: ‘Previous investigations were not thorough. Trey Gowdy to Clinton: Trey Gowdy addressed former Secretary of State Hillary Clinton personally at a high-stakes hearing on Thursday, telling the Democratic presidential candidate that the panel’s investigation is not about her. “Madame Secretary, I understand some people — frankly in both parties — have suggested this investigation is about you,” Gowdy said. “Let me assure you it is not. And let me assure you why it is not. This work is about something much more important than any single person. It is about four U.S. government workers, including our Ambassador, murdered by terrorists on foreign soil. It is about what happened before, during, and after the attacks that killed these four men.” He continued: “It is about what this country owes those who risk their lives to serve it. It is about the fundamental obligation of our government to tell the truth — always — to the American people. Not a single member of this Committee signed up for an investigation into you or your email system. We signed up because we wanted to honor the service and sacrifice of four people sent to a foreign land to represent us – who were killed – and do everything we can to prevent it from happening to others.” Gowdy also presented several key questions he would be asking in his opening statement: Why were there so many requests for more security personnel and equipment, and why were those requests denied in Washington? Why did the State Department compound in Benghazi not even come close to meeting proper security specifications? What policies were we pursuing in Libya that required a physical presence in spite of the escalating violence? Who in Washington was aware of the escalating violence in Libya? What special precautions, if any, were taken on the anniversary of 9-11? What happened in Washington after the first attack and what was the response to that attack? What did the military do or not do? What did our leaders in Washington do or not do and when? Why was the American public given such divergent accounts of what caused these attacks? And why is it so hard to get information from the very government these four men were representing and serving and sacrificing for?

Benghazi panel chair: Investigation not about Hillary Clinton

South Carolina Rep. Trey Gowdy, the chairman of the House Select Committee investigating Benghazi, tells Hillary Clinton in his opening statement that the probe is not singularly focused on the former secretary of state.

Benghazi hearing: Hillary Clinton’s entire statement

Hillary Clinton gave her opening statement to the House Select Committee investigating the 2012 attacks at the U.S. Embassy in Benghazi, Libya.

Benghazi Hearing Committee Chairman on Hillary Clinton’s Emails | The New York Times

Trey Gowdy questions Hillary Clinton (Part 1)

Trey Gowdy questions Hillary Clinton (Part 2)

Clinton to panel: 3 things we learned from Benghazi

Trey Gowdy GRILLS Hillary Clinton Benghazi Committee Hearing

Trey Gowdy GRILLS Hillary Clinton during the Benghazi Committee Hearing. trey gowdy went off on hillary clinton about blumenthal and more. watch the explosive exchange. Hillary Clinton coolly hit back at her Republican interrogators on the Benghazi committee during her long-awaited testimony on Thursday, rebuffing claims she was detached as the situation in Libya deteriorated and asserting she did not use email to conduct the “vast majority” of her work as secretary of state.

The Democratic front-runner told the House Selection Committee on Benghazi, which is 18 months into its probe of the 2012 attacks on the consulate in Libya, that the tragedy does not deserve partisan attacks, while insisting the U.S. needs to stay committed to diplomatic engagement.

“Despite all the previous investigations and all the talk about partisan agendas, I’m here to honor those we lost and to do what I can to aid those who serve us still,” Clinton said, speaking slowly and deliberately during her opening statement. “My challenge to you, members of this committee, is the same challenge I put to myself…. Let’s be worthy of the trust the American people bestow on us… they expect us to rise above partisanship. And I hopes it’s what we’ll strive for today and in the future.”

Republicans questioned Clinton about why numerous requests for additional security never made it Clinton’s attention. She said they went to the right place: to personnel who handled security. And when they pressed her on why she kept the compound open or did not give it additional, she retorted that she never received a recommendation to shut down the mission—even after two attacks on the compound.

The hearing kicked off on Thursday with the partisan sniping that has been the hallmark of the committee’s work, with House Benghazi Committee Chairman Trey Gowdy defended his investigation, assuring Clinton that his probe is not centered on her.
Hour_2_151022_hillary_clinton_2_gty_1160­.jpg

WATCH LIVE: Hillary Clinton testifies before Benghazi Committee

“Madame Secretary, I understand some people — frankly in both parties — have suggested this investigation is about you. Let me assure you it is not,” Gowdy said in his opening statement, adding that it was about the people who were killed.

He also blamed her in part for the fact that the inquiry has dragged on for a year and a half.

The State Department only realized it did not have Clinton’s emails after they requested documents, triggering a lengthy process by which the department had to ask her and her top aides who also sometimes used private email for work purposes to turn them over.

“You had an unusual email arrangement with yourself, which meant the State Department could not produce your emails to us,” Gowdy said. “When you left the State Department you kept those public records to yourself for almost two years….Those decisions were your decisions, not ours… It just took longer to get them and garnered more attention in the process.

Ranking Democrat Elijah Cummings (D-Md.) blasted the committee as a partisan witch-hunt out to get Clinton, saying Republicans formed the panel because they “did not like the answers they got” in previous probe—“so they set up this select committee with no rules, no deadlines and a unlimited budget.”

“They set the noose because you’re running for president,” Cummings said, raising his voice before calling for the panel to disband. “It is time for Republicans to end this …fishing expedition.”

It only took Cummings a few minutes to highlight a number of embarrassing moments for Gowdy in recent weeks, including comments by Majority Leader Kevin McCarthy (R-Calif.), Rep. Richard Hanna (R-N.Y) and a fired GOP Benghazi investigator who all suggested the panel was either out to hurt Clinton or increasingly focused on investigating her.

REP. Martha Roby vs Hillary Clinton at House Select Committee on Benghazi 10/22/15

Rep Jim Jordan Goes After Hillary ‘Where’d the False Narrative Start It Started With You’

REP Trey Gowdy vs Hillary Clinton Round 2 at House Select Committee on Benghazi 102215

Benghazi Select – Gowdy: this is an investigation, not a prosecution

Bickering among Benghazi panel as Clinton looks on silently

Fireworks erupt between Clinton, Republicans at Benghazi hearing



More Background Information

Weekly Address: Carrying on the Work of

America’s intelligence community, explained

THE RECRUIT – Spy School: Inside the CIA Training Program, 1 of 2

THE RECRUIT – Spy School: Inside the CIA Training Program, 2 of 2

Special Activities Division

Published on Aug 15, 2014

The Special Activities Division (SAD) is a division in the United States Central Intelligence Agency’s (CIA) National Clandestine Service (NCS) responsible for covert operations known as “special activities”. Within SAD there are two separate groups, SAD/SOG for tactical paramilitary operations and SAD/PAG for covert political action.
Special Operations Group (SOG) is the department within SAD responsible for operations that include the collection of intelligence in hostile countries and regions, and all high threat military or intelligence operations with which the U.S. government does not wish to be overtly associated. As such, members of the unit (called Paramilitary Operations Officers and Specialized Skills Officers) normally do not carry any objects or clothing (e.g., military uniforms) that would associate them with the United States government. If they are compromised during a mission, the government of the United States may deny all knowledge.

Inside America’s New Covert Wars: Navy SEALs, Delta Force, Blackwater, Security Contractors (2013)

The Daring Early Years of the CIA: Covert Ops from WW2 to Vietnam (1995)

How has the CIA been used as a secret Military force? William Blum • BRAVE NEW FILMS

The CIA began as a spy agency after World War Two, but soon the CIA was planning and executing covert operations across the globe without proper congressional oversight. From the removal of the democratically elected leaders of Iran and Guatemala to the attempted invasion of Cuba, to the removal of every secular government in the Middle East, the influence of the agency is insidious. But how can a democratic society tolerate such a secret and lethal institution that works against the very values America seeks to uphold around the world?

CIA Covert Operations in Africa: How Does the U.S. Government Make Decisions?

According to the Department of Defense Dictionary of Military and Associated Terms, a covert operation (also as CoveOps or covert ops) is “an operation that is so planned and executed as to conceal the identity of or permit plausible denial by the sponsor.” It is intended to create a political effect which can have implications in the military, intelligence or law enforcement arenas. Covert operations aim to fulfill their mission objectives without any parties knowing who sponsored or carried out the operation. It is normally financed by government revenues but in this age of super-empowered individuals and corporations they could become a common tool of power beyond traditional war and diplomacy.

Under United States law, the Central Intelligence Agency (CIA) must lead covert operations unless the president finds that another agency should do so and properly informs the congress. Normally, the CIA is the US Government agency legally allowed to carry out covert action. The CIA’s authority to conduct covert action comes from the National Security Act of 1947. President Ronald Reagan issued Executive Order 12333 titled in 1984. This order defined covert action as “special activities”, both political and military, that the US Government could legally deny. The CIA was also designated as the sole authority under the 1991 Intelligence Authorization Act and in Title 50 of the United States Code Section 413(e). The CIA must have a “Presidential Finding” issued by the President of the United States in order to conduct these activities under the Hughes-Ryan amendment to the 1991 Intelligence Authorization Act. These findings are then monitored by the oversight committees in both the US Senate and the House of Representatives. As a result of this framework, the CIA “receives more oversight from the Congress than any other agency in the federal government”. The Special Activities Division (SAD) is a division of the CIA’s National Clandestine Service, responsible for Covert Action and “Special Activities”. These special activities include covert political influence and paramilitary operations. The division is overseen by the United States Secretary of State.

Special Activities Division – Special Operations Group | SAD SOG

Published on Jun 30, 2015

The Special Activities Division (SAD) is a division in the United States Central Intelligence Agency’s (CIA) National Clandestine Service responsible for covert operations known as “special activities”. Within SAD there are two separate groups, SAD/SOG for tactical paramilitary operations and SAD/PAG for covert political action. The Special Activities Division reports directly to the Deputy Director of the National Clandestine Service.

Special Operations Group (SOG) is the department within SAD responsible for operations that include the collection of intelligence in hostile countries and regions, and all high threat military or intelligence operations with which the U.S. government does not wish to be overtly associated. As such, members of the unit (called Paramilitary Operations Officers and Specialized Skills Officers) normally do not carry any objects or clothing (e.g., military uniforms) that would associate them with the United States government. If they are compromised during a mission, the United States government may deny all knowledge.

SOG is generally considered the most secretive special operations force in the United States. The group selects operatives from other tier one special mission units such as Delta Force, DEVGRU and ISA, as well as other United States special operations forces, such as USNSWC, MARSOC, Special Forces, SEALs and 24th STS.

SOG Paramilitary Operations Officers account for a majority of Distinguished Intelligence Cross and Intelligence Star recipients during any given conflict or incident which elicits CIA involvement. An award bestowing either of these citations represents the highest honors awarded within the CIA organization in recognition of distinguished valor and excellence in the line of duty. SAD/SOG operatives also account for the majority of the names displayed on the Memorial Wall at CIA headquarters indicating that the agent died while on active duty.

REVEALED: If This Is True, Benghazi Is Even Worse Than We Ever Thought

Insiders Come Forward, Proof of Benghazi Stand Down Order, It was Obama

Obama Lies About Libya – Imperial Presidency

Media Silent About Obama’s Undeclared Wars

Did the Military Intervention in Libya Succeed? (Benjamin Friedman)

Drones are Obama’s weapon of choice for waging illegal and undeclared wars

Special Activities Division

From Wikipedia, the free encyclopedia

Seal of the Central Intelligence Agency

The Special Activities Division (SAD) is a division in the United States Central Intelligence Agency‘s (CIA) Directorate of Operations (DO) responsible for covert operations known as “special activities”. Within SAD there are two separate groups, SAD/SOG for tactical paramilitary operations and SAD/PAG for covert political action.[1] The Special Activities Division reports directly to the Deputy Director for the Directorate of Operations.

Special Operations Group (SOG) is the department within SAD responsible for operations that include the collection ofintelligence in hostile countries and regions, and all high threat military or intelligence operations with which the U.S. government does not wish to be overtly associated.[2] As such, members of the unit (called Paramilitary Operations Officers and Specialized Skills Officers) normally do not carry any objects or clothing (e.g., military uniforms) that would associate them with the United States government.[3] If they are compromised during a mission, the United States government maydeny all knowledge.[4]

SOG is generally considered the most secretive special operations force in the United States. The group selects operatives from other tier one special mission units such as Delta Force, DEVGRU, ISA, and 24th STS, as well as other United States special operations forces, such as USNSWC, MARSOC, Green Berets, SEALs, SWCC, Force Recon, Pararescuemen,Combat Controllers, and Army Rangers.

SOG Paramilitary Operations Officers account for a majority of Distinguished Intelligence Cross and Intelligence Star recipients during any given conflict or incident which elicits CIA involvement. An award bestowing either of these citations represents the highest honors awarded within the CIA organization in recognition of distinguished valor and excellence in the line of duty. SAD/SOG operatives also account for the majority of the names displayed on the Memorial Wall at CIA headquarters indicating that the agent died while on active duty.[5]

Political Action Group (PAG) is responsible for covert activities related to political influence, psychological operations and economic warfare. The rapid development of technology has added cyberwarfare to their mission. Tactical units within SAD are also capable of carrying out covert political action while deployed in hostile and austere environments. A large covert operation usually has components that involve many, or all, of these categories, as well as paramilitary operations. Political and Influence covert operations are used to support U.S. foreign policy. Often overt support for one element of an insurgency would be counter-productive due to the impression it would have on the local population. In such cases, covert assistance allows the U.S. to assist without damaging these elements in the process. Many of the other activities (such as propaganda, economic and cyber) support the overall political effort. There have been issues in the past with attempts to influence the US media such as in Operation Mockingbird. However, these activities are now subject to the same oversight as all covert action operations.[6]

Overview

SAD provides the President of the United States with an option when overt military and/or diplomatic actions are not viable or politically feasible. SAD can be directly tasked by the President of the United States or the National Security Council at the President’s direction. This is unlike any other U.S. special mission force. However, SAD/SOG has far fewer members than most of the other special missions units, such as the U.S. Army’s 1st Special Forces Operational Detachment-Delta (Delta Force) or Naval Special Warfare Development Group (DEVGRU).[7][8][9]

As the action arm of the DO, SAD/SOG conducts direct action missions such as raids, ambushes, sabotage, targeted killings[10][11][12] and unconventional warfare(e.g., training and leading guerrilla and military units of other countries in combat). SAD/SOG also conducts special reconnaissance, that can be either military orintelligence driven, but is carried out by Paramilitary Officers (also called Paramilitary Operatives) when in “non-permissive environments“. Paramilitary Operations Officers are also fully trained case officers (i.e., “spies”) and as such conduct clandestine human intelligence (HUMINT) operations throughout the world.[13]SAD/SOG officers are selected from the most elite U.S. military units.[9]

The political action group within SAD conducts the deniable psychological operations, also known as black propaganda, as well as “Covert Influence” to effect political change as an important part of any Administration’s foreign policy.[1] Covert intervention in a foreign election is the most significant form of political action. This could involve financial support for favored candidates, media guidance, technical support for public relations, get-out-the-vote or political organizing efforts, legal expertise, advertising campaigns, assistance with poll-watching, and other means of direct action. Policy decisions could be influenced by assets, such as subversion of officials of the country, to make decisions in their official capacity that are in the furtherance of U.S. policy aims. In addition, mechanisms for forming and developing opinions involve the covert use of propaganda.[14]

Propaganda includes leaflets, newspapers, magazines, books, radio, and television, all of which are geared to convey the U.S. message appropriate to the region. These techniques have expanded to cover the internet as well. They may employ officers to work as journalists, recruit agents of influence, operate media platforms, plant certain stories or information in places it is hoped it will come to public attention, or seek to deny and/or discredit information that is public knowledge. In all such propaganda efforts, “black” operations denote those in which the audience is to be kept ignorant of the source; “white” efforts are those in which the originator openly acknowledges himself; and “gray” operations are those in which the source is partly but not fully acknowledged.[14][15]

Some examples of political action programs were the prevention of the Italian Communist Party (PCI) from winning elections between 1948 and the late 1960s; overthrowing the governments of Iran in 1953, and Guatemala in 1954; arming rebels in Indonesia in 1957; and providing funds and support to the trade unionfederation Solidarity following the imposition of martial law in Poland after 1981.[16]

SAD’s existence became better known as a result of the “Global War on Terror“. Beginning in autumn of 2001, SAD/SOG paramilitary teams arrived in Afghanistanto hunt down al-Qaeda leaders, facilitate the entry of U.S. Army Special Forces and lead the United Islamic Front for the Salvation of Afghanistan against the rulingTaliban. SAD/SOG units also defeated Ansar al-Islam in Iraqi Kurdistan prior to the invasion of Iraq in 2003[17][18] and trained, equipped, organized and led theKurdish peshmerga forces to defeat the Iraqi army in northern Iraq.[13][17] Despite being the most covert unit in U.S. Special Operations, numerous books have been published on the exploits of CIA paramilitary officers, including Conboy and Morrison’s Feet to the Fire: CIA Covert Operations in Indonesia,[19] and Warner’sShooting at the Moon: The Story of America’s Clandestine War in Laos.[20] Most experts consider SAD/SOG the premiere force for unconventional warfare (UW), whether that warfare consists of either creating or combating an insurgency in a foreign country.[7][21][22]

SOCOM.jpg

There remains some conflict between the National Clandestine Service and the more clandestine parts of the United States Special Operations Command (USSOCOM),[23] such as the Joint Special Operations Command. This is usually confined to the civilian/political heads of the respective Department/Agency. The combination of SAD and USSOCOM units has resulted in some of the most notable successes of the wars in Iraq and Afghanistan, to include the locating and killing of Osama bin Laden.[22][24] SAD/SOG has several missions. One of these missions is the recruiting, training, and leading of indigenous forces in combat operations.[22] SAD/SOG and its successors have been used when it was considered desirable to have plausible deniability about U.S. support (this is called a covert operation or “covert action”).[13] Unlike other special missions units, SAD/SOG operatives combine special operations and clandestine intelligence capabilities in one individual.[9] These individuals can operate in any environment (sea, air or ground) with limited to no support.[7]

Covert action

Under U.S. law, the CIA is authorized to collect intelligence, conduct counterintelligence and to conduct covert action by the National Security Act of 1947.[1]President Ronald Reagan issued Executive Order 12333 titled “United States Intelligence Activities” in 1984. This order defined covert action as “special activities,” both political and military, that the U.S. government would deny, granting such operations exclusively to the CIA. The CIA was also designated as the sole authority under the 1991 Intelligence Authorization Act and mirrored in Title 50 of the United States Code Section 413(e).[1][22] The CIA must have a presidential findingissued by the President of the United States in order to conduct these activities under the Hughes-Ryan amendment to the 1991 Intelligence Authorization Act.[25]These findings are then monitored by the oversight committees in both the U.S. Senate, called the Senate Select Committee on Intelligence (SSCI) and the U.S. House of Representatives, called the House Permanent Select Committee on Intelligence (HPSCI).[26]

The Pentagon commissioned a study to determine whether the CIA or the U.S. Department of Defense (DoD) should conduct covert action paramilitary operations. Their study determined that the CIA should maintain this capability and be the “sole government agency conducting covert action.” The DoD found that, even under U.S. law, it does not have the legal authority to conduct covert action, nor the operational agility to carry out these types of missions.[27] The operation in May 2011 that resulted in the death of Osama bin Laden was a covert action under the authority of the CIA.[24][28]

Selection and training

SAD/SOG has several hundred officers, mostly former members of special operations forces (SOF) and a majority from theJoint Special Operations Command (JSOC).[29] The CIA has also recruited individuals within the agency.[30] The CIA’s formal position for these individuals is “Paramilitary Operations Officers” and “Specialized Skills Officers.” Paramilitary Operations Officers attend the Clandestine Service Trainee (CST) program, which trains them as clandestine intelligence operatives (known as “Core Collectors” within the Agency). The primary strengths of SAD/SOG Paramilitary Officers are operational agility, adaptability, and deniability. They often operate in small teams, typically made up of six operators (with some operations being carried out by a single officer), all with extensive military special operations expertise and a set of specialized skills that does not exist in any other unit.[9] As fully trained intelligence case officers, Paramilitary Operations Officers possess all the clandestine skills to collect human intelligence—and most importantly—to recruit assets from among the indigenous troops receiving their training. These officers often operate in remote locations behind enemy lines to carry out direct action (including raids and sabotage), counter-intelligence, guerrilla/unconventional warfare, counter-terrorism, and hostage rescue missions, in addition to being able to conduct espionage via HUMINT assets.

There are four principal elements within SAD’s Special Operations Group: the Air Branch, the Maritime Branch, the Ground Branch, and the Armor and Special Programs Branch. The Armor and Special Programs Branch is charged with development, testing, and covert procurement of new personnel and vehicular armor and maintenance of stockpiles of ordnance and weapons systems used by SOG, almost all of which must be obtained from clandestine sources abroad, in order to provide SOG operatives and their foreign trainees with plausible deniability in accordance with U.S. Congressional directives.

Together, SAD/SOG contains a complete combined arms covert military. Paramilitary Operations Officers are the core of each branch and routinely move between the branches to gain expertise in all aspects of SOG.[30] As such, Paramilitary Operations Officers are trained to operate in a multitude of environments. Because these officers are taken from the most highly trained units in the U.S. military and then provided with extensive additional training to become CIA clandestine intelligence officers, many U.S. security experts assess them as the most elite of the U.S. special missions units.[31]

SAD, like most of the CIA, requires a bachelor’s degree to be considered for employment. Many have advanced degrees such as Master’s and law degrees.[32]Many candidates come from notable schools, many from Ivy League institutions and United States Service Academies, but the majority of recruits today come from middle-class backgrounds.[33] SAD officers are trained at Camp Peary, Virginia (also known as “The Farm”) and at privately owned training centers around the United States. They also train its personnel at “The Point” (Harvey Point), a facility outside of Hertford, North Carolina.[34][35] In addition to the eighteen months of training in the Clandestine Service Trainee (CST) Program[36] required to become a clandestine intelligence officer, Paramilitary Operations Officers are trained to a high level of proficiency in the use and tactical employment of an unusually wide degree of modern weaponry, explosive devices and firearms (foreign and domestic), hand to hand combat, high performance/tactical driving (on and off road), apprehension avoidance (including picking handcuffs and escaping from confinement), improvised explosive devices, cyberwarfare, covert channels, Military Free Fall parachuting, combat and commercial SCUBA and closed circuit diving, proficiency in foreign languages, surreptitious entry operations (picking or otherwise bypassing locks), vehicle hot-wiring, Survival, Evasion, Resistance and Escape(SERE), extreme survival and wilderness training, combat EMS medical training, tactical communications, and tracking.

History

World War II

While the World War II Office of Strategic Services (OSS) was technically a military agency under the Joint Chiefs of Staff, in practice it was fairly autonomous of military control and enjoyed direct access to President Franklin D. Roosevelt. Major General William Joseph Donovan was the head of the OSS. Donovan was a soldier and Medal of Honor recipient from World War I. He was also a lawyer and former classmate of FDR at Columbia Law School.[37] Like its successor, the CIA, OSS included both human intelligence functions and special operations paramilitary functions. Its Secret Intelligence division was responsible for espionage, while its Jedburgh teams, a joint U.S.-UK-French unit, were forerunners of groups that create guerrilla units, such as the U.S. Army Special Forces and the CIA. OSS’ Operational Groups were larger U.S. units that carried out direct action behind enemy lines. Even during World War II, the idea of intelligence and special operations units not under strict military control was controversial. OSS operated primarily in the European Theater of Operations (ETO) and to some extent in the China-Burma-India Theater, while General of the Army Douglas MacArthur was extremely reluctant to have any OSS personnel within his area of operations.

From 1943 to 1945, the OSS also played a major role in training Kuomintang troops in China and Burma, and recruited other indigenous irregular forces for sabotage as well as guides for Allied forces in Burma fighting the Japanese army. OSS also helped arm, train and supply resistance movements, including Mao Zedong‘s People’s Liberation Army in China and the Viet Minh in French Indochina, in areas occupied by the Axis powers. Other functions of the OSS included the use ofpropaganda, espionage, subversion, and post-war planning.

One of the OSS’ greatest accomplishments during World War II was its penetration of Nazi Germany by OSS operatives. The OSS was responsible for training German and Austrian commandos for missions inside Nazi Germany. Some of these agents included exiled communists and socialist party members, labor activists, anti-Nazi POWs, and German and Jewish refugees. At the height of its influence during World War II, the OSS employed almost 24,000 people.[38]

OSS Paramilitary Officers parachuted into many countries then behind enemy lines, including France, Norway, Greece and The Netherlands. In Crete, OSS paramilitary officers linked up with, equipped and fought alongside Greek resistance forces against the Axis occupation.

OSS was disbanded shortly after World War II, with its intelligence analysis functions moving temporarily into the U.S. Department of State. Espionage and counterintelligence went into military units, while paramilitary and related functions went into an assortment of ‘ad hoc’ groups, such as the Office of Policy Coordination. Between the original creation of the CIA by the National Security Act of 1947 and various mergers and reorganizations through 1952, the wartime OSS functions generally went into CIA. The mission of training and leading guerrillas generally stayed in the United States Army Special Forces, but those missions required to remain covert were folded into the paramilitary arm of the CIA. The direct descendant of the OSS’ Special Operations is the CIA’s Special Activities Division.

Tibet

After the Chinese invasion of Tibet in October 1950, the CIA inserted SAD paramilitary teams into Tibet to train and lead Tibetan resistance fighters against thePeople’s Liberation Army of China. These teams selected and then trained Tibetan soldiers in the Rocky Mountains of the United States;[39] training occurred atCamp Hale.[40][41] The SAD teams then advised and led these commandos against the Chinese, both from Nepal and India. In addition, SAD Paramilitary Officers were responsible for the Dalai Lama‘s clandestine escape to India, narrowly escaping capture and certain execution by the Chinese government.[39]

According to a book by retired CIA officer John Kenneth Knaus, entitled Orphans Of The Cold War: America And The Tibetan Struggle For Survival, Gyalo Thondup, the older brother of the 14th (and current) Dalai Lama, sent the CIA five Tibetan recruits. These recruits were then trained in paramilitary tactics on the island ofSaipan in the Northern Marianas.[42] Shortly thereafter, the five men were covertly returned to Tibet “to assess and organize the resistance” and selected another 300 Tibetans for training. U.S. assistance to the Tibetan resistance ceased after the 1972 Nixon visit to China, after which the United States and China normalized relations.[43]

Korea

The CIA sponsored a variety of activities during the Korean War. These activities included maritime operations behind North Korean lines. Yong Do Island, connected by a rugged isthmus to Pusan, served as the base for those operations. These operations were carried out by well-trained Korean guerrillas. The four principal U.S. advisers responsible for the training and operational planning of those special missions were Dutch Kramer, Tom Curtis, George Atcheson and Joe Pagnella. All of these Paramilitary Operations Officers operated through a CIA front organization called the Joint Advisory Commission, Korea (JACK), headquartered at Tongnae, a village near Pusan, on the peninsula’s southeast coast.[44] These paramilitary teams were responsible for numerous maritime raids and ambushes behind North Korean lines, as well as prisoner of warrescue operations. These were the first maritime unconventional warfare units that trained indigenous forces as surrogates. They also provided a model, along with the other CIA-sponsored ground based paramilitary Korean operations, for theMilitary Assistance Command, Vietnam-Studies and Observations Group (MACV-SOG) activities conducted by the U.S. military and the CIA/SAD in Vietnam.[7][44] In addition, CIA paramilitary ground-based teams worked directly for U.S. military commanders, specifically with the 8th Army, on the “White Tiger” initiative. This initiative included inserting South Korean commandos and CIA Paramilitary Operations Officers prior to the two major amphibious assaults on North Korea, including the landing at Inchon.[7]

Cuba (1961)

Main article: Bay of Pigs Invasion

Map showing the location of the Bay of Pigs

The Bay of Pigs Invasion (known as “La Batalla de Girón”, or “Playa Girón” in Cuba), was an unsuccessful attempt by a U.S.-trained force of Cuban exiles to invade southern Cuba and overthrow the Cuban government of Fidel Castro. The plan was launched in April 1961, less than three months after John F. Kennedy assumed the presidency of the United States. TheCuban Revolutionary Armed Forces, trained and equipped by Eastern Bloc nations, defeated the exile-combatants in three days.

The sea-borne invasion force landed on April 17, and fighting lasted until April 19, 1961. CIA Paramilitary Operations OfficersGrayston Lynch and William “Rip” Robertson led the first assault on the beaches, and supervised the amphibious landings.[45] Four American aircrew instructors from Alabama Air National Guard were killed while flying attack sorties.[45]Various sources estimate Cuban Army casualties (killed or injured) to be in the thousands (between 2,000 and 5,000).[46] This invasion followed the successful overthrow by the CIA of the Mosaddeq government in Iran in 1953[47] and Arbenz government in Guatemala in 1954,[48] but was a failure both militarily and politically.[49] Deteriorating Cuban-American relations were made worse by the 1962 Cuban Missile Crisis.

Bolivia

The National Liberation Army of Bolivia (ELN-Ejército de Liberación Nacional de Bolivia) was a communist guerrilla force that operated from the remote Ñancahuazú region against the pro-U.S. Bolivian government. They were joined by Che Guevara in the mid-1960s.[50][51] The ELN was well equipped and scored a number of early successes against the Bolivian army in the difficult terrain of the mountainous Camiri region.[52] In the late 1960s, the CIA deployed teams of SAD Paramilitary Operations Officers to Bolivia to train the Bolivian army in order to counter the ELN.[52] These SAD teams linked up with U.S. Army Special Forces and Bolivian Special Forces to track down and capture Guevara, who was a special prize because of his leading role in the Cuban Revolution.[52] On October 9, 1967, Guevara was executed by Bolivian soldiers on the orders of CIA paramilitary operative Félix Rodríguez shortly after being captured, according to CIA documents.[53]

Vietnam and Laos

South Vietnam, Military Regions, 1967

The original OSS mission in Vietnam under Major Archimedes Patti was to work with Ho Chi Minh in order to prepare his forces to assist the United States and their Allies in fighting the Japanese. After the end of World War II, the US agreed at Potsdam to turn Vietnam back to their previous French rulers and in 1950 the US began providing military aid to the French.[54]

CIA Paramilitary Operations Officers trained and led Hmong tribesmen in Laos and Vietnam, and their actions of these officers were not known for several years. Air America was the air component of the CIA’s paramilitary mission in Southeast Asia and was responsible for all combat, logistics and search and rescue operations in Laos and certain sections of Vietnam.[55] The ethnic minority forces numbered in the tens of thousands and they conducted direct actions mission, led by Paramilitary Operations Officers, against the communist Pathet Lao forces and their North Vietnamese allies.[7]

Elements of SAD were seen in the CIA’s Phoenix Program. One component of the Phoenix Program was involved in the capture and killing of suspected Viet Cong (National Liberation Front – NLF) members.[56] Between 1968 and 1972, the Phoenix Program captured 81,740 National Liberation Front of South Vietnam (NLF or Viet Cong) members, of whom 26,369 were killed. This was a large proportion of U.S. killings between 1969 and 1971. The program was also successful in destroying their infrastructure. By 1970, communist plans repeatedly emphasized attacking the government’s “pacification” program and specifically targeted Phoenix agents. The NLF also imposed quotas. In 1970, for example, communist officials near Da Nang in northern South Vietnam instructed their agents to “kill 400 persons” deemed to be government “tyrant[s]” and to “annihilate” anyone involved with the “pacification” program. Several North Vietnamese officials have made statements about the effectiveness of Phoenix.[57][58]

MAC-V SOG (Studies and Observations Group) (which was originally named the Special Operations Group, but was changed for cover purposes), was created and active during the Vietnam War. While CIA was just one part of MAC-V SOG, it did have operational control of some of the programs. Many of the military members of MAC-V SOG joined the CIA after their military service. The legacy of MAC-V SOG continues within SAD’s Special Operations Group.[59]

Maritime activities against the USSR

In 1973, SAD/SOG and the CIA’s Directorate of Science and Technology built and deployed the USNS Glomar Explorer (T-AG-193), a large deep-sea salvage ship, on a secret operation. This operation was called Project Azorian (erroneously called Project Jennifer by the press).[60] Her mission was to recover a sunken Sovietsubmarine, K-129, which had been lost in April 1968.[61][62] A mechanical failure caused two-thirds of the submarine to break off during recovery,[60] but SAD recovered two nuclear-tipped torpedoes, cryptographic machines and the bodies of six Soviet submariners.[63] An alternative theory claims that all of K-129 was recovered[64] and that the official account was an “elaborate cover-up”.[65]

Also in the 1970s, the U.S. Navy, the National Security Agency (NSA) and SAD/SOG [66] conducted Operation Ivy Bells and a series of other missions to place wire taps on Soviet underwater communications cables. These operations were covered in detail in the 1998 book Blind Man’s Bluff: The Untold Story of American Submarine Espionage.[67] In the 1985 edition of “Studies in Intelligence”, the CIA’s in-house journal that outsiders rarely get to see, the CIA describes the “staggering expense and improbable engineering feats” that culminated in the August 1974 mission.[68]

Nicaragua

In 1979, the U.S.-backed Anastasio Somoza Debayle dictatorship in Nicaragua fell to the socialist Sandinistas. Once in power, the Sandinistas disbanded theNicaraguan National Guard, who had committed many human rights abuses, and arrested and executed some of its members. Other former National Guard members helped to form the backbone of the Nicaraguan Counterrevolution or Contra. SAD/SOG paramilitary teams were deployed to train and lead these forces against the Sandinista government. These paramilitary activities were based in Honduras and Costa Rica. Direct military aid by the United States was eventually forbidden by the Boland Amendment of the Defense Appropriations Act of 1983. The Boland Amendment was extended in October 1984 to forbid action by not only the Defense Department, but also to include the Central Intelligence Agency.[69][70]

The Boland Amendment was a compromise because the U.S. Democratic Party did not have enough votes for a comprehensive ban on military aid. It covered only appropriated funds spent by intelligence agencies. Some of Reagan’s national security officials used non-appropriated money of the National Security Council (NSC) to circumvent the Amendment. NSC officials sought to arrange funding by third parties. These efforts resulted in the Iran-Contra Affair of 1987, which concerned Contra funding through the proceeds of arms sales to the Islamic Republic of Iran. No court ever made a determination whether Boland covered the NSC and on the grounds that it was a prohibition rather than a criminal statute, no one was indicted for violating it. Congress later resumed aid to the Contras, totaling over $300 million. The Contra war ended when the Sandinistas were voted out of power by a war-weary populace in 1990.[70][71] Sandinista leader Daniel Ortega was re-elected as President of Nicaragua in 2006 and took office again on January 10, 2007.

El Salvador

CIA personnel were also involved in the Salvadoran civil war.[72] Some allege that the techniques used to interrogate prisoners in El Salvador foreshadowed those later used in Iraq and Afghanistan.[73] In fact, when a similar counter-insurgency program was proposed in Iraq, it was referred to as “the Salvador Option”.[74]

Somalia

Location of Somalia

SAD sent in teams of Paramilitary Operations Officers into Somalia prior to the U.S. intervention in 1992. On December 23, 1992, Paramilitary Officer Larry Freedman became the first casualty of the conflict in Somalia. Freedman was a former ArmyDelta Force operator who had served in every conflict that the U.S. was involved in, both officially and unofficially, since Vietnam.[75] Freedman was killed while conducting special reconnaissance in advance of the entry of U.S. military forces. His mission was completely voluntary, as it required entry into a very hostile area without any support. Freedman was awarded the Intelligence Star on January 5, 1993 for his “extraordinary heroism”.[76]

SAD/SOG teams were key in working with JSOC and tracking high value targets (HVT), known as “Tier One Personalities”. Their efforts, working under extremely dangerous conditions with little to no support, led to several very successful joint JSOC/CIA operations.[77] In one specific operation, a CIA case officer, Michael Shanklin[78] and codenamed “Condor”, working with a CIA Technical Operations Officer from the Directorate of Science and Technology, managed to get a cane with a beacon in it to Osman Ato, a wealthy businessman, arms importer, and Mohammed Aideed, a money man whose name was right below Mohamed Farrah Aidid’s on the Tier One list.

Once Condor confirmed that Ato was in a vehicle, JSOC‘s Delta Force launched a capture operation.

a Little Bird helicopter dropped out of the sky and a sniper leaned out and fired three shots into the car’s engine block. The car ground to a halt as commandos roped down from hovering Blackhawks [sic], surrounded the car and handcuffed Ato. It was the first known helicopter takedown of suspects in a moving car. The next time Jones saw the magic cane, an hour later, Garrison had it in his hand. “I like this cane,” Jones remembers the general exclaiming, a big grin on his face. “Let’s use this again.” Finally, a tier one personality was in custody.[77]

President Bill Clinton withdrew U.S. forces on May 4, 1994.[79]

In June 2006, the Islamic Courts Union seized control of southern Somalia, including the country’s capital Mogadishu, prompting the Ethiopian government to send in troops to try to protect the transitional government. In December, the Islamic Courts warned Ethiopia they would declare war if Ethiopia did not remove all its troops from Somalia. Sheikh Sharif Ahmed, leader of the Islamic Courts, called for a jihad, or holy war, against Ethiopia and encouraged foreign Muslim fighters to come to Somalia. At that time, the United States accused the group of being controlled by al-Qaeda, but the Islamic Courts denied that charge.[80]

In 2009, PBS reported that al-Qaeda had been training terrorists in Somalia for years. Until December 2006, Somalia’s government had no power outside of the town of Baidoa, 150 miles (240 km) from the capital. The countryside and the capital were run by warlords and militia groups who could be paid to protect terrorist groups.[80]

CIA officers kept close tabs on the country and paid a group of Somali warlords to help hunt down members of al-Qaeda according to the New York Times.[citation needed] Meanwhile, Ayman al-Zawahiri, the deputy to al-Qaeda leader Osama bin Laden, issued a message calling for all Muslims to go to Somalia.[80]On January 9, 2007, a U.S. official said that ten militants were killed in one airstrike.[81]

On September 14, 2009, Saleh Ali Saleh Nabhan, a senior al-Qaeda leader in East Africa as well as a senior leader in Shabaab, al Qaeda’s surrogate in Somalia, was killed by elements of U.S. Special Operations. According to a witness, at least two AH-6 Little Bird attack helicopters strafed a two-car convoy. Navy SEALs then seized the body of Nabhan and took two other wounded fighters captive.[82][83] JSOC and the CIA had been trying to kill Nabhan for some time including back in January 2007, when an AC-130 Gunship was called in on one attempt. A U.S. intelligence source stated that CIA paramilitary teams are directly embedded with Ethiopian forces in Somalia, allowing for the tactical intelligence to launch these operations.[84] Nabhan was wanted for his involvement in the 1998 United States embassy bombings, as well as leading the cell behind the 2002 Mombasa attacks.[82][85]

From 2010 to 2013, the CIA set up the Somalia National Intelligence and Security Agency (NISA) by providing training, funding and diplomatic access. In the same time period, the EU and UN has spent millions of dollars for the military training of the Somali National Army (SNA). NISA is considered a professional Somali security force that can be relied upon to neutralize the terrorist threat.[86] This force responded to the complex al-Shabaab attack on the Banadir Regional Courthouse in Mogadishu which killed 25 civilians. NISA’s response however saved 100s and resulted in the death of all the al-Shabaab guerrillas involved.[87]

Significant events during this timeframe included the targeted drone strikes against British al-Qaida operative Bilal el-Berjawi [88] and Moroccan al-Qaida operative Abu Ibrahim.[89] It also included the rescue of U.S. citizen Jessica Buchanan by U.S. Navy SEALs.[90] All likely aided by intelligence collection efforts in Somalia.[91]

Afghanistan

Hamid Karzai with Special Forces and CIA Paramilitary in late 2001.

During the Soviet war in Afghanistan in the 1980s, Paramilitary Operations Officers were instrumental in equippingMujaheddin forces against the Soviet Army. Although the CIA in general, and a Texas congressman named Charlie Wilson in particular, have received most of the attention, the key architect of this strategy was Michael G. Vickers. Vickers was a young Paramilitary Operations Officer from SAD/SOG. The CIA’s efforts have been given credit for assisting in ending the Sovietinvolvement in Afghanistan and bringing Taliban to power.[92]

SAD paramilitary teams were active in Afghanistan in the 1990s in clandestine operations to locate and kill or capture Osama Bin Laden. These teams planned several operations, but did not receive the order to execute from President Bill Clintonbecause the available intelligence did not guarantee a successful outcome weighed against the extraordinary risk to the SAD/SOG teams that would execute the mission.[13] These efforts did however build many of the relationships that would prove essential in the 2001 U.S. Invasion of Afghanistan.[13]

On September 26, 2001, members of the Special Activities Division, led by Gary Schroen, were the first U.S. forces inserted into Afghanistan. The Northern Afghanistan Liaison Team entered the country nine days after the 9/11 attack[93][94] and linked up with the Northern Alliance as part of Task Force Dagger.[95]

They provided the Northern Alliance with resources including cash to buy weapons and prepared for the arrival of USSOCOM forces. The plan for the invasion of Afghanistan was developed by the CIA, the first time in United States history that such a large-scale military operation was planned by the CIA.[96] SAD, U.S. Army Special Forces, and the Northern Alliance combined to overthrow the Taliban in Afghanistan with minimal loss of U.S. lives. They did this without the use of conventional U.S. military ground forces.[13][97][98][99]

The Washington Post stated in an editorial by John Lehman in 2006:

What made the Afghan campaign a landmark in the U.S. Military’s history is that it was prosecuted by Special Operations forces from all the services, along with Navy and Air Force tactical power, operations by the Afghan Northern Alliance and the CIA were equally important and fully integrated. No large Army or Marine force was employed”.[100]

In a 2008 New York Times book review of Horse Soldiers, a book by Doug Stanton about the invasion of Afghanistan, Bruce Barcott wrote:

The valor exhibited by Afghan and American soldiers, fighting to free Afghanistan from a horribly cruel regime, will inspire even the most jaded reader. The stunning victory of the horse soldiers – 350 Special Forces soldiers, 100 C.I.A. officers and 15,000 Northern Alliance fighters routing a Taliban army 50,000 strong – deserves a hallowed place in American military history”.[101]

Small and highly agile paramilitary mobile teams spread out over the countryside to meet with locals and gather information about the Taliban and al-Qa’ida. During that time, one of the teams was approached in a village and asked by a young man for help in retrieving his teenage sister. He explained that a senior Taliban official had taken her as a wife and had sharply restricted the time she could spend with her family. The team gave the man a small hand-held tracking device to pass along to his sister, with instructions for her to activate it when the Taliban leader returned home. The team responded to her emergency signal, capturing the senior Taliban official and rescuing the sister. The siblings’ tearful reunion left the team at a loss for words—a rarity for the normally loud warriors of CIA’s Special Activities Division.[102]

Tora Bora

In December 2001, SAD/SOG and the Army’s Delta Force tracked down Osama bin Laden in the rugged mountains near the Khyber Pass in Afghanistan.[103]Former CIA station chief Gary Berntsen as well as a subsequent Senate investigation claimed that the combined American special operations task force was largely outnumbered by al-Qaeda forces and that they were denied additional US troops by higher command.[104] The task force also requested munitions to block the avenues of egress of bin Laden, but that request was also denied.[105] The team allegedly uncovered evidence in the subsequent site exploration that bin Laden’s ultimate aim was to obtain and detonate a nuclear device in a terrorist attack.[96] According to other press reports, SAD were ineffectual and “Bin Laden and bodyguards walked uncontested out of Tora Bora and disappeared into Pakistan’s unregulated tribal area.”[106]

Surge

In September 2009, the CIA planned on “deploying teams of spies, analysts and paramilitary operatives to Afghanistan, part of a broad intelligence ‘surge’ ordered by President Obama. This will make its station there among the largest in the agency’s history.”[107] This presence is expected to surpass the size of the stations in Iraq and Vietnam at the height of those wars.[107] The station is located at the U.S. Embassy in Kabul and is led “by a veteran with an extensive background in paramilitary operations”.[108] The majority of the CIA’s workforce is located among secret bases and military special operations posts throughout the country.[108][109]

Also in 2009, General Stanley McChrystal, the commander of NATO forces in Afghanistan, planned to request an increase in teams of CIA operatives, including their elite paramilitary officers, to join with U.S. military special operations forces. This combination worked well in Iraq and is largely credited with the success of that surge.[108][110] There have been basically three options described in the media: McChrystal’s increased counterinsurgency campaign; a counter-terror campaign using special operations raids and drone strikes; and withdrawal. The most successful combination in both the wars in Afghanistan and Iraq has been the linking up of SAD and military special forces to fight alongside highly trained indigenous units. One thing all of these options have in common is a requirement for greater CIA participation.[110]

The End Game

According to the current and former intelligence officials, General McChrystal also had his own preferred candidate for the Chief of Station (COS) job, a good friend and decorated CIA paramilitary officer.[111] The officer had extensive experience in war zones, including two previous tours in Afghanistan with one as the Chief of Station, as well as tours in the Balkans, Baghdad and Yemen. He is well known in CIA lore as “the man who saved Hamid Karzai‘s life when the CIA led the effort to oust the Taliban from power in 2001″. President Karzai is said to be greatly indebted to this officer and was pleased when the officer was named chief of station again. According to interviews with several senior officials, this officer “was uniformly well-liked and admired. A career paramilitary officer, he came to the CIA after several years in an elite Marine unit”.[111][112]

General McChrystal’s strategy included the lash up of special operations forces from the U.S. Military and from SAD/SOG to duplicate the initial success and the defeat of the Taliban in 2001[113] and the success of the “Surge” in Iraq in 2007.[114] This strategy proved highly successful and worked very well in Afghanistan with SAD/SOG and JSOC forces conducting raids nearly every night having “superb results” against the enemy.[115]

In 2001, the CIA’s SAD/SOG began creating what would come to be called Counter-terrorism Pursuit Teams (CTPT).[116][117] These units grew to include over 3,000 operatives by 2010 and have been involved in sustained heavy fighting against the enemy. It is considered the “best Afghan fighting force”.

Located at 7,800 feet (2,400 m) above sea level, Firebase Lilley in Shkin serves as a “nerve center for the covert war”.[117] This covert war includes being a hub for these CTPT operations with Firebase Lilley being just one in a constellation of CIA bases across Afghanistan.[117] These units have not only been highly effective in combat operations against the Taliban and al-Qaeda forces, but have also been used to engage with the tribes in areas with no other official government presence.[118]

This covert war also includes a large SOG/CTPT expansion into Pakistan to target senior al-Qaeda and Taliban leadership in the Federally Administered Tribal Area (FATA).[119] CTPT units are the main effort in both the “Counterterrorism plus” and the full “Counterinsurgency” options being discussed by the Obama administration in the December 2010 review.[120] SOG/CTPT are also key to any exit strategy for the U.S. government to leave Afghanistan, while still being able to deny al-Qaeda and other trans-national extremists groups a safehaven both in Afghanistan and in the FATA of Pakistan.[121]

In January 2013, a CIA drone strike killed Mullah Nazir a senior Taliban commander in the South Waziristan area of Pakistan believed responsible for carrying out the insurgent effort against the US military in Afghanistan. Nazir’s death degraded the Taliban.[122]

The U.S. has decided to lean heavily on CIA in general and SAD specifically in their efforts to withdraw from Afghanistan as it did in Iraq.[123] There are plans being considered to have several US Military special operations elements assigned to CIA after the withdrawal.[124]

Yemen

On November 5, 2002, a missile launched from a CIA-controlled Predator drone killed al-Qaeda members traveling in a remote area in Yemen. SAD/SOG paramilitary teams had been on the ground tracking their movements for months and called in this air strike.[125] One of those in the car was Ali Qaed Senyan al-Harthi, al-Qaeda’s chief operative in Yemen and a suspect in the October 2000 bombing of the destroyer USS Cole. Five other people, believed to be low-level al-Qaeda members, were also killed to include an American named Kamal Derwish.[126][127] Former Deputy U.S. Defense Secretary Paul Wolfowitz called it “a very successful tactical operation” and said “such strikes are useful not only in killing terrorists but in forcing al-Qaeda to change its tactics”.[126]

“It’s an important step that has been taken in that it has eliminated another level of experienced leadership from al-Qaeda,” said Vince Cannistraro, former head of counter-terrorism for the CIA and current ABC News consultant. “It will help weaken the organization and make it much less effective.”[128][129] Harithi was on the run, pursued by several security forces who were looking for him and Muhammad Hamdi al-Ahdal, another suspect in the USS Cole bombing case.[130]

In 2009, the Obama administration authorized continued lethal operations in Yemen by the CIA.[131] As a result, the SAD/SOG and JSOC have joined together to aggressively target al-Qaeda operatives in that country, both through leading Yemenese special forces and intelligence driven drone strikes.[131] A major target of these operations is Imam Anwar al-Aulaqi, an American citizen with ties to both Nidal Hassan, the alleged Fort Hood attacker, and Umar Farouk Abdulmutallab, the Christmas 2009 attempted bomber of Northwest Airline flight 253.[132] Imam al-Aulaki was killed on September 30, 2011 by an air attack carried out by the Joint Special Operations Command.[133]

Iraq

SAD paramilitary teams entered Iraq before the 2003 invasion. Once on the ground they prepared the battle space for the subsequent arrival of U.S. military forces. SAD teams then combined with U.S. Army special forces (on a team called the Northern Iraq Liaison Element or NILE).[17] This team organized the KurdishPeshmerga for the subsequent U.S. led invasion. This joint team combined in Operation Viking Hammer to defeat Ansar al-Islam, an Islamist group allied to al-Qaeda, which several battle-hardened fighters from Afghanistan had joined after the fall of the Taliban, in a battle for control over the northeast of Iraq – a battle that turned out being one of the “most intense battles of Special Forces since Vietnam”.[134] This battle was for an entire territory that was completely occupied by Ansar al-Islam and was executed prior to the invasion in February 2003. If this battle had not been as successful as it was, there would have been a considerable hostile force in the rear of the U.S./secular Kurdish force in the subsequent assault on the Iraqi army to the south. The U.S. side was represented by paramilitary operations officers from SAD/SOG and the army’s 10th Special Forces Group (10th SFG). 10th SFG soldiers were awarded three Silver Stars and six Bronze Stars with V for valor for this battle alone [135] and several paramilitary officers were awarded the Intelligence Star for valor in combat.[136] This battle was a significant direct attack and victory on a key U.S. opponent. It resulted in the deaths of a substantial number of militants and the uncovering of a crude laboratory that had traces of poisons and information on chemical weapons at Sargat.[17][137] The team found foreign identity cards, visas, and passports on the enemy bodies. They had come from a wide variety of Middle Eastern and north African countries including Yemen, Sudan, Saudi Arabia, Qatar, Oman, Tunisia, Morocco, and Iran.[135]Sargat was also the only facility that had traces of chemical weapons discovered in the Iraq war.[18][136][138]

The village of Biyara and Base of Ansar al-Islam 2001–2003

In a 2004 U.S. News & World Report article, “A firefight in the mountains”, the author states:

“Viking Hammer would go down in the annals of Special Forces history—a battle fought on foot, under sustained fire from an enemy lodged in the mountains, and with minimal artillery and air support.”[135]

SAD/SOG teams also conducted high risk special reconnaissance missions behind Iraqi lines to identify senior leadership targets. These missions led to the initial assassination attempts against Iraqi President Saddam Hussein and his key generals. Although the initial air strike against Hussein was unsuccessful in killing the dictator, it was successful in effectively ending his ability to command and control his forces. Other strikes against key generals were successful and significantly degraded the command’s ability to react to and maneuver against the U.S.-led invasion force.[17][139] SAD operations officers were also successful in convincing key Iraqi army officers to surrender their units once the fighting started and/or not to oppose the invasion force.[18]

NATO member Turkey refused to allow its territory to be used by the U.S. Army’s 4th Infantry Division for the invasion. As a result, the SAD/SOG, U.S. Army special forces joint teams, the Kurdish Peshmerga and the 173d Airborne Brigade were the entire northern force against the Iraqi army during the invasion. Their efforts kept the 13 divisions of the Iraqi Army in place to defend against the Kurds rather allowing them to contest the coalition force coming from the south.[134] This combined U.S. special operations and Kurdish force defeated the Iraqi Army.[17] Four members of the SAD/SOG team received CIA’s rare Intelligence Star for “extraordinary heroism”.[18]

The mission that captured Saddam Hussein was called “Operation Red Dawn“. It was planned and carried out by JSOC’s Delta Force and SAD/SOG teams (together called Task Force 121). The operation eventually included around 600 soldiers from the 1st Brigade of the 4th Infantry Division.[140][141] Special operations troops probably numbered around 40. Much of the publicity and credit for the capture went to the 4th Infantry Division soldiers, but CIA and JSOC were the driving force. “Task Force 121 were actually the ones who pulled Saddam out of the hole” said Robert Andrews, former deputy assistant Secretary of Defense for special operations and low-intensity conflict. “They can’t be denied a role anymore.”[140]

CIA paramilitary units continued to team up with the JSOC in Iraq and in 2007 the combination created a lethal force many credit with having a major impact in the success of “the Surge“. They did this by killing or capturing many of the key al-Qaeda leaders in Iraq.[142][143] In a CBS 60 Minutes interview, Pulitzer Prize-winning journalist Bob Woodward described a new special operations capability that allowed for this success. This capability was developed by the joint teams of CIA and JSOC.[144] Several senior U.S. officials stated that the “joint efforts of JSOC and CIA paramilitary units was the most significant contributor to the defeat of al-Qaeda in Iraq”.[142][145]

In May 2007, Marine Major Douglas A. Zembiec was serving in SAD Ground Branch in Iraq when he was killed by small arms fire while leading a raid.[146][147]Reports from fellow paramilitary officers stated that the flash radio report sent was “five wounded and one martyred”[148] Major Zembiec was killed while saving his soldiers, Iraqi soldiers. He was honored with an intelligence star for his valor in combat.[149]

On October 26, 2008, SAD/SOG and JSOC conducted an operation in Syria targeting the “foreign fighter logistics network” bringing al-Qaeda operatives into Iraq (See 2008 Abu Kamal raid).[150] A U.S. source told CBS News that “the leader of the foreign fighters, an al-Qaeda officer, was the target of Sunday’s cross-border raid.” He said the attack was successful, but did not say whether or not the al-Qaeda officer was killed.[151] Fox News later reported that Abu Ghadiya, “al-Qa’ida’s senior coordinator operating in Syria”, was killed in the attack.[152] The New York Times reported that during the raid U.S. forces killed several armed males who “posed a threat”.[153]

In September 2014 with the rise of the Islamic State, the U.S. government began aggressive military operations against them in both Iraq and Syria. SAD Ground Branch was placed in charge of the ground war.[154] This is a testament to SAD being the preeminent force for unconventional warfare and their long-standing relationship with the most effective fighting force in the region, the Kurdish Peshmerga.[155]

Pakistan

SAD/SOG has been very active “on the ground” inside Pakistan targeting al-Qaeda operatives for Unmanned Aerial Vehicle (UAV) Predator strikes and along with USSOCOM elements they have been training Pakistani Special Service Group Commandos.[156] Before leaving office, President George W. Bush authorized SAD’s successful killing of eight senior al-Qaeda operatives via targeted air strikes.[157] Among those killed were the mastermind of a 2006 plot to detonate explosives aboard planes flying across the Atlantic Rashid Rauf and the man thought to have planned the Islamabad Marriott Hotel bombing on September 20, 2008 that killed 53 people.[158][159] The CIA Director authorized the continuation of these operations and on January 23, SAD/SOG performed killings of 20 individuals in northwestern Pakistan that were terrorists. Some experts assess that the CIA Director – at that time Leon Panetta – has been more aggressive in conducting paramilitary operations in Pakistan than his predecessor.[160] A Pakistani security official stated that other strikes killed at least 10 insurgents, including five foreign nationals and possibly “a high-value target” such as a senior al-Qaeda or Taliban official.[161] On February 14, the CIA drone killed 27 taliban and al-Qaeda fighters in a missile strike in south Waziristan, a militant stronghold near the Afghan border where al-Qaeda leaders Osama bin Laden and Ayman al-Zawahri were believed to be hiding.[162]

According to the documentary film Drone, by Tonje Schei, since 2002 the U.S. Air Force 17th Reconnaissance Squadronhas been working for the CIA as “customer”, carrying out at least some of the armed missions in Pakistan.[163]

In a National Public Radio (NPR) report dated February 3, 2008, a senior official stated that al-Qaeda has been “decimated” by SAD/SOG’s air and ground operations. This senior U.S. counter-terrorism official goes on to say, “The enemy is really, really struggling. These attacks have produced the broadest, deepest and most rapid reduction in al-Qaida senior leadership that we’ve seen in several years.”[164] President Obama’s CIA Director Leon Panetta stated that SAD/SOG’s efforts in Pakistan have been “the most effective weapon” against senior al-Qaeda leadership.[165][166]

These covert attacks have increased significantly under President Obama, with as many at 50 al-Qaeda militants being killed in the month of May 2009 alone.[167][168][169] In June 2009, sixty Taliban fighters were killed while at a funeral to bury fighters that had been killed in previous CIA attacks.[170] On July 22, 2009, National Public Radio reported that U.S. officials believeSaad bin Laden, a son of Osama bin Laden, was killed by a CIA strike in Pakistan. Saad bin Laden spent years under house arrest in Iran before traveling last year to Pakistan, according to former National Intelligence Director Mike McConnell. It’s believed he was killed sometime in 2009. A senior U.S. counter-terrorism said U.S. intelligence agencies are “80 to 85 percent” certain that Saad bin Laden is dead.[171]

On August 6, 2009, the CIA announced that Baitullah Mehsud was killed by a SAD/SOG drone strike in Pakistan.[172] The New York Times said, “Although President Obama has distanced himself from many of the Bush administration’s counter-terrorism policies, he has embraced and even expanded the C.I.A.’s covert campaign in Pakistan using Predator and Reaper drones”.[172] The biggest loss may be to “Osama bin Laden’s al-Qa’ida”. For the past eight years, al-Qaeda had depended on Mehsud for protection after Mullah Mohammed Omar fled Afghanistan in late 2001. “Mehsud’s death means the tent sheltering Al Qaeda has collapsed,” an Afghan Taliban intelligence officer who had met Mehsud many times told Newsweek. “Without a doubt he was Al Qaeda’s No. 1 guy in Pakistan,” adds Mahmood Shah, a retired Pakistani Army brigadier and a former chief of the Federally Administered Tribal Area, or FATA, Mehsud’s base.[173]

Airstrikes from CIA drones struck targets in the Federally Administered Tribal Areas (FATA) of Pakistan on September 8, 2009. Reports stated that seven to ten militants were killed to include one top al-Qaida leaders. He was Mustafa al-Jaziri, an Algerian national described as an “important and effective” leader and senior military commander for al-Qaida. The success of these operations are believed to have caused senior Taliban leaders to significantly alter their operations and cancel key planning meetings.[174][175]

The CIA is also increasing its campaign using Predator missile strikes on al-Qaeda in Pakistan. The number of strikes in 2009 exceeded the 2008 total, according to data compiled by the Long War Journal, which tracks strikes in Pakistan.[108] In December 2009, the New York Times reported that President Obama ordered an expansion of the drone program with senior officials describing the program as “a resounding success, eliminating key terrorists and throwing their operations into disarray”.[176] The article also cites a Pakistani official who stated that about 80 missile attacks in less than two years have killed “more than 400” enemy fighters, a number lower than most estimates but in the same range. His account of collateral damage was strikingly lower than many unofficial counts: “We believe the number of civilian casualties is just over 20, and those were people who were either at the side of major terrorists or were at facilities used by terrorists.”[176]

On December 6, 2009, a senior al-Qaeda operative, Saleh al-Somali, was killed in a drone strike in Pakistan. He was responsible for their operations outside of the Afghanistan-Pakistan region and formed part of the senior leadership. Al-Somali was engaged in plotting terrorist acts around the world and “given his central role, this probably included plotting attacks against the United States and Europe”.[177][178] On December 31, 2009, senior Taliban leader and strong Haqqani ally Haji Omar Khan, brother of Arif Khan, was killed in the strike along with the son of local tribal leader Karim Khan.[179]

In January 2010, al-Qaeda in Pakistan announced that Lashkar al-Zil leader Abdullah Said al Libi was killed in a drone missile strike. Neither al-Qaeda nor the US has revealed the date of the attack that killed Libi.[180] On January 14, 2010, subsequent to the suicide attack at Camp Chapman, the CIA located and killed the senior Taliban leader in Pakistan, Hakimullah Mehsud. Mehsud had claimed responsibility in a video he made with the suicide bomber Humam Khalil Abu-Mulal al-Balawi.[181]

On February 5, 2010, the Pakistani Inter-Services Intelligence (ISI) and CIA’s SAD/SOG conducted a joint raid and apprehended Mullah Abdul Ghani Baradar. Baradar was the most significant Taliban figure to be detained since the beginning of the Afghan War more than eight years ago until that date. He ranked second to Mullah Muhammad Omar, the Taliban’s founder and was known to be a close associate of Osama bin Laden. Mullah Baradar was interrogated by CIA and ISI officers for several days before news of his capture was released.[182] This capture sent the message that the Taliban leadership is not safe in Afghanistan or Pakistan.[183] “The seizure of the Afghan Taliban’s top military leader in Pakistan represents a turning point in the U.S.-led war against the militants”, U.S. officials and analysts said.[184] Per Pakistani Interior Minister Rehman Malik, several raids in Karachi in early February netted dozens of suspected Afghan militants.[184] In other joint raids that occurred around the same time, Afghan officials said that the Taliban “shadow governorsP for two provinces in northern Afghanistan had also been detained. Mullah Abdul Salam, the Taliban’s leader in Kunduz, and Mullah Mir Mohammed of Baghlan were captured in Akora Khattack.[185]

On February 20, Muhammad Haqqani, son of Jalaluddin Haqqani, was one of four people killed in the drone strike in Pakistan’s tribal region in North Waziristan, according to two Pakistani intelligence sources.[186]

On May 31, 2010, the New York Times reported that Mustafa Abu al Yazid (AKA Saeed al Masri), a senior operational leader for Al Qaeda, was killed in an American missile strike in Pakistan’s tribal areas.[187]

From July to December 2010, predator strikes killed 535 suspected militants in the FATA to include Sheikh Fateh Al Misri, Al-Qaeda’s new third in command on September 25.[188] Al Misri was planning a major terrorist attack in Europe by recruiting British Muslims who would then go on a shooting rampage similar to what transpired in Mumbai in November 2008.[189]

Operation Neptune Spear

File:President Obama on Death of Osama bin Laden.ogv

President Barack Obama‘s address(Text)

On May 1, 2011, President Barack Obama announced that Osama bin Laden had been killed earlier that day in Abbottabad, Pakistan by “a small team of Americans” acting under his direct orders during a CIA operation under Director Leon Panetta.[24][28][190] The helicopter raid was executed from a CIA forward operating base in Afghanistan by the elements of the U.S. Naval Special Warfare Development Group (assigned to the CIA) and CIA paramilitary operatives.[191] [192][193]

The operation in the Bilal military cantonment area in the city of Abbottabad resulted in the acquisition of extensive intelligence on the future attack plans of al-Qaeda.[194][195][196] The body of bin Laden was flown to Afghanistan to be identified and then out to the USS Carl Vinson for a burial at sea.[197] DNA from bin Laden’s body, compared with DNA samples on record from his dead sister, confirmed his identity.

The operation was a result of years of intelligence work that included the Inter-Services Intelligence (ISI), the CIA, the DSS, and the Delta Force‘s, apprehension and interrogation of Khalid Sheik Mohammad (KSM),[198][199][200] the discovery of the real name of the courier disclosed by KSM, the tracking, via signal intelligence, of the courier to the Abbottobad compound by paramilitary operatives and the establishment of a CIA safe house that provided critical advance intelligence for the operation.[201][202][203][203]

The material discovered in the raid indicated that bin Laden was still in charge of his Al-Qaeda organization and was developing plans and issuing orders at the time of his death. There is considerable controversy over claims that elements of the Pakistani government, particularly the ISI, may have been concealing the presence of Osama bin Laden in Pakistan.[204][205][206] Bin Laden’s death has been labeled a “game changer” and a fatal blow to Al-Qaeda, by senior U.S. officials.[207]

Iran

In the early 1950s, the Central Intelligence Agency and Britain’s Secret Intelligence Service were ordered to overthrow the government of Iran, Prime MinisterMohammed Mosaddeq, and re-install deposed Shah Mohammad Reza Pahlavi.[208] This event was called Operation Ajax.[209][210] The senior CIA officer was Kermit Roosevelt, Jr., the grandson of American president Theodore Roosevelt. The operation utilized all of SAD’s components to include political action, covert influence and paramilitary operations. The paramilitary component included training anti-Communist guerrillas to fight the Tudeh Party if they seized power in the chaos of Operation Ajax.[211] Although a significant tactical/operational success, Operation Ajax is considered very controversial with many critics.[212]

In November 1979, a group of Islamist students and militants took over the American embassy in support of the Iranian Revolution.[213] Operation Eagle Claw was the unsuccessful United States military operation that attempted to rescue the 52 hostages from the U.S. Embassy in Tehran, Iran on April 24, 1980. Several SAD/SOG teams infiltrated into Tehran to support this operation.[214]

On March 9, 2007 alleged CIA Agent Robert Levinson was kidnapped from Iran’s Kish Island. On July 7, 2008, Pulitzer Prize winning investigative journalist and author Seymour Hersh wrote an article in the New Yorker stating that the Bush Administration had signed a Presidential Finding authorizing the CIA to begin cross border paramilitary operations from Iraq and Afghanistan into Iran. These operations would be against Quds Force, the commando arm of the Iranian Revolutionary Guard, public and private sector strategic targets, and “high-value targets” in the war on terror. Also enrolled to support CIA objectives were the Mujahideen-e-Khalq, known in the West as the M.E.K.,and the Baluchis insurgents. “The Finding was focused on undermining Iran’s nuclear ambitions and trying to undermine the government through regime change,” a person familiar with its contents said, and involved “working with opposition groups and passing money.”[215] Any significant effort against Iran by the Obama Administration would likely come directly from SAD.[216] and in July 2010, Director Panetta chose a former chief of SAD as the new NCS Director.[217]

Libya

After the Arab Spring movements overthrew the rulers of Tunisia and Egypt, its neighbours to the west and east respectively, Libya had a major revolt beginning in February 2011.[218][219] In response, the Obama administration sent in SAD paramilitary operatives to assess the situation and gather information on the opposition forces.[220][221] Experts speculated that these teams could be determining the capability of these forces to defeat the Muammar Gaddafi regime and whether Al-Qaeda had a presence in these rebel elements.

U.S. officials had made it clear that no U.S. troops would be “on the ground”, making the use of covert paramilitary operatives the only alternative.[222] During the early phases of the Libyan offensive of U.S. led air strikes, paramilitary operatives assisted in the recovery of a U.S. Air Force pilot who had crashed due to mechanical problems.[223] [224] There was speculation that President Obama issued a covert action finding in March 2011 that authorizes the CIA to carry out a clandestine effort to provide arms and support to the Libyan opposition.[225]

Syria

CIA paramilitary teams have been deployed to Syria to report on the uprising, to access the rebel groups, leadership and to potentially train, equip and lead one of those rebel groups against the Bashar al-Assad regime.[226] In early September 2013, President Obama told U.S. Senators that the CIA had trained the first 50-man insurgent element and that they had been inserted into Syria.[227] The deployment of this unit and the supplying of weapons may be the first tangible measure of support since the U.S. stated they would begin providing assistance to the opposition.[228][229]

In October 2013, SAD was tasked with overthrowing the Syrian government of Bashar al-Assad. This program was considered too limited to have the desired outcome.[230] However, with the rise of the Islamic State, SAD was given the overall command and control of the ground fight against them. This fight will cross the borders between Iraq and Syria.[154][231]

Worldwide mission

Khalid Sheikh Mohammed after his capture

The CIA has always had a Special Activities Division, which secretly carries out special operations mission. However, since September 11, 2001 the US government has relied much more on SAD/SOG because fighting terrorists does not usually involve fighting other armies. Rather, it involves secretly moving in and out of countries like Pakistan, Iran and Somaliawhere the American military is not legally allowed to operate.[232]

If there are missions in these countries that are denied to U.S. military special operations forces, SAD/SOG units are the primary national special missions units to execute those operations.[233]

In the War on Terror, SAD has the lead in the covert war being waged against al Qaeda.[11][234] SAD/SOG paramilitary teams have apprehended many of the senior leaders. These include: Abu Zubaydah,[235] the chief of operations for al-Qaeda;Ramzi bin al-Shibh,[236] the so-called the “20th hijacker”;[237] Khalid Sheikh Mohammed, the mastermind of the September 11, 2001 attacks on New York City and Washington, D.C.;[238] Abd al-Rahim al-Nashiri, alleged to be the mastermind of theUSS Cole bombing and leader of al Qaeda operations in the Persian Gulf prior to his capture in November 2002;[239] Abu Faraj al-Libi, al Qaeda’s “field general” believed to have taken the role of No. 3 in al Qaeda following the capture of Khalid Sheikh Mohammed in Pakistan;[240] andMullah Abdul Ghani Baradar, the number two taliban commander and the highest level taliban commander apprehended in the Afghan War.[241] Prior to the beginning of the “War on Terror”, SAD/SOG located and captured many notable militants and international criminals, including Abimael Guzman and Carlos the Jackal. These were just three of the over 50 caught by SAD/SOG just between 1983 and 1995.[242]

In 2002, the George W. Bush Administration prepared a list of “terrorist leaders” the CIA is authorized to kill in a targeted killing, if capture is impractical and civilian casualties can be kept to an acceptable number. The list includes key al Qaeda leaders like Osama bin Laden (deceased) and his chief deputy, Ayman al-Zawahiri, as well as other principal figures from al Qaeda and affiliated groups. This list is called the “high value target list”.[243] The U.S. president is not legally required to approve each name added to the list, nor is the CIA required to obtain presidential approval for specific attacks, although the president is kept well informed about operations.[243]

SAD/SOG teams have been dispatched to the country of Georgia, where dozens of al Qaeda fugitives from Afghanistan are believed to have taken refuge withChechen separatists and thousands of refugees in the Pankisi Gorge. Their efforts have already resulted in 15 Arab militants linked to al Qaeda being captured.[125]

The SAD/SOG teams have also been active in the Philippines, where 1,200 U.S. military advisers helped to train local soldiers in “counter-terrorist operations” against Abu Sayyaf, a radical Islamist group suspected of ties with al Qaeda. Little is known about this U.S. covert action program, but some analysts believe that “the CIA’s paramilitary wing, the Special Activities Division (SAD), has been allowed to pursue terrorist suspects in the Philippines on the basis that its actions will never be acknowledged”.[125]

On July 14, 2009, several newspapers reported that DCIA Leon Panetta was briefed on a CIA program that had not been briefed to the oversight committees in Congress. Panetta cancelled the initiative and reported its existence to Congress and the President. The program consisted of teams of SAD paramilitary officers organized to execute targeted killing operations against al Qaeda operatives around the world in any country. According to the Los Angeles Times, DCIA Panetta “has not ruled out reviving the program”.[11] There is some question as to whether former Vice President Dick Cheney instructed the CIA not to inform Congress.[244]Per senior intelligence officers, this program was an attempt to avoid the civilian casualties that can occur during predator drone strikes using Hellfire missiles.[245][246]

According to many experts, the Obama administration has relied on the CIA and their paramilitary capabilities, even more than they have on U.S. military forces, to maintain the fight against terrorists in the Afghanistan and Pakistan region, as well as places like Yemen, Somalia and North Africa.[247][248] Ronald Kessler states in his book The CIA at War: Inside the Secret War Against Terror, that although paramilitary operations are a strain on resources, they’re winning the war against terrorism.[247][249]

SAD/SOG paramilitary officers executed the clandestine evacuation of U.S. citizens and diplomatic personnel in Somalia, Iraq (during the Persian Gulf War) andLiberia during periods of hostility, as well as the insertion of Paramilitary Operations Officers prior to the entry of U.S. military forces in every conflict since World War II.[250] SAD officers have operated covertly since 1947 in places such as North Korea, Vietnam, Laos, Cambodia, Lebanon, Iran, Syria, Libya, Iraq, El Salvador,Guatemala, Colombia, Mexico, Nicaragua, Honduras, Chile, Bosnia and Herzegovina, Serbia, Somalia, Kosovo, Afghanistan and Pakistan.[251]

Innovations in special operations

The Fulton system in use

The Fulton surface-to-air recovery system (STARS) is a system developed in the early 1950s by CIA paramilitary officers for retrieving persons on the ground from a MC-130E Combat Talon I aircraft. It uses a harness and a self-inflating balloon that carries an attached lift line. An MC-130E engages the line with its V-shaped yoke and the individual is reeled on board.[252]Project COLDFEET was a very successful mission in 1962 in which two military officers parachuted into a remote abandoned Soviet site in the Arctic. The two were subsequently extracted by the Fulton sky hook. The team gathered evidence of advanced research on acoustical systems to detect under-ice US submarines and efforts to develop Arctic anti-submarine warfare techniques.[253]

Sergeant Major (SgtMaj) Billy Waugh was a Special Forces soldier attached to CIA in the 1960s. During his time at MACV-SOG in Vietnam, he developed and conducted the first combat High Altitude-Low Opening (HALO) jump, “In October 1970, my team made a practice Combat Infiltration into the NVA owned War Zone D, in South Vietnam, for reassembly training, etc. This was the first one in a combat zone.”[254] HALO is a method of delivering personnel, equipment, and supplies from a transport aircraft at a high altitude via free-fall parachute insertion. HALO andHAHO (High Altitude-High Opening) are also known as Military Free Fall (MFF). In the HALO technique, the parachutist opens his parachute at a low altitude after free-falling for a period of time to avoid detection by the enemy. Waugh also led the last combat special reconnaissance parachute insertion into enemy territory occupied by communist North Vietnamese Army (NVA) troops on June 22, 1971.[255]

Notable paramilitary officers

On October 25, 2003, paramilitary officers Christopher Mueller and William “Chief” Carlson were killed while conducting an operation to kill/capture high level al-Qa’ida leaders near Shkin, Afghanistan. Both these officers were honored with Stars on the CIA Memorial Wall at their Headquarters in Langley, Virginia.[256] “The bravery of these two men cannot be overstated,” Director of Central Intelligence George J. Tenet told a gathering of several hundred Agency employees and family members. “Chris and Chief put the lives of others ahead of their own. That is heroism defined.” Mueller, a former US Navy SEAL and Carlson, a former Army Special Forces soldier, Delta Force operator, and member of the Blackfeet Nation in Montana, died while on this covert operation. Both officers saved the lives of others, including Afghan soldiers, during the engagement with al-Qa’ida forces.[256][257][258] In Oliver North’s book American Heroes in Special Operations, a chapter is devoted to their story.[259]

Notable political action officers

  • Virginia Hall Goillot started as the only female paramilitary officer in the OSS. She shot herself in the leg while hunting in Turkey in 1932, which was then amputated below the knee. She parachuted into France to organize the resistance with her prosthesis strapped to her body. She was awarded theDistinguished Service Cross. She married an OSS officer named Paul Goillot and the two joined the CIA as paramilitary operations officers in SAD. Once aboard, Mrs. Goillot made her mark as a political action officer playing significant roles in the Guatemala and Guyana operations. These operations involved the covert removal of the governments of these two countries, as directed by the President of the United States.[260]
  • E. Howard Hunt (October 9, 1918 – January 23, 2007) was an Ivy league educated Naval officer who joined the CIA in 1949 after serving with the OSS in World War II. Hunt was a political action officer in what came to be called their Special Activities Division.[261] He became station chief in Mexico City in 1950, and supervised William F. Buckley, Jr., (Not to be confused with a famous SAD Paramilitary Officer of the same name) who worked for the CIA in Mexico during the period 1951–1952. Buckley, another SAD political action specialist, only served briefly in the CIA and went on to be considered the father of the modern American conservative movement. Buckley and Hunt remained lifelong friends.[262] Hunt ran Operation PBSUCCESS, which overthrew the government in Guatemala in 1954, was heavily involved in theBay of Pigs Invasion operation, frequently mentioned in the JFK assassination, and was one of the operatives in the Watergate scandal.[263]Hunt was also a well-known author with over 50 books to his credit. These books were published under several alias names and several were made into motion pictures.[264]
  • David Atlee Phillips Perhaps the most famous propaganda officer ever to serve in CIA, Phillips began his career as a journalist and amateur actor in Buenos Aires, Argentina. He joined the Agency in the 1950s and was one of the chief architects of the operation to overthrow Communist president Arbenz in Guatemala in 1954. He was later heavily engaged as a principal member of the Bay of Pigs Task Force at Langley, and in subsequent anti-Castro operations throughout the 1960s. He founded the Association of Former Intelligence Officers (AFIO) after successfully contesting a libel suit against him.

CIA Memorial Wall

Main article: CIA Memorial Wall

The CIA Memorial Wall is located at CIA headquarters in Langley, Virginia. It honors CIA employees who died in the line of duty.[265] As of August 6, 2012, there were 103 stars carved into the marble wall,[266] each one representing an officer. A majority of these were paramilitary officers.[265] A black book, called the “Book of Honor”, lies beneath the stars and is encased in an inch-thick plate of glass.[266] Inside this book are stars, arranged by year of death, and the names of 77 employees who died in CIA service alongside them.[265][266] The other names remain secret, even in death.[265]

See also

Declaration of war by the United States

From Wikipedia, the free encyclopedia

Franklin D. Roosevelt signs the declaration of war against Japan on December 8, 1941

A declaration of war is a formal declaration issued by a national government indicating that a state of war exists between that nation and another. The document Declarations of War and Authorizations for the Use of Military Force: Historical Background and Legal Implications gives an extensive listing and summary of statutes which are automatically engaged upon the US declaring war.

For the United States, Article One, Section Eight of the Constitution says “Congress shall have power to … declare War”. However, that passage provides no specific format for what form legislation must have in order to be considered a “declaration of war” nor does the Constitution itself use this term. Many[who?] have postulated “Declaration(s) of War” must contain that phrase as or within the title. Others oppose that reasoning. In the courts, the United States Court of Appeals for the First Circuit, in Doe v. Bush, said: “[T]he text of the October Resolution itself spells out justifications for a war and frames itself as an ‘authorization’ of such a war.”[1] in effect saying an authorization suffices for declaration and what some may view as a formal Congressional “Declaration of War” was not required by the Constitution.

This article will use the term “formal declaration of war” to mean Congressional legislation that uses the phrase “declaration of war” in the title. Elsewhere, this article will use the terms “authorized by Congress”, “funded by Congress” or “undeclared war” to describe other such conflicts.

History

The United States has formally declared war against foreign nations five separate times, each upon prior request by the President of the United States. Four of those five declarations came after hostilities had begun.[2] James Madison reported that in the Federal Convention of 1787, the phrase “make war” was changed to “declare war” in order to leave to the Executive the power to repel sudden attacks but not to commence war without the explicit approval of Congress.[3] Debate continues as to the legal extent of the President’s authority in this regard.

After Congress repealed the Gulf of Tonkin Resolution in January 1971 and President Richard Nixon continued to wage war in Vietnam, Congress passed the War Powers Resolution (Pub.L. 93–148) over the veto of Nixon in an attempt to rein in some of the president’s claimed powers. The War Powers Resolution proscribes the only power of the president to wage war which is recognized by Congress.

Declarations of war

Formal

The table below lists the five wars in which the United States has formally declared war against eleven foreign nations.[4] The only country against which the United States has declared war more than once is Germany, against which the United States has declared war twice (though a case could be made for Hungary as asuccessor state to Austria-Hungary).

In World War II, the Japanese attacked Pearl Harbor on December 7, 1941. Germany and Italy, led respectively by Adolf Hitler and Benito Mussolini, declared war on the United States, and the U.S. Congress responded in kind.[5][6]

War Declaration Opponent(s) Date of declaration Votes President Result
Senate House
War of 1812 Declaration of War upon the U.K.  United Kingdom June 18, 1812 19–13 79–49 James Madison Treaty of Ghent(December 24, 1814)
Mexican–American War “An Act providing for the Prosecution of the existing War between the United States and the Republic of Mexico.”[7] Mexico May 13, 1846 40–2 173–14 James K. Polk Treaty of Guadalupe Hidalgo (February 2, 1848)
Spanish–American War Declaration of War upon Spain  Spain April 25, 1898 42–35 310–6 William McKinley Treaty of Paris(December 10, 1898)
World War I Declaration of War upon Germany  Germany April 6, 1917 82–6 373–50 Woodrow Wilson Treaty of Berlin (August 25, 1921)
Declaration of War upon Austria-Hungary[8][9]  Austria-Hungary December 7, 1917 74–0 365–1 1921 U.S.–Austrian Peace Treaty (August 24, 1921), 1921 U.S.-Hungarian Peace Treaty (August 29, 1921)
World War II Declaration of War upon Japan  Japan December 8, 1941 82–0 388–1 Franklin D. Roosevelt V-J Day, Japanese Instrument of Surrender(September 2, 1945),Treaty of San Francisco(September 8, 1951)
Declaration of War upon Germany  Germany December 11, 1941 88–0 393–0 V-E Day, German Instrument of Surrender(May 8, 1945), Treaty on the Final Settlement with Respect to Germany (September 12, 1990), Treaty of Vienna with Austria (May 15, 1955)
Declaration of War upon Italy  Italy 90–0 399–0 Paris Peace Treaty(February 10, 1947)
Declaration of War upon Bulgaria  Bulgaria June 5, 1942 73–0 357–0
Declaration of War upon Hungary[8]  Hungary 360–0
Declaration of War upon Romania[8]  Romania 361-0

Military engagements authorized by Congress

In other instances, the United States has engaged in extended military combat that was authorized by Congress.

War or conflict Opponent(s) Initial authorization Votes President Result
U.S. Senate U.S. House
Quasi-War France Act Further to Protect the Commerce of the United States
July 9, 1798
18-4 John Adams Treaty of Mortefontaine
First Barbary War Tripoli February 6, 1802[10] Thomas Jefferson War ended 1805
Second Barbary War Algiers May 10, 1815[11] James Madison War ended 1816
Enforcing 1808 slave trade ban; naval squadron sent to African waters to apprehend illegal slave traders Slave traders and pirates “Act in addition to the acts prohibiting the Slave Trade” 1819 James Monroe 1822 first African-American settlement founded in Liberia, 1823 U.S. Navy stops anti-trafficking patrols
Redress for attack on U.S. Navy‘sUSS Water Witch  Paraguay 1858.[12] James Buchanan
Occupation of Veracruz  Mexico H.J.R. 251, 38 Stat. 770
April 22, 1914
337–37 Woodrow Wilson Force withdrawn after six months. However, the Joint Resolution was likely used to authorize the Pancho Villa Expedition. In the Senate, “when word reached the Senate that the invasion had gone forward before the use-of-force resolution had been approved, Republicans reacted angrily” saying it was a violation of the Constitution, but eventually after the action had already started, a resolution was passed after the action to “justify” it since Senators did not think it was a declaration of war.[13][14]
Intervention during the Russian Civil War  Russia 1918 [15] Woodrow Wilson
Lebanon crisis of 1958 Lebanese opposition, led by
Al-Mourabitoun
Progressive Socialist Party
H.J. Res. 117, Public Law 85-7, Joint Resolution “To promote peace and stability in the Middle East”, March 9, 1957[16] 72–19 355–61 Dwight D. Eisenhower U.S. forces withdrawn, October 25, 1958
Vietnam War Viet Cong
North Vietnam
Gulf of Tonkin Resolution, August 7, 1964 88–2 416–0 John F. Kennedy, Lyndon B. Johnson, Richard M. Nixon U.S. forces withdrawn under terms of the Paris Peace Accords signed January 27, 1973
Multinational Force in Lebanon Shia and Druze militias; Syria S.J.R. 159
September 29, 1983
54–46 253–156 Ronald W. Reagan Forces withdrawn in 1984
Persian Gulf War Iraq H.R.J. Res. 77
January 12, 1991.
52–47 250–183 George H.W. Bush The United Nations Security Council drew up terms for the cease-fire, April 3, 1991
War in Afghanistan Afghanistan
al-Qaeda
S.J. Res. 23
September 14, 2001
98–0 420–1 George W. Bush War ended on December 28, 2014
Iraq War[17] Iraq H.J. Res. 114,
March 3, 2003
77–23 296–133 George W. Bush Ba’athist Iraqi government deposed April 2003. U.S. combat operations ended August 31, 2010. War ended December 15, 2011. Destabilization of Iraq and emergence of ISIL in the region 2011–present.[18]

Military engagements authorized by United Nations Security Council Resolutions and funded by Congress

In many instances, the United States has engaged in extended military engagements that were authorized by United Nations Security Council Resolutions and funded by appropriations from Congress.

Military engagement Opponent(s) Initial authorization President Result
Korean War  North Korea
 China
UNSCR 84, 1950 Harry S. Truman Korean Armistice Agreement,[19] 1953
Multinational Force in Lebanon Shia militias, Druzemiltias, Syria UNSCR 425, 1978UNSCR 426, 1978 Jimmy Carter, Ronald Reagan U.S. forces withdrew in 1984
Persian Gulf War Iraq UNSCR 678, 1990 George H. W. Bush UNSCR 689, 1991
Bosnian War Republika Srpska UNSCR 770, 1992
UNSCR 776, 1992
UNSCR 836, 1993
Bill Clinton Reflagged as IFOR in 1995, Reflagged as SFORin 1996, Completed in 2004
Second Liberian Civil War Peacekeeping UNSCR 1497, 2003 George W. Bush U.S. forces are withdrawn in 2003 after theUNMIL is established.
Haitian coup d’état UNSCR 1529, 2004UNSCR 1542, 2004 2004
Libyan Civil War Libya UNSCR 1973, 2011 Barack Obama Debellation of the Libyan Arab Jamahiriya, October 31, 2011

Other undeclared wars

On at least 125 occasions, the President has acted without prior express military authorization from Congress.[20] These include instances in which the United States fought in the Philippine–American War from 1898–1903, in Nicaragua in 1927, as well as the NATO bombing campaign of Yugoslavia in 1999.

The United States’ longest war was fought between approximately 1840 and 1886 against the Apache Nation. During that entire 46-year period, there was never more than 90 days of peace.[citation needed]

The Indian Wars comprise at least 28 conflicts and engagements. These localized conflicts, with Native Americans, began with European colonists coming to North America, long before the establishment of the United States. For the purpose of this discussion, the Indian Wars are defined as conflicts with the United States of America. They begin as one front in the American Revolutionary War in 1775 and had concluded by 1918. The United States Army still maintains a campaign streamer for Pine Ridge 1890–1891 despite opposition from certain Native American groups.[21]

The American Civil War was not an international conflict under the laws of war, because the Confederate States of America was not a government that had been granted full diplomatic recognition as a sovereign nation by other sovereign states.[22][23] The CSA was recognized by the United States government as a belligerent power, a different status of recognition that authorized Confederate warships to visit non-U.S. ports. This recognition of the CSA’s status as a belligerent power did not impose any duty upon the United States to recognize the sovereignty of the Confederacy, and the United States never did so.

The War Powers Resolution

In 1973, following the withdrawal of most American troops from the Vietnam War, a debate emerged about the extent of presidential power in deploying troops without a declaration of war. A compromise in the debate was reached with the War Powers Resolution. This act clearly defined how many soldiers could be deployed by the President of the United States and for how long. It also required formal reports by the President to Congress regarding the status of such deployments, and limited the total amount of time that American forces could be deployed without a formal declaration of war.

Although the constitutionality of the act has never been tested, it is usually followed, most notably during the Grenada Conflict, the Panamanian Conflict, the Somalia Conflict, the Persian Gulf War, and the Iraq War[clarification needed]. The only exception was President Clinton’s use of U.S. troops in the 78-day NATO air campaign against Yugoslavia during the Kosovo War.[citation needed] In all other cases, the President asserted the constitutional authority to commit troops without the necessity of Congressional approval, but in each case the President received Congressional authorization that satisfied the provisions of the War Powers Act.

On March 21, 2011, a number of lawmakers expressed concern that the decision of President Barack Obama to order the U.S. military to join in attacks of Libyan air defenses and government forces exceeded his constitutional authority because the decision to authorize the attack was made without Congressional permission.[24]

See also

References

  1. Jump up^ Doe v. Bush, 03-1266, (March 13, 2003)”. FindLaw. Retrieved 20 June 2013.
  2. Jump up^ Henderson, Phillip G. (2000). The presidency then and now. Rowman & Littlefield. p. 51. ISBN 978-0-8476-9739-7.
  3. Jump up^ The Debates in the Federal Convention of 1787 reported by James Madison : August 17,The Avalon Project, Yale Law School, retrieved Feb 13, 2008
  4. Jump up^ Official Declarations of War by Congress
  5. Jump up^ BBC News, On This Day
  6. Jump up^ Whereas the Government of Germany has formally declared war against the government and the people of the United States of America… the state of war between the United States and the Government of Germany which has thus been thrust upon the United States is hereby formally declared. The War Resolution
  7. Jump up^ United States Congress (May 13, 1846). “An Act providing for the Prosecution of the existing War between the United States and the Republic of Mexico.” (PDF).Government of the United States of America. Government of the United States of America. Retrieved August 10, 2006.
  8. ^ Jump up to:a b c https://fas.org/sgp/crs/natsec/RL31133.pdf
  9. Jump up^ H.J.Res.169: Declaration of War with Austria-Hungary, WWI, United States Senate
  10. Jump up^ Key Events in the Presidency of Thomas Jefferson, Miller Center of Public Affairs, University of Virginia, (retrieved on August 10, 2010).
  11. Jump up^ Key Events in the Presidency of James Madison, Miller Center of Public Affairs, University of Virginia, (retrieved on August 10, 2010).
  12. Jump up^ Expenses – Paraguay Expedition, House of Representatives, 36th Congress, 1st Session, Mis. Doc. No. 86 (May 11, 1860), p. 142
  13. Jump up^ http://www.dtic.mil/cgi-bin/GetTRDoc?AD=ADA416074
  14. Jump up^ http://www.wilsoncenter.org/sites/default/files/ACF18F1.pdf
  15. Jump up^ A History of Russia, 7th Edition, Nichlas V. Riasanovsky & Mark D. Steinberg, Oxford University Press, 2005.
  16. Jump up^ http://www.shafr.org/wp-content/uploads/2011/11/U.S.-Congress-Approval-of-the-Eisenhower-Doctrine-1957.pdf
  17. Jump up^ http://www.msnbc.msn.com/id/38944049/ns/politics-white_house
  18. Jump up^ Londoño, Ernesto (August 19, 2010). “Operation Iraqi Freedom ends as last combat soldiers leave Baghdad”. The Washington Post.
  19. Jump up^ s:Korean Armistice Agreement
  20. Jump up^ The President’s Constitutional Authority To Conduct Military Operations Against Terrorists and Nations Supporting Them
  21. Jump up^ Army Continues to Parade Wounded Knee Battle Streamer, National Congress of American Indians.
  22. Jump up^ “Preventing Diplomatic Recognition of the Confederacy, 1861–1865”. U.S. Department of State.
  23. Jump up^ McPherson, James M. (2007). This Mighty Scourge: Perspectives on the Civil War. Oxford University Press US. p. 65. ISBN 978-0-19-531366-6.
  24. Jump up^ Obama Attacked for No Congressional Consent on Libya, New York Times.

Further reading

External links

The Pronk Pops Show Podcasts Portfolio

Listen To Pronk Pops Podcast or Download Show 556-559

Listen To Pronk Pops Podcast or Download Show 546-555

Listen To Pronk Pops Podcast or Download Show 538-545

Listen To Pronk Pops Podcast or Download Show 532-537

Listen To Pronk Pops Podcast or Download Show 526-531

Listen To Pronk Pops Podcast or Download Show 519-525

Listen To Pronk Pops Podcast or Download Show 510-518

Listen To Pronk Pops Podcast or Download Show 500-509

Listen To Pronk Pops Podcast or Download Show 490-499

Listen To Pronk Pops Podcast or Download Show 480-489

Listen To Pronk Pops Podcast or Download Show 473-479

Listen To Pronk Pops Podcast or Download Show 464-472

Listen To Pronk Pops Podcast or Download Show 455-463

Listen To Pronk Pops Podcast or Download Show 447-454

Listen To Pronk Pops Podcast or Download Show 439-446

Listen To Pronk Pops Podcast or Download Show 431-438

Listen To Pronk Pops Podcast or Download Show 422-430

Listen To Pronk Pops Podcast or Download Show 414-421

Listen To Pronk Pops Podcast or Download Show 408-413

Listen To Pronk Pops Podcast or Download Show 400-407

Listen To Pronk Pops Podcast or Download Show 391-399

Listen To Pronk Pops Podcast or Download Show 383-390

Listen To Pronk Pops Podcast or Download Show 376-382

Listen To Pronk Pops Podcast or Download Show 369-375

Listen To Pronk Pops Podcast or Download Show 360-368

Listen To Pronk Pops Podcast or Download Show 354-359

Listen To Pronk Pops Podcast or Download Show 346-353

Listen To Pronk Pops Podcast or Download Show 338-345

Listen To Pronk Pops Podcast or Download Show 328-337

Listen To Pronk Pops Podcast or Download Show 319-327

Listen To Pronk Pops Podcast or Download Show 307-318

Listen To Pronk Pops Podcast or Download Show 296-306

Listen To Pronk Pops Podcast or Download Show 287-295

Listen To Pronk Pops Podcast or Download Show 277-286

Listen To Pronk Pops Podcast or Download Show 264-276

Listen To Pronk Pops Podcast or Download Show 250-263

Listen To Pronk Pops Podcast or Download Show 236-249

Listen To Pronk Pops Podcast or Download Show 222-235

Listen To Pronk Pops Podcast or Download Show 211-221

Listen To Pronk Pops Podcast or Download Show 202-210

Listen To Pronk Pops Podcast or Download Show 194-201

Listen To Pronk Pops Podcast or Download Show 184-193

Listen To Pronk Pops Podcast or Download Show 174-183

Listen To Pronk Pops Podcast or Download Show 165-173

Listen To Pronk Pops Podcast or Download Show 158-164

Listen To Pronk Pops Podcast or Download Show 151-157

Listen To Pronk Pops Podcast or Download Show 143-150

Listen To Pronk Pops Podcast or Download Show 135-142

Listen To Pronk Pops Podcast or Download Show 131-134

Listen To Pronk Pops Podcast or Download Show 124-130

Listen To Pronk Pops Podcast or Download Shows 121-123

Listen To Pronk Pops Podcast or Download Shows 118-120

Listen To Pronk Pops Podcast or Download Shows 113 -117

Listen To Pronk Pops Podcast or Download Show 112

Listen To Pronk Pops Podcast or Download Shows 108-111

Listen To Pronk Pops Podcast or Download Shows 106-108

Listen To Pronk Pops Podcast or Download Shows 104-105

Listen To Pronk Pops Podcast or Download Shows 101-103

Listen To Pronk Pops Podcast or Download Shows 98-100

Listen To Pronk Pops Podcast or Download Shows 94-97

Listen To Pronk Pops Podcast or Download Shows 93

Listen To Pronk Pops Podcast or Download Shows 92

Listen To Pronk Pops Podcast or Download Shows 91

Listen To Pronk Pops Podcast or Download Shows 88-90

Listen To Pronk Pops Podcast or Download Shows 84-87

Listen To Pronk Pops Podcast or Download Shows 79-83

Listen To Pronk Pops Podcast or Download Shows 74-78

Listen To Pronk Pops Podcast or Download Shows 71-73

Listen To Pronk Pops Podcast or Download Shows 68-70

Listen To Pronk Pops Podcast or Download Shows 65-67

Listen To Pronk Pops Podcast or Download Shows 62-64

Listen To Pronk Pops Podcast or Download Shows 58-61

Listen To Pronk Pops Podcast or Download Shows 55-57

Listen To Pronk Pops Podcast or Download Shows 52-54

Listen To Pronk Pops Podcast or Download Shows 49-51

Listen To Pronk Pops Podcast or Download Shows 45-48

Listen To Pronk Pops Podcast or Download Shows 41-44

Listen To Pronk Pops Podcast or Download Shows 38-40

Listen To Pronk Pops Podcast or Download Shows 34-37

Listen To Pronk Pops Podcast or Download Shows 30-33

Listen To Pronk Pops Podcast or Download Shows 27-29

Listen To Pronk Pops Podcast or Download Shows 17-26

Listen To Pronk Pops Podcast or Download Shows 16-22

Listen To Pronk Pops Podcast or Download Shows 10-15

Listen To Pronk Pops Podcast or Download Shows 01-09

Read Full Post | Make a Comment ( None so far )

The Pronk Pops Show 373, Novmeber 18, 2014, Story 1: Agent Provocateur: Government Agencies (FBI and NSA and others) and Mass Media Provoking Riots in Ferguson To Increase Budgets and Ratings — Is Justice Department Under Holder Using The FBI As Agent Provocateurs? — Playing The Blame Game — Videos

Posted on November 18, 2014. Filed under: Assault, Blogroll, Communications, Corruption, Crime, Culture, Disasters, Education, Employment, Federal Government, Government, Homicide, National Security Agency, Videos, Violence, Wisdom | Tags: , , , , , , , , , , , , , , , , , , , , , , , |

Project_1

The Pronk Pops Show Podcasts

Pronk Pops Show 373: November 18, 2014

Pronk Pops Show 372: November 17, 2014

Pronk Pops Show 371: November 14, 2014

Pronk Pops Show 370: November 13, 2014

Pronk Pops Show 369: November 12, 2014

Pronk Pops Show 368: November 11, 2014

Pronk Pops Show 367: November 10, 2014

Pronk Pops Show 366: November 7, 2014

Pronk Pops Show 365: November 6, 2014

Pronk Pops Show 364: November 5, 2014

Pronk Pops Show 363: November 4, 2014

Pronk Pops Show 362: November 3, 2014

Pronk Pops Show 361: October 31, 2014

Pronk Pops Show 360: October 30, 2014

Pronk Pops Show 359: October 29, 2014

Pronk Pops Show 358: October 28, 2014

Pronk Pops Show 357: October 27, 2014

Pronk Pops Show 356: October 24, 2014

Pronk Pops Show 355: October 23, 2014

Pronk Pops Show 354: October 22, 2014

Pronk Pops Show 353: October 21, 2014

Pronk Pops Show 352: October 20, 2014

Pronk Pops Show 351: October 17, 2014

Pronk Pops Show 350: October 16, 2014

Pronk Pops Show 349: October 15, 2014

Pronk Pops Show 348: October 14, 2014

Pronk Pops Show 347: October 13, 2014

Pronk Pops Show 346: October 9, 2014

Pronk Pops Show 345: October 8, 2014

Pronk Pops Show 344: October 6, 2014

Pronk Pops Show 343: October 3, 2014

Pronk Pops Show 342: October 2, 2014

Pronk Pops Show 341: October 1, 2014

Pronk Pops Show 340: September 30, 2014

Pronk Pops Show 339: September 29, 2014

Pronk Pops Show 338: September 26, 2014

Pronk Pops Show 337: September 25, 2014

Pronk Pops Show 336: September 24, 2014

Pronk Pops Show 335: September 23 2014

Pronk Pops Show 334: September 22 2014

Pronk Pops Show 333: September 19 2014

Pronk Pops Show 332: September 18 2014

Pronk Pops Show 331: September 17, 2014

Pronk Pops Show 330: September 16, 2014

Pronk Pops Show 329: September 15, 2014

Pronk Pops Show 328: September 12, 2014

Pronk Pops Show 327: September 11, 2014

Pronk Pops Show 326: September 10, 2014

Pronk Pops Show 325: September 9, 2014

Pronk Pops Show 324: September 8, 2014

Pronk Pops Show 323: September 5, 2014

Pronk Pops Show 322: September 4, 2014

Pronk Pops Show 321: September 3, 2014

Pronk Pops Show 320: August 29, 2014

Pronk Pops Show 319: August 28, 2014

Pronk Pops Show 318: August 27, 2014 

Pronk Pops Show 317: August 22, 2014

Pronk Pops Show 316: August 20, 2014

Pronk Pops Show 315: August 18, 2014

Pronk Pops Show 314: August 15, 2014

Pronk Pops Show 313: August 14, 2014

Pronk Pops Show 312: August 13, 2014

Pronk Pops Show 311: August 11, 2014

Pronk Pops Show 310: August 8, 2014

Pronk Pops Show 309: August 6, 2014

Pronk Pops Show 308: August 4, 2014

Pronk Pops Show 307: August 1, 2014

Story 1: Agent Provocateur: Government Agencies (FBI and NSA and others) and Mass Media Provoking Riots in Ferguson To Increase Budgets and Ratings — Is Justice Department Under Holder Using The FBI As Agent Provocateurs? — Playing The Blame Game — Videos

Stuff They Don’t Want You to Know – Dirty Tricks: Agent Provocateur

Preparing for violence in Missouri

Ferguson Nervously Awaits Grand Jury Decision

How police Agent Provocateur frame people

Provocateur Caught Throwing Bricks At Ferguson Police

John Sayles on New FBI Rules & Role of Agent Provocateurs in Disrupting Social Movements

FBI Warns of Ferguson Violence from ‘Extremists’ After Grand Jury Decision

Ferguson Missouri More Feds Than Protestors

Ferguson braces for grand jury decision

Snipers Take Aim and Push Infowars Reporters

Combat Vet Ferguson Missouri Has Turned Into Fallujah Iraq

Infowars Shatters Multiple Mainstream Media Lies in Ferguson, MO

Infowars Recounts Ferguson Police State

Missouri Deploys National Guard

Occupy LA – Police Provocateurs Confirmed

Occupy LA has become victim to police provocateur (under cover cops causing violence) much like other cities around the world. What to look for:

The same boots,
black masks
black backpacks,
specific type of black bandana.

Police Provocateurs are not smart, and they are easy to spot. Do not let your 1st amendment rights be trampled by corrupt police.

LAPD Infiltrators and Agent Provocateurs Targeted Left and Panthers – Johnston on RAI – (2/4)

The Deep State and the Power of Billionaires – David Cay Johnston on Reality Asserts Itself (3/4)

Ferguson on the edge: RT America special on eve of grand jury ruling

Michael Brown Protests Turns Into RIOT…LOOTINGS…VIOLENCE(RIOT Police Called In)

Ferguson, Missouri LOOTERS Target FOOT LOCKER…FAMILY DOLLAR …RIMS… BURNS Down QUICKTRIP!!

Violence erupts in Ferguson

COINTELPRO 101 – The Sabotage Of Legitimate Dissent

Activists Who Stole FBI Documents in 1971 Revealing COINTELPRO Speak Out

Betty Medsger “The Burglary”

TREASON 101 FBI Cointelpro

COINTELPRO: The FBI’s War on Black America

BUSTED! Proof Missouri Riots Were Obama’s Attempt To Implement A Martial Law Police State!

FBI Agent Provocateur Suggested Terror Attack at Mosque

FBI – Don’t post that or I’ll be “livid”

Return of the Ferguson War Zone? Missouri Enacts State of Emergency Ahead of Mike Brown Grand Jury

 Missouri Gov. Jay Nixon has declared a state of emergency in advance of the grand jury’s pending decision in the Michael Brown shooting case. On Monday, Nixon issued an executive order to activate the state’s National Guard in response to what he called “the possibility of expanded unrest.” Nixon cited the protests in Ferguson and the St. Louis area since Brown, an unarmed black teenager, was killed by police officer Darren Wilson on August 9. The grand jury has been meeting for nearly three months, and protests are expected to escalate if they choose not to indict. But while state officials say they fear violence, protesters say they fear a return to the militarized crackdown that turned their community into a war zone. As the grand jury nears a decision and all sides prepare for the unknown under a state of emergency, we are joined by two guests: Jeff Smith, a New School professor and former Missouri state senator whose new book is “Ferguson: In Black and White,” and Montague Simmons, chair of the St. Louis-based Organization for Black Struggle and a key organizer in the movement that has emerged since Brown’s killing.

Under Obama, U.S. personal freedom ranking slips below France

U.S. Secrets: Classified Intelligence, CIA,FBI,NSA,Secret Service, Edward Snowden

 

The No Indictment.org Ferguson protest group released its list of potential targets following the decision by the St. Louis County Courthouse on the Mike Brown case.

The published map shows expected landmarks like the Ferguson City Hall and the County Courthouse.

But it also marks things that have NOTHING to do with the Michael Brown situation, like Anheuser Busch and Boeing.
ferguson targets

Most telling thing is the mark for Emerson Electric. Emerson has been in Ferguson for at least 50 years, long before Ferguson became a minority municipality. Yet not only do they mark Emerson they make note of the CEO’s salary. Maybe they’re mutating into an extortion group straight out of the playbook of Jesse Jackson’s Rainbow Push Coalition?

Below is the published list of potential St. Louis area targets.
Potential Action Locations

  • Robert McCulloch’s office
  • St. Louis County Justice Center
  • Stephanie Karr’s office
  • Olin Corporation Headquarters
  • Judge Maura McShane’s courtroom
  • St. Louis County Police Department
  • Governor Nixon’s Office (Wainwright Building)
  • Clayton School District Office
  • Department of Justice
  • Dean Plocher’s office
  • Ronald Brockmeyer’s office
  • Dan Boyle’s office
  • Thomas Flach’s office
  • Regal III Market
  • Canfield Green Apartments
  • Ferguson Police Department & Jail
  • West Florissant Quick Trip
  • Missouri Botanical Gradens
  • Powell Symphony Hall
  • Monsanto Headquarters
  • Peabody Energy Headquarters
  • Anheuser-Busch Headquarters
  • Emerson Electric Headquarters
  • Steve Stenger’s lawfirm
  • St. Louis Art Museum
  • Gateway Arch
  • Peabody Opera House
  • Ritz Carlton
  • Lambert International Airport
  • Mayor Slay
  • Boeing
  • St. Louis City Police Department
  • St. Louis Galleria
  • Plaza Frontenac
  • Six Stars Market
  • Colonel Jon Belmar
  • Senator Roy Blunt
  • Senator Claire McCaskill
  • St. Louis City Justice Center
  • St. Ann Police Department & Jail
  • Clayton City Hall
  • GCI Security, Inc.
  • St. Louis County Council
  • Clayton Police Department & Jail
  • Ferguson City Hall
  • Lacy Clay’s Office
  • Donors
  • Husch Blackwell LLP
  • Martin Insurance Group LLC
  • Stone, Leyton & Gershman
  • University Square Company
  • Stone & Alter Real Estate
  • Carey & Danis LLC
  • The Law Firm of Thomas C Antoniou LLC
  • Hammond & Shinners Law Firm
  • Collinsville Acquisitions Inc
  • Thompson Coburn
  • Commercial Bank
  • Sanctuaries
  • Greater St. Mark Family Church
  • Veterans for Peace Office
  • St. John’s Episcopal Church
  • Hospitals
  • St. Louis University Hospital
  • SSM Cardinal Glennon Children’s Medical Center
  • SSM St. Mary’s Health Center
  • Barnes Jewish Hospital
  • St. Alexius Hospital
  • Kindred Hospital
  • Southwest Medical Center

The Ferguson Mike Brown protesters are not ruling out violence or looting.

“Rioting and looting are the tools of those without a voice. The rioting and looting, while I didn’t participate in it, was necessary. Without it we would not be standing here today.”

 

http://www.thegatewaypundit.com/2014/11/justice-for-mike-brown-group-releases-list-of-targets-including-anheuser-busch-boeing-emerson-electric-airport/

 

No Indictment Planning

#Ferguson

 

In preparation for a no-indictment decision, here is the important information to know.

 

On August 9, 2014, Mike Brown was killed by Officer Darren Wilson. For nearly 100 days, we have protested to demand an indictment. We are hopeful that Darren Wilson will be indicted for murder, but the recent signs do not seem that this outcome is likely.

 

We will update this page daily with key information regarding post indictment decision announcement planning. And this isn’t meant to replace twitter or the newsletter, but to be a central space for information that can be updated in real-time.

 

If you’d like to donate, please click here.

 

If you have not already done so, please read the last Protestor and Ally Open Letter entitled, “An American Horror Story,” by clicking here.

 

We are on the right side of justice. Stand with us.

 

// Netta (@nettaaaaaaaa) and DeRay (@deray)

 

P.S. To suggest additions to the site, please e-mail us at netta@thisisthemovement.org or deray@thisisthemovement.org.

Possible Protest Spaces

Here is a map of possible protest spaces. Remember, we actively advocate and profess the importance of peaceful protest. We do not support, condone, or encourage violence.

 

Safe Spaces

These are spaces to escape police violence, get updated on protest plans and all are located near protest zones.

 

Shaw: St. John’s Episcopal Church, 3664 Arsenal, 63166

 

Ferguson: Greater St. Mark’s Church, 9950 Glen Owen Drive, 63136

 

Clayton: Veterans for Peace Office, 216 S. Meramec Ave., 63105

 

 

Day of Non-Indictment Decision Announcement

On the day of the non-indictment announcement, protestors are gathering at the #Ferguson PD Lot and at VonDerrit’s memorial site in Shaw.

 

Day AFTER Non-Indictment Decision Announcement

On the day AFTER the non-indictment announcement, protestors are gathering in Clayton. More information is forthcoming.

 

Grand Jury Announcement Text Alert

Click here to sign up to receive a text alert when the Grand Jury makes its decision regarding the killing of Michael Brown Jr. (Here’s the direct link: http://bit.ly/GJText)

 

Rules of Engagement

Protestors publicly proposed Rules of Engagement for police in the event of a non-indictment. Here is the link to the rules: http://media.wix.com/ugd/9c5255_9d5572481c7840fbad088ef6d8ae82d4.pdf

 

Law-Related Volunteers

Lawyers, Legal Workers, and Law Students — The Ferguson Legal Defense Fund, a coalition of St. Louis lawyers and firms, has issued an emergency call to action to find volunteers to assist with legal representation, jail supports and visits, legal research, legal observation, and legal observation and training. Click here to learn more and to volunteer.

 

Nationwide Actions Planned

Click here to learn more about the actions planned across the country in the event of a non-indictment. Actions are currently planned in 50+ cities across America.

 

Protest Preparation

For a primer and re-cap of the direct action trainings, click here to access the core materials. More information will be posted in the coming days.

 

Support With Safe House Supplies

All supplies are to be delivered to World Community Center at 438 N Skinker Blvd.

Food
Apples, Oranges, Pretzels, Chips, Crackers, Peanut Butter, Jelly, Carrots, Granola Bars, Cookies, Chips & Salsa, Nuts, Bread, Jerky, Cheese, Hummus
Drinks
Water, Coffee, Tea, Juice, Gatorade
Cleaning/Eating
Toilet Paper, Paper Towels, Disinfectant Wipes, Hand Soap, Disposable Plates, Cups, Napkins, Utensils, Trash Bags
Electronics
Surge Protectors, Flashlights (w/ batteries), Cell Phone Chargers
Wearables
Blankets, Hand Warmers
Communication
Flip Chart Markers, Pens, Pads of Paper

 

 

Safe Spaces and Sanctuaries

We will publish the list of Safe Spaces and Sanctuaries later this week.

 

Hospitals and urgent care: Name, address, approximate time by car from Canfield Green Apts, phone number, hours.

  • St Louis University Hospital: 3635 Vista Ave, STL. 25 min. 314-577-8000.
  • Concentra Urgent Care: 463 Lynn Haven, Hazelwood. 13 Min. 314-731-0448. M-F 8-5
  • Concentra Urgent Care — North Broadway. 8340 N Broadway, STL. 15 min. 314-385-9563. M-F 8-5.
  • St Luke’s Urgent Care: 8857 Ladue Rd, STL. 18 min. 314-576-8189. M-Su 8-8.

 

 

Protestor Action Kit:

  1. Jail support number written on your body with permanent marker
  2. Change of warm clothes
  3. Plastic gallon bags
  4. Snacks/Water
  5. Portable phone charger
  6. Paper map
  7. Medications
  8. Gloves, hat, scarf, hand warmers
  9. Shatter proof goggles
  10. Quick reference sheet with names (first, last) and date of birth for each member of your team/cohort and any important phone numbers and addresses
  11. Medical supplies: gauze, tape, L.A.W. (liquid antacid and water – Maalox and water), mask, cold pack

 

Support With Protest Supplies

All supplies are to be delivered to World Community Center at 438 N Skinker Blvd.

Signage
White Bed Sheets (for banners), Banners, Spray Paint
Gas Masks
2 liter plastic bottles, box cutters, duct tape, rubber foam, shoestrings, elastic bands, glue
Wooden Shields
Rubber hoses, ¾” and ½” Phillps screws, 11/32” plywood sheathing cut into 32X34” sections, electric drills or Phillips screwdrives
Other

http://noindictment.org/

FBI Warns Ferguson Decision ‘Will Likely’ Lead to Violence By Extremists Protesters

Jeff Roberson/AP Photo
PHOTO: A protester kicks a smoke grenade that had been deployed by police back in the direction of police, Aug. 13, 2014, in Ferguson, Mo.

The bulletin cites a series of recent messages threatening law enforcement, including a message posted online last week by a black separatist group that offered “a $5,000 bounty for the location” of Ferguson police officer Darren Wilson, who fired the shots that killed Brown on Aug. 9.

In interviews with ABC News, police officials said their departments have identified a number of agitators who routinely appear at mass demonstrations.

“How many of those sympathizers are actually sympathizers?” Rick Hite, the chief of the Indianapolis Metropolitan police department, wondered. Many of them see the protests as a way to “chime in with their own personal agenda,” he said.

In its new intelligence bulletin, obtained by ABC News, the FBI says “exploitation” of mass demonstrations “could occur both in the Ferguson area and nationwide.”

“All it takes is one.”

Overall, though, law enforcement officials contacted by ABC News – stretching from Los Angeles to the Atlanta area – remained confident that any protests in their cities would not be tainted by violence.

“We are not expecting any issues in our city,” said Billy Grogan, the chief of police in Dunwoody, Ga., outside Atlanta. “However, we are preparing just in case. I believe most departments are watching the situation closely and are prepared to respond if needed.”

A law enforcement official in Pennsylvania agreed, saying that while authorities there are not enacting any significant new measures they are “monitoring” developments out of Ferguson.

PHOTO: Plywood covers the glass front of a strip mall along West Florissant Street on Nov. 12, 2014 in Ferguson, Mo.

Scott Olson/Getty Images
PHOTO: Plywood covers the glass front of a strip mall along West Florissant Street on Nov. 12, 2014 in Ferguson, Mo.

In addition, police officials emphasized that efforts to address a big decision like the one pending in Ferguson actually begin well before that decision.

In Indianapolis, police have held two town-hall meetings in the past two months to discuss the Ferguson issue with concerned residents, and meetings like that help build a “bank of trust,” Hite said.

But it’s sometimes hard to build such trust between a community and the law enforcement officers working its streets.

With several recent cases involving allegations of excessive force by police officers, many in African-American communities can’t help but wonder why seemingly routine encounters escalate so dramatically.

PHOTO: A man watches as police walk through a cloud of smoke during a clash with protesters, Aug. 13, 2014, in Ferguson, Mo.

Jeff Roberson/AP Photo
PHOTO: A man watches as police walk through a cloud of smoke during a clash with protesters, Aug. 13, 2014, in Ferguson, Mo.

In a recent interview with ABC News, Philadelphia Police Chief Charles Ramsey said people in “communities of color” often “don’t view us as people who really have the right to enforce laws or tell them what to do,” and sometimes it’s because of “the way they’ve seen us conduct ourselves in the past.”

“Not all cops, but all it takes is one,” Ramsey said. “As human beings, we tend to remember the one bad incident, not the 10 good ones that we may have experienced.”

On the other side of the spectrum, there are some uncomfortable facts that may be influencing how some police respond to African-Americans they encounter on routine patrols.

In particular, African-Americans are disproportionally represented in crime. According to the FBI, 4,379 blacks were arrested for murder last year, while 3,799 whites were arrested for murder – even though census numbers show there are six times more whites than blacks in the United States.

But as Ramsey said, crime statistics are no excuse for police bias.

“Protest. But protest peacefully. Have your voices be heard.”

And now a grand jury in Ferguson and federal prosecutors are separately looking into whether that type of bias led to Brown’s death.

It’s unclear whether the facts of the case will lead to any prosecution. Indeed, it seems few pieces of evidence are without dispute.

The day after the encounter that resulted in Brown’s death, St. Louis County Police Chief Jon Belmar told reporters that Brown “physically assaulted” Wilson inside his police car and that “there was a struggle over the officer’s weapon.” At least one shot was fired inside the car, but the fatal shot was fired when both Wilson and Brown were outside the car, according to Belmar. At least one witness said Brown was shot “with his arms up in the air,” while the police claim Wilson fired because Brown was advancing towards him.

PHOTO: People raise their hands in the middle of the street as police wearing riot gear move toward their position trying to get them to disperse, Aug. 11, 2014, in Ferguson, Mo.

Jeff Roberson/AP Photo
PHOTO: People raise their hands in the middle of the street as police wearing riot gear move toward their position trying to get them to disperse, Aug. 11, 2014, in Ferguson, Mo.

Pressed in September to acknowledge that the Justice Department’s own civil rights investigation may not result in charges, outgoing Attorney General Eric Holder would only say that “at the end of the day, it’s most important that we get it right.”

As for what’s ahead in Ferguson and communities across the country, Ramsey offered this piece of advice: “Protest. But protest peacefully. Have your voices be heard.”

http://abcnews.go.com/Politics/fbi-warns-ferguson-decision-lead-violence-extremist-protesters/story?id=26980624

The Wonderful American World of Informers and Agents Provocateurs


A New York City police officer near the New York Stock Exchange, Wednesday, July 11, 2012, in New York. (AP Photo/Frank Franklin II)

This article originally appeared at TomDispatch.com. To stay on top of important articles like these, sign up to receive the latest updates from TomDispatch.com.

Only Martians, by now, are unaware of the phone and online data scooped up by the National Security Agency (though if it turns out that they are aware, the NSA has surely picked up their signals and crunched their metadata). American high-tech surveillance is not, however, the only kind around. There’s also the lower tech, up-close-and-personal kind that involves informers and sometimes government-instigated violence.

Just how much of this is going on and in how coordinated a way no one out here in the spied-upon world knows. The lower-tech stuff gets reported, if at all, only one singular, isolated event at a time—look over here, look over there, now you see it, now you don’t. What is known about such surveillance as well as the suborning of illegal acts by government agencies, including the FBI, in the name of counterterrorism has not been put together by major news organizations in a way that would give us an overview of the phenomenon. (TheACLU has done by far the best job of compiling reports on this sort of spying on Americans.)

Some intriguing bits about informers and agents provocateurs briefly made it into the public spotlight whenOccupy Wall Street was riding high. But as always, dots need connecting. Here is a preliminary attempt to sort out some patterns behind what could be the next big story about government surveillance and provocation in America.

Two Stories From Occupy Wall Street

The first is about surveillance. The second is about provocation.

On September 17, 2011, Plan A for the New York activists who came to be known as Occupy Wall Street was to march to the territory outside the bank headquarters of JPMorgan Chase. Once there, they discovered that the block was entirely fenced in. Many activists came to believe that the police had learned their initial destination from e-mail circulating beforehand. Whereupon they headed for nearby Zuccotti Park and a movement was born.

The evening before May Day 2012, a rump Occupy groupmarched out of San Francisco’s Dolores Park and into the Mission District, a neighborhood where not so many 1 percenters live, work or shop. There, they proceeded to trash “mom and pop shops, local boutiques and businesses, and cars,” according to Scott Rossi, a medic and eyewitness, who summed his feelings up this way afterward: “We were hijacked.” The people “leading the march tonight,” he added, were

clean cut, athletic, commanding, gravitas not borne of charisma but of testosterone and intimidation. They were decked out in outfits typically attributed to those in the “black bloc” spectrum of tactics, yet their clothes were too new, and something was just off about them. They were very combative and nearly physically violent with the livestreamers on site, and got ignorant with me, a medic, when I intervened.… I didn’t recognize any of these people. Their eyes were too angry, their mouths were too severe. They felt “military” if that makes sense. Something just wasn’t right about them on too many levels.

He was quick to add, “I’m not one of those tin foil hat conspiracy theorists. I don’t subscribe to those theories that Queen Elizabeth’s Reptilian slave driver masters run the Fed. I’ve read up on agents provocateurs and plants and that sort of thing and I have to say that, without a doubt, I believe 100 percent that the people that started tonight’s events in the Mission were exactly that.”

Taken aback, Occupy San Francisco condemned the sideshow: “We consider these acts of vandalism and violence a brutal assault on our community and the 99%.”

Where does such vandalism and violence come from? We don’t know. There are actual activists who believe that they are doing good this way; and there are government infiltrators; and then there are double agents who don’t know who they work for, ultimately, but like smashing things or blowing them up. By definition, masked trashers of windows in Oakland or elsewhere are anonymous. In anonymity, they—and the burners of flags and setters of bombs—magnify their power. They hijack the media spotlight. In this way, tiny groups—incendiary, sincere, fraudulent, whoever they are—seize levers that can move the entire world.

The Sting of the Clueless Bee

Who casts the first stone? Who smashes the first window? Who teaches bombers to build and plant actual or spurious bombs? The history of the secret police planting agents provocateurs in popular movements goes back at least to nineteenth-century France and twentieth-century Russia. In 1905, for example, the priest who led the St. Petersburg’s revolution was some sort of double agent, as was the man who organized the assassination of the czar’s uncle, the grand duke. As it happens, the United States has its own surprisingly full history of such planted agents at work turning small groups or movements in directions that, for better or far more often worse, they weren’t planning on going. One well-documented case is that of “Tommy the Traveler,” a Students for a Democratic Society (SDS) organizer who after years of trying to arouse violent action convinced two 19-year-old students to firebomb an ROTC headquarters at Hobart College in upstate New York. The writer John Schultz reported onlikely provocateurs in Chicago during the Democratic National Convention of 1968. How much of this sort of thing went on? Who knows? Many relevant documents molded in unopened archives, or have been heavily redacted or destroyed.

As the Boston marathon bombing illustrates, there are homegrown terrorists capable of producing the weapons they need and killing Americans without the slightest help from the US government. But historically, it’s surprising how relatively often the gendarme is also a ringleader. Just how often is hard to know, since information on the subject is fiendishly hard to pry loose from the secret world.

Through 2011, 508 defendants in the United States were prosecuted in what the Department of Justice calls “terrorism-related cases.” According to Mother Jones’s Trevor Aaronson, the FBI ran sting operations that “resulted in prosecutions against 158 defendants”—about one-third of the total. “Of that total, forty-nine defendants participated in plots led by an agent provocateur—an FBI operative instigating terrorist action. With three exceptions, all of the high-profile domestic terror plots of the last decade were actually FBI stings.”

In Cleveland, on May Day of 2012, in the words of a Rolling Stone exposé, the FBI “turned five stoner misfits into the world’s most hapless terrorist cell.” To do this, the FBI put a deeply indebted, convicted bank robber and bad-check passer on its payroll, and hooked him up with an arms dealer, also paid by the bureau. The FBI undercover man then hustled five wacked-out wannabe anarchists into procuring what they thought was enough C4 plastic explosive to build bombs they thought would blow up a bridge. The bombs were, of course, dummies. The five were arrested and await trial.

What do such cases mean? What is the FBI up to? Trevor Aaronson offers this appraisal:

The FBI’s goal is to create a hostile environment for terrorist recruiters and operators—by raising the risk of even the smallest step toward violent action. It’s a form of deterrence.… Advocates insist it has been effective, noting that there hasn’t been a successful large-scale attack against the United States since 9/11. But what can’t be answered—as many former and current FBI agents acknowledge—is how many of the bureau’s targets would have taken the step over the line at all, were it not for an informant.

Perhaps Aaronson is a bit too generous. The FBI may, at times, be anything but thoughtful in its provocations. It may, in fact, be flatly dopey. COINTELPRO records released since the 1960s under the Freedom of Information Act (FOIA) show that it took FBI Director J. Edgar Hoover until 1968 to discover that there was such a thing as a New Left that might be of interest. Between 1960 and 1968, as the New Left was becoming a formidable force in its own right, the bureau’s top officials seem to have thought that groups like Students for a Democratic Society were simply covers for the Communist Party, which was like mistaking the fleas for the dog. We have been assured that the FBI of today has learned something since the days of J. Edgar Hoover. But of ignorance and stupidity there is no end.

Trivial and Nontrivial Pursuits

Entrapment and instigation to commit crimes are in themselves genuine dangers to American liberties, even when the liberties are those of the reckless and wild. But there is another danger to such pursuits: the attention the authorities pay to nonexistent threats (or the creation of such threats) is attention not paid to actual threats.

Anyone concerned about the security of Americans should cast a suspicious eye on the allocation or simply squandering of resources on wild goose chases. Consider some particulars which have recently come to light. Under the Freedom of Information Act, thePartnership for Civil Justice Fund (PCJF) has unearthed documents showing that, in 2011 and 2012, the Department of Homeland Security (DHS) and other federal agencies were busy surveilling and worrying about a good number of Occupy groups—during the very time that they were missing actual warnings about actual terrorist actions.

From its beginnings, the Occupy movement was of considerable interest to the DHS, the FBI and other law enforcement and intelligence agencies, while true terrorists were slipping past the nets they cast in the wrong places. In the fall of 2011, the DHS specifically asked its regional affiliates to report on “Peaceful Activist Demonstrations, in addition to reporting on domestic terrorist acts and ‘significant criminal activity.’ ”

Aware that Occupy was overwhelmingly peaceful, the federally funded Boston Regional Intelligence Center, one of seventy-seven coordination centers known generically as “fusion centers,” was busy monitoring Occupy Boston daily. As the investigative journalist Michael Isikoff recently reported, it was not only tracking Occupy-related Facebook pages and websites but “writing reports on the movement’s potential impact on ‘commercial and financial sector assets.’ ”

It was in this period that the FBI received the second of two Russian police warnings about the extremist Islamist activities of Tamerlan Tsarnaev, the future Boston Marathon bomber. That city’s police commissioner later testified that the federal authorities did not pass any information at all about the Tsarnaev brothers on to him, though there’s no point in letting the Boston police off the hook either. The ACLU has uncovered documents showing that, during the same period, they were paying close attention to the internal workings of… Code Pink and Veterans for Peace.

Public Agencies and the “Private Sector”

So we know that Boston’s master coordinators—its Committee on Public Safety, you might say—were worried about constitutionally protected activity, including its consequences for “commercial and financial sector assets.” Unsurprisingly, the feds worked closely with Wall Street even before the settling of Zuccotti Park. More surprisingly, in Alaska, Alabama, Florida, Mississippi, Tennessee and Wisconsin, intelligence was not only pooled among public law enforcement agencies, but shared with private corporations—and vice versa.

Nationally, in 2011, the FBI and DHS were, in the words of Mara Verheyden-Hilliard, executive director of the Partnership for Civil Justice Fund, “treating protests against the corporate and banking structure of America as potential criminal and terrorist activity.” Last December using FOIA, PCJF obtained 112 pages of documents (heavily redacted) revealing a good deal of evidence for what might otherwise seem like an outlandish charge: that federal authorities were, in Verheyden-Hilliard’s words, “functioning as a de facto intelligence arm of Wall Street and Corporate America.” Consider these examples from PCJF’s summary of federal agencies working directly not only with local authorities but on behalf of the private sector:

• “As early as August 19, 2011, the FBI in New York was meeting with the New York Stock Exchange to discuss the Occupy Wall Street protests that wouldn’t start for another month. By September, prior to the start of the OWS, the FBI was notifying businesses that they might be the focus of an OWS protest.”

• “The FBI in Albany and the Syracuse Joint Terrorism Task Force disseminated information to…[twenty-two] campus police officials.… A representative of the State University of New York at Oswego contacted the FBI for information on the OWS protests and reported to the FBI on the SUNY-Oswego Occupy encampment made up of students and professors.”

• An entity called the Domestic Security Alliance Council (DSAC), “a strategic partnership between the FBI, the Department of Homeland Security, and the private sector,” sent around information regarding Occupy protests at West Coast ports [on November 2, 2011] to “raise awareness concerning this type of criminal activity.” The DSAC report contained “a ‘handling notice’ that the information is ‘meant for use primarily within the corporate security community. Such messages shall not be released in either written or oral form to the media, the general public or other personnel…’ Naval Criminal Investigative Services reported to DSAC on the relationship between OWS and organized labor.”

• DSAC gave tips to its corporate clients on “civil unrest,” which it defined as running the gamut from “small, organized rallies to large-scale demonstrations and rioting.” It advised corporate employees to dress conservatively, avoid political discussions and “avoid all large gatherings related to civil issues. Even seemingly peaceful rallies can spur violent activity or be met with resistance by security forces.”

• The FBI in Anchorage, Jacksonville, Tampa, Richmond, Memphis, Milwaukee and Birmingham also gathered information and briefed local officials on wholly peaceful Occupy activities.

• In Jackson, Mississippi, FBI agents “attended a meeting with the Bank Security Group in Biloxi, MS with multiple private banks and the Biloxi Police Department, in which they discussed an announced protest for ‘National Bad Bank Sit-In-Day’ on December 7, 2011.” Also in Jackson, “the Joint Terrorism Task Force issued a ‘Counterterrorism Preparedness’ alert” that, despite heavy redactions, notes the need to ‘document…the Occupy Wall Street Movement.’ ”

Sometimes, “intelligence” moves in the opposite direction—from private corporations to public agencies. Among the collectors of such “intelligence” are entities that, like the various intelligence and law enforcement outfits, do not make distinctions between terrorists and nonviolent protesters. Consider TransCanada, the corporation that plans to build the 1,179-mile Keystone-XL tar sands pipeline across the US and in the process realize its “vision to become the leading energy infrastructure company in North America.“ The anti-pipeline group Bold Nebraska filed a successful Freedom of Information Act request with the Nebraska State Patrol and so was able to put TransCanada’s briefing slideshow up online.

So it can be documented in living color that the company lectured federal agents and local police to look into the use of “anti-terrorism statutes” against peaceful anti-Keystone activists. TransCanada showed slides that cited as sinister the “attendance” of Bold Nebraska members at public events, noting “Suspicious Vehicles/Photography.” TransCanada alerted the authorities that Nebraska protesters were guilty of “aggressive/abusive behavior,” citing a local anti-pipeline group that, they said, committed a “slap on the shoulder” at the Merrick County Board Meeting (possessor of said shoulder unspecified). They fingered nonviolent activists by name and photo, paying them the tribute of calling them “’Professionals’ & Organized.” Native News Network pointed out that “although TransCanada’s presentation to authorities contains information about property destruction, sabotage, and booby traps, police in Texas and Oklahoma have never alleged, accused, or charged Tar Sands Blockade activists of any such behaviors.”

Centers for Fusion, Diffusion and Confusion

After September 11, 2001, government agencies at all levels, suddenly eager to break down information barriers and connect the sort of dots that had gone massively unconnected before the Al Qaeda attacks, used Department of Homeland Security funds to start “fusion centers.” These are supposed to coordinate anti-terrorist intelligence gathering and analysis. They are also supposed to “fuse” intelligence reports from federal, state and local authorities, as well as private companies that conduct intelligence operations. According to the ACLU, at least seventy-seven fusion centers currently receive federal funds.

Much is not known about these centers, including just who runs them, by what rules and which public and private entities are among the fused. There is nothing public about most of them. However, some things are known about a few. Several fusion center reports that have gone public illustrate a remarkably slapdash approach to what constitutes “terrorist danger” and just what kinds of data are considered relevant for law enforcement. In 2010, the American Civil Liberties Union of Tennessee learned, for instance, that the Tennessee Fusion Center was “highlighting on its website map of ‘Terrorism Events and Other Suspicious Activity’ a recent ACLU-TN letter to school superintendents. The letter encourages schools to be supportive of all religious beliefs during the holiday season.” (The map is no longer online.)

So far, the prize for pure fused wordiness goes to a 215-page manual issued in 2009 by theVirginia Fusion Center (VFC), filled with Keystone Kop–style passages among pages that in their intrusive sweep are anything but funny. The VFC warned, for instance, that “the Garbage Liberation Front (GLF) is an ecological direct action group that demonstrates the joining of anarchism and environmental movements.” Among GLF’s dangerous activities well worth the watching, the VFC included “dumpster diving, squatting, and train hopping.”

In a similarly jaw-dropping manner, the manual claimed—the italics are mine—that “Katuah Earth First (KEF), based in Asheville, North Carolina, sends activists throughout the region to train and engage in criminal activity. KEF has trained local environmentalists in non-violent tactics, including blocking roads and leading demonstrations, at action camps in Virginia.While KEF has been primarily involved in protests and university outreach, members have also engaged in vandalism.” Vandalism! Send out an APB!

The VFC also warned that, “although the anarchist threat to Virginia is assessed as low, these individuals view the government as unnecessary, which could lead to threats or attacks against government figures or establishments.” It singled out the following 2008 incidents as worth notice:

• At the Martinsville Speedway, “A temporary employee called in a bomb threat during a Sprint Cup race…because he was tired of picking up trash and wanted to go home.”

• In Missouri, “a mobile security team observed an individual photographing an unspecified oil refinery.… The person abruptly left the scene before he could be questioned.”

• Somewhere in Virginia, “seven passengers aboard a white pontoon boat dressed in traditional Middle Eastern garments immediately sped away after being sighted in the recreational area, which is in close proximity to” a power plant.

What idiot or idiots wrote this script?

Given a disturbing lack of evidence of terrorist actions undertaken or in prospect, the authors even warned:

It is likely that potential incidents of interest are occurring, but that such incidents are either not recognized by initial responders or simply not reported. The lack of detailed information for Virginia instances of monitored trends should not be construed to represent a lack of occurrence.

Lest it be thought that Virginia stands alone and shivering on the summit of bureaucratic stupidity, consider an “intelligence report” from the North Central Texas fusion center, which in a 2009 “Prevention Awareness Bulletin” described, in the ACLU’s words, “a purported conspiracy between Muslim civil rights organizations, lobbying groups, the antiwar movement, a former US Congresswoman, the US Treasury Department, and hip hop bands to spread tolerance in the United States, which would ‘provide an environment for terrorist organizations to flourish.’ ”

And those Virginia and Texas fusion centers were hardly alone in expanding the definition of “terrorist” to fit just about anyone who might oppose government policies. According to a 2010 report in the Los Angeles Times, the Justice Department Inspector General found that “FBI agents improperly opened investigations into Greenpeace and several other domestic advocacy groups after the Sept. 11 terrorist attacks in 2001, and put the names of some of their members on terrorist watch lists based on evidence that turned out to be ‘factually weak.’ ” The Inspector General called “troubling” what the Los Angeles Times described as “singling out some of the domestic groups for investigations that lasted up to five years, and were extended ‘without adequate basis.’ ”

Subsequently, the FBI continued to maintain investigative files on groups like Greenpeace, the Catholic Worker, and the Thomas Merton Center in Pittsburgh, cases where (in the politely put words of the Inspector General’s report) “there was little indication of any possible federal crimes… In some cases, the FBI classified some investigations relating to nonviolent civil disobedience under its ‘acts of terrorism’ classification.”

One of these investigations concerned Greenpeace protests planned for ExxonMobil shareholder meetings. (Note: I was on Greenpeace’s board of directors during three of those years.) The inquiry was kept open “for over three years, long past the shareholder meetings that the subjects were supposedly planning to disrupt.” The FBI put the names of Greenpeace members on its federal watch list. Around the same time, an ExxonMobil-funded lobby got the IRS to audit Greenpeace.

This counterintelligence archipelago of malfeasance and stupidity is sometimes fused with ass-covering fabrication. In Pittsburgh, on the day after Thanksgiving 2002 (“a slow work day” in the Justice Department inspector general’s estimation), a rookie FBI agent was outfitted with a camera, sent to an antiwar rally, and told to look for terrorism suspects. The “possibility that any useful information would result from this make-work assignment was remote,” the report added drily.

The agent was unable to identify any terrorism subjects at the event, but he photographed a woman in order to have something to show his supervisor. He told us he had spoken to a woman leafletter at the rally who appeared to be of Middle Eastern descent, and that she was probably the person he photographed.

The sequel was not quite so droll. The Inspector General found that FBI officials, including their chief lawyer in Pittsburgh, manufactured postdated “routing slips” and the rest of a phony paper trail to justify this surveillance retroactively.

Moreover, at least one fusion center has involved military intelligence in civilian law enforcement. In 2009, a military operative from Fort Lewis, Washington, worked undercovercollecting information on peace groups in the Northwest. In fact, he helped run the Port Militarization Resistance group’s Listserv. Once uncovered, he told activists there were others doing similar work in the Army. How much the military spies on American citizens is unknown and, at the moment at least, unknowable.

Do we hear an echo from the abyss of the counterintelligence programs of the 1960s and 1970s, when FBI memos—I have some in my own heavily redacted files obtained through an FOIA request—were routinely copied to military intelligence units? Then, too, military intelligence operatives spied on activists who violated no laws, were not suspected of violating laws, and had they violated laws, would not have been under military jurisdiction in any case. During those years, more than 1,500 Army intelligence agents in plain clothes were spying, undercover, on domestic political groups (according to “Military Surveillance of Civilian Politics, 1967–70,” an unpublished dissertation by former Army intelligence captain Christopher H. Pyle). They posed as students, sometimes growing long hair and beards for the purpose, or as reporters and camera crews. They recorded speeches and conversations on concealed tape recorders. The Army lied about their purposes, claiming they were interested solely in “civil disturbance planning.”

Years later, I met one of these agents, now retired, in San Francisco. He knew more about what I was doing in the late 1960s than my mother did.

Squaring Circles

In 2009, President Obama told the graduating class at the Naval Academy that, “as Americans, we reject the false choice between our security and our ideals.” Security and ideals: officially we want both. But how do you square circles, especially in a world in which “security” has often enough become a stand-in for whatever intelligence operatives decide to do?

Please support our journalism. Get a digital subscription for just $9.50!

The ACLU’s Tennessee office sums the situation up nicely: “While the ostensible purpose of fusion centers, to improve sharing of anti-terrorism intelligence among different levels and arms of government, is legitimate and important, using the centers to monitor protected First Amendment activity clearly crosses the line.” Nationally, the ACLU rightly worries about who is in charge of fusion centers and by what rules they operate, about what becomes of privacy when private corporations are inserted into the intelligence process, about what the military is doing meddling in civilian law enforcement, about data-mining operations that Federal guidelines encourage, and about the secrecy walls behind which the fusion centers operate.

Even when fusion centers do their best to square that circle in their own guidelines, like the ones obtained by the ACLU from Massachusetts’s Commonwealth Fusion Center (CFC), the knots in which they tie themselves are all over the page. Imagine, then, what happens when you let informers or agents provocateurs loose in actual undercover situations.

“Undercovers,” writes the Massachusetts CFC, “may not seek to gain access to private meetings and should not actively participate in meetings.… At the preliminary inquiry stage, sources and informants should not be used to cultivate relationships with persons and groups that are the subject of the preliminary inquiry.” So far so good. Then, it adds, “Investigators may, however, interview, obtain, and accept information known to sources and informants.” By eavesdropping, say? Collecting trash? Hacking? All without warrants? Without probable cause?

“Undercovers and informants,” the guidelines continue, “are strictly prohibited from engaging in any conduct the sole purpose of which is to disrupt the lawful exercise of political activity, from disrupting the lawful operations of an organization, from sowing seeds of distrust between members of an organization involved in lawful activity, or from instigating unlawful acts or engaging in unlawful or unauthorized investigative activities.” Now, go back and note that little, easy-to-miss word “sole.” Who knows just what grim circles that tiny word squares?

The Massachusetts CFC at least addresses the issue of entrapment: “Undercovers should not become so involved in a group that they are participating in directing the operations of a group, either by accepting a formal position in the hierarchy or by informally establishing the group’s policy and priorities. This does not mean an undercover cannot support a group’s policies and priorities; rather an undercover should not become a driving force behind a group’s unlawful activities.” Did Cleveland’s fusion center have such guidelines? Did they follow them? Do other state fusion centers? We don’t know.

Whatever the fog of surveillance, when it comes to informers, agents provocateurs, and similar matters, four things are clear enough:

• Terrorist plots arise, in the United States as elsewhere, with the intent of committing murder and mayhem. Since 2001, in the US, these have been almost exclusively the work of freelance Islamist ideologues like the Tsarnaev brothers of Boston. None have been connected in any meaningful way with any legitimate organization or movement.

• Government surveillance may in some cases have been helpful in scotching such plots, but there is no evidence that it has been essential.

• Even based on the limited information available to us, since September 11, 2001, the net of surveillance has been thrown wide indeed. Tabs have been kept on members of quite a range of suspect populations, including American Muslims, anarchists, and environmentalists, among others—in situation after situation where there was no probable cause to suspect preparations for a crime.

• At least on occasion—we have no way of knowing how often—agents provocateurs on government payrolls have spurred violence.

How much official unintelligence is at work? How many demonstrations are being poked and prodded by undercover agents? How many acts of violence are being suborned? It would be foolish to say we know. At least equally foolish would be to trust the authorities to keep to honest-to-goodness police work when they are so mightily tempted to take the low road into straight-out, unwarranted espionage and instigation.

http://www.thenation.com/article/175005/wonderful-american-world-informers-and-agents-provocateurs#

 

COINTELPRO

COINTELPRO (an acronym for COunter INTELligence PROgram) was a series of covert, and at times illegal,[1][2] projects conducted by the United States Federal Bureau of Investigation (FBI) aimed at surveying, infiltrating, discrediting, and disrupting domestic political organizations.[3] National Security Agency operation Project MINARET targeted the personal communications of leading Americans who criticized the Vietnam War, including Senators (e.g., Frank Church and Howard Baker), civil rights leaders, journalists, and athletes.[4][5]

The official COINTELPRO label took place between 1956 and 1971.[6][7] The FBI’s stated motivation was “protecting national security, preventing violence, and maintaining the existing social and political order.”[8]

FBI records show that 85% of COINTELPRO resources targeted groups and individuals that the FBI deemed “subversive”,[9]including communist and socialist organizations; organizations and individuals associated with the Civil Rights Movement, including Rev. Dr. Martin Luther King, Jr. and others associated with the Southern Christian Leadership Conference, theNational Association for the Advancement of Colored People, and the Congress of Racial Equality and other civil rights organizations; black nationalist groups; the Young Lords; the Rainbow Coalition; the American Indian Movement; a broad range of organizations labeled “New Left“, including Students for a Democratic Society and the Weathermen; almost all groupsprotesting the Vietnam War, as well as individual student demonstrators with no group affiliation; the National Lawyers Guild; organizations and individuals associated with the women’s rights movement; nationalist groups such as those seeking independence for Puerto Rico, United Ireland, and Cuban exile movements including Orlando Bosch‘s Cuban Power and theCuban Nationalist Movement; and additional notable Americans (for example, Albert Einstein, who was a socialist and a member of several civil rights groups, came under FBI surveillance during the years just before COINTELPRO’s official inauguration).[10] The remaining 15% of COINTELPRO resources were expended to marginalize and subvert white supremist hate groups, including the Ku Klux Klan and the National States’ Rights Party.[11]

FBI Director J. Edgar Hoover issued directives governing COINTELPRO, ordering FBI agents to “expose, disrupt, misdirect, discredit, neutralize or otherwise eliminate” the activities of these movements and their leaders.[12][13] Under Hoover, the agent in charge of COINTELPRO was William C. Sullivan.[14] Attorney General Robert F. Kennedy personally authorized some of these programs.[15] Kennedy would later learn that he also had been a target of FBI surveillance.[citation needed]

History

The FBI engaged in the political repression of “communism” almost from the time of the agency’s inception in 1908, at a time of widespread social disruption due to anarchists and labor movements. Beginning in the 1930s, antecedents to COINTELPRO operated during the Franklin D. Roosevelt and Harry S. Trumanadministrations. Centralized operations under COINTELPRO officially began in August 1956 with a program designed to “increase factionalism, cause disruption and win defections” inside the Communist Party U.S.A. (CPUSA). Tactics included anonymous phone calls, IRS audits, and the creation of documents that would divide American communists internally.[16] An October 1956 memo from Hoover reclassified the FBI’s ongoing surveillance of black leaders, including it within COINTELPRO, with the justification that the movement was infiltrated by communists.[17] In 1956, Hoover sent an open letter denouncing Dr. T.R.M. Howard, a civil rights leader, surgeon, and wealthy entrepreneur in Mississippi who had criticized FBI inaction in solving recent murders of George W. Lee, Emmett Till, and other blacks in the South.[18] When the Southern Christian Leadership Conference (SCLC) was founded in 1957, the FBI began to monitor and target the group almost immediately, focusing particularly on Bayard Rustin, Stanley Levison, and, eventually, Rev. Martin Luther King, Jr.[19]

After the 1963 March on Washington for Jobs and Freedom, Hoover singled out King as a major target for COINTELPRO. Under pressure from Hoover to focus on King, Sullivan wrote:

In the light of King’s powerful demagogic speech. … We must mark him now, if we have not done so before, as the most dangerous Negro of the future in this nation from the standpoint of communism, the Negro, and national security.[20]

Soon after, the FBI was systematically bugging King’s home and his hotel rooms.[21]

In the mid-1960s, King began publicly criticizing the Bureau for giving insufficient attention to the use of terrorism by white supremacists. Hoover responded by publicly calling King the most “notorious liar” in the United States.[22] In his 1991 memoir, Washington Post journalist Carl Rowan asserted that the FBI had sent at least one anonymous letter to King encouraging him to commit suicide.[23] Historian Taylor Branch documents an anonymous November 21, 1964 “suicide package” sent by the FBI that contained audio recordings of King’s sexual indiscretions combined with a letter telling him “There is only one way out for you. You better take it before your filthy, abnormal, fraudulent self is bared to the nation.”[24]

During the same period the program also targeted Malcolm X. While an FBI spokesman has denied that the FBI was “directly” involved in Malcolm’s murder, it is documented that the Bureau fostered the violent schism between Malcolm and the Nation of Islam that led to the black leader’s death. The FBI heavily infiltrated Malcolm’s Organization of Afro-American Unity in the final month’s of his life. The Pulitzer Prize-winning biography of Malcolm X by Manning Marable asserts that most of the men who plotted Malcolm’s assassination were never apprehended and that the full extent of the FBI’s involvement in his death cannot be known.[25] [26]

Amidst the urban unrest of July–August 1967, the FBI began “COINTELPRO–BLACK HATE”, which focused on King and the SCLC as well as the Student Nonviolent Coordinating Committee (SNCC), the Revolutionary Action Movement (RAM), the Deacons for Defense and Justice, Congress of Racial Equality (CORE), and theNation of Islam.[27] BLACK HATE established the Ghetto Informant Program and instructed 23 FBI offices to “disrupt, misdirect, discredit, or otherwise neutralize the activities of black nationalist hate type organizations”.[28]

A March 1968 memo stated the programs goal was to “prevent the coalition of militant black nationalist groups” ; to “Prevent the RISE OF A ‘MESSIAH’ who could unify…the militant black nationalist movement” ; “to pinpoint potential troublemakers and neutralize them before they exercise their potential for violence [against authorities].” ; to “Prevent militant black nationalist groups and leaders from gaining RESPECTABILITY, by discrediting them to…both the responsible community and to liberals who have vestiges of sympathy…”; and to “prevent the long-range GROWTH of militant black organizations, especially among youth.” Dr. King was said to have potential to be the “messiah” figure, should he abandon nonviolence and integrationism;[29] Stokely Carmichael was noted to have “the necessary charisma to be a real threat in this way.” [30]

This program coincided with a broader federal effort to prepare military responses for urban riots, and began increased collaboration between the FBI, Central Intelligence Agency, National Security Agency, and the Department of Defense. The CIA launched its own domestic espionage project in 1967 called Operation CHAOS. [31] A particular target was the Poor People’s Campaign, a national effort organized by King and the SCLC to occupy Washington, D.C. The FBI monitored and disrupted the campaign on a national level, while using targeted smear tactics locally to undermine support for the march.[32]

COINTELPRO–NEW LEFT was created in April 1968, in the wake of Martin Luther King, Jr.‘s assassination in Memphis and mass student protests at Columbia University.[33]

Overall, COINTELPRO encompassed disruption and sabotage of the Socialist Workers Party (1961), the Ku Klux Klan (1964), the Nation of Islam, the Black Panther Party (1967), and the entire New Left social/political movement, which included antiwar, community, and religious groups (1968). A later investigation by the Senate’sChurch Committee (see below) stated that “COINTELPRO began in 1956, in part because of frustration with Supreme Court rulings limiting the Government’s power to proceed overtly against dissident groups …”[34] Official congressional committees and several court cases[35] have concluded that COINTELPRO operations against communist and socialist groups exceeded statutory limits on FBI activity and violated constitutional guarantees of freedom of speech and association.[1]

Program exposed

The building broken into by the Citizen’s Commission to Investigate the FBI, at One Veterans Square, Media, Pennsylvania

The program was successfully kept secret until 1971, when the Citizens’ Commission to Investigate the FBI burglarized an FBI field office in Media, Pennsylvania, took several dossiers, and exposed the program by passing this material to news agencies. Many news organizations initially refused to publish the information. Within the year, Director J. Edgar Hooverdeclared that the centralized COINTELPRO was over, and that all future counterintelligence operations would be handled on a case-by-case basis.[36][37]

Additional documents were revealed in the course of separate lawsuits filed against the FBI by NBC correspondent Carl Stern, the Socialist Workers Party, and a number of other groups. In 1976 the Select Committee to Study Governmental Operations with Respect to Intelligence Activities of the United States Senate, commonly referred to as the “Church Committee” for its chairman, Senator Frank Church of Idaho, launched a major investigation of the FBI and COINTELPRO. Journalists and historians speculate that the government has not released many dossier and documents related to the program. Many released documents have been partly, or entirely, redacted.

Since the conclusion of centralized COINTELPRO operations in 1971, FBI counterintelligence operations have been handled on a “case-by-case basis”; however allegations of improper political repression continue.[38][39]

The Final Report of the Select Committee castigated conduct of the intelligence community in its domestic operations (including COINTELPRO) in no uncertain terms:

The Committee finds that the domestic activities of the intelligence community at times violated specific statutory prohibitions and infringed the constitutional rights of American citizens. The legal questions involved in intelligence programs were often not considered. On other occasions, they were intentionally disregarded in the belief that because the programs served the “national security” the law did not apply. While intelligence officers on occasion failed to disclose to their superiors programs which were illegal or of questionable legality, the Committee finds that the most serious breaches of duty were those of senior officials, who were responsible for controlling intelligence activities and generally failed to assure compliance with the law.[1] Many of the techniques used would be intolerable in a democratic society even if all of the targets had been involved in violent activity, but COINTELPRO went far beyond that … the Bureau conducted a sophisticated vigilante operation aimed squarely at preventing the exercise of First Amendment rights of speech and association, on the theory that preventing the growth of dangerous groups and the propagation of dangerous ideas would protect the national security and deter violence.[34]

The Church Committee documented a history of the FBI exercising political repression as far back as World War I, through the 1920s, when agents were charged with rounding up “anarchists, communists, socialists, reformists and revolutionaries” for deportation. The domestic operations were increased against political and anti-war groups from 1936 through 1976.

Intended effects

The intended effect of the FBI’s COINTELPRO was to “expose, disrupt, misdirect, or otherwise neutralize” groups that the FBI officials believed were “subversive”[40] by instructing FBI field operatives to:[41]

  1. create a negative public image for target groups (e.g. by surveilling activists, and releasing negative personal information to the public)
  2. break down internal organization
  3. create dissension between groups
  4. restrict access to public resources
  5. restrict the ability to organize protests
  6. restrict the ability of individuals to participate in group activities

Range of targets

The main target was the Communist Party.[42]

According to the Church Committee:

While the declared purposes of these programs were to protect the “national security” or prevent violence, Bureau witnesses admit that many of the targets were nonviolent and most had no connections with a foreign power. Indeed, nonviolent organizations and individuals were targeted because the Bureau believed they represented a “potential” for violence—and nonviolent citizens who were against the war in Vietnam were targeted because they gave “aid and comfort” to violent demonstrators by lending respectability to their cause.

The imprecision of the targeting is demonstrated by the inability of the Bureau to define the subjects of the programs. The Black Nationalist program, according to its supervisor, included “a great number of organizations that you might not today characterize as black nationalist but which were in fact primarily black.” Thus, the nonviolent Southern Christian Leadership Conference was labeled as a Black Nationalist-“Hate Group.”

Furthermore, the actual targets were chosen from a far broader group than the titles of the programs would imply. The CPUSA program targeted not only Communist Party members but also sponsors of the National Committee to Abolish the House Un-American Activities Committee and civil rights leaders allegedly under Communist influence or deemed to be not sufficiently “anti-Communist”. The Socialist Workers Party program included non-SWP sponsors of anti-war demonstrations which were cosponsored by the SWP or the Young Socialist Alliance, its youth group. The Black Nationalist program targeted a range of organizations from the Panthers to SNCC to the peaceful Southern Christian Leadership Conference, and included every Black Student Union and many other black student groups. New Left targets ranged from the SDS to the InterUniversity Committee for Debate on Foreign Policy, from Antioch College (“vanguard of the New Left”) to the New Mexico Free University and other “alternate” schools, and from underground newspapers to students’ protesting university censorship of a student publication by carrying signs with four-letter words on them.

Examples of surveillance, spanning all presidents from FDR to Nixon, both legal and illegal, contained in the Church Committee report:[43]

  • President Roosevelt asked the FBI to put in its files the names of citizens sending telegrams to the White House opposing his “national defense” policy and supporting Col. Charles Lindbergh.
  • President Truman received inside information on a former Roosevelt aide’s efforts to influence his appointments, labor union negotiating plans, and the publishing plans of journalists.
  • President Eisenhower received reports on purely political and social contacts with foreign officials by Bernard Baruch, Eleanor Roosevelt, and Supreme Court Justice William O. Douglas.
  • The Kennedy administration had the FBI wiretap a congressional staff member, three executive officials, a lobbyist, and a Washington law firm. US Attorney General Robert F. Kennedy received the fruits of an FBI wire tap on Martin Luther King, Jr. and an electronic listening device targeting a congressman, both of which yielded information of a political nature.
  • President Johnson asked the FBI to conduct “name checks” of his critics and members of the staff of his 1964 opponent, Senator Barry Goldwater. He also requested purely political intelligence on his critics in the Senate, and received extensive intelligence reports on political activity at the 1964 Democratic Conventionfrom FBI electronic surveillance.
  • President Nixon authorized a program of wiretaps which produced for the White House purely political or personal information unrelated to national security, including information about a Supreme Court Justice.

The COINTELPRO documents show numerous cases of the FBI’s intentions to prevent and disrupt protests against the Vietnam War. Many techniques were used to accomplish this task. “These included promoting splits among antiwar forces, encouraging red-baiting of socialists, and pushing violent confrontations as an alternative to massive, peaceful demonstrations.” One 1966 COINTELPRO operation tried to redirect the Socialist Workers Party from their pledge of support for the antiwar movement.[44]

The FBI claims that it no longer undertakes COINTELPRO or COINTELPRO-like operations. However, critics have claimed that agency programs in the spirit of COINTELPRO targeted groups such as the Committee in Solidarity with the People of El Salvador,[45] the American Indian Movement,[6][46] Earth First!,[47] the White Separatist Movement,[48] and the Anti-Globalization Movement.[citation needed]

Methods

Body of Fred Hampton, national spokesman for the Black Panther Party, who was killed by members of the Chicago Police Department, as part of a COINTELPRO operation.[49][50][7][51]

According to attorney Brian Glick in his book War at Home, the FBI used four main methods during COINTELPRO:

  1. Infiltration: Agents and informers did not merely spy on political activists. Their main purpose was to discredit and disrupt. Their very presence served to undermine trust and scare off potential supporters. The FBI and police exploited this fear to smear genuine activists as agents.
  2. Psychological warfare: The FBI and police used myriad “dirty tricks” to undermine progressive movements. They planted false media stories and published bogus leaflets and other publications in the name of targeted groups. They forged correspondence, sent anonymous letters, and made anonymous telephone calls. They spread misinformation about meetings and events, set up pseudo movement groups run by government agents, and manipulated or strong-armed parents, employers, landlords, school officials and others to cause trouble for activists. They used bad-jacketingto create suspicion about targeted activists, sometimes with lethal consequences.[52]
  3. Legal harassment: The FBI and police abused the legal system to harass dissidents and make them appear to be criminals. Officers of the law gave perjured testimony and presented fabricated evidence as a pretext for false arrests and wrongful imprisonment. They discriminatorily enforced tax laws and other government regulations and used conspicuous surveillance, “investigative” interviews, and grand jury subpoenas in an effort to intimidate activists and silence their supporters.[49]
  4. Illegal force: The FBI conspired with local police departments to threaten dissidents; to conduct illegal break-ins in order to search dissident homes; and to commit vandalism, assaults, beatings and assassinations.[49][50][7][53] The object was to frighten or eliminate dissidents and disrupt their movements.

The FBI specifically developed tactics intended to heighten tension and hostility between various factions in the black militancy movement, for example between the Black Panthers, the US Organization, and the Blackstone Rangers. This resulted in numerous deaths, among which were San Diego Black Panther Party members John Huggins, Bunchy Carter and Sylvester Bell.[49]

The FBI also conspired with the police departments of many U.S. cities (San Diego, Los Angeles, San Francisco, Oakland, Philadelphia, Chicago) to encourage repeated raids on Black Panther homes—often with little or no evidence of violations of federal, state, or local laws—which resulted directly in the police killing many members of the Black Panther Party, most notably Chicago Black Panther Party Chairman Fred Hampton on December 4, 1969.[49][50][7][54]

In order to eliminate black militant leaders whom they considered dangerous, the FBI is believed to have worked with local police departments to target specific individuals,[55] accuse them of crimes they did not commit, suppress exculpatory evidence and falsely incarcerate them.[citation needed] Elmer “Geronimo” Pratt, a Black Panther Party leader, was incarcerated for 27 years before a California Superior Court vacated his murder conviction, ultimately freeing him. Appearing before the court, an FBI agent testified that he believed Pratt had been framed, because both the FBI and the Los Angeles Police Department knew he had not been in the area at the time the murder occurred.[56][57]

Some sources claim that the FBI conducted more than 200 “black bag jobs“,[58][59] which were warrantless surreptitious entries, against the targeted groups and their members.[60]

J. Edgar Hoover

In 1969 the FBI special agent in San Francisco wrote Hoover that his investigation of the Black Panther Party (BPP) had concluded that in his city, at least, the Panthers were primarily engaged in feeding breakfast to children. Hoover fired back a memo implying the agent’s career goals would be directly affected by his supplying evidence to support Hoover’s view that the BPP was “a violence-prone organization seeking to overthrow the Government by revolutionary means”.[61]

Hoover supported using false claims to attack his political enemies. In one memo he wrote: “Purpose of counterintelligence action is to disrupt the BPP and it is immaterial whether facts exist to substantiate the charge.”[62]

In one particularly controversial 1965 incident, white civil rights worker Viola Liuzzo was murdered by Ku Klux Klansmen, who gave chase and fired shots into her car after noticing that her passenger was a young black man; one of the Klansmen was Gary Thomas Rowe, an acknowledged FBI informant.[63][64] The FBI spread rumors that Liuzzo was a member of theCommunist Party and had abandoned her children to have sexual relationships with African Americans involved in the Civil Rights Movement.[65][66] FBI records show that J. Edgar Hoover personally communicated these insinuations to President Johnson.[67][68] FBI informant Rowe has also been implicated in some of the most violent crimes of the 1960s civil rights era, including attacks on the Freedom Riders and the 1963 Birmingham, Alabama 16th Street Baptist Church bombing.[63]According to Noam Chomsky, in another instance in San Diego, the FBI financed, armed, and controlled an extreme right-wing group of former Minutemen, transforming it into a group called the Secret Army Organization that targeted groups, activists, and leaders involved in the Anti-War Movement, using both intimidation and violent acts.[69][70][71]

Hoover ordered preemptive action “to pinpoint potential troublemakers and neutralize them before they exercise their potential for violence.”[12]

Illegal surveillance

The final report of the Church Committee concluded:

Too many people have been spied upon by too many Government agencies and too much information has been illegally collected. The Government has often undertaken the secret surveillance of citizens on the basis of their political beliefs, even when those beliefs posed no threat of violence or illegal acts on behalf of a hostile foreign power. The Government, operating primarily through secret and bias informants, but also using other intrusive techniques such as wiretaps, microphone “bugs”, surreptitious mail opening, and break-ins, has swept in vast amounts of information about the personal lives, views, and associations of American citizens. Investigations of groups deemed potentially dangerous—and even of groups suspected of associating with potentially dangerous organizations—have continued for decades, despite the fact that those groups did not engage in unlawful activity.

Groups and individuals have been assaulted, repressed, harassed and disrupted because of their political views,social believes and their lifestyles. Investigations have been based upon vague standards whose breadth made excessive collection inevitable. Unsavory, harmful and vicious tactics have been employed—including anonymous attempts to break up marriages, disrupt meetings, ostracize persons from their professions, and provoke target groups into rivalries that might result in deaths. Intelligence agencies have served the political and personal objectives of presidents and other high officials. While the agencies often committed excesses in response to pressure from high officials in the Executive branch and Congress, they also occasionally initiated improper activities and then concealed them from officials whom they had a duty to inform.

Governmental officials—including those whose principal duty is to enforce the law—have violated or ignored the law over long periods of time and have advocated and defended their right to break the law.

The Constitutional system of checks and balances has not adequately controlled intelligence activities. Until recently the Executive branch has neither delineated the scope of permissible activities nor established procedures for supervising intelligence agencies. Congress has failed to exercise sufficient oversight, seldom questioning the use to which its appropriations were being put. Most domestic intelligence issues have not reached the courts, and in those cases when they have reached the courts, the judiciary has been reluctant to grapple with them.[72][73]

Post-COINTELPRO operations

While COINTELPRO was officially terminated in April 1971, critics allege that continuing FBI actions indicate that post-COINTELPRO reforms did not succeed in ending COINTELPRO tactics.[74][75][76] Documents released under the FOIA show that the FBI tracked the late David Halberstam—a Pulitzer Prize-winning journalist and author—for more than two decades.[77][78] In 1978, then-acting FBI Director William H. Webster indicated that, by 1976, most of the program’s resources has been rerouted.[79][better source needed]

“Counterterrorism” guidelines implemented during the Reagan administration have been described as allowing a return to COINTELPRO tactics.[80][pages needed] Some radical groups accuse factional opponents of being FBI informants or assume the FBI is infiltrating the movement.[81]

According to a report by the Inspector General (IG) of the U.S. Department of Justice, the FBI improperly opened investigations of American activist groups, even though they were planning nothing more than peaceful protests and civil disobedience. The review by the inspector general was launched in response to complaints by civil liberties groups and members of Congress. The FBI improperly monitored groups including the Thomas Merton Center, a Pittsburgh-based peace group; People for the Ethical Treatment of Animals (PETA); and Greenpeace USA, an environmental activism organization. Also, activists affiliated with Greenpeace were improperly put on a terrorist watch list, although they were planning no violence or illegal activities.

The IG report found these “troubling” FBI practices between 2001 and 2006. In some cases, the FBI conducted investigations of people affiliated with activist groups for “factually weak” reasons. Also, the FBI extended investigations of some of the groups “without adequate basis” and improperly kept information about activist groups in its files. The IG report also found that FBI Director Robert Mueller III provided inaccurate congressional testimony about one of the investigations, but this inaccuracy may have been due to his relying on what FBI officials told him.[82]

Several authors have accused the FBI of continuing to deploy COINTELPRO-like tactics against radical groups after the official COINTELPRO operations were ended. Several authors have suggested the American Indian Movement (AIM) has been a target of such disturbing operations.

Authors such as Ward Churchill, Rex Weyler, and Peter Matthiessen allege that the federal government intended to acquire uranium deposits on the Lakota tribe’s reservation land, and that this motivated a larger government conspiracy against AIM activists on the Pine Ridge reservation.[6][46][83][84][85] Others believe COINTELPRO continues and similar actions are being taken against activist groups.[85][86][87] Caroline Woidat says that, with respect to Native Americans, COINTELPRO should be understood within a historical context in which “Native Americans have been viewed and have viewed the world themselves through the lens of conspiracy theory.”[88] Other authors note that while some conspiracy theories related to COINTELPRO are unfounded, the issue of ongoing government surveillance and repression is real.[39][89]

See also

The Pronk Pops Show Podcasts Portfolio

Listen To Pronk Pops Podcast or Download Show 369-373

Listen To Pronk Pops Podcast or Download Show 360-368

Listen To Pronk Pops Podcast or Download Show 354-359

Listen To Pronk Pops Podcast or Download Show 346-353

Listen To Pronk Pops Podcast or Download Show 338-345

Listen To Pronk Pops Podcast or Download Show 328-337

Listen To Pronk Pops Podcast or Download Show 319-327

Listen To Pronk Pops Podcast or Download Show 307-318

Listen To Pronk Pops Podcast or Download Show 296-306

Listen To Pronk Pops Podcast or Download Show 287-295

Listen To Pronk Pops Podcast or Download Show 277-286

Listen To Pronk Pops Podcast or Download Show 264-276

Listen To Pronk Pops Podcast or Download Show 250-263

Listen To Pronk Pops Podcast or Download Show 236-249

Listen To Pronk Pops Podcast or Download Show 222-235

Listen To Pronk Pops Podcast or Download Show 211-221

Listen To Pronk Pops Podcast or DownloadShow 202-210

Listen To Pronk Pops Podcast or Download Show 194-201

Listen To Pronk Pops Podcast or Download Show 184-193

Listen To Pronk Pops Podcast or Download Show 174-183

Listen To Pronk Pops Podcast or Download Show 165-173

Listen To Pronk Pops Podcast or Download Show 158-164

Listen To Pronk Pops Podcast or Download Show 151-157

Listen To Pronk Pops Podcast or Download Show 143-150

Listen To Pronk Pops Podcast or Download Show 135-142

Listen To Pronk Pops Podcast or Download Show 131-134

Listen To Pronk Pops Podcast or Download Show 124-130

Listen To Pronk Pops Podcast or Download Shows 121-123

Listen To Pronk Pops Podcast or Download Shows 118-120

Listen To Pronk Pops Podcast or Download Shows 113 -117

Listen To Pronk Pops Podcast or Download Show 112

Listen To Pronk Pops Podcast or Download Shows 108-111

Listen To Pronk Pops Podcast or Download Shows 106-108

Listen To Pronk Pops Podcast or Download Shows 104-105

Listen To Pronk Pops Podcast or Download Shows 101-103

Listen To Pronk Pops Podcast or Download Shows 98-100

Listen To Pronk Pops Podcast or Download Shows 94-97

Listen To Pronk Pops Podcast or Download Shows 93

Listen To Pronk Pops Podcast or Download Shows 92

Listen To Pronk Pops Podcast or Download Shows 91

Listen To Pronk Pops Podcast or Download Shows 88-90

Listen To Pronk Pops Podcast or Download Shows 84-87

Listen To Pronk Pops Podcast or Download Shows 79-83

Listen To Pronk Pops Podcast or Download Shows 74-78

Listen To Pronk Pops Podcast or Download Shows 71-73

Listen To Pronk Pops Podcast or Download Shows 68-70

Listen To Pronk Pops Podcast or Download Shows 65-67

Listen To Pronk Pops Podcast or Download Shows 62-64

Listen To Pronk Pops Podcast or Download Shows 58-61

Listen To Pronk Pops Podcast or Download Shows 55-57

Listen To Pronk Pops Podcast or Download Shows 52-54

Listen To Pronk Pops Podcast or Download Shows 49-51

Listen To Pronk Pops Podcast or Download Shows 45-48

Listen To Pronk Pops Podcast or Download Shows 41-44

Listen To Pronk Pops Podcast or Download Shows 38-40

Listen To Pronk Pops Podcast or Download Shows 34-37

Listen To Pronk Pops Podcast or Download Shows 30-33

Listen To Pronk Pops Podcast or Download Shows 27-29

Listen To Pronk Pops Podcast or Download Shows 17-26

Listen To Pronk Pops Podcast or Download Shows 16-22

Listen To Pronk Pops Podcast or Download Shows 10-15

Listen To Pronk Pops Podcast or Download Shows 01-09

Read Full Post | Make a Comment ( None so far )

Liked it here?
Why not try sites on the blogroll...