The Pronk Pops Show 914, June 19, 2017, Story 1: Otto Warmbier Died After Being Released From North Korea in A Coma — Videos — Story 2: Time For Strategic Patience Is Over — Take Out The Korean Dictator, Missiles, Nuclear Bomb Facilities, Artillery and Rocket Launchers In Range of South Korea — Regularly Planned and Scheduled War — Videos — Story 3: U.S. Navy F-18 Fighter Shoots Down Syrian SU -22 Fighter Over Raqqa, Syria After U.S. Allies On Ground Bombed– Russia Warns U.S. Planes Will Be Considered Targets — Videos — Story 4: Interventionist Foreign Policy of Progressive Democrats and Republicans (Neocons) Projecting Power of American Empire — No War Ever Declared Or American People Consulted — Videos

Posted on June 19, 2017. Filed under: American History, Blogroll, Breaking News, Communications, Congress, Constitutional Law, Countries, Crime, Culture, Defense Spending, Diet, Donald J. Trump, Donald J. Trump, Donald J. Trump, Donald Trump, Donald Trump, Education, Empires, Exercise, Food, Foreign Policy, Former President Barack Obama, Freedom of Speech, Government Spending, Health, Health Care, History, House of Representatives, Human, Human Behavior, Independence, Japan, Language, Law, Life, Lying, Media, Medicine, National Interest, News, North Korea, Obama, People, Philosophy, Photos, Politics, Polls, President Trump, Progressives, Raymond Thomas Pronk, Resources, Scandals, Security, Senate, Social Science, South Korea, Success, Taxation, Taxes, Terror, Terrorism, Unemployment, United States of America, Videos, War, Wealth, Wisdom | Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , |

Project_1

The Pronk Pops Show Podcasts

Pronk Pops Show 914,  June 19, 2017

Pronk Pops Show 913,  June 16, 2017

Pronk Pops Show 912,  June 15, 2017

Pronk Pops Show 911,  June 14, 2017

Pronk Pops Show 910,  June 13, 2017

Pronk Pops Show 909,  June 12, 2017

Pronk Pops Show 908,  June 9, 2017

Pronk Pops Show 907,  June 8, 2017

Pronk Pops Show 906,  June 7, 2017

Pronk Pops Show 905,  June 6, 2017

Pronk Pops Show 904,  June 5, 2017

Pronk Pops Show 903,  June 1, 2017

Pronk Pops Show 902,  May 31, 2017

Pronk Pops Show 901,  May 30, 2017

Pronk Pops Show 900,  May 25, 2017

Pronk Pops Show 899,  May 24, 2017

Pronk Pops Show 898,  May 23, 2017

Pronk Pops Show 897,  May 22, 2017

Pronk Pops Show 896,  May 18, 2017

Pronk Pops Show 895,  May 17, 2017

Pronk Pops Show 894,  May 16, 2017

Pronk Pops Show 893,  May 15, 2017

Pronk Pops Show 892,  May 12, 2017

Pronk Pops Show 891,  May 11, 2017

Pronk Pops Show 890,  May 10, 2017

Pronk Pops Show 889,  May 9, 2017

Pronk Pops Show 888,  May 8, 2017

Pronk Pops Show 887,  May 5, 2017

Pronk Pops Show 886,  May 4, 2017

Pronk Pops Show 885,  May 3, 2017

Pronk Pops Show 884,  May 1, 2017

Pronk Pops Show 883 April 28, 2017

Pronk Pops Show 882: April 27, 2017

Pronk Pops Show 881: April 26, 2017

Pronk Pops Show 880: April 25, 2017

Pronk Pops Show 879: April 24, 2017

Pronk Pops Show 878: April 21, 2017

Pronk Pops Show 877: April 20, 2017

Pronk Pops Show 876: April 19, 2017

Pronk Pops Show 875: April 18, 2017

Pronk Pops Show 874: April 17, 2017

Pronk Pops Show 873: April 13, 2017

Pronk Pops Show 872: April 12, 2017

Pronk Pops Show 871: April 11, 2017

Pronk Pops Show 870: April 10, 2017

Pronk Pops Show 869: April 7, 2017

Pronk Pops Show 868: April 6, 2017

Pronk Pops Show 867: April 5, 2017

Pronk Pops Show 866: April 3, 2017

Pronk Pops Show 865: March 31, 2017

Pronk Pops Show 864: March 30, 2017

Pronk Pops Show 863: March 29, 2017

Pronk Pops Show 862: March 28, 2017

Pronk Pops Show 861: March 27, 2017

Pronk Pops Show 860: March 24, 2017

Pronk Pops Show 859: March 23, 2017

Pronk Pops Show 858: March 22, 2017

Pronk Pops Show 857: March 21, 2017

Pronk Pops Show 856: March 20, 2017

Pronk Pops Show 855: March 10, 2017

Pronk Pops Show 854: March 9, 2017

Pronk Pops Show 853: March 8, 2017

Pronk Pops Show 852: March 6, 2017

Pronk Pops Show 851: March 3, 2017

Pronk Pops Show 850: March 2, 2017

Pronk Pops Show 849: March 1, 2017

Image result for otto warmbierImage result for map of war with north korea june 2017

Image result for map of syria and ISIS territory u.s. f-18 shots Russian SU-22 Image result for us navy fighter shot down syrian fighter june 18, 2017Image result for Russian SU-22Image result for russia warns us will shot down us planes

Story 1: Otto Warmbier Died After Being Released From North Korea in A Coma — Videos

GLOBALNEWS: North Korea Invites More Western Tourists To Visit Days After Sending One Home In A Coma

Trump administration weighs options after Warmbier death

Should the US retaliate against North Korea for the death of Otto Warmbier?

HOT NEWS: Lt. Col. Tony Shaffer Drops A BOMB And Reveals Real Reason Otto Warmbier Died- This is BIG

North Korea ‘murdered’ Otto Warmbier: Gen. Keane

Family announces Otto Warmbier has died

Otto Warmbier’s Dad Destroys Obama With 5 Words After Trump Brings His Son Home From N. Korea

Father of Otto Warmbier give a press conference and questions following the release of his son, now

‘North Korea Crossed the Line’ | Tucker Carlson Interviews Otto Warmbier’s Father

Doctors update public on Otto Warmbier’s health

North Korea releases American in a coma

Dr. Siegel: Very unlikely Otto Warmbier will ever wake up

Otto Warmbier, Just released from North Korea, Has Died! # 2

Otto Warmbier, American student held in North Korea, dead at 22, family says

American Doctors Examine Otto Warmbier – They JUST Found Something SHOCKING!

Man in vegetative state for 12 years wakes up to tell remarkable story || Full story

Vegetative State

NCBC: What is Persistent Vegetative State, or PVS?

What happened to Otto Warmbier?

The Truth About ‘Truth Serum’

MacGyver – Truth Serum

Otto Warmbier has died, hospital says

CINCINNATI — Otto Warmbier has died, University of Cincinnati Medical Center announced Monday.

Warmbier died at 2:20 p.m. Monday, days after he was released from captivity in North Korea.

In a statement, family members said Warmbier had been unable to speak, see or react to verbal commands since his return to Cincinnati June 13.

“He looked very uncomfortable – almost anguished,” family members said. “Although we would never hear his voice again, within a day the countenance of his face changed – he was at peace. He was home and we believe he could sense that.”

Family members thanked the hospital’s staff for the care they provided Warmbier but said ” the awful torturous mistreatment our son received at the hands of the North Koreans ensured that no other outcome was possible beyond the sad one we experienced today.”

“It would be easy at a moment like this to focus on all that we lost – future time that won’t be spent with a warm, engaging, brilliant young man whose curiosity and enthusiasm for life knew no bounds,” the family said. “But we choose to focus on the time we were given to be with this remarkable person. You can tell from the outpouring of emotion from the communities that he touched – Wyoming, Ohio and the University of Virginia to name just two – that the love for Otto went well beyond his immediate family.”

Check back for more on this breaking story.

Sodium thiopental

From Wikipedia, the free encyclopedia
Sodium thiopental
Sodium thiopental.svg
Sodium-thiopental-3D-vdW-2.png
Clinical data
AHFS/Drugs.com Monograph
Routes of
administration
Intravenous (most common), oral or rectal
ATC code
Legal status
Legal status
Pharmacokinetic data
Biological half-life 5.5[1]-26 hours[2]
Identifiers
CAS Number
  • 71-73-8 Yes (sodium salt)
    76-75-5 (free acid)
PubChem CID
DrugBank
ChemSpider
UNII
KEGG
ChEBI
ChEMBL
ECHA InfoCard 100.000.896
Chemical and physical data
Formula C11H17N2NaO2S
Molar mass 264.32 g/mol
3D model (Jmol)
Chirality Racemic mixture
 Yes (what is this?)  (verify)

Sodium thiopental, also known as Sodium Pentothal (a trademark of Abbott Laboratories, not to be confused with pentobarbital), thiopental, thiopentone, or Trapanal (also a trademark), is a rapid-onset short-acting barbiturate general anesthetic that is an analogue of thiobarbital. Sodium thiopental was a core medicine in the World Health Organization‘s “Essential Drugs List“, which is a list of minimum medical needs for a basic healthcare system, but was supplanted by propofol.[3] It was previously the first of three drugs administered during most lethal injections in the United States, but the U.S. manufacturer Hospira stopped manufacturing the drug and the EU banned the export of the drug for this purpose.[4]

Uses

Anesthesia

Sodium thiopental is an ultra-short-acting barbiturate and has been used commonly in the induction phase of general anesthesia. Its use has been largely replaced with that of propofol, but retains popularity as an induction agent for rapid sequence intubation and in obstetrics.[citation needed] Following intravenous injection, the drug rapidly reaches the brain and causes unconsciousness within 30–45 seconds. At one minute, the drug attains a peak concentration of about 60% of the total dose in the brain. Thereafter, the drug distributes to the rest of the body, and in about 5–10 minutes the concentration is low enough in the brain that consciousness returns.[citation needed]

A normal dose of sodium thiopental (usually 4–6 mg/kg) given to a pregnant woman for operative delivery (caesarian section) rapidly makes her unconscious, but the baby in her uterus remains conscious. However, larger or repeated doses can depress the baby.[5]

Sodium thiopental is not used to maintain anesthesia in surgical procedures because, in infusion, it displays zero-order elimination kinetics, leading to a long period before consciousness is regained. Instead, anesthesia is usually maintained with an inhaled anesthetic (gas) agent. Inhaled anesthetics are eliminated relatively quickly, so that stopping the inhaled anesthetic will allow rapid return of consciousness. Sodium thiopental would have to be given in large amounts to maintain an anesthetic plane, and because of its 11.5- to 26-hour half-life, consciousness would take a long time to return.[6]

In veterinary medicine, sodium thiopental is used to induce anesthesia in animals. Since it is redistributed to fat, certain lean breeds of dogs such as sight hounds will have prolonged recoveries from sodium thiopental due to their lack of body fat and their lean body mass. Conversely, obese animals will have rapid recoveries, but it will be some time[vague] before it is entirely removed (metabolized) from their bodies. Sodium thiopental is always administered intravenously, as it can be fairly irritating; severe tissue necrosis and sloughing can occur if it is injected incorrectly into the tissue around a vein.[citation needed]

Sodium thiopental decreases the cardiac stroke volume, which results in a decrease in cardiac output. The decrease in cardiac output occurs in conjunction with a decrease in systemic vascular resistance, which results in hypotension. However, in comparison with propofol, the reflex tachycardia seen during states of hypotension is relatively spared (a bradycardia is common after administration of propofol) and therefore the observed fall in blood pressure is generally less severe.

Medically induced coma

In addition to anesthesia induction, sodium thiopental was historically used to induce medical comas.[7] It has now been superseded by drugs such as propofol because their effects wear off more quickly than thiopental. Patients with brain swelling, causing elevation of intracranial pressure, either secondary to trauma or following surgery, may benefit from this drug. Sodium thiopental, and the barbiturate class of drugs, decrease neuronal activity and therefore decrease the production of osmotically active metabolites, which in turn decreases swelling. Patients with significant swelling have improved outcomes following the induction of coma. Reportedly, thiopental has been shown to be superior to pentobarbital in reducing intracranial pressure.[8] This phenomenon is also called a reverse steal effect.[citation needed]

Status epilepticus

In refractory status epilepticus, thiopental may be used to terminate a seizure.

Euthanasia

Sodium thiopental is used intravenously for the purposes of euthanasia. In both Belgium and the Netherlands, where active euthanasia is allowed by law, the standard protocol recommends sodium thiopental as the ideal agent to induce coma, followed by pancuronium bromide.[9]

Intravenous administration is the most reliable and rapid way to accomplish euthanasia. A coma is first induced by intravenous administration of 20 mg/kg thiopental sodium (Nesdonal) in a small volume (10 ml physiological saline). Then, a triple dose of a non-depolarizing neuromuscular blocking drug is given, such as 20 mg pancuronium bromide (Pavulon) or 20 mg vecuronium bromide (Norcuron). The muscle relaxant should be given intravenously to ensure optimal availability but pancuronium bromide may be administered intramuscularly at an increased dosage level of 40 mg.[9]

Lethal injection

Along with pancuronium bromide and potassium chloride, thiopental is used in 34 states of the U.S. to execute prisoners by lethal injection. A very large dose is given to ensure rapid loss of consciousness. Although death usually occurs within ten minutes of the beginning of the injection process, some have been known to take longer.[10] The use of sodium thiopental in execution protocols was challenged in court after a study in the medical journal The Lancet reported autopsies of executed inmates showed the level of thiopental in their bloodstream was insufficient to cause unconsciousness.

On December 8, 2009, the State of Ohio became the first to use a single dose of sodium thiopental for its capital execution, following the failed use of the standard three-drug cocktail during a recent execution, due to inability to locate suitable veins. Kenneth Biros was executed using the single-drug method.[11]

The state of Washington is now the second state in the U.S. to use the single-dose sodium thiopental injections for death penalty executions. On September 10, 2010, Cal Coburn Brown was executed. This was the first execution in the state to use a single dose, single drug injection. His death was pronounced approximately one and a half minutes after the intravenous administration of five grams of the drug.[12]

After its use for execution of Jeffrey Landrigan in the U.S., the UK introduced a ban on the export of sodium thiopental in December 2010,[13] after it was established that no European supplies to the U.S. were being used for any other purpose.[14] The restrictions were based on “the European Union Torture Regulation (including licensing of drugs used in execution by lethal injection)”.[15] From 21 December 2011 the European Union extended trade restrictions to prevent the export of certain medicinal products for capital punishment, stating that “the Union disapproves of capital punishment in all circumstances and works towards its universal abolition”.[16]

Truth serum

Thiopental (Pentothal) is still used in some places as a truth serum to weaken the resolve of a subject and make them more compliant to pressure.[17] The barbiturates as a class decrease higher cortical brain functioning. Some psychiatrists hypothesize that because lying is more complex than telling the truth, suppression of the higher cortical functions may lead to the uncovering of the truth. The drug tends to make subjects loquacious and cooperative with interrogators; however, the reliability of confessions made under thiopental is questionable.[18] “Sodium pentathol” as a truth serum has become a trope in films, comics and literature, and even appears in popular music.[19]

Psychiatry

Psychiatrists have used thiopental to desensitize patients with phobias,[20] and to “facilitate the recall of painful repressed memories.”[21] One psychiatrist who worked with thiopental is the Dutch Professor Jan Bastiaans, who used this procedure to help relieve trauma in surviving victims of the Holocaust.[22]

Mechanism of action

Sodium thiopental is a member of the barbiturate class of drugs, which are relatively non-selective compounds that bind to an entire superfamily of ligand-gated ion channels, of which the GABAA receptor channel is one of several representatives. This superfamily of ion channels includes the neuronal nAChR channel, the 5HT3R channel, the GlyR channel and others. Surprisingly, while GABAA receptor currents are increased by barbiturates (and other general anesthetics), ligand-gated ion channels that are predominantly permeable for cationic ions are blocked by these compounds. For example, neuronal nAChR channels are blocked by clinically relevant anesthetic concentrations of both sodium thiopental and pentobarbital.[23] Such findings implicate (non-GABA-ergic) ligand-gated ion channels, e.g. the neuronal nAChR channel, in mediating some of the (side) effects of barbiturates.[24]The GABAA receptor is an inhibitory channel that decreases neuronal activity, and barbiturates enhance the inhibitory action of the GABAA receptor.[25]

Controversies

Following a shortage that led a court to delay an execution in California, a company spokesman for Hospira, the sole American manufacturer of the drug, objected to the use of thiopental in lethal injection. “Hospira manufactures this product because it improves or saves lives, and the company markets it solely for use as indicated on the product labeling. The drug is not indicated for capital punishment and Hospira does not support its use in this procedure.”[26] On January 21, 2011, the company announced that it would stop production of sodium thiopental from its plant in Italy because Italian authorities couldn’t guarantee that exported quantities of the drug would not be used in executions. Italy was the only viable place where the company could produce sodium thiopental, leaving the United States without a supplier.[27]

Metabolism

Thiopental rapidly and easily crosses the blood brain barrier as it is a lipophilic molecule. As with all lipid-soluble anaesthetic drugs, the short duration of action of sodium thiopental is due almost entirely to its redistribution away from central circulation towards muscle and fat tissue, due to its very high fat:water partition coefficient (aprx 10), leading to sequestration in fat tissue. Once redistributed, the free fraction in the blood is metabolized in the liver. Sodium thiopental is mainly metabolized to pentobarbital,[28] 5-ethyl-5-(1′-methyl-3′-hydroxybutyl)-2-thiobarbituric acid, and 5-ethyl-5-(1′-methyl-3′-carboxypropyl)-2-thiobarbituric acid.[29]

Dosage

The usual dose range for induction of anesthesia using thiopental is from 3 to 6 mg/kg; however, there are many factors that can alter this. Premedication with sedatives such as benzodiazepines or clonidine will reduce requirements, as do specific disease states and other patient factors. Among patient factors are: age, sex, and lean body mass. Specific disease conditions that can alter the dose requirements of thiopentone and for that matter any other intravenous anaesthetic are: hypovolemia, burns, azotemia, hepatic failure, hypoproteinemia, etc.[citation needed]

Side effects

As with nearly all anesthetic drugs, thiopental causes cardiovascular and respiratory depression resulting in hypotension, apnea and airway obstruction. For these reasons, only suitably trained medical personnel should give thiopental in an environment suitably equipped to deal with these effects. Side effects include headache, agitated emergence, prolonged somnolence, and nausea. Intravenous administration of sodium thiopental is followed instantly by an odor and/or taste sensation, sometimes described as being similar to rotting onions, or to garlic. The hangover from the side effects may last up to 36 hours.

Although individual molecules of thiopental contain one sulfur atom, it is not a sulfonamide, and does not show allergic reactions of sulfa/sulpha drugs.

Contraindications

Thiopental should be used with caution in cases of liver disease, Addison’s disease, myxedema, severe heart disease, severe hypotension, a severe breathing disorder, or a family history of porphyria.[30][31]

Co-administration of pentoxifylline and thiopental causes death by acute pulmonary edema in rats. This pulmonary edema was not mediated by cardiac failure or by pulmonary hypertension but was due to increased pulmonary vascular permeability.[32]

History

Sodium thiopental was discovered in the early 1930s by Ernest H. Volwiler and Donalee L. Tabern, working for Abbott Laboratories. It was first used in human beings on March 8, 1934, by Dr. Ralph M. Waters[33] in an investigation of its properties, which were short-term anesthesia and surprisingly little analgesia.[34] Three months later,[35] Dr. John S. Lundy started a clinical trial of thiopental at the Mayo Clinic at the request of Abbott.[36]Abbott continued to make the drug until 2004, when it spun off its hospital-products division as Hospira.

Thiopental is famously associated with a number of anesthetic deaths in victims of the attack on Pearl Harbor. These deaths, relatively soon after the drug’s introduction, were said to be due to excessive doses given to shocked trauma patients. However, recent evidence available through freedom of information legislation was reviewed in the British Journal of Anaesthesia,[37] which has suggested that this story was grossly exaggerated. Of the 344 wounded that were admitted to the Tripler Army Hospital only 13 did not survive and it is unlikely that thiopentone overdose was responsible for more than a few of these.

Thiopental is still rarely used as a recreational drug, usually stolen from veterinarians or other legitimate users of the drug; however, more common sedatives such as benzodiazepines are usually preferred as recreational drugs, and abuse of thiopental tends to be uncommon and opportunistic.[citation needed]

See also

https://en.wikipedia.org/wiki/Sodium_thiopental

Story 2: Time For Strategic Patience Is Over — Take Out The Korean Dictator, Missiles, Nuclear Bomb Facilities, Artillery and Rocket Launchers In Range of South Korea — Regularly Planned and Scheduled War — Videos

FRIEDMAN: US Attack on North Korea is Imminent

Crisis & Chaos: Are We Moving Toward World War III?

Inside North Korea’s Special Forces: The North Korea Nightmare

[News – Live] ‘China must be prepared to TOPPLE Kim Jong-un or WE’LL do it’, former US chief claim

A North Korean Mystery: Where Did Its Rockets and Missiles Come From?

‘North Korea would Lose in Nuclear War with USA’ Chief of Staff

HORRIFIC WAR WITH NORTH KOREA IS IMMANENT

WHY U.S IS NOT USING MILITARY OPTION AGAINST NORTH KOREA?

US ATTACK ON NORTH KOREA IS IMMINENT

U.S. defense secretary Mattis says war with North Korea would be “catastrophic”

WHY RUSSIA & CHINA SHOULD FEAR USS GERALD R. FORD? TOP 5 DEFINITIVE REASONS

Special: Attack Weapons on USS Ford Carrier

North Korea: 4th US Aircraft Carrier Joining the 3 Carriers Already in War Zone!

Show of Force: The US Deploys Third Aircraft Carrier to North Korea

Can North Korea Sink a US Aircraft Carrier? Analysis

Russia & China Warn USA: DO NOT use military force against N.Korea-China warns WW3 inevitable!

USA & Japan & South Korea VS Russia & China & North Korea Military Power Comparison 2017 – 2018

WHY U.S. WILL NEVER ATTACK NORTH KOREA?

Who Are North Korea’s Allies?

Why Did America Fight the Korean War?

Why Korea Split Into North and South Korea

Russia warning after US shoots down Syrian jet

The Breathtaking Incoherence of American Foreign Policy as to North Korea and Syria

Story 3: U.S. Navy F-18 Fighter Shoots Down Syrian SU -22 Fighter Over Raqqa, Syria After U.S. Allies On Ground Bombed– Russia Warns U.S. Planes Will Be Considered Targets — Videos

RED ALERT! U.S. Army Chief Threatens War With Russia – china and North Korea

US Navy fighter jet shoots down Syrian warplane

US Navy Fighter shoots down Syrian Warplane over Syria

NEWS ALERT – Syrian warplane shot down by US-led coalition

Russia Vows to Shoot Down Any Aircraft West of Euphrates River

U.S. Warplane Shoots Down Syrian Army Jet, Russia Threatens to Target U.S. Aircraft

Bombshell ‘Army Readiness is at 30% ‘U.S. Army Chief of Staff

‘Extremely Lethal and Fast’ Army Warns Future War with Russia/China

US Shoots Down Syrian Jet, Russia Threatens to Track and Attack Anything West of Euphrates

Russia to treat US jets in Syria as ‘targets’ after America guns down first regime warplane

Communication channel between Washington and Moscow to be suspended immediately

Russia has said it will treat US warplanes operating in parts of Syria where its air forces are also present as “targets” amid a diplomatic row caused by the downing of a Syrian jet.

The country’s defence ministry said it would track US-led coalition aircraft with missile systems and military aircraft, but stopped short of saying it would shoot them down.

A hotline set up between Russia and the US to prevent mid-air collisions will also be suspended.

“All kinds of airborne vehicles, including aircraft and UAVs of the international coalition detected to the west of the Euphrates River will be tracked by the Russian SAM systems as air targets,” the Russian Defence Ministry said in a statement.

The warning comes after a US F-18 Super Hornet shot down a Syrian army SU-22 jet on Sunday in the countryside southwest of Raqqa – the first such downing of a Syrian jet by the US since the start of the country’s civil war in 2011.

Washington said the jet had dropped bombs near US-backed forces but Damascus said the plane was downed while flying a mission against Isis militants.

Russia’s defence ministry said the suspension of its communication line with the Americans would begin immediately.

The US did not use its hotline with Russia ahead of the downing of the Syrian government warplane, said the ministry, which accused the US of a “deliberate failure to make good on its commitments” under the deconfliction deal.

“The shooting down of a Syrian Air Force jet in Syria’s airspace is a cynical violation of Syria’s sovereignty,” the ministry said.

“The US’ repeated combat operations under the guise of ‘combating terrorism’ against the legitimate armed forces of a UN member-country are a flagrant violation of international law and an actual military aggression against the Syrian Arab Republic.”

Theresa May appealed to Russia to continue the use of “deconfliction” measures over the skies of Syria to reduce the risk of misunderstandings in what is a crowded airspace.

Russia, which has been providing air cover for Syria’s President, Bashar al-Assad, since 2015, has an agreement with the US aimed at preventing incidents involving either country’s warplanes engaged in operations in Syria.

Downing the jet was akin to “helping the terrorists that the US is fighting against”, Sergei Ryabkov, Russia’s deputy foreign minister, said.

A statement released by US Central Command on Sunday said the Syrian jet was “immediately shot down… in accordance with rules of engagement and in collective self-defence of Coalition partnered forces”.

“The Coalition’s mission is to defeat Isis in Iraq and Syria. The Coalition does not seek to fight Syrian regime, Russian, or pro-regime forces partnered with them, but will not hesitate to defend Coalition or partner forces from any threat,” it added.

“The Coalition presence in Syria addresses the imminent threat Isis in Syria poses globally. The demonstrated hostile intent and actions of pro-regime forces toward Coalition and partner forces in Syria conducting legitimate counter-Isis operations will not be tolerated.”

Tensions rise in Syria as Russia, Iran send US warnings

By BASSEM MROUE and NATALIYA VASILYEVA, Associated PressTHE ASSOCIATED PRESS STATEMENT OF NEWS VALUES AND PRINCIPLES

(AP) — Russia on Monday threatened aircraft from the U.S.-led coalition in Syrian-controlled airspace and suspended a hotline intended to avoid collisions in retaliation for the U.S. military shooting down a Syrian warplane.

The U.S. said it had downed the Syrian jet a day earlier after it dropped bombs near the U.S.-backed Syrian Democratic Forces conducting operations against the Islamic State group, adding that was something it would not tolerate.

The downing of the warplane — the first time in the six-year conflict that the U.S. has shot down a Syrian jet — came amid another first: Iran fired several ballistic missiles Sunday night at IS positions in eastern Syria in what it said was a message to archrival Saudi Arabia and the United States.

The developments added to already-soaring regional tensions and reflect the intensifying rivalry among the major players in Syria’s civil war that could spiral out of control just as the fight against the Islamic State group in its stronghold of Raqqa is gaining ground.

Russia, a key ally of Syrian President Bashar Assad, called on the U.S. military to provide a full accounting as to why it decided to shoot down the Syrian Su-22 bomber.

The U.S. military confirmed that one of its F-18 Super Hornets shot down a Syrian jet that had dropped bombs near the U.S. partner forces SDF. Those forces, which are aligned with the U.S. in the campaign against the Islamic State group, warned Syrian government troops to stop their attacks or face retaliation.

The Russian Defense Ministry said in a statement that as of Monday, all coalition jets and drones flying west of the Euphrates River will be tracked as potential targets.

Areas of northern Syria west of the Euphrates were controlled by IS before Syrian government forces captured most of them in recent months. The Russians, who have been providing air cover for Assad’s forces since 2015, appear to want to avoid further U.S. targeting of Syrian warplanes or ground troops that have come under U.S. attack in eastern Syria recently.

It was the second time Russia suspended a hotline intended to minimize incidents with the U.S. in Syrian airspace. In April, Russia briefly suspended cooperation after the U.S. military fired 59 missiles at a Syrian air base following a chemical weapons attack that Washington blamed on the Assad government.

Gen. Joseph Dunford, chairman of the Joint Chiefs of Staff, said Washington is working to re-establish communications aimed at avoiding mishaps involving U.S. and Russian air operations in Syria.

Speaking in Washington, the top U.S. military officer said the two sides were in delicate discussions to lower tensions.

“The worst thing any of us could do right now is address this with hyperbole,” Dunford said.

Viktor Ozerov, chairman of the defense and security committee at the upper chamber of Russian parliament, described his Defense Ministry’s statement as a warning.

“I’m sure that because of this, neither the U.S. nor anyone else will take any actions to threaten our aircraft,” he told the state-owned RIA Novosti news agency. “That’s why there’s no threat of direct confrontation between Russia and American aircraft.”

Ozerov insisted that Russia will be tracking the coalition’s jets, not shooting them down, but he added that “a threat for those jets may appear only if they take action that pose a threat to Russian aircraft.”

Iran said the missile strike by its powerful Revolutionary Guard hit Syria’s eastern city of Deir el-Zour on Sunday night and was in retaliation for two attacks in Tehran earlier this month that killed 17 people and were claimed by the Islamic State group.

It appeared to be Iran’s first missile attack abroad in over 15 years and its first in the Syrian conflict, in which it has provided crucial support to Assad. The muscle-flexing comes amid the worsening of a long-running feud between Shiite powerhouse Iran and Saudi Arabia, with supports Syrian rebels and has led recent efforts to isolate the Gulf nation of Qatar.

“The Saudis and Americans are especially receivers of this message,” Gen. Ramazan Sharif of the Revolutionary Guard told Iranian state TV in an interview.

It also raised questions about how U.S. President Donald Trump’s administration, which had previously put Iran “on notice” for its ballistic missile tests, will respond. Israel also is concerned about Iran’s missiles and has deployed a multilayered missile-defense system.

The missile attack came amid recent confrontations in Syria between U.S.-backed forces and Iranian-backed pro-government factions. The U.S. recently deployed a truck-mounted missile system in Syria as Iranian-backed forces cut off the advance of the U.S.-supported rebels along the Iraqi border.

Iranian officials threatened more strikes. Former Guard chief Gen. Mohsen Rezai wrote on Twitter: “The bigger slap is yet to come.”

U.S.-backed opposition fighters said Assad’s forces have been attacking them in the northern province of Raqqa and warned that if such attacks continue, the fighters will take action.

Clashes between Syrian troops and the SDF would escalate tensions and open a new front line in the many complex battlefields of the civil war, now in its seventh year. Clashes between the Kurdish-led SDF and Syrian forces have been rare and some rebel groups have even accused them of coordinating on the battlefield.

Both sides are battling the Islamic State group, with SDF fighters focusing on their march into the northern city of Raqqa, which the extremist group has declared to be its capital.

Syrian government forces have also been attacking IS in northern, central and southern parts of the country, seizing 25,000 square kilometers (9,600 square miles) and reaching the Iraqi border for the first time in years.

SDF spokesman Talal Sillo said the government wants to thwart the SDF offensive to capture Raqqa. He said government forces began attacking the SDF on Saturday, using warplanes, artillery and tanks in areas that SDF had liberated from IS.

Sillo also warned that if “the regime continues in its offensive against our positions in Raqqa province, this will force us to retaliate with force.”

The Britain-based Syrian Observatory for Human Rights, which tracks Syria’s war, said government forces expanded their presence in Raqqa province by capturing from IS the town of Rasafa.

___

Vasilyeva reported from Moscow. Associated Press writers Nasser Karimi in Tehran and Jon Gambrell in Dubai, United Arab Emirates, contributed.

http://hosted2.ap.org/APDefault/*/Article_2017-06-19-Syria/id-371357b2c20e4aaa982d07da071a7f7a

Story 4: Interventionist Foreign Policy of Progressive Democrats and Republicans (Neocons) Projecting Power of American Empire — No War Ever Declared Or American People Consulted — Videos

Ron Paul – Neo-CONNED!

Should America be the World’s Policeman?

Ron Paul Americans Are Forced to Pay for U S Government’s Interventionist Foreign Policy

Outline of US foreign interventions

CIA Covert Operations and U.S. Interventions Since World War II Full documentary

Overthrowing Governments 101, CIA Coups

Ron Paul explains he’s not an Isolationist

The Middle East Problem

The Pronk Pops Show Podcasts Portfolio

Listen To Pronk Pops Podcast or Download Shows 906-914

Listen To Pronk Pops Podcast or Download Shows 889-896

Listen To Pronk Pops Podcast or Download Shows 884-888

Listen To Pronk Pops Podcast or Download Shows 878-883

Listen To Pronk Pops Podcast or Download Shows 870-877

Listen To Pronk Pops Podcast or Download Shows 864-869

Listen To Pronk Pops Podcast or Download Shows 857-863

Listen To Pronk Pops Podcast or Download Shows 850-856

Listen To Pronk Pops Podcast or Download Shows 845-849

Listen To Pronk Pops Podcast or Download Shows 840-844

Listen To Pronk Pops Podcast or Download Shows 833-839

Listen To Pronk Pops Podcast or Download Shows 827-832

Listen To Pronk Pops Podcast or Download Shows 821-826

Listen To Pronk Pops Podcast or Download Shows 815-820

Listen To Pronk Pops Podcast or Download Shows 806-814

Listen To Pronk Pops Podcast or Download Shows 800-805

Listen To Pronk Pops Podcast or Download Shows 793-799

Listen To Pronk Pops Podcast or Download Shows 785-792

Listen To Pronk Pops Podcast or Download Shows 777-784

Listen To Pronk Pops Podcast or Download Shows 769-776

Listen To Pronk Pops Podcast or Download Shows 759-768

Listen To Pronk Pops Podcast or Download Shows 751-758

Listen To Pronk Pops Podcast or Download Shows 745-750

Listen To Pronk Pops Podcast or Download Shows 738-744

Listen To Pronk Pops Podcast or Download Shows 732-737

Listen To Pronk Pops Podcast or Download Shows 727-731

Listen To Pronk Pops Podcast or Download Shows 720-726

Listen To Pronk Pops Podcast or DownloadShows 713-719

Listen To Pronk Pops Podcast or DownloadShows 705-712

Listen To Pronk Pops Podcast or Download Shows 695-704

Listen To Pronk Pops Podcast or Download Shows 685-694

Listen To Pronk Pops Podcast or Download Shows 675-684

Listen To Pronk Pops Podcast or Download Shows 668-674

Listen To Pronk Pops Podcast or Download Shows 660-667

Listen To Pronk Pops Podcast or Download Shows 651-659

Listen To Pronk Pops Podcast or Download Shows 644-650

Listen To Pronk Pops Podcast or Download Shows 637-643

Listen To Pronk Pops Podcast or Download Shows 629-636

Listen To Pronk Pops Podcast or Download Shows 617-628

Listen To Pronk Pops Podcast or Download Shows 608-616

Listen To Pronk Pops Podcast or Download Shows 599-607

Listen To Pronk Pops Podcast or Download Shows 590-598

Listen To Pronk Pops Podcast or Download Shows 585- 589

Listen To Pronk Pops Podcast or Download Shows 575-584

Listen To Pronk Pops Podcast or Download Shows 565-574

Listen To Pronk Pops Podcast or Download Shows 556-564

Listen To Pronk Pops Podcast or Download Shows 546-555

Listen To Pronk Pops Podcast or Download Shows 538-545

Listen To Pronk Pops Podcast or Download Shows 532-537

Listen To Pronk Pops Podcast or Download Shows 526-531

Listen To Pronk Pops Podcast or Download Shows 519-525

Listen To Pronk Pops Podcast or Download Shows 510-518

Listen To Pronk Pops Podcast or Download Shows 500-509

Listen To Pronk Pops Podcast or Download Shows 490-499

Listen To Pronk Pops Podcast or Download Shows 480-489

Listen To Pronk Pops Podcast or Download Shows 473-479

Listen To Pronk Pops Podcast or Download Shows 464-472

Listen To Pronk Pops Podcast or Download Shows 455-463

Listen To Pronk Pops Podcast or Download Shows 447-454

Listen To Pronk Pops Podcast or Download Shows 439-446

Listen To Pronk Pops Podcast or Download Shows 431-438

Listen To Pronk Pops Podcast or Download Shows 422-430

Listen To Pronk Pops Podcast or Download Shows 414-421

Listen To Pronk Pops Podcast or Download Shows 408-413

Listen To Pronk Pops Podcast or Download Shows 400-407

Listen To Pronk Pops Podcast or Download Shows 391-399

Listen To Pronk Pops Podcast or Download Shows 383-390

Listen To Pronk Pops Podcast or Download Shows 376-382

Listen To Pronk Pops Podcast or Download Shows 369-375

Listen To Pronk Pops Podcast or Download Shows 360-368

Listen To Pronk Pops Podcast or Download Shows 354-359

Listen To Pronk Pops Podcast or Download Shows 346-353

Listen To Pronk Pops Podcast or Download Shows 338-345

Listen To Pronk Pops Podcast or Download Shows 328-337

Listen To Pronk Pops Podcast or Download Shows 319-327

Listen To Pronk Pops Podcast or Download Shows 307-318

Listen To Pronk Pops Podcast or Download Shows 296-306

Listen To Pronk Pops Podcast or Download Shows 287-295

Listen To Pronk Pops Podcast or Download Shows 277-286

Listen To Pronk Pops Podcast or Download Shows 264-276

Listen To Pronk Pops Podcast or Download Shows 250-263

Listen To Pronk Pops Podcast or Download Shows 236-249

Listen To Pronk Pops Podcast or Download Shows 222-235

Listen To Pronk Pops Podcast or Download Shows 211-221

Listen To Pronk Pops Podcast or Download Shows 202-210

Listen To Pronk Pops Podcast or Download Shows 194-201

Listen To Pronk Pops Podcast or Download Shows 184-193

Listen To Pronk Pops Podcast or Download Shows 174-183

Listen To Pronk Pops Podcast or Download Shows 165-173

Listen To Pronk Pops Podcast or Download Shows 158-164

Listen To Pronk Pops Podcast or Download Shows151-157

Listen To Pronk Pops Podcast or Download Shows 143-150

Listen To Pronk Pops Podcast or Download Shows 135-142

Listen To Pronk Pops Podcast or Download Shows 131-134

Listen To Pronk Pops Podcast or Download Shows 124-130

Listen To Pronk Pops Podcast or Download Shows 121-123

Listen To Pronk Pops Podcast or Download Shows 118-120

Listen To Pronk Pops Podcast or Download Shows 113 -117

Listen To Pronk Pops Podcast or Download Show 112

Listen To Pronk Pops Podcast or Download Shows 108-111

Listen To Pronk Pops Podcast or Download Shows 106-108

Listen To Pronk Pops Podcast or Download Shows 104-105

Listen To Pronk Pops Podcast or Download Shows 101-103

Listen To Pronk Pops Podcast or Download Shows 98-100

Listen To Pronk Pops Podcast or Download Shows 94-97

Listen To Pronk Pops Podcast or Download Show 93

Listen To Pronk Pops Podcast or Download Show 92

Listen To Pronk Pops Podcast or Download Show 91

Listen To Pronk Pops Podcast or Download Shows 88-90

Listen To Pronk Pops Podcast or Download Shows 84-87

Listen To Pronk Pops Podcast or Download Shows 79-83

Listen To Pronk Pops Podcast or Download Shows 74-78

Listen To Pronk Pops Podcast or Download Shows 71-73

Listen To Pronk Pops Podcast or Download Shows 68-70

Listen To Pronk Pops Podcast or Download Shows 65-67

Listen To Pronk Pops Podcast or Download Shows 62-64

Listen To Pronk Pops Podcast or Download Shows 58-61

Listen To Pronk Pops Podcast or Download Shows 55-57

Listen To Pronk Pops Podcast or Download Shows 52-54

Listen To Pronk Pops Podcast or Download Shows 49-51

Listen To Pronk Pops Podcast or Download Shows 45-48

Listen To Pronk Pops Podcast or Download Shows 41-44

Listen To Pronk Pops Podcast or Download Shows 38-40

Listen To Pronk Pops Podcast or Download Shows 34-37

Listen To Pronk Pops Podcast or Download Shows 30-33

Listen To Pronk Pops Podcast or Download Shows 27-29

Listen To Pronk Pops Podcast or Download Shows 17-26

Listen To Pronk Pops Podcast or Download Shows 16-22

Listen To Pronk Pops Podcast or Download Shows 10-15

Listen To Pronk Pops Podcast or Download Shows 1-9

Read Full Post | Make a Comment ( None so far )

The Pronk Pops Show 902, May 31, 2017, –Breaking — Story 1: Unmasking The Unmaskers: House Intelligence Committee Issues Subpoenas To NSA, CIA, FBI Regarding Unmasking Requests By Susan Rice, John Brennan, and Samantha Power in Classified Documents and Former Trump National Security Advisor Mike Flynn and Trump Lawyer — Videos — Story 2: Portrait of A Paranoid: Hillary Clinton Unplugged But Weaponized– Blames Russians, Comey, Democratic Party, Fake News, Wikileaks, and Others — Not Herself and Her Campaign — Videos — Story 3: President Trump Still Listening To Both Side on Paris Climate Agreement — Trump Supporters Want Him To Pull Out Now! — Videos

Posted on May 31, 2017. Filed under: American History, Barack H. Obama, Blogroll, Breaking News, Central Intelligence Agency, Congress, Countries, Crime, Donald J. Trump, Donald J. Trump, Donald J. Trump, Donald Trump, Drugs, Education, Elections, Federal Bureau of Investigation (FBI), Freedom of Speech, Government, History, House of Representatives, Networking, News, Obama, People, Politics, Polls, Raymond Thomas Pronk, Russia, Scandals, Senate, Spying on American People, United Kingdom, United States of America | Tags: , , , , , , , , , |

Project_1

The Pronk Pops Show Podcasts

Pronk Pops Show 902,  May 31, 2017

Pronk Pops Show 901,  May 30, 2017

Pronk Pops Show 900,  May 25, 2017

Pronk Pops Show 899,  May 24, 2017

Pronk Pops Show 898,  May 23, 2017

Pronk Pops Show 897,  May 22, 2017

Pronk Pops Show 896,  May 18, 2017

Pronk Pops Show 895,  May 17, 2017

Pronk Pops Show 894,  May 16, 2017

Pronk Pops Show 893,  May 15, 2017

Pronk Pops Show 892,  May 12, 2017

Pronk Pops Show 891,  May 11, 2017

Pronk Pops Show 890,  May 10, 2017

Pronk Pops Show 889,  May 9, 2017

Pronk Pops Show 888,  May 8, 2017

Pronk Pops Show 887,  May 5, 2017

Pronk Pops Show 886,  May 4, 2017

Pronk Pops Show 885,  May 3, 2017

Pronk Pops Show 884,  May 1, 2017

Pronk Pops Show 883 April 28, 2017

Pronk Pops Show 882: April 27, 2017

Pronk Pops Show 881: April 26, 2017

Pronk Pops Show 880: April 25, 2017

Pronk Pops Show 879: April 24, 2017

Pronk Pops Show 878: April 21, 2017

Pronk Pops Show 877: April 20, 2017

Pronk Pops Show 876: April 19, 2017

Pronk Pops Show 875: April 18, 2017

Pronk Pops Show 874: April 17, 2017

Pronk Pops Show 873: April 13, 2017

Pronk Pops Show 872: April 12, 2017

Pronk Pops Show 871: April 11, 2017

Pronk Pops Show 870: April 10, 2017

Pronk Pops Show 869: April 7, 2017

Pronk Pops Show 868: April 6, 2017

Pronk Pops Show 867: April 5, 2017

Pronk Pops Show 866: April 3, 2017

Pronk Pops Show 865: March 31, 2017

Pronk Pops Show 864: March 30, 2017

Pronk Pops Show 863: March 29, 2017

Pronk Pops Show 862: March 28, 2017

Pronk Pops Show 861: March 27, 2017

Pronk Pops Show 860: March 24, 2017

Pronk Pops Show 859: March 23, 2017

Pronk Pops Show 858: March 22, 2017

Pronk Pops Show 857: March 21, 2017

Pronk Pops Show 856: March 20, 2017

Pronk Pops Show 855: March 10, 2017

Pronk Pops Show 854: March 9, 2017

Pronk Pops Show 853: March 8, 2017

Pronk Pops Show 852: March 6, 2017

Pronk Pops Show 851: March 3, 2017

Pronk Pops Show 850: March 2, 2017

Pronk Pops Show 849: March 1, 2017

Pronk Pops Show 848: February 28, 2017

Pronk Pops Show 847: February 27, 2017

Pronk Pops Show 846: February 24, 2017

Pronk Pops Show 845: February 23, 2017

Pronk Pops Show 844: February 22, 2017

Pronk Pops Show 843: February 21, 2017

Pronk Pops Show 842: February 20, 2017

Pronk Pops Show 841: February 17, 2017

Pronk Pops Show 840: February 16, 2017

Pronk Pops Show 839: February 15, 2017

Pronk Pops Show 838: February 14, 2017

Pronk Pops Show 837: February 13, 2017

Pronk Pops Show 836: February 10, 2017

Pronk Pops Show 835: February 9, 2017

Pronk Pops Show 834: February 8, 2017

Pronk Pops Show 833: February 7, 2017

Pronk Pops Show 832: February 6, 2017

Pronk Pops Show 831: February 3, 2017

Pronk Pops Show 830: February 2, 2017

Image result for unmasking susan rice and john brennanImage result for unmasking susan rice and john brennanImage result for trump on climate change

Breaking — Story 1: House Intelligence Committee Issues Subpoenas To NSA, CIA, FBI Regarding Unmasking Requests By Susan Rice, John Brennan, and Samantha Power in Classified Documents and Former Trump National Security Advisor Mike Flynn — Videos

House committee issues subpoenas, references ‘unmasking’

FBI, CIA and NSA served with subpoenas in unmasking probe

House Intelligence Committee unmasks the unmaskers

Trump’s Lawyer, Flynn Subpoenaed by House Intel Committee

Rep Adam Schiff Confirms House Intel Will Also Subpoena Michael Flynn MSNBC

EVERY TREY GOWDY QUESTION: GRILLS John Brennan on Trump Russia Collusion Leaks Unmasking

Why Russia Helps Trump, Not Clinton?? CIA Director John Brennan GRILLED by Tom Rooney

“The Day You Left Office Classified Information Appeared On The Front Page” Trey Gowdy’s Pissed

Former CIA Director John Brennan Testifies on Interference in 2016 Elections 5/23/17

NSA Director Mike Rogers Testifies on President Trump and FBI Probe 5/23/2017

House Intelligence Panel Issues Seven Subpoenas in Russia Probe

Four are related to Russia investigation, three to ‘unmasking’ controversy, individuals say

Former CIA Director John Brennan testifying before the House Permanent Select Committee on Intelligence last week.

Former CIA Director John Brennan testifying before the House Permanent Select Committee on Intelligence last week. PHOTO: DREW ANGERER/GETTY IMAGES

The Republican-led committee issued four subpoenas related to the Russia investigation. Three subpoenas are related to questions about how and why the names of associates of President Donald Trump were unredacted and distributed within classified reports by Obama administration officials during the transition between administrations.

The committee has subpoenaed the National Security Agency, the Federal Bureau of Investigation and the Central Intelligence Agency for information about what is called “unmasking.” Republicans on the committee have been pushing for a thorough investigation of how the names of Trump campaign officials became exposed in classified intelligence reports based off intelligence community intercepts.

Those subpoenas seek information on requests made by former national security adviser Susan Rice, former CIA Director John Brennan and former United Nations Ambassador Samantha Power for names to be unmasked in classified material. The three didn’t personally receive subpoenas, the people familiar with the matte said. Mr. Brennan, Ms. Rice and Ms. Power didn’t immediately respond to requests for comment.

Ms. Power hasn’t previously been reported as a potential witness in the probe so her inclusion in the subpoenas may mean Republicans are broadening their areas of investigation.

Typically, information about Americans intercepted in foreign surveillance is redacted, even in classified reports distributed within the government, unless a compelling need exists to reveal them. Unmasking requests aren’t uncommon by top intelligence community officials but Republicans want to know whether any of the unmaskings of Trump campaign officials during the transition were politically motivated.

The four subpoenas related to the Russia investigation remain unknown but Rep. Adam Schiff, the top Democrat on the panel, has previously said that former national security adviser Mike Flynn would be subpoenaed by the panel. It is unclear if Mr. Flynn is one of the four targeted Wednesday.

The House Intelligence Committee is one of two bodies currently probing the question of whether Russian meddled in the 2016 election and whether anyone from Mr. Trump’s campaign played a role. The Senate Intelligence Committee is conducting its own investigation and has already issued subpoenas to Mr. Flynn and his businesses. Mr. Trump has said there was no collusion with Russia and called the investigation a witch hunt. Russia has denied the allegations.

The House panel also sent a letter to former White House press aide Boris Epshteyn asking him to voluntarily submit information to the committee. Mr. Epshteyn briefly served as special assistant to the president in the Trump administration before departing his post earlier this year.

“Like many others, Mr. Epshteyn has received a broad, preliminary request for information from the House Intelligence Committee,” an attorney for Mr. Epshteyn said Wednesday. “This is a voluntary request. Mr. Epshteyn has not been subpoenaed nor do we anticipate that he will be. We have reached out to the committee with several follow up questions and we are awaiting their response in order to better understand what information they are seeking and whether Mr. Epshteyn is able to reasonably provide it.”

https://www.wsj.com/articles/house-intelligence-committee-said-to-have-issued-seven-subpoenas-in-russia-probe-1496261435

 

Story 2: Portrait of A Paranoid:  Hillary Clinton Unplugged And Weaponized — Blames Russians, Comey, Democratic Party, Fake News, Wikileaks, and Many Others — Not Herself  — The Emails and Server Were A “Nothing Burger” (Actually Criminal Behavior)  — Videos —

FULL EVENT: Hillary Clinton Speaks at Recode’s Code Conference (5-31-17)

FULL Hillary Clinton tears into Donald Trump at CodeCon

 Hillary Clinton: Russians Influenced Voters In The Election | CNBC

Published on May 31, 2017

Former Secretary of State and 2016 Democratic Presidential Nominee Hillary Clinton speaks with Recode’s Kara Swisher and The Verge’s Walt Mossberg at the Code Conference about her loss in the election and how Russia and technology played into that.
» Subscribe to CNBC: http://cnb.cx/SubscribeCNBC

BLAME COMEY: Hillary Clinton Says “Yes, We Thought We Were Going to Win” the Day Before Election

TWITTER: GOOD OR BAD? Hillary Clinton Addresses Conspiracies, Lies, Disinformation on Social Media

Hillary Clinton blamed the DNC in part for her election loss

Hillary Clinton Blames Russians, James Comey, Fake News For Her Defeat In 2016 | TODAY

The Truth about “Paranoia” (Reality Distortion)

Are you distorting reality? How do you know?

Napoleon XIV: ‘They’re coming to take me away’

Story 3: President Trump Still Listening To Both Side on Paris Climate Agreement — Trump Supporters Want Him To Pull Out Now! — Videos

The Paris Climate Agreement Won’t Change the Climate

Climate Change: What Do Scientists Say?

What They Haven’t Told You about Climate Change

Do 97% of Climate Scientists Really Agree?

President Trump Will Pull Out of Paris Climate Agreement. New Report!

Trump ready to pull out of Paris climate deal

Climate Deal in Paris: Everything You Need to Know

The Pronk Pops Show Podcasts Portfolio

Listen To Pronk Pops Podcast or Download Shows 897-902

Listen To Pronk Pops Podcast or Download Shows 889-896

Listen To Pronk Pops Podcast or Download Shows 884-888

Listen To Pronk Pops Podcast or Download Shows 878-883

Listen To Pronk Pops Podcast or Download Shows 870-877

Listen To Pronk Pops Podcast or Download Shows 864-869

Listen To Pronk Pops Podcast or Download Shows 857-863

Listen To Pronk Pops Podcast or Download Shows 850-856

Listen To Pronk Pops Podcast or Download Shows 845-849

Listen To Pronk Pops Podcast or Download Shows 840-844

Listen To Pronk Pops Podcast or Download Shows 833-839

Listen To Pronk Pops Podcast or Download Shows 827-832

Listen To Pronk Pops Podcast or Download Shows 821-826

Listen To Pronk Pops Podcast or Download Shows 815-820

Listen To Pronk Pops Podcast or Download Shows 806-814

Listen To Pronk Pops Podcast or Download Shows 800-805

Listen To Pronk Pops Podcast or Download Shows 793-799

Listen To Pronk Pops Podcast or Download Shows 785-792

Listen To Pronk Pops Podcast or Download Shows 777-784

Listen To Pronk Pops Podcast or Download Shows 769-776

Listen To Pronk Pops Podcast or Download Shows 759-768

Listen To Pronk Pops Podcast or Download Shows 751-758

Listen To Pronk Pops Podcast or Download Shows 745-750

Listen To Pronk Pops Podcast or Download Shows 738-744

Listen To Pronk Pops Podcast or Download Shows 732-737

Listen To Pronk Pops Podcast or Download Shows 727-731

Listen To Pronk Pops Podcast or Download Shows 720-726

Listen To Pronk Pops Podcast or DownloadShows 713-719

Listen To Pronk Pops Podcast or DownloadShows 705-712

Listen To Pronk Pops Podcast or Download Shows 695-704

Listen To Pronk Pops Podcast or Download Shows 685-694

Listen To Pronk Pops Podcast or Download Shows 675-684

Listen To Pronk Pops Podcast or Download Shows 668-674

Listen To Pronk Pops Podcast or Download Shows 660-667

Listen To Pronk Pops Podcast or Download Shows 651-659

Listen To Pronk Pops Podcast or Download Shows 644-650

Listen To Pronk Pops Podcast or Download Shows 637-643

Listen To Pronk Pops Podcast or Download Shows 629-636

Listen To Pronk Pops Podcast or Download Shows 617-628

Listen To Pronk Pops Podcast or Download Shows 608-616

Listen To Pronk Pops Podcast or Download Shows 599-607

Listen To Pronk Pops Podcast or Download Shows 590-598

Listen To Pronk Pops Podcast or Download Shows 585- 589

Listen To Pronk Pops Podcast or Download Shows 575-584

Listen To Pronk Pops Podcast or Download Shows 565-574

Listen To Pronk Pops Podcast or Download Shows 556-564

Listen To Pronk Pops Podcast or Download Shows 546-555

Listen To Pronk Pops Podcast or Download Shows 538-545

Listen To Pronk Pops Podcast or Download Shows 532-537

Listen To Pronk Pops Podcast or Download Shows 526-531

Listen To Pronk Pops Podcast or Download Shows 519-525

Listen To Pronk Pops Podcast or Download Shows 510-518

Listen To Pronk Pops Podcast or Download Shows 500-509

Listen To Pronk Pops Podcast or Download Shows 490-499

Listen To Pronk Pops Podcast or Download Shows 480-489

Listen To Pronk Pops Podcast or Download Shows 473-479

Listen To Pronk Pops Podcast or Download Shows 464-472

Listen To Pronk Pops Podcast or Download Shows 455-463

Listen To Pronk Pops Podcast or Download Shows 447-454

Listen To Pronk Pops Podcast or Download Shows 439-446

Listen To Pronk Pops Podcast or Download Shows 431-438

Listen To Pronk Pops Podcast or Download Shows 422-430

Listen To Pronk Pops Podcast or Download Shows 414-421

Listen To Pronk Pops Podcast or Download Shows 408-413

Listen To Pronk Pops Podcast or Download Shows 400-407

Listen To Pronk Pops Podcast or Download Shows 391-399

Listen To Pronk Pops Podcast or Download Shows 383-390

Listen To Pronk Pops Podcast or Download Shows 376-382

Listen To Pronk Pops Podcast or Download Shows 369-375

Listen To Pronk Pops Podcast or Download Shows 360-368

Listen To Pronk Pops Podcast or Download Shows 354-359

Listen To Pronk Pops Podcast or Download Shows 346-353

Listen To Pronk Pops Podcast or Download Shows 338-345

Listen To Pronk Pops Podcast or Download Shows 328-337

Listen To Pronk Pops Podcast or Download Shows 319-327

Listen To Pronk Pops Podcast or Download Shows 307-318

Listen To Pronk Pops Podcast or Download Shows 296-306

Listen To Pronk Pops Podcast or Download Shows 287-295

Listen To Pronk Pops Podcast or Download Shows 277-286

Listen To Pronk Pops Podcast or Download Shows 264-276

Listen To Pronk Pops Podcast or Download Shows 250-263

Listen To Pronk Pops Podcast or Download Shows 236-249

Listen To Pronk Pops Podcast or Download Shows 222-235

Listen To Pronk Pops Podcast or Download Shows 211-221

Listen To Pronk Pops Podcast or Download Shows 202-210

Listen To Pronk Pops Podcast or Download Shows 194-201

Listen To Pronk Pops Podcast or Download Shows 184-193

Listen To Pronk Pops Podcast or Download Shows 174-183

Listen To Pronk Pops Podcast or Download Shows 165-173

Listen To Pronk Pops Podcast or Download Shows 158-164

Listen To Pronk Pops Podcast or Download Shows151-157

Listen To Pronk Pops Podcast or Download Shows 143-150

Listen To Pronk Pops Podcast or Download Shows 135-142

Listen To Pronk Pops Podcast or Download Shows 131-134

Listen To Pronk Pops Podcast or Download Shows 124-130

Listen To Pronk Pops Podcast or Download Shows 121-123

Listen To Pronk Pops Podcast or Download Shows 118-120

Listen To Pronk Pops Podcast or Download Shows 113 -117

Listen To Pronk Pops Podcast or Download Show 112

Listen To Pronk Pops Podcast or Download Shows 108-111

Listen To Pronk Pops Podcast or Download Shows 106-108

Listen To Pronk Pops Podcast or Download Shows 104-105

Listen To Pronk Pops Podcast or Download Shows 101-103

Listen To Pronk Pops Podcast or Download Shows 98-100

Listen To Pronk Pops Podcast or Download Shows 94-97

Listen To Pronk Pops Podcast or Download Show 93

Listen To Pronk Pops Podcast or Download Show 92

Listen To Pronk Pops Podcast or Download Show 91

Listen To Pronk Pops Podcast or Download Shows 88-90

Listen To Pronk Pops Podcast or Download Shows 84-87

Listen To Pronk Pops Podcast or Download Shows 79-83

Listen To Pronk Pops Podcast or Download Shows 74-78

Listen To Pronk Pops Podcast or Download Shows 71-73

Listen To Pronk Pops Podcast or Download Shows 68-70

Listen To Pronk Pops Podcast or Download Shows 65-67

Listen To Pronk Pops Podcast or Download Shows 62-64

Listen To Pronk Pops Podcast or Download Shows 58-61

Listen To Pronk Pops Podcast or Download Shows 55-57

Listen To Pronk Pops Podcast or Download Shows 52-54

Listen To Pronk Pops Podcast or Download Shows 49-51

Listen To Pronk Pops Podcast or Download Shows 45-48

Listen To Pronk Pops Podcast or Download Shows 41-44

Listen To Pronk Pops Podcast or Download Shows 38-40

Listen To Pronk Pops Podcast or Download Shows 34-37

Listen To Pronk Pops Podcast or Download Shows 30-33

Listen To Pronk Pops Podcast or Download Shows 27-29

Listen To Pronk Pops Podcast or Download Shows 17-26

Listen To Pronk Pops Podcast or Download Shows 16-22

Listen To Pronk Pops Podcast or Download Shows 10-15

Listen To Pronk Pops Podcast or Download Shows 1-9

Read Full Post | Make a Comment ( None so far )

The Pronk Pops Show 901, May 30, 2017, Story 1: Jared Kushner Talked To Russians — So Do Democrats — “Treason?” — Russia/Trump Collusion — No Evidence — No Credibility — No Crime — American People Bored With Progressive Propaganda — Show Me — Put Up or Shut Up — Big Lie Media and Desperate, Delusional, Demented Democrat Distraction For Not Covering Obama Administration Spying On American People and Republican Candidates For President — Videos Story 2: Amazon Benefits From Growing Trend Of Consumer Shopping Online — Benefits of Amazon Prime For $99 Per Year — Videos — Story 3: Amazon’s Just Walk Out Technology — Coming Soon??? — Videos —

Posted on May 30, 2017. Filed under: American History, Blogroll, Breaking News, Business, Consitutional Law, Corruption, Countries, Crime, Donald J. Trump, Donald Trump, Freedom of Speech, History, Human, Language, Law, Life, Media, News, People, Philosophy, Photos, Politics, Progressives, Raymond Thomas Pronk, Rule of Law, Terror, Terrorism, United States of America, Videos, Violence, Wealth, Wisdom | Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , |

Project_1

The Pronk Pops Show Podcasts

Pronk Pops Show 901,  May 30, 2017

Pronk Pops Show 900,  May 25, 2017

Pronk Pops Show 899,  May 24, 2017

Pronk Pops Show 898,  May 23, 2017

Pronk Pops Show 897,  May 22, 2017

Pronk Pops Show 896,  May 18, 2017

Pronk Pops Show 895,  May 17, 2017

Pronk Pops Show 894,  May 16, 2017

Pronk Pops Show 893,  May 15, 2017

Pronk Pops Show 892,  May 12, 2017

Pronk Pops Show 891,  May 11, 2017

Pronk Pops Show 890,  May 10, 2017

Pronk Pops Show 889,  May 9, 2017

Pronk Pops Show 888,  May 8, 2017

Pronk Pops Show 887,  May 5, 2017

Pronk Pops Show 886,  May 4, 2017

Pronk Pops Show 885,  May 3, 2017

Pronk Pops Show 884,  May 1, 2017

Pronk Pops Show 883 April 28, 2017

Pronk Pops Show 882: April 27, 2017

Pronk Pops Show 881: April 26, 2017

Pronk Pops Show 880: April 25, 2017

Pronk Pops Show 879: April 24, 2017

Pronk Pops Show 878: April 21, 2017

Pronk Pops Show 877: April 20, 2017

Pronk Pops Show 876: April 19, 2017

Pronk Pops Show 875: April 18, 2017

Pronk Pops Show 874: April 17, 2017

Pronk Pops Show 873: April 13, 2017

Pronk Pops Show 872: April 12, 2017

Pronk Pops Show 871: April 11, 2017

Pronk Pops Show 870: April 10, 2017

Pronk Pops Show 869: April 7, 2017

Pronk Pops Show 868: April 6, 2017

Pronk Pops Show 867: April 5, 2017

Pronk Pops Show 866: April 3, 2017

Pronk Pops Show 865: March 31, 2017

Pronk Pops Show 864: March 30, 2017

Pronk Pops Show 863: March 29, 2017

Pronk Pops Show 862: March 28, 2017

Pronk Pops Show 861: March 27, 2017

Pronk Pops Show 860: March 24, 2017

Pronk Pops Show 859: March 23, 2017

Pronk Pops Show 858: March 22, 2017

Pronk Pops Show 857: March 21, 2017

Pronk Pops Show 856: March 20, 2017

Pronk Pops Show 855: March 10, 2017

Pronk Pops Show 854: March 9, 2017

Pronk Pops Show 853: March 8, 2017

Pronk Pops Show 852: March 6, 2017

Pronk Pops Show 851: March 3, 2017

Pronk Pops Show 850: March 2, 2017

Pronk Pops Show 849: March 1, 2017

Pronk Pops Show 848: February 28, 2017

Pronk Pops Show 847: February 27, 2017

Pronk Pops Show 846: February 24, 2017

Pronk Pops Show 845: February 23, 2017

Pronk Pops Show 844: February 22, 2017

Pronk Pops Show 843: February 21, 2017

Pronk Pops Show 842: February 20, 2017

Pronk Pops Show 841: February 17, 2017

Pronk Pops Show 840: February 16, 2017

Pronk Pops Show 839: February 15, 2017

Pronk Pops Show 838: February 14, 2017

Pronk Pops Show 837: February 13, 2017

Pronk Pops Show 836: February 10, 2017

Pronk Pops Show 835: February 9, 2017

Pronk Pops Show 834: February 8, 2017

Pronk Pops Show 833: February 7, 2017

Pronk Pops Show 832: February 6, 2017

Pronk Pops Show 831: February 3, 2017

Pronk Pops Show 830: February 2, 2017

Image result for jared kusner back channel with russia

Image result for branco cartoons russia trump collusion

Image result for branco cartoons obama spied on trump using nsaImage result for branco cartoons trump colluded with russians

 

 Story 1: Jared Kushner Talked To Russians — So Do Democrats — “Treason?” — Russia/Trump Collusion — No Evidence — No Credibility — No Crime — American People Bored With Progressive Propaganda — Put Up or Shut Up — Big Lie Media and Desperate, Delusional, Demented Democrat Distraction For Not Covering Obama Administration’s Spying On American People and Republican Candidates For President —  Videos

Backchannel diplomacy refers to secret lines of communication held open between two adversaries. It is often communicated through an informal intermediary or through a third party. 

 Amb. Bolton on Jared Kushner’s backchannel talks

Jared Kushner under FBI scrutiny in Russia probe

Cracking the Kushner Russian code: Kushner Russian back channel explained part 1

Published on May 27, 2017

What you need to know about Jared Kushner’s ties to Russia. Sergey Kislyak reported to his superiors in December that Jared Kushner, President Trump’s son-in-law and adviser, asked him about setting up a communications channel between the transition team and the Kremlin using Russian facilities in the United States. Russia’s ambassador to Washington discussed the possibility of setting up a secret and secure communications channel between Trump’s transition team and the Kremlin, using Russian diplomatic facilities in an apparent move to shield their pre-inauguration discussions from monitoring, according to U.S. officials briefed on intelligence reports. Ambassador Sergey Kislyak reported to his superiors in Moscow that Kushner, son-in-law and confidant to then-President-elect Trump, made the proposal during a meeting on Dec. 1 or 2 at Trump Tower, according to intercepts of Russian communications that were reviewed by U.S. officials. Kislyak said Kushner suggested using Russian diplomatic facilities in the United States for the communications. The meeting also was attended by Michael Flynn, Trump’s first national security adviser. The White House disclosed the meeting only in March, playing down its significance. But people familiar with the matter say the FBI now considers the encounter, as well as another meeting Kushner had with a Russian banker, to be of investigative interest. Kislyak reportedly was taken aback by the suggestion of allowing an American to use Russian communications gear at its embassy or consulate — a proposal that would have carried security risks for Moscow as well as the Trump team.

Cracking the Kushner Russian code: Kushner Russian back channel explained part 2

Published on May 27, 2017

Cracking the Kushner Russian code: Kushner Russian back channel explained. Russian ambassador told Moscow that Kushner wanted secret channel with Kremlin. Sergey Kislyak reported to his superiors in December that Jared Kushner, President Trump’s son-in-law and adviser, asked him about setting up a communications channel between the transition team and the Kremlin using Russian facilities in the United States. Russia’s ambassador to Washington discussed the possibility of setting up a secret and secure communications channel between Trump’s transition team and the Kremlin, using Russian diplomatic facilities in an apparent move to shield their pre-inauguration discussions from monitoring, according to U.S. officials briefed on intelligence reports. Ambassador Sergey Kislyak reported to his superiors in Moscow that Kushner, son-in-law and confidant to then-President-elect Trump, made the proposal during a meeting on Dec. 1 or 2 at Trump Tower, according to intercepts of Russian communications that were reviewed by U.S. officials. Kislyak said Kushner suggested using Russian diplomatic facilities in the United States for the communications. The meeting also was attended by Michael Flynn, Trump’s first national security adviser. The White House disclosed the meeting only in March, playing down its significance. But people familiar with the matter say the FBI now considers the encounter, as well as another meeting Kushner had with a Russian banker, to be of investigative interest. Kislyak reportedly was taken aback by the suggestion of allowing an American to use Russian communications gear at its embassy or consulate — a proposal that would have carried security risks for Moscow as well as the Trump team.

Will recent revelations impact Jared Kushner’s influence on Trump?

Sean Spicer Dodges Questions On Jared Kushner-Russia Meetings

Sean Spicer holds first briefing since Jared Kushner/Russia ties reports

CNN panel: No way Jared Kushner was ‘lone-wolfing’ backchannel pitch to Russian- Trump was involved

James Clapper: Dashboard Light Was On Over Trump Campaign, Russia (Full) | Meet The Press | NBC News

Published on May 30, 2017

Former Director of National Intelligence James Clapper tells Chuck Todd that he was “very concerned about the nature” of approaches between the Trump campaign and Russian agents during the 2016 elections.

Fmr. DNI James Clapper: I HAVE SEEN NO EVIDENCE OF TRUMP-RUSSIA COLLUSION

Published on Mar 5, 2017

Former Director of National Intelligence James Clapper says that, to his knowledge, there is no evidence of collusion between the Trump campaign and the Russians. This clip is from Clapper’s interview with Chuck Todd on NBC’s Meet the Press on March 5, 2017.

Former CIA Chief “Concerned” Trump Could Be On “Treasonous Path”

Inside Dems’ ‘Big Lie’ About Trump And Russia

Tucker Carlson Trump Collusion With Russia: Inappropriate Deals with Russia. Fox News 2017

Krauthammer on Trump-Russia collusion: “I don’t trust the story”

James Clapper: ‘Still no EVIDENCE of any Russian Collusion with Trump Campaign’

“You Don’t Do Evidence Well I Do” Trey Gowdy Demands Answers On Trump Russia Collusion Investigation

Former Senate Intel Chair Dianne Feinstein No Evidence Of Russia Trump Camp Collusion

CNN: Alt-Left Journalistic Malpractice, Fake News Proliferation and Contamination

CNN Host gets Destroyed By John Sununu For Russian Collusion Fake News

 Story 2: Amazon Benefits From Growing Trend Of Consumer Shopping Online — Benefits of Amazon Prime For $99 Per Year — Videos —

Image result for amazon online shopping

 What Is Amazon Prime and Is It Worth It?

Introducing Amazon Go and the world’s most advanced shopping technology

IT’S PRIMETIME AT AMAZON.COM … SHARES HIT $1,000

NEW YORK (AP) — Amazon, the internet goliath that revolutionized the way much of the world buys books, toilet paper and TVs, hit a new milestone Tuesday. Its stock surpassed the $1,000 mark for the first time.

That price put Amazon’s market value at about $478 billion, double that of the world’s biggest traditional retailer, Wal-Mart, and more than 15 times the size of Target. A $1,000 investment on Amazon’s first day of trading in 1997 would be worth more than $500,000 today.

Not only has Amazon changed the retail landscape since it became a public company 20 years ago, it’s now part of a small cadre of high-flying stocks belonging to companies that have defied Wall Street and shunned stock splits.

Those splits make the stock more affordable and generate brokerage fees. But companies like Amazon have chosen to reward its long-term investors.

The last time Amazon has split its stock was nearly 18 years ago, according to financial research firm FactSet.

Another company with a similar philosophy is Alphabet Inc., the parent company of Google.

Amazon just beat Alphabet to the $1,000 level, with its Class A shares just $2 short of $1,000 Tuesday.

Only four other U.S.-listed companies have shares trading above $1,000: online travel booking company Priceline Group Inc., homebuilder NVR Inc., pork producer and ocean transportation company Seaboard Corp. and the apostle of long-term investing, Warren Buffett, with his holding company Berkshire Hathaway Inc. But stock prices only tell a part of the story.

The value of a company is determined by its stock price and the number of shares on the market. Amazon.com is well over four times the size of Priceline, NVR and Seaboard combined. It’s 17 percent bigger than Berkshire Hathaway, a multinational conglomerate with ownership stakes in some of America’s most well-known consumer brands like Coca-Cola, insurance companies and U.S. infrastructure.

Since launching a website to sell mostly books in 1995, Amazon has transfigured retail, sent revenue numbers to stratospheric heights, and is among the biggest reasons longtime powerhouses like Macy’s, Borders bookstores and even RadioShack have suffered.

Those companies are closing locations and Amazon is filling the void, sometimes literally.

Last week in a location once occupied by Borders, the bookstore chain that went out of business in 2011, Amazon opened its first bookstore in New York City.

http://hosted.ap.org/dynamic/stories/U/US_AMAZON_1K_STOCK?SITE=AP&SECTION=HOME&TEMPLATE=DEFAULT&CTIME=2017-05-30-11-55-52

 

About Amazon Prime

Receive all the benefits of Amazon Prime including FREE Two-Day Shipping for eligible purchases, unlimited streaming of movies and TV shows with Prime Video, and the ability to borrow books from the Kindle Owners’ Lending Library for $99 a year or $10.99 a month. We also offer a Prime Video membership for $8.99 a month that only includes Prime Video as a benefit.

The benefits include:

  • FREE Two-Day Shipping on eligible items to addresses in the contiguous U.S. and other shipping benefits. For more information, go to Amazon Prime Shipping Benefits.
  • FREE Same-Day Delivery in eligible zip codes. For more information, go to Order with Prime FREE Same-Day Delivery.
  • Prime Now: Get FREE two-hour delivery or scheduled delivery on over 10,000 items, from groceries to electronics and more. Plus, get free delivery from your favorite local stores. Available in eligible zip codes only. For more information go to Prime Now.
  • Amazon Restaurants: One-hour delivery from popular restaurants for Prime members in eligible ZIP codes. Learn more at amazon.com/restaurants.
  • FREE Release-Date Delivery: FREE Release-Date Delivery on eligible pre-order items delivered on their release date to ZIP codes within the continental U.S. For more information, go to Release-Date Delivery.
  • Prime Video: unlimited streaming of movies and TV episodes for paid or free trial members in the U.S. and Puerto Rico. For more information, go to About Prime Video.
  • Prime Music: unlimited, ad-free access to hundreds of Prime Playlists and more than a million songs for members in the U.S. and Puerto Rico. For more information, go to About Prime Music.
  • Prime Photos: Secure unlimited photo storage and enhanced search and organization features in Amazon Drive for you and the members of your Family Vault. For more information, go to About Prime Photos.
  • Prime Pantry: Access to Prime Pantry, where members can purchase and ship to addresses in the contiguous U.S. low priced grocery, household, and pet care items for a flat delivery fee of $5.99 for each Prime Pantry box. Prime Pantry orders cannot be shipped to addresses in Alaska, Hawaii, and Puerto Rico.
  • Amazon Elements: Access to Amazon Elements products, Amazon’s own line of everyday essentials.
  • Amazon Dash for Prime: Never run out of your favorite products with Amazon Dash Button. For more information, go to Amazon Dash Button.
  • Prime Early Access: Get 30-minute early access to Lightning Deals on Amazon.com. For more information, go to About Prime Early Access.
  • Kindle Owners’ Lending Library: access to members in the U.S. For more information, go to Kindle Owners’ Lending Library
  • Prime Reading: You can borrow books, magazines, and more from the Prime Reading catalog and read them on your Fire tablet, Kindle e-reader, or the Kindle reading apps for iOS and Android. For more information, go to Borrow Books from Amazon Prime Reading.
  • Kindle First: Early access for members in the U.S. to download a new book for free every month from the Kindle First picks. For more information, go to Kindle First.
  • Audible Channels for Prime: Get access to Audible Channels, a $60/year value, for free. Audible Channels includes unlimited listening to original audio series and playlists handcrafted for every interest. You’ll also receive access to Prime Exclusive Audiobooks, a collection of streaming audiobooks including best sellers, family favorites, celebrity-narrated classics and more. Just download the free Audible app and sign in with your Amazon account to start listening.
  • Amazon Music Unlimited: Prime members can get discounted Amazon Music Unlimited monthly plans and there are annual plans available exclusively to Prime members. For more information, go to Amazon Music Unlimited.
  • Video Add-On Subscriptions: Members can purchase Video Add-on Subscriptions to premium content providers. Browse available Video Add-on Subscriptions, or manage your existing subscriptions.
  • Deals and Discounts, Compliments of Amazon Family: These include 20% off diapers through Subscribe & Save and 15% off eligible products from your baby registry. For more information go to Get 20% off Diaper Subscriptions or About the Completion Discount.
  • Twitch Prime: Members get exclusive discounts on physical games pre-orders and new releases. Twitch.tv users who link their Amazon Prime account get ad-free viewing on Twitch, a free Twitch channel subscription every month, and exclusive access to free game content. For more information, go to Twitch.tv.
  • Membership Sharing: Two adults living in the same household can create an Amazon Household to share certain Amazon Prime benefits. For more information, go to About Amazon Households. If you have a paid Prime membership under your personal account you can share your shipping benefits with your Amazon Business user account. Go to Amazon Prime and Business Accounts.

Note:

  • Amazon Prime isn’t available for customers who purchase products for the purpose of resale or use Amazon Prime to ship products to their customers or potential customers.
  • Some items are not available for Two-Day Shipping due to special shipping characteristics and instead will receive free standard shipping, which delivers in 4-5 business days.
  • Your Prime Membership may be subject to sales tax in some states.
  • Customers who receive a Prime free trial through Amazon Student or are guests of another membership aren’t eligible for the following benefits unless they are eligible through their Amazon Household: membership sharing, Kindle Owners’ Lending Library, Prime Video, Prime Music, and shopping discounts provided by Amazon Family such as 20% off diapers and 15% Baby Registry Completion discount. Customers who are guests of another membership aren’t eligible for Prime Photos.
  • To use Kindle Owners’ Lending Library, the Kindle device must be associated with the Prime account that’s eligible for the benefit.
  • We may change these benefits occasionally as provided in the Prime Terms & Conditions.

https://www.amazon.com/gp/help/customer/display.html?nodeId=200444160

Story 3: Amazon’s Just Walk Out Technology — Coming Soon??? — Videos

Image result for amazon to go

Why Amazon Go Is Being Called The Next Big Job Killer | Tech Bet | CNBC

How does Amazon Go work?

The Fox News Specialists 5/29/17 | Fox News | May 29, 2017

 

The Pronk Pops Show Podcasts Portfolio

Listen To Pronk Pops Podcast or Download Shows 897-901

Listen To Pronk Pops Podcast or Download Shows 889-896

Listen To Pronk Pops Podcast or Download Shows 884-888

Listen To Pronk Pops Podcast or Download Shows 878-883

Listen To Pronk Pops Podcast or Download Shows 870-877

Listen To Pronk Pops Podcast or Download Shows 864-869

Listen To Pronk Pops Podcast or Download Shows 857-863

Listen To Pronk Pops Podcast or Download Shows 850-856

Listen To Pronk Pops Podcast or Download Shows 845-849

Listen To Pronk Pops Podcast or Download Shows 840-844

Listen To Pronk Pops Podcast or Download Shows 833-839

Listen To Pronk Pops Podcast or Download Shows 827-832

Listen To Pronk Pops Podcast or Download Shows 821-826

Listen To Pronk Pops Podcast or Download Shows 815-820

Listen To Pronk Pops Podcast or Download Shows 806-814

Listen To Pronk Pops Podcast or Download Shows 800-805

Listen To Pronk Pops Podcast or Download Shows 793-799

Listen To Pronk Pops Podcast or Download Shows 785-792

Listen To Pronk Pops Podcast or Download Shows 777-784

Listen To Pronk Pops Podcast or Download Shows 769-776

Listen To Pronk Pops Podcast or Download Shows 759-768

Listen To Pronk Pops Podcast or Download Shows 751-758

Listen To Pronk Pops Podcast or Download Shows 745-750

Listen To Pronk Pops Podcast or Download Shows 738-744

Listen To Pronk Pops Podcast or Download Shows 732-737

Listen To Pronk Pops Podcast or Download Shows 727-731

Listen To Pronk Pops Podcast or Download Shows 720-726

Listen To Pronk Pops Podcast or DownloadShows 713-719

Listen To Pronk Pops Podcast or DownloadShows 705-712

Listen To Pronk Pops Podcast or Download Shows 695-704

Listen To Pronk Pops Podcast or Download Shows 685-694

Listen To Pronk Pops Podcast or Download Shows 675-684

Listen To Pronk Pops Podcast or Download Shows 668-674

Listen To Pronk Pops Podcast or Download Shows 660-667

Listen To Pronk Pops Podcast or Download Shows 651-659

Listen To Pronk Pops Podcast or Download Shows 644-650

Listen To Pronk Pops Podcast or Download Shows 637-643

Listen To Pronk Pops Podcast or Download Shows 629-636

Listen To Pronk Pops Podcast or Download Shows 617-628

Listen To Pronk Pops Podcast or Download Shows 608-616

Listen To Pronk Pops Podcast or Download Shows 599-607

Listen To Pronk Pops Podcast or Download Shows 590-598

Listen To Pronk Pops Podcast or Download Shows 585- 589

Listen To Pronk Pops Podcast or Download Shows 575-584

Listen To Pronk Pops Podcast or Download Shows 565-574

Listen To Pronk Pops Podcast or Download Shows 556-564

Listen To Pronk Pops Podcast or Download Shows 546-555

Listen To Pronk Pops Podcast or Download Shows 538-545

Listen To Pronk Pops Podcast or Download Shows 532-537

Listen To Pronk Pops Podcast or Download Shows 526-531

Listen To Pronk Pops Podcast or Download Shows 519-525

Listen To Pronk Pops Podcast or Download Shows 510-518

Listen To Pronk Pops Podcast or Download Shows 500-509

Listen To Pronk Pops Podcast or Download Shows 490-499

Listen To Pronk Pops Podcast or Download Shows 480-489

Listen To Pronk Pops Podcast or Download Shows 473-479

Listen To Pronk Pops Podcast or Download Shows 464-472

Listen To Pronk Pops Podcast or Download Shows 455-463

Listen To Pronk Pops Podcast or Download Shows 447-454

Listen To Pronk Pops Podcast or Download Shows 439-446

Listen To Pronk Pops Podcast or Download Shows 431-438

Listen To Pronk Pops Podcast or Download Shows 422-430

Listen To Pronk Pops Podcast or Download Shows 414-421

Listen To Pronk Pops Podcast or Download Shows 408-413

Listen To Pronk Pops Podcast or Download Shows 400-407

Listen To Pronk Pops Podcast or Download Shows 391-399

Listen To Pronk Pops Podcast or Download Shows 383-390

Listen To Pronk Pops Podcast or Download Shows 376-382

Listen To Pronk Pops Podcast or Download Shows 369-375

Listen To Pronk Pops Podcast or Download Shows 360-368

Listen To Pronk Pops Podcast or Download Shows 354-359

Listen To Pronk Pops Podcast or Download Shows 346-353

Listen To Pronk Pops Podcast or Download Shows 338-345

Listen To Pronk Pops Podcast or Download Shows 328-337

Listen To Pronk Pops Podcast or Download Shows 319-327

Listen To Pronk Pops Podcast or Download Shows 307-318

Listen To Pronk Pops Podcast or Download Shows 296-306

Listen To Pronk Pops Podcast or Download Shows 287-295

Listen To Pronk Pops Podcast or Download Shows 277-286

Listen To Pronk Pops Podcast or Download Shows 264-276

Listen To Pronk Pops Podcast or Download Shows 250-263

Listen To Pronk Pops Podcast or Download Shows 236-249

Listen To Pronk Pops Podcast or Download Shows 222-235

Listen To Pronk Pops Podcast or Download Shows 211-221

Listen To Pronk Pops Podcast or Download Shows 202-210

Listen To Pronk Pops Podcast or Download Shows 194-201

Listen To Pronk Pops Podcast or Download Shows 184-193

Listen To Pronk Pops Podcast or Download Shows 174-183

Listen To Pronk Pops Podcast or Download Shows 165-173

Listen To Pronk Pops Podcast or Download Shows 158-164

Listen To Pronk Pops Podcast or Download Shows151-157

Listen To Pronk Pops Podcast or Download Shows 143-150

Listen To Pronk Pops Podcast or Download Shows 135-142

Listen To Pronk Pops Podcast or Download Shows 131-134

Listen To Pronk Pops Podcast or Download Shows 124-130

Listen To Pronk Pops Podcast or Download Shows 121-123

Listen To Pronk Pops Podcast or Download Shows 118-120

Listen To Pronk Pops Podcast or Download Shows 113 -117

Listen To Pronk Pops Podcast or Download Show 112

Listen To Pronk Pops Podcast or Download Shows 108-111

Listen To Pronk Pops Podcast or Download Shows 106-108

Listen To Pronk Pops Podcast or Download Shows 104-105

Listen To Pronk Pops Podcast or Download Shows 101-103

Listen To Pronk Pops Podcast or Download Shows 98-100

Listen To Pronk Pops Podcast or Download Shows 94-97

Listen To Pronk Pops Podcast or Download Show 93

Listen To Pronk Pops Podcast or Download Show 92

Listen To Pronk Pops Podcast or Download Show 91

Listen To Pronk Pops Podcast or Download Shows 88-90

Listen To Pronk Pops Podcast or Download Shows 84-87

Listen To Pronk Pops Podcast or Download Shows 79-83

Listen To Pronk Pops Podcast or Download Shows 74-78

Listen To Pronk Pops Podcast or Download Shows 71-73

Listen To Pronk Pops Podcast or Download Shows 68-70

Listen To Pronk Pops Podcast or Download Shows 65-67

Listen To Pronk Pops Podcast or Download Shows 62-64

Listen To Pronk Pops Podcast or Download Shows 58-61

Listen To Pronk Pops Podcast or Download Shows 55-57

Listen To Pronk Pops Podcast or Download Shows 52-54

Listen To Pronk Pops Podcast or Download Shows 49-51

Listen To Pronk Pops Podcast or Download Shows 45-48

Listen To Pronk Pops Podcast or Download Shows 41-44

Listen To Pronk Pops Podcast or Download Shows 38-40

Listen To Pronk Pops Podcast or Download Shows 34-37

Listen To Pronk Pops Podcast or Download Shows 30-33

Listen To Pronk Pops Podcast or Download Shows 27-29

Listen To Pronk Pops Podcast or Download Shows 17-26

Listen To Pronk Pops Podcast or Download Shows 16-22

Listen To Pronk Pops Podcast or Download Shows 10-15

Listen To Pronk Pops Podcast or Download Shows 1-9

Read Full Post | Make a Comment ( None so far )

The Pronk Pops Show 900, May 25, 2017, Story 1: President Trump To 23 Members of NATO “Pay Your Fair Share” — How Much Does NATO Headquarters Building Cost? American Tax Payers Would Like To Know — About $1,230,000,000 — Videos — Story 2: NSA Violate The Fourth Amendment Rights of American Citizens — Obama’s NSA conducted illegal searches — Nothing New — Congress Will Do Nothing As Usual — No Safeguards and No Privacy — Videos — Story 3: Montana Congressional Candidate Gianforte Will Win Despite Roughing up Aggressive Reporter — Setup of A Political Assassination by Big LIe Media — Videos

Posted on May 25, 2017. Filed under: American History, Banking System, Blogroll, Breaking News, Budgetary Policy, College, Communications, Computers, Congress, Countries, Culture, Defense Spending, Donald J. Trump, Donald J. Trump, Donald J. Trump, Donald Trump, Donald Trump, Economics, Education, Elections, Empires, Employment, Federal Government, Fiscal Policy, Foreign Policy, Freedom of Speech, Government, Government Dependency, Government Spending, Hillary Clinton, History, House of Representatives, Human Behavior, Illegal Immigration, Immigration, Investments, Islam, Labor Economics, Language, Legal Immigration, Life, Lying, Media, Monetary Policy, People, Philosophy, Photos, Politics, Polls, President Trump, Progressives, Radio, Raymond Thomas Pronk, Regulation, Religion, Rule of Law, Scandals, Security, Senate, Social Security, Spying, Success, Tax Policy, Taxation, Taxes, Terror, Unemployment, United States Constitution, United States of America, Videos, Wealth, Welfare Spending, Wisdom | Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , |

Project_1

The Pronk Pops Show Podcasts

Pronk Pops Show 900,  May 25, 2017

Pronk Pops Show 899,  May 24, 2017

Pronk Pops Show 898,  May 23, 2017

Pronk Pops Show 897,  May 22, 2017

Pronk Pops Show 896,  May 18, 2017

Pronk Pops Show 895,  May 17, 2017

Pronk Pops Show 894,  May 16, 2017

Pronk Pops Show 893,  May 15, 2017

Pronk Pops Show 892,  May 12, 2017

Pronk Pops Show 891,  May 11, 2017

Pronk Pops Show 890,  May 10, 2017

Pronk Pops Show 889,  May 9, 2017

Pronk Pops Show 888,  May 8, 2017

Pronk Pops Show 887,  May 5, 2017

Pronk Pops Show 886,  May 4, 2017

Pronk Pops Show 885,  May 3, 2017

Pronk Pops Show 884,  May 1, 2017

Pronk Pops Show 883 April 28, 2017

Pronk Pops Show 882: April 27, 2017

Pronk Pops Show 881: April 26, 2017

Pronk Pops Show 880: April 25, 2017

Pronk Pops Show 879: April 24, 2017

Pronk Pops Show 878: April 21, 2017

Pronk Pops Show 877: April 20, 2017

Pronk Pops Show 876: April 19, 2017

Pronk Pops Show 875: April 18, 2017

Pronk Pops Show 874: April 17, 2017

Pronk Pops Show 873: April 13, 2017

Pronk Pops Show 872: April 12, 2017

Pronk Pops Show 871: April 11, 2017

Pronk Pops Show 870: April 10, 2017

Pronk Pops Show 869: April 7, 2017

Pronk Pops Show 868: April 6, 2017

Pronk Pops Show 867: April 5, 2017

Pronk Pops Show 866: April 3, 2017

Pronk Pops Show 865: March 31, 2017

Pronk Pops Show 864: March 30, 2017

Pronk Pops Show 863: March 29, 2017

Pronk Pops Show 862: March 28, 2017

Pronk Pops Show 861: March 27, 2017

Pronk Pops Show 860: March 24, 2017

Pronk Pops Show 859: March 23, 2017

Pronk Pops Show 858: March 22, 2017

Pronk Pops Show 857: March 21, 2017

Pronk Pops Show 856: March 20, 2017

Pronk Pops Show 855: March 10, 2017

Pronk Pops Show 854: March 9, 2017

Pronk Pops Show 853: March 8, 2017

Pronk Pops Show 852: March 6, 2017

Pronk Pops Show 851: March 3, 2017

Pronk Pops Show 850: March 2, 2017

Pronk Pops Show 849: March 1, 2017

Pronk Pops Show 848: February 28, 2017

Pronk Pops Show 847: February 27, 2017

Pronk Pops Show 846: February 24, 2017

Pronk Pops Show 845: February 23, 2017

Pronk Pops Show 844: February 22, 2017

Pronk Pops Show 843: February 21, 2017

Pronk Pops Show 842: February 20, 2017

Pronk Pops Show 841: February 17, 2017

Pronk Pops Show 840: February 16, 2017

Pronk Pops Show 839: February 15, 2017

Pronk Pops Show 838: February 14, 2017

Pronk Pops Show 837: February 13, 2017

Pronk Pops Show 836: February 10, 2017

Pronk Pops Show 835: February 9, 2017

Pronk Pops Show 834: February 8, 2017

Pronk Pops Show 833: February 7, 2017

Pronk Pops Show 832: February 6, 2017

Pronk Pops Show 831: February 3, 2017

Pronk Pops Show 830: February 2, 2017

Image result for Trump speech at NATO with European Leaders May 25, 2017

Image result for 2016 NATO Countries and defense spending

Image result for NSA Spying on Americans without warrants

 

Story 1: President Trump To 23 Members Of NATO “Pay Your Fair Share” — How Much Does NATO Headquarters Building Cost? American Tax Payers Would Like To Know — About $1, 230,000,000 — Videos —

 

Article 5

The Parties agree that an armed attack against one or more of them in Europe or North America shall be considered an attack against them all and consequently they agree that, if such an armed attack occurs, each of them, in exercise of the right of individual or collective self-defence recognised by Article 51 of the Charter of the United Nations, will assist the Party or Parties so attacked by taking forthwith, individually and in concert with the other Parties, such action as it deems necessary, including the use of armed force, to restore and maintain the security of the North Atlantic area.

Any such armed attack and all measures taken as a result thereof shall immediately be reported to the Security Council. Such measures shall be terminated when the Security Council has taken the measures necessary to restore and maintain international peace and security.

https://en.wikisource.org/wiki/North_Atlantic_Treaty#Article_5https://en.wikisource.org/wiki/North_Atlantic_Treaty#Article_5

Image result for george washington entangling alliances quote

Image result for GEORGE WASHINTON STEER CLEAR OF ALLIANCEImage result for list of NATO countriesImage result for map on NATO countriesImage result for map on NATO countriesImage result for Trump speech at NATO with European Leaders May 25, 2017Image result for list of NATO countriesImage result for Nato Headquarters RestaurantImage result for Trump speech at NATO with European Leaders May 25, 2017Image result for Trump speech at NATOImage result for Trump speech at NATOImage result for Nato Headquarters RestaurantImage result for Nato Headquarters RestaurantImage result for Nato Headquarters RestaurantImage result for Nato Headquarters RestaurantImage result for Nato Headquarters Restaurant

Image result for Trump speech at NATO with European Leaders May 25, 2017

Image result for 2016 NATO Countries and defense spending

Image result for 2016 NATA Countries and defense spending

Image result for 2016 NATA Countries and defense spending

Image result for thomas jefferson quotes on entangling alliance images alliances

Trump’s full speech at NATO 9/11 memorial

Amb. Bolton: It would be a mistake for the U.S. to drop NATO

What is NATO?

How Powerful Is NATO?

President Trump arrives at NATO summit in Brussels May 25, 2017.

FULL: President Donald Trump Speech NATO Unveiling Of The Article 5 Berlin Wall Memorials 2017 Trump

FULL Event: NATO meeting in Brussels. President Trump speech at NATO summit. May 25, 2017.

Can NATO Survive Without The U.S.?

Why Germany And Japan Are Expanding Their Militaries

Which Countries Spend The Most On Their Military?

What Are The World’s Most Powerful Militaries?

Which Countries Can Defend Against Nuclear Missiles?

New NATO Headquarters Cost $1.23 Billion

(Photo credit should read JOHN THYS/AFP/Getty Images)

BY: Daniel Halper
May 25, 2017 11:15 am

President Trump departed from prepared remarks Thursday to comment on the ostentatious new NATO headquarters in Brussels at a dedication ceremony with world leaders.

“I never asked once what the new NATO headquarters cost,” Trump said, bringing attention to the glass structure. “I refuse to do that, but it is beautiful.”

In fact, the building cost an astounding $1.23 billion, according to a budget released by the North Atlantic Treaty Organization.

Architecture, design, and quality management cost the alliance $129 million alone. Audio visual installations ran $29 million, while construction ran $514 million, the document states.

  • 1,500 personnel from national delegations

  • 1,700 international military and civilian staff

  • 600 staff from NATO agencies

  • frequent visitors, currently some 500 per day

The alliance bragged that the structure is also a “green building for the future.”

“The environment and sustainability have played a major role in the design process. The new building’s energy consumption has been optimized through the use of geothermal and solar energy and advanced lighting systems. Thermal insulation, thermal inertia and solar protection have been incorporated in the design to reduce heating. Rainwater will be used for non-potable water use and the buildings short wings will have green roofs,” the document states.

In his remarks Thursday, Trump took NATO member states to task for not paying their fair share.

“Twenty-three of the 28 member nations are still not paying what they should be paying and what they’re supposed to be paying for their defense,” Trump told leaders of the alliance countries.

“This is not fair to the people and taxpayers of the United States — and many of these nations owe massive amounts of money from past years and not paying in those past years. Over the last eight years, the United States spent more on defense than all other NATO countries combined. If all NATO members had spent just 2 percent of their GDP on defense last year, we would have had another $119 billion for our collective defense and for the financing of additional NATO reserves,” he added.

Trump said NATO would be “stronger” in fighting terrorism if member states paid their obligations.

http://freebeacon.com/politics/new-nato-headquarters-cost-1-23-billion/

NATO

From Wikipedia, the free encyclopedia

Coordinates: 50°52′34″N 4°25′19″E

North Atlantic Treaty Organization
Organisation du Traité de l’Atlantique Nord
NATO OTAN landscape logo.svg

Logo
North Atlantic Treaty Organization (orthographic projection).svg

Member states of NATO
Abbreviation NATO, OTAN
Motto
Flag Flag of NATO.svg
Formation 4 April 1949; 68 years ago
Type Military alliance
Headquarters Brussels, Belgium
Membership
Official language
English
French[2]
Jens Stoltenberg
Petr Pavel
Curtis Scaparrotti
Denis Mercier
Expenses (2015) $866,971 million[3]
Website nato.int

The North Atlantic Treaty Organization (NATO/ˈnt/; French: Organisation du Traité de l’Atlantique Nord; OTAN), also called the North Atlantic Alliance, is an intergovernmentalmilitary alliance between several North American and European states based on the North Atlantic Treaty which was signed on 4 April 1949. The organization constitutes a system of collective defence whereby its member states agree to mutual defence in response to an attack by any external party. Three NATO members (the United States, France and the United Kingdom) are permanent members of the United Nations Security Council with the power to veto and are officially nuclear-weapon states. NATO’s headquarters are located in Haren, Brussels, Belgium, while the headquarters of Allied Command Operations is near Mons.

NATO is an Alliance that consists of 28 independent member countries across North America and Europe, the newest of which, Albania and Croatia, joined in April 2009. An additional 22 countries participate in NATO’s Partnership for Peace program, with 15 other countries involved in institutionalized dialogue programmes. The combined military spending of all NATO members constitutes over 70% of the global total.[4] Members’ defence spending is supposed to amount to at least 2% of GDP.[5]

NATO was little more than a political association until the Korean War galvanized the organization’s member states, and an integrated military structure was built up under the direction of two US supreme commanders. The course of the Cold War led to a rivalry with nations of the Warsaw Pact, which formed in 1955. Doubts over the strength of the relationship between the European states and the United States ebbed and flowed, along with doubts over the credibility of the NATO defence against a prospective Soviet invasion—doubts that led to the development of the independent French nuclear deterrent and the withdrawal of France from NATO’s military structure in 1966 for 30 years. After the fall of the Berlin Wall in 1989, the organization became involved in the breakup of Yugoslavia, and conducted its first military interventions in Bosnia from 1992 to 1995 and later Yugoslavia in 1999. Politically, the organization sought better relations with former Warsaw Pact countries, several of which joined the alliance in 1999 and 2004.

Article 5 of the North Atlantic treaty, requiring member states to come to the aid of any member state subject to an armed attack, was invoked for the first and only time after the September 11 attacks,[6] after which troops were deployed to Afghanistan under the NATO-led ISAF. The organization has operated a range of additional roles since then, including sending trainers to Iraq, assisting in counter-piracy operations[7] and in 2011 enforcing a no-fly zoneover Libya in accordance with U.N. Security Council Resolution 1973. The less potent Article 4, which merely invokes consultation among NATO members, has been invoked five times: by Turkey in 2003 over the Iraq War; twice in 2012 by Turkey over the Syrian Civil War, after the downing of an unarmed Turkish F-4 reconnaissance jet, and after a mortar was fired at Turkey from Syria;[8] in 2014 by Poland, following the Russian intervention in Crimea;[9] and again by Turkey in 2015 after threats by Islamic State of Iraq and the Levant to its territorial integrity.[10]

History

Beginnings

Eleven men in suits stand around a large desk at which another man is signing a document.

The North Atlantic Treaty was signed by President Harry Truman in Washington, D.C., on 4 April 1949 and was ratified by the United States that August.

The Treaty of Brussels, signed on 17 March 1948 by Belgium, the Netherlands, Luxembourg, France, and the United Kingdom, is considered the precursor to the NATO agreement. The treaty and the Soviet Berlin Blockade led to the creation of the Western European Union‘s Defence Organization in September 1948.[11] However, participation of the United States was thought necessary both to counter the military power of the USSR and to prevent the revival of nationalist militarism. In addition the 1948 Czechoslovak coup d’état by the Communists had overthrown a democratic government and British Foreign Minister Ernest Bevin reiterated that the best way to prevent another Czechoslovakia was to evolve a joint Western military strategy. He got a receptive hearing, especially considering American anxiety over Italy (and the Italian Communist Party).[12] In 1948 European leaders met with U.S. defense, military and diplomatic officials at the Pentagon, under U.S. Secretary of State George C. Marshall‘s orders, exploring a framework for a new and unprecedented association.[13] Talks for a new military alliance resulted in the North Atlantic Treaty, which was signed by U.S. President Harry Truman in Washington, D.C. on 4 April 1949. It included the five Treaty of Brussels states plus the United States, Canada, Portugal, Italy, Norway, Denmark and Iceland.[14] The first NATO Secretary General, Lord Ismay, stated in 1949 that the organization’s goal was “to keep the Russians out, the Americans in, and the Germans down”.[15] Popular support for the Treaty was not unanimous, and some Icelanders participated in a pro-neutrality, anti-membership riot in March 1949. The creation of NATO can be seen as the primary institutional consequence of a school of thought called Atlanticism which stressed the importance of trans-Atlantic cooperation.[16]

The members agreed that an armed attack against any one of them in Europe or North America would be considered an attack against them all. Consequently, they agreed that, if an armed attack occurred, each of them, in exercise of the right of individual or collective self-defence, would assist the member being attacked, taking such action as it deemed necessary, including the use of armed force, to restore and maintain the security of the North Atlantic area. The treaty does not require members to respond with military action against an aggressor. Although obliged to respond, they maintain the freedom to choose the method by which they do so. This differs from Article IV of the Treaty of Brussels, which clearly states that the response will be military in nature. It is nonetheless assumed that NATO members will aid the attacked member militarily. The treaty was later clarified to include both the member’s territory and their “vessels, forces or aircraft” above the Tropic of Cancer, including some overseas departments of France.[17]

The creation of NATO brought about some standardization of allied military terminology, procedures, and technology, which in many cases meant European countries adopting US practices. The roughly 1300 Standardization Agreements (STANAG) codified many of the common practices that NATO has achieved. Hence, the 7.62×51mm NATO rifle cartridge was introduced in the 1950s as a standard firearm cartridge among many NATO countries.[18]Fabrique Nationale de Herstal‘s FAL, which used the 7.62mm NATO cartridge, was adopted by 75 countries, including many outside of NATO.[19] Also, aircraft marshalling signals were standardized, so that any NATO aircraft could land at any NATO base. Other standards such as the NATO phonetic alphabet have made their way beyond NATO into civilian use.[20]

Cold War

The outbreak of the Korean War in June 1950 was crucial for NATO as it raised the apparent threat of all Communist countries working together, and forced the alliance to develop concrete military plans.[21]Supreme Headquarters Allied Powers Europe (SHAPE) was formed to direct forces in Europe, and began work under Supreme Allied Commander Dwight D. Eisenhower in January 1951.[22] In September 1950, the NATO Military Committee called for an ambitious buildup of conventional forces to meet the Soviets, subsequently reaffirming this position at the February 1952 meeting of the North Atlantic Council in Lisbon. The Lisbon conference, seeking to provide the forces necessary for NATO’s Long-Term Defence Plan, called for an expansion to ninety-six divisions. However this requirement was dropped the following year to roughly thirty-five divisions with heavier use to be made of nuclear weapons. At this time, NATO could call on about fifteen ready divisions in Central Europe, and another ten in Italy and Scandinavia.[23][24] Also at Lisbon, the post of Secretary General of NATO as the organization’s chief civilian was created, and Lord Ismay was eventually appointed to the post.[25]

Two soldiers crouch under a tree while a tank sits on a road in front of them.

The German Bundeswehr provided the largest element of the allied land forces guarding the frontier in Central Europe.

In September 1952, the first major NATO maritime exercises began; Exercise Mainbrace brought together 200 ships and over 50,000 personnel to practice the defence of Denmark and Norway.[26] Other major exercises that followed included Exercise Grand Slam and Exercise Longstep, naval and amphibious exercises in the Mediterranean Sea, Italic Weld, a combined air-naval-ground exercise in northern Italy, Grand Repulse, involving the British Army on the Rhine (BAOR), the Netherlands Corps and Allied Air Forces Central Europe (AAFCE), Monte Carlo, a simulated atomic air-ground exercise involving the Central Army Group, and Weldfast, a combined amphibious landing exercise in the Mediterranean Sea involving American, British, Greek, Italian and Turkish naval forces.[27]

Greece and Turkey also joined the alliance in 1952, forcing a series of controversial negotiations, in which the United States and Britain were the primary disputants, over how to bring the two countries into the military command structure.[22] While this overt military preparation was going on, covert stay-behind arrangements initially made by the Western European Union to continue resistance after a successful Soviet invasion, including Operation Gladio, were transferred to NATO control. Ultimately unofficial bonds began to grow between NATO’s armed forces, such as the NATO Tiger Association and competitions such as the Canadian Army Trophy for tank gunnery.[28][29]

In 1954, the Soviet Union suggested that it should join NATO to preserve peace in Europe.[30] The NATO countries, fearing that the Soviet Union’s motive was to weaken the alliance, ultimately rejected this proposal.

On 17 December 1954, the North Atlantic Council approved MC 48, a key document in the evolution of NATO nuclear thought. MC 48 emphasized that NATO would have to use atomic weapons from the outset of a war with the Soviet Union whether or not the Soviets chose to use them first. This gave SACEUR the same prerogatives for automatic use of nuclear weapons as existed for the commander-in-chief of the US Strategic Air Command.

The incorporation of West Germany into the organization on 9 May 1955 was described as “a decisive turning point in the history of our continent” by Halvard Lange, Foreign Affairs Minister of Norway at the time.[31] A major reason for Germany’s entry into the alliance was that without German manpower, it would have been impossible to field enough conventional forces to resist a Soviet invasion.[32] One of its immediate results was the creation of the Warsaw Pact, which was signed on 14 May 1955 by the Soviet Union, Hungary, Czechoslovakia, Poland, Bulgaria, Romania, Albania, and East Germany, as a formal response to this event, thereby delineating the two opposing sides of the Cold War.

Three major exercises were held concurrently in the northern autumn of 1957. Operation Counter Punch, Operation Strikeback, and Operation Deep Water were the most ambitious military undertaking for the alliance to date, involving more than 250,000 men, 300 ships, and 1,500 aircraft operating from Norway to Turkey.[33]

French withdrawal

A map of France with red and blue markings indicating air force bases as of 1966.

Map of the NATO air bases in France before Charles de Gaulle‘s 1966 withdrawal from NATO military integrated command

NATO’s unity was breached early in its history with a crisis occurring during Charles de Gaulle‘s presidency of France.[34] De Gaulle protested against the USA’s strong role in the organization and what he perceived as a special relationship between it and the United Kingdom. In a memorandum sent to President Dwight D. Eisenhower and Prime Minister Harold Macmillan on 17 September 1958, he argued for the creation of a tripartite directorate that would put France on an equal footing with the US and the UK.[35]

Considering the response to be unsatisfactory, de Gaulle began constructing an independent defence force for his country. He wanted to give France, in the event of an East German incursion into West Germany, the option of coming to a separate peace with the Eastern bloc instead of being drawn into a larger NATO–Warsaw Pact war.[36] In February 1959, France withdrew its Mediterranean Fleet from NATO command,[37] and later banned the stationing of foreign nuclear weapons on French soil. This caused the United States to transfer two hundred military aircraft out of France and return control of the air force bases that it had operated in France since 1950 to the French by 1967.

Though France showed solidarity with the rest of NATO during the Cuban Missile Crisis in 1962, de Gaulle continued his pursuit of an independent defence by removing France’s Atlantic and Channel fleets from NATO command.[38] In 1966, all French armed forces were removed from NATO’s integrated military command, and all non-French NATO troops were asked to leave France. US Secretary of State Dean Rusk was later quoted as asking de Gaulle whether his order included “the bodies of American soldiers in France’s cemeteries?”[39] This withdrawal forced the relocation of SHAPE from Rocquencourt, near Paris, to Casteau, north of Mons, Belgium, by 16 October 1967.[40] France remained a member of the alliance, and committed to the defence of Europe from possible Warsaw Pact attack with its own forces stationed in the Federal Republic of Germany throughout the Cold War. A series of secret accords between US and French officials, the Lemnitzer–Ailleret Agreements, detailed how French forces would dovetail back into NATO’s command structure should East-West hostilities break out.[41]

France announced their return to full participation at the 2009 Strasbourg–Kehl summit.[42]

Détente and escalation

Two older men in suits sit next to each other, while a third stands behind leaning in to listen to the right man talk.

Détente led to many high level meetings between leaders from both NATO and the Warsaw Pact.

During most of the Cold War, NATO’s watch against the Soviet Union and Warsaw Pact did not actually lead to direct military action. On 1 July 1968, the Nuclear Non-Proliferation Treaty opened for signature: NATO argued that its nuclear sharing arrangements did not breach the treaty as US forces controlled the weapons until a decision was made to go to war, at which point the treaty would no longer be controlling. Few states knew of the NATO nuclear sharing arrangements at that time, and they were not challenged. In May 1978, NATO countries officially defined two complementary aims of the Alliance, to maintain security and pursue détente. This was supposed to mean matching defences at the level rendered necessary by the Warsaw Pact’s offensive capabilities without spurring a further arms race.[43]

A map of Europe showing several countries on the left in blue, while ones on the right are in red. Other unaffiliated countries are in white.

During the Cold War, most of Europe was divided between two alliances. Members of NATO are shown in blue, with members of the Warsaw Pact in red, unaffiliated countries are in grey. Yugoslavia, although communist, had left the Soviet sphere in 1948, while Albania was only a Warsaw Pact member until 1968.

On 12 December 1979, in light of a build-up of Warsaw Pact nuclear capabilities in Europe, ministers approved the deployment of US GLCMcruise missiles and Pershing IItheatre nuclear weapons in Europe. The new warheads were also meant to strengthen the western negotiating position regarding nuclear disarmament. This policy was called the Dual Track policy.[44] Similarly, in 1983–84, responding to the stationing of Warsaw PactSS-20 medium-range missiles in Europe, NATO deployed modern Pershing II missiles tasked to hit military targets such as tank formations in the event of war.[45] This action led to peace movement protests throughout Western Europe, and support for the deployment wavered as many doubted whether the push for deployment could be sustained.

The membership of the organization at this time remained largely static. In 1974, as a consequence of the Turkish invasion of Cyprus, Greece withdrew its forces from NATO’s military command structure but, with Turkish cooperation, were readmitted in 1980. The Falklands War between the United Kingdom and Argentina did not result in NATO involvement because article 6 of the North Atlantic Treaty specifies that collective self-defence is only applicable to attacks on member state territories north of the Tropic of Cancer.[46] On 30 May 1982, NATO gained a new member when, following a referendum, the newly democratic Spain joined the alliance. At the peak of the Cold War, 16 member nations maintained an approximate strength of 5,252,800 active military, including as many as 435,000 forward deployed US forces, under a command structure that reached a peak of 78 headquarters, organized into four echelons.[47]

After the Cold War

The Revolutions of 1989 and the dissolution of the Warsaw Pact in 1991 removed the de facto main adversary of NATO and caused a strategic re-evaluation of NATO’s purpose, nature, tasks, and their focus on the continent of Europe. This shift started with the 1990 signing in Paris of the Treaty on Conventional Armed Forces in Europe between NATO and the Soviet Union, which mandated specific military reductions across the continent that continued after the dissolution of the Soviet Union in December 1991.[48] At that time, European countries accounted for 34 percent of NATO’s military spending; by 2012, this had fallen to 21 percent.[49] NATO also began a gradual expansion to include newly autonomous Central and Eastern Europeannations, and extended its activities into political and humanitarian situations that had not formerly been NATO concerns.

Two men in suits sit signing documents at a large table in front of their country's flags. Two others stand outside watching them.

Reforms made under Mikhail Gorbachev led to the end of the Warsaw Pact.

The first post-Cold War expansion of NATO came with German reunification on 3 October 1990, when the former East Germany became part of the Federal Republic of Germany and the alliance. This had been agreed in the Two Plus Four Treaty earlier in the year. To secure Soviet approval of a united Germany remaining in NATO, it was agreed that foreign troops and nuclear weapons would not be stationed in the east, and there are diverging views on whether negotiators gave commitments regarding further NATO expansion east.[50]Jack Matlock, American ambassador to the Soviet Union during its final years, said that the West gave a “clear commitment” not to expand, and declassified documents indicate that Soviet negotiators were given the impression that NATO membership was off the table for countries such as Czechoslovakia, Hungary, or Poland.[51]Hans-Dietrich Genscher, the West German foreign minister at that time, said in a conversation with Eduard Shevardnadze that “[f]or us, however, one thing is certain: NATO will not expand to the east.”[51] In 1996, Gorbachev wrote in his Memoirs, that “during the negotiations on the unification of Germany they gave assurances that NATO would not extend its zone of operation to the east,”[52] and repeated this view in an interview in 2008.[53] According to Robert Zoellick, a State Department official involved in the Two Plus Four negotiating process, this appears to be a misperception, and no formal commitment regarding enlargement was made.[54]

As part of post-Cold War restructuring, NATO’s military structure was cut back and reorganized, with new forces such as the Headquarters Allied Command Europe Rapid Reaction Corps established. The changes brought about by the collapse of the Soviet Union on the military balance in Europe were recognized in the Adapted Conventional Armed Forces in Europe Treaty, which was signed in 1999. The policies of French President Nicolas Sarkozy resulted in a major reform of France’s military position, culminating with the return to full membership on 4 April 2009, which also included France rejoining the NATO Military Command Structure, while maintaining an independent nuclear deterrent.[41][55]

Enlargement and reform

A pale yellow building with square columns with three flags hanging in front and soldiers and dignitaries saluting them.

The NATO flag being raised in a ceremony marking Croatia‘s joining of the alliance in 2009.

Between 1994 and 1997, wider forums for regional cooperation between NATO and its neighbors were set up, like the Partnership for Peace, the Mediterranean Dialogueinitiative and the Euro-Atlantic Partnership Council. In 1998, the NATO-Russia Permanent Joint Council was established. On 8 July 1997, three former communist countries, Hungary, the Czech Republic, and Poland, were invited to join NATO, which each did in 1999. Membership went on expanding with the accession of seven more Central and Eastern European countries to NATO: Estonia, Latvia, Lithuania, Slovenia, Slovakia, Bulgaria, and Romania. They were first invited to start talks of membership during the 2002 Prague summit, and joined NATO on 29 March 2004, shortly before the 2004 Istanbul summit. In Istanbul, NATO launched the Istanbul Cooperation Initiative with four Persian Gulf nations.[56] At that time the decision was criticised in the US by many military, political and academic leaders as a “a policy error of historic proportions.”[57] According to George F. Kennan, an American diplomat and an advocate of the containment policy, this decision “may be expected to have an adverse effect on the development of Russian democracy; to restore the atmosphere of the cold war to East-West relations, to impel Russian foreign policy in directions decidedly not to our liking.”[58]

New NATO structures were also formed while old ones were abolished. In 1997, NATO reached agreement on a significant downsizing of its command structure from 65 headquarters to just 20.[59]The NATO Response Force (NRF) was launched at the 2002 Prague summit on 21 November, the first summit in a former Comecon country. On 19 June 2003, a further restructuring of the NATO military commands began as the Headquarters of the Supreme Allied Commander, Atlantic were abolished and a new command, Allied Command Transformation (ACT), was established in Norfolk, Virginia, United States, and the Supreme Headquarters Allied Powers Europe (SHAPE) became the Headquarters of Allied Command Operations (ACO). ACT is responsible for driving transformation (future capabilities) in NATO, whilst ACO is responsible for current operations.[60] In March 2004, NATO’s Baltic Air Policing began, which supported the sovereignty of Latvia, Lithuania and Estonia by providing jet fighters to react to any unwanted aerial intrusions. Eight multinational jet fighters are based in Lithuania, the number of which was increased from four in 2014.[61]

Two older Caucasian men in black suits and red ties sit facing each other in a room with green, white, and gold trimmed walls.

Meetings between the government of Viktor Yushchenko and NATO leaders led to the Intensified Dialogue programme.

The 2006 Riga summit was held in Riga, Latvia, and highlighted the issue of energy security. It was the first NATO summit to be held in a country that had been part of the Soviet Union. At the April 2008 summit in Bucharest, Romania, NATO agreed to the accession of Croatia and Albania and both countries joined NATO in April 2009. Ukraine and Georgia were also told that they could eventually become members.[62] The issue of Georgian and Ukrainian membership in NATO prompted harsh criticism from Russia, as did NATO plans for a missile defence system. Studies for this system began in 2002, with negotiations centered on anti-ballistic missiles being stationed in Poland and the Czech Republic. Though NATO leaders gave assurances that the system was not targeting Russia, both presidents Vladimir Putin and Dmitry Medvedev criticized it as a threat.[63]

In 2009, US President Barack Obama proposed using the ship-based Aegis Combat System, though this plan still includes stations being built in Turkey, Spain, Portugal, Romania, and Poland.[64] NATO will also maintain the “status quo” in its nuclear deterrent in Europe by upgrading the targeting capabilities of the “tactical” B61 nuclear bombs stationed there and deploying them on the stealthier Lockheed Martin F-35 Lightning II.[65][66] Following the 2014 Crimean crisis, NATO committed to forming a new “spearhead” force of 5,000 troops at bases in Estonia, Lithuania, Latvia, Poland, Romania, and Bulgaria.[67][68] On June 15, 2016, NATO officially recognized cyberwarfare as an operational domain of war, just like land, sea and aerial warfare. This means that any cyber attack on NATO members can trigger Article 5 of the North Atlantic Treaty.[69]

At the 2014 Wales summit, the leaders of NATO’s member states reaffirmed their pledge to spend the equivalent of at least 2% of their gross domestic products on defense.[70] In 2015, five of its 28 members met that goal.[71][72][73]

Military operations

Early operations

No military operations were conducted by NATO during the Cold War. Following the end of the Cold War, the first operations, Anchor Guard in 1990 and Ace Guard in 1991, were prompted by the Iraqi invasion of Kuwait. Airborne early warning aircraft were sent to provide coverage of southeastern Turkey, and later a quick-reaction force was deployed to the area.[74]

Bosnia and Herzegovina intervention

A fighter jet with AV marked on its tail takes off from a mountain runway.

NATO planes engaged in aerial bombardments during Operation Deliberate Force after the Srebrenica massacre.

The Bosnian War began in 1992, as a result of the breakup of Yugoslavia. The deteriorating situation led to United Nations Security Council Resolution 816 on 9 October 1992, ordering a no-fly zone over central Bosnia and Herzegovina, which NATO began enforcing on 12 April 1993 with Operation Deny Flight. From June 1993 until October 1996, Operation Sharp Guard added maritime enforcement of the arms embargo and economic sanctions against the Federal Republic of Yugoslavia. On 28 February 1994, NATO took its first wartime action by shooting down four Bosnian Serb aircraft violating the no-fly zone.[75]

On 10 and 11 April 1994, during the Bosnian War, the United Nations Protection Force called in air strikes to protect the Goražde safe area, resulting in the bombing of a Bosnian Serb military command outpost near Goražde by two US F-16 jets acting under NATO direction.[76] This resulted in the taking of 150 U.N. personnel hostage on 14 April.[77][78] On 16 April a British Sea Harrier was shot down over Goražde by Serb forces.[79] A two-week NATO bombing campaign, Operation Deliberate Force, began in August 1995 against the Army of the Republika Srpska, after the Srebrenica massacre.[80]

NATO air strikes that year helped bring the Yugoslav wars to an end, resulting in the Dayton Agreement in November 1995.[80] As part of this agreement, NATO deployed a UN-mandated peacekeeping force, under Operation Joint Endeavor, named IFOR. Almost 60,000 NATO troops were joined by forces from non-NATO nations in this peacekeeping mission. This transitioned into the smaller SFOR, which started with 32,000 troops initially and ran from December 1996 until December 2004, when operations were then passed onto European Union Force Althea.[81] Following the lead of its member nations, NATO began to award a service medal, the NATO Medal, for these operations.[82]

Kosovo intervention

Three trucks of soldiers idle on a country road in front of trees and red roofed houses. The rear truck has KFOR painted on is back.

German KFOR soldiers patrol southern Kosovo in 1999

In an effort to stop Slobodan Milošević‘s Serbian-led crackdown on KLA separatists and Albanian civilians in Kosovo, the United Nations Security Council passed Resolution 1199 on 23 September 1998 to demand a ceasefire. Negotiations under US Special Envoy Richard Holbrooke broke down on 23 March 1999, and he handed the matter to NATO,[83] which started a 78-day bombing campaign on 24 March 1999.[84] Operation Allied Force targeted the military capabilities of what was then the Federal Republic of Yugoslavia. During the crisis, NATO also deployed one of its international reaction forces, the ACE Mobile Force (Land), to Albania as the Albania Force (AFOR), to deliver humanitarian aid to refugees from Kosovo.[85]

Though the campaign was criticized for high civilian casualties, including bombing of the Chinese embassy in Belgrade, Milošević finally accepted the terms of an international peace plan on 3 June 1999, ending the Kosovo War. On 11 June, Milošević further accepted UN resolution 1244, under the mandate of which NATO then helped establish the KFOR peacekeeping force. Nearly one million refugees had fled Kosovo, and part of KFOR’s mandate was to protect the humanitarian missions, in addition to deterring violence.[85][86] In August–September 2001, the alliance also mounted Operation Essential Harvest, a mission disarming ethnic Albanian militias in the Republic of Macedonia.[87] As of 1 December 2013, 4,882 KFOR soldiers, representing 31 countries, continue to operate in the area.[88]

The US, the UK, and most other NATO countries opposed efforts to require the U.N. Security Council to approve NATO military strikes, such as the action against Serbia in 1999, while France and some others claimed that the alliance needed UN approval.[89] The US/UK side claimed that this would undermine the authority of the alliance, and they noted that Russia and China would have exercised their Security Council vetoes to block the strike on Yugoslavia, and could do the same in future conflicts where NATO intervention was required, thus nullifying the entire potency and purpose of the organization. Recognizing the post-Cold War military environment, NATO adopted the Alliance Strategic Concept during its Washington summit in April 1999 that emphasized conflict prevention and crisis management.[90]

War in Afghanistan

A monumental green copper statue of a woman with a torch stands on an island in front of a mainland where a massive plume of gray smoke billows amongst skyscrapers.

The September 11 attacks in the United States caused NATO to invoke its collective defence article for the first time.

The September 11 attacks in the United States caused NATO to invoke Article 5 of the NATO Charter for the first time in the organization’s history. The Article says that an attack on any member shall be considered to be an attack on all. The invocation was confirmed on 4 October 2001 when NATO determined that the attacks were indeed eligible under the terms of the North Atlantic Treaty.[91] The eight official actions taken by NATO in response to the attacks included Operation Eagle Assist and Operation Active Endeavour, a naval operation in the Mediterranean Sea which is designed to prevent the movement of terrorists or weapons of mass destruction, as well as enhancing the security of shipping in general which began on 4 October 2001.[92]

The alliance showed unity: On 16 April 2003, NATO agreed to take command of the International Security Assistance Force (ISAF), which includes troops from 42 countries. The decision came at the request of Germany and the Netherlands, the two nations leading ISAF at the time of the agreement, and all nineteen NATO ambassadors approved it unanimously. The handover of control to NATO took place on 11 August, and marked the first time in NATO’s history that it took charge of a mission outside the north Atlantic area.[93]

A general hands a NATO flag from a soldier on the left to one on the right.

ISAF General David M. Rodriguez at an Italian change of command in Herat.

ISAF was initially charged with securing Kabul and surrounding areas from the Taliban, al Qaeda and factional warlords, so as to allow for the establishment of the Afghan Transitional Administration headed by Hamid Karzai. In October 2003, the UN Security Council authorized the expansion of the ISAF mission throughout Afghanistan,[94] and ISAF subsequently expanded the mission in four main stages over the whole of the country.[95]

On 31 July 2006, the ISAF additionally took over military operations in the south of Afghanistan from a US-led anti-terrorism coalition.[96] Due to the intensity of the fighting in the south, in 2011 France allowed a squadron of Mirage 2000 fighter/attack aircraft to be moved into the area, to Kandahar, in order to reinforce the alliance’s efforts.[97] During its 2012 Chicago Summit, NATO endorsed a plan to end the Afghanistan war and to remove the NATO-led ISAF Forces by the end of December 2014.[98] ISAF was disestablished in December 2014 and replaced by the follow-on training Resolute Support Mission.

Iraq training mission

In August 2004, during the Iraq War, NATO formed the NATO Training Mission – Iraq, a training mission to assist the Iraqi security forces in conjunction with the US ledMNF-I.[99] The NATO Training Mission-Iraq (NTM-I) was established at the request of the Iraqi Interim Government under the provisions of United Nations Security Council Resolution 1546. The aim of NTM-I was to assist in the development of Iraqi security forces training structures and institutions so that Iraq can build an effective and sustainable capability that addresses the needs of the nation. NTM-I was not a combat mission but is a distinct mission, under the political control of NATO’s North Atlantic Council. Its operational emphasis was on training and mentoring. The activities of the mission were coordinated with Iraqi authorities and the US-led Deputy Commanding General Advising and Training, who was also dual-hatted as the Commander of NTM-I. The mission officially concluded on 17 December 2011.[100]

Gulf of Aden anti-piracy

A tall plume of black smoke rises from the blue ocean waters next to a large gray battleship and a small black inflatable boat.

USS Farragut destroying a Somali pirate skiff in March 2010

Beginning on 17 August 2009, NATO deployed warships in an operation to protect maritime traffic in the Gulf of Aden and the Indian Ocean from Somali pirates, and help strengthen the navies and coast guards of regional states. The operation was approved by the North Atlantic Council and involves warships primarily from the United States though vessels from many other nations are also included. Operation Ocean Shield focuses on protecting the ships of Operation Allied Provider which are distributing aid as part of the World Food Programme mission in Somalia. Russia, China and South Korea have sent warships to participate in the activities as well.[101][102] The operation seeks to dissuade and interrupt pirate attacks, protect vessels, and abetting to increase the general level of security in the region.[103]

Libya intervention

During the Libyan Civil War, violence between protestors and the Libyan government under Colonel Muammar Gaddafi escalated, and on 17 March 2011 led to the passage of United Nations Security Council Resolution 1973, which called for a ceasefire, and authorized military action to protect civilians. A coalition that included several NATO members began enforcing a no-fly zone over Libya shortly afterwards. On 20 March 2011, NATO states agreed on enforcing an arms embargo against Libya with Operation Unified Protector using ships from NATO Standing Maritime Group 1 and Standing Mine Countermeasures Group 1,[104] and additional ships and submarines from NATO members.[105] They would “monitor, report and, if needed, interdict vessels suspected of carrying illegal arms or mercenaries“.[104]

Pieces of a destroyed tank, notably the gun turret, lie on a sandy landscape.

Libyan Army Palmaria howitzers destroyed by the French Air Force near Benghazi in March 2011

On 24 March, NATO agreed to take control of the no-fly zone from the initial coalition, while command of targeting ground units remained with the coalition’s forces.[106][107] NATO began officially enforcing the UN resolution on 27 March 2011 with assistance from Qatar and the United Arab Emirates.[108] By June, reports of divisions within the alliance surfaced as only eight of the 28 member nations were participating in combat operations,[109] resulting in a confrontation between US Defense Secretary Robert Gates and countries such as Poland, Spain, the Netherlands, Turkey, and Germany to contribute more, the latter believing the organization has overstepped its mandate in the conflict.[110][111][112] In his final policy speech in Brussels on 10 June, Gates further criticized allied countries in suggesting their actions could cause the demise of NATO.[113] The German foreign ministry pointed to “a considerable [German] contribution to NATO and NATO-led operations” and to the fact that this engagement was highly valued by President Obama.[114]

While the mission was extended into September, Norway that day announced it would begin scaling down contributions and complete withdrawal by 1 August.[115] Earlier that week it was reported Danish air fighters were running out of bombs.[116][117] The following week, the head of the Royal Navy said the country’s operations in the conflict were not sustainable.[118] By the end of the mission in October 2011, after the death of Colonel Gaddafi, NATO planes had flown about 9,500 strike sorties against pro-Gaddafi targets.[119][120] A report from the organization Human Rights Watch in May 2012 identified at least 72 civilians killed in the campaign.[121] Following a coup d’état attempt in October 2013, Libyan Prime Minister Ali Zeidan requested technical advice and trainers from NATO to assist with ongoing security issues.[122]

Participating countries

Map of NATO affiliations in Europe Map of NATO partnerships globally
A map of Europe with countries in blue, cyan, orange, and yellow based on their NATO affiliation. A world map with countries in blue, cyan, orange, yellow, purple, and green, based on their NATO affiliation.

Members

Twelve men in black suits stand talking in small groups under a backdrop with the words Lisbonne and Lisboa.

NATO organizes regular summits for leaders of their members states and partnerships.

NATO has twenty-eight members, mainly in Europe and North America. Some of these countries also have territory on multiple continents, which can be covered only as far south as the Tropic of Cancer in the Atlantic Ocean, which defines NATO’s “area of responsibility” under Article 6 of the North Atlantic Treaty. During the original treaty negotiations, the United States insisted that colonies such as the Belgian Congo be excluded from the treaty.[123][124]French Algeria was however covered until their independence on 3 July 1962.[125] Twelve of these twenty-eight are original members who joined in 1949, while the other sixteen joined in one of seven enlargement rounds. Few members spend more than two percent of their gross domestic product on defence,[126] with the United States accounting for three quarters of NATO defense spending.[127]

From the mid-1960s to the mid-1990s, France pursued a military strategy of independence from NATO under a policy dubbed “Gaullo-Mitterrandism”.[citation needed]Nicolas Sarkozy negotiated the return of France to the integrated military command and the Defence Planning Committee in 2009, the latter being disbanded the following year. France remains the only NATO member outside the Nuclear Planning Group and unlike the United States and the United Kingdom, will not commit its nuclear-armed submarines to the alliance.[41][55]

Enlargement

A map of Europe with countries labeled in shades of blue, green, and yellow based on when they joined NATO.

NATO has added 12 new members since the German reunification and the end of the Cold War.

New membership in the alliance has been largely from Central and Eastern Europe, including former members of the Warsaw Pact. Accession to the alliance is governed with individual Membership Action Plans, and requires approval by each current member. NATO currently has three candidate countries that are in the process of joining the alliance: Bosnia and Herzegovina, Montenegro, and the Republic of Macedonia. On 2 December 2015, NATO Foreign Ministers decided to invite Montenegro to start accession talks to become the 29th member of the Alliance.[128] On 28 April 2017 the Montenegro’s parliament ratified the accession treaty, and as of that date 27 of 28 NATO members had approved Montenegro’s accession, with Spain’s parliament expected to act in May 2017.[129] In NATO official statements, the Republic of Macedonia is always referred to as the “former Yugoslav Republic of Macedonia”, with a footnote stating that “Turkey recognizes the Republic of Macedonia under its constitutional name”. Though Macedonia completed its requirements for membership at the same time as Croatia and Albania, NATO’s most recent members, its accession was blocked by Greece pending a resolution of the Macedonia naming dispute.[130] In order to support each other in the process, new and potential members in the region formed the Adriatic Charter in 2003.[131]Georgia was also named as an aspiring member, and was promised “future membership” during the 2008 summit in Bucharest,[132] though in 2014, US President Barack Obama said the country was not “currently on a path” to membership.[133]

Russia continues to oppose further expansion, seeing it as inconsistent with understandings between Soviet leader Mikhail Gorbachev and European and American negotiators that allowed for a peaceful German reunification.[51] NATO’s expansion efforts are often seen by Moscow leaders as a continuation of a Cold War attempt to surround and isolate Russia,[134] though they have also been criticised in the West.[135]Ukraine‘s relationship with NATO and Europe has been politically divisive, and contributed to “Euromaidan” protests that saw the ousting of pro-Russian President Viktor Yanukovych in 2014. In March 2014, Prime Minister Arseniy Yatsenyuk reiterated the government’s stance that Ukraine is not seeking NATO membership.[136] Ukraine’s president subsequently signed a bill dropping his nation’s nonaligned status in order to pursue NATO membership, but signaled that it would hold a referendum before seeking to join.[137] Ukraine is one of eight countries in Eastern Europe with an Individual Partnership Action Plan. IPAPs began in 2002, and are open to countries that have the political will and ability to deepen their relationship with NATO.[138]

Partnerships

Hundreds of soldiers in military uniforms stand behind a line on a tarmac with 14 flags held by individuals at the front.

Partnership for Peace conducts multinational military exercises like Cooperative Archer, which took place in Tblisi in July 2007 with 500 servicemen from four NATO members, eight PfP members, and Jordan, a Mediterranean Dialogue participant.[139]

The Partnership for Peace (PfP) programme was established in 1994 and is based on individual bilateral relations between each partner country and NATO: each country may choose the extent of its participation.[140] Members include all current and former members of the Commonwealth of Independent States.[141] The Euro-Atlantic Partnership Council (EAPC) was first established on 29 May 1997, and is a forum for regular coordination, consultation and dialogue between all fifty participants.[142] The PfP programme is considered the operational wing of the Euro-Atlantic Partnership.[140] Other third countries also have been contacted for participation in some activities of the PfP framework such as Afghanistan.[143]

The European Union (EU) signed a comprehensive package of arrangements with NATO under the Berlin Plus agreement on 16 December 2002. With this agreement, the EU was given the possibility to use NATO assets in case it wanted to act independently in an international crisis, on the condition that NATO itself did not want to act—the so-called “right of first refusal“.[144] For example, Article 42(7) of the 1982 Treaty of Lisbon specifies that “If a Member State is the victim of armed aggression on its territory, the other Member States shall have towards it an obligation of aid and assistance by all the means in their power”. The treaty applies globally to specified territories whereas NATO is restricted under its Article 6 to operations north of the Tropic of Cancer. It provides a “double framework” for the EU countries that are also linked with the PfP programme.

Additionally, NATO cooperates and discusses its activities with numerous other non-NATO members. The Mediterranean Dialogue was established in 1994 to coordinate in a similar way with Israel and countries in North Africa. The Istanbul Cooperation Initiative was announced in 2004 as a dialog forum for the Middle East along the same lines as the Mediterranean Dialogue. The four participants are also linked through the Gulf Cooperation Council.[145]

Political dialogue with Japan began in 1990, and since then, the Alliance has gradually increased its contact with countries that do not form part of any of these cooperation initiatives.[146] In 1998, NATO established a set of general guidelines that do not allow for a formal institutionalisation of relations, but reflect the Allies’ desire to increase cooperation. Following extensive debate, the term “Contact Countries” was agreed by the Allies in 2000. By 2012, the Alliance had broadened this group, which meets to discuss issues such as counter-piracy and technology exchange, under the names “partners across the globe” or “global partners”.[147][148]Australia and New Zealand, both contact countries, are also members of the AUSCANNZUKUS strategic alliance, and similar regional or bilateral agreements between contact countries and NATO members also aid cooperation. Colombia is the NATO’s latest partner and Colombia has access to the full range of cooperative activities NATO offers to partners; Colombia became the first and only Latin American country to cooperate with NATO.[149]

Structures

Two gray haired older men talk with a soldier wearing camouflage and a green beret who is facing away.

Secretary General of NATOJens Stoltenberg (right) and his predecessor, Anders Fogh Rasmussen (left), talk with members of the Norwegian army’s Telemark Battalion in Oslo.

The main headquarters of NATO is located on Boulevard Léopold III/Leopold III-laan, B-1110 Brussels, which is in Haren, part of the City of Brussels municipality.[150] A new €750 million headquarters building began construction in 2010, was completed in summer 2016,[151] and was dedicated on 25 May 2017.[152] Problems in the original building stemmed from its hurried construction in 1967, when NATO was forced to move its headquarters from Porte Dauphine in Paris, France following the French withdrawal.[153][40]

The staff at the Headquarters is composed of national delegations of member countries and includes civilian and military liaison offices and officers or diplomatic missions and diplomats of partner countries, as well as the International Staff and International Military Staff filled from serving members of the armed forces of member states.[154] Non-governmental citizens’ groups have also grown up in support of NATO, broadly under the banner of the Atlantic Council/Atlantic Treaty Association movement.

NATO Council

Like any alliance, NATO is ultimately governed by its 28 member states. However, the North Atlantic Treaty and other agreements outline how decisions are to be made within NATO. Each of the 28 members sends a delegation or mission to NATO’s headquarters in Brussels, Belgium.[155] The senior permanent member of each delegation is known as the Permanent Representative and is generally a senior civil servant or an experienced ambassador (and holding that diplomatic rank). Several countries have diplomatic missions to NATO through embassies in Belgium.

Together, the Permanent Members form the North Atlantic Council (NAC), a body which meets together at least once a week and has effective governance authority and powers of decision in NATO. From time to time the Council also meets at higher level meetings involving foreign ministers, defence ministers or heads of state or government (HOSG) and it is at these meetings that major decisions regarding NATO’s policies are generally taken. However, it is worth noting that the Council has the same authority and powers of decision-making, and its decisions have the same status and validity, at whatever level it meets. France, Germany, Italy, the United Kingdom and the United States are together referred to as the Quint, which is an informal discussion group within NATO. NATO summits also form a further venue for decisions on complex issues, such as enlargement.[156]

The meetings of the North Atlantic Council are chaired by the Secretary General of NATO and, when decisions have to be made, action is agreed upon on the basis of unanimity and common accord. There is no voting or decision by majority. Each nation represented at the Council table or on any of its subordinate committees retains complete sovereignty and responsibility for its own decisions.

List of Secretaries General[157]
# Name Country Duration
1 Lord Ismay  United Kingdom 4 April 1952 – 16 May 1957
2 Paul-Henri Spaak  Belgium 16 May 1957 – 21 April 1961
3 Dirk Stikker  Netherlands 21 April 1961 – 1 August 1964
4 Manlio Brosio  Italy 1 August 1964 – 1 October 1971
5 Joseph Luns  Netherlands 1 October 1971 – 25 June 1984
6 Lord Carrington  United Kingdom 25 June 1984 – 1 July 1988
7 Manfred Wörner  Germany 1 July 1988 – 13 August 1994
Sergio Balanzino  Italy 13 August 1994 – 17 October 1994
8 Willy Claes  Belgium 17 October 1994 – 20 October 1995
Sergio Balanzino  Italy 20 October 1995 – 5 December 1995
9 Javier Solana  Spain 5 December 1995 – 6 October 1999
10 Lord Robertson  United Kingdom 14 October 1999 – 17 December 2003
Alessandro Minuto-Rizzo  Italy 17 December 2003 – 1 January 2004
11 Jaap de Hoop Scheffer  Netherlands 1 January 2004 – 1 August 2009
12 Anders Fogh Rasmussen  Denmark 1 August 2009 – 30 September 2014
13 Jens Stoltenberg  Norway 1 October 2014 – present
List of Deputy Secretaries General[158]
# Name Country Duration
1 Jonkheer van Vredenburch  Netherlands 1952–1956
2 Baron Adolph Bentinck  Netherlands 1956–1958
3 Alberico Casardi  Italy 1958–1962
4 Guido Colonna di Paliano  Italy 1962–1964
5 James A. Roberts  Canada 1964–1968
6 Osman Olcay  Turkey 1969–1971
7 Paolo Pansa Cedronio  Italy 1971–1978
8 Rinaldo Petrignani  Italy 1978–1981
9 Eric da Rin  Italy 1981–1985
10 Marcello Guidi  Italy 1985–1989
11 Amedeo de Franchis  Italy 1989–1994
12 Sergio Balanzino  Italy 1994–2001
13 Alessandro Minuto Rizzo  Italy 2001–2007
14 Claudio Bisogniero  Italy 2007–2012
15 Alexander Vershbow  United States 2012–2016
16 Rose Gottemoeller  United States 2016–present
Acting Secretary General

NATO Parliamentary Assembly

A large baroque yellow and gold room with a stage on the left and long tables filled with men and women in suits on the right.

The NATO Parliamentary Assembly, an intergovernmental organization of NATO and associate countries’ elected representatives, meets in London prior to the start of the 2014 Newport summit.

The body that sets broad strategic goals for NATO is the NATO Parliamentary Assembly (NATO-PA) which meets at the Annual Session, and one other during the year, and is the organ that directly interacts with the parliamentary structures of the national governments of the member states which appoint Permanent Members, or ambassadors to NATO. The NATO Parliamentary Assembly is made up of legislators from the member countries of the North Atlantic Alliance as well as thirteen associate members. Karl A. Lamers, German Deputy Chairman of the Defence Committee of the Bundestag and a member of the Christian Democratic Union, became president of the assembly in 2010.[159] It is however officially a different structure from NATO, and has as aim to join together deputies of NATO countries in order to discuss security policies on the NATO Council.

The Assembly is the political integration body of NATO that generates political policy agenda setting for the NATO Council via reports of its five committees:

  • Committee on the Civil Dimension of Security
  • Defence and Security Committee
  • Economics and Security Committee
  • Political Committee
  • Science and Technology Committee

These reports provide impetus and direction as agreed upon by the national governments of the member states through their own national political processes and influencers to the NATO administrative and executive organizational entities.

Military structures

An older man with a gray beard, red beret, and olive green military suit.

Petr Pavel (right), of the Czech Republic, has been Chairman of the NATO Military Committee since 2015

NATO’s military operations are directed by the Chairman of the NATO Military Committee, and split into two Strategic Commands commanded by a senior US officer and (currently) a senior French officer[160] assisted by a staff drawn from across NATO. The Strategic Commanders are responsible to the Military Committee for the overall direction and conduct of all Alliance military matters within their areas of command.[60]

Each country’s delegation includes a Military Representative, a senior officer from each country’s armed forces, supported by the International Military Staff. Together the Military Representatives form the Military Committee, a body responsible for recommending to NATO’s political authorities those measures considered necessary for the common defence of the NATO area. Its principal role is to provide direction and advice on military policy and strategy. It provides guidance on military matters to the NATO Strategic Commanders, whose representatives attend its meetings, and is responsible for the overall conduct of the military affairs of the Alliance under the authority of the Council.[161] The Chairman of the NATO Military Committee is Petr Pavel of the Czech Republic, since 2015.

Like the Council, from time to time the Military Committee also meets at a higher level, namely at the level of Chiefs of Defence, the most senior military officer in each nation’s armed forces. Until 2008 the Military Committee excluded France, due to that country’s 1966 decision to remove itself from the NATO Military Command Structure, which it rejoined in 1995. Until France rejoined NATO, it was not represented on the Defence Planning Committee, and this led to conflicts between it and NATO members.[162] Such was the case in the lead up to Operation Iraqi Freedom.[163] The operational work of the Committee is supported by the International Military Staff.

Three soldiers in camouflage stand in salute while a fourth raises a blue and white flag on a red and white striped flagpole.

NATO flag raising at opening of Exercise Steadfast Jazz at Drawsko Pomorskie in Poland in November 2013.

The structure of NATO evolved throughout the Cold War and its aftermath. An integrated military structure for NATO was first established in 1950 as it became clear that NATO would need to enhance its defences for the longer term against a potential Soviet attack. In April 1951, Allied Command Europe and its headquarters (SHAPE) were established; later, four subordinate headquarters were added in Northern and Central Europe, the Southern Region, and the Mediterranean.[164]

From the 1950s to 2003, the Strategic Commanders were the Supreme Allied Commander Europe (SACEUR) and the Supreme Allied Commander Atlantic (SACLANT). The current arrangement is to separate responsibility between Allied Command Transformation (ACT), responsible for transformation and training of NATO forces, and Allied Command Operations (ACO), responsible for NATO operations worldwide.[165] Starting in late 2003 NATO has restructured how it commands and deploys its troops by creating several NATO Rapid Deployable Corps, including Eurocorps, I. German/Dutch Corps, Multinational Corps Northeast, and NATO Rapid Deployable Italian Corps among others, as well as naval High Readiness Forces (HRFs), which all report to Allied Command Operations.[166]

In early 2015, in the wake of the War in Donbass, meetings of NATO ministers decided that Multinational Corps Northeast would be augmented so as to develop greater capabilities, to, if thought necessary, prepare to defend the Baltic States, and that a new Multinational Division Southeast would be established in Romania. Six NATO Force Integration Units would also be established to coordinate preparations for defence of new Eastern members of NATO.[167]

Multinational Division Southeast was activated on December 1, 2015.[168]

During August 2016 it was announced that 650 soldiers of the British Army would be deployed on an enduring basis in Eastern Europe, mainly in Estonia with some also being deployed to Poland.[169] This British deployment forms part of a four-battle group (four-battalion) deployment by various allies, NATO Enhanced Forward Presence, one each spread from Poland (the Poland-deployed battle group mostly led by the U.S.) to Estonia.

Criticism and controversy

Goals

While the original goal of NATO was clear – to defend Western Europe from Soviet influence – its post-Soviet goals have long been debated. Members of all participating countries have often noted that the United States spends more on the organization than all other members combined. According to the Huffington Post in 2017: “… it can’t be argued that NATO has served American interests since 1991. For the last 15 years, the U.S. has been engaged in wars in Afghanistan, Iraq and other Muslim countries. … NATO is a military alliance and one of its members, the United States, has been involved in wars for 15 years.” However, not all US-led invasions have received automatic support. After Article 5 was invoked for the first and only time due to the September 11 attacks, the NATO members showed support for an invasion of Afghanistan but not for one of Iraq. While some countries independently aided the US in Iraq (such as the United Kingdom and the Netherlands), others like France and Germany refused. Furthermore, countries had no obligation in terms of numbers and involvement regarding Afghanistan. As such, any country in the alliance was free to contribute whatever served their interests best. The Post article refers to the group as “a group of sovereign nations that will respond to American requests as they see fit”, as well as having “devolved into bilateral relations between the U.S. and each NATO member”.[170]

Opponents have described the organization as a “quasi-imperial, militaristic force” and fear that it’s likely to create problems rather than solve them. Pew Research Center‘s 2016 survey among its member states showed that while most countries viewed NATO positively, most NATO members preferred keeping their military spending the same. The response to whether their country should militarily aid another NATO country if it were to get into a serious military conflict with Russia was also mixed. Only in the US and Canada did more than 50% of the people answer that they should.[171]

See also

References

https://en.wikipedia.org/wiki/NATO

North Atlantic Treaty

Washington D.C. – 4 April 1949The Parties to this Treaty reaffirm their faith in the purposes and principles of the Charter of the United Nations and their desire to live in peace with all peoples and all governments.

They are determined to safeguard the freedom, common heritage and civilisation of their peoples, founded on the principles of democracy, individual liberty and the rule of law. They seek to promote stability and well-being in the North Atlantic area.

They are resolved to unite their efforts for collective defence and for the preservation of peace and security. They therefore agree to this North Atlantic Treaty :

Article 1

The Parties undertake, as set forth in the Charter of the United Nations, to settle any international dispute in which they may be involved by peaceful means in such a manner that international peace and security and justice are not endangered, and to refrain in their international relations from the threat or use of force in any manner inconsistent with the purposes of the United Nations.

Article 2

The Parties will contribute toward the further development of peaceful and friendly international relations by strengthening their free institutions, by bringing about a better understanding of the principles upon which these institutions are founded, and by promoting conditions of stability and well-being. They will seek to eliminate conflict in their international economic policies and will encourage economic collaboration between any or all of them.

Article 3

In order more effectively to achieve the objectives of this Treaty, the Parties, separately and jointly, by means of continuous and effective self-help and mutual aid, will maintain and develop their individual and collective capacity to resist armed attack.

Article 4

The Parties will consult together whenever, in the opinion of any of them, the territorial integrity, political independence or security of any of the Parties is threatened.

Article 5

The Parties agree that an armed attack against one or more of them in Europe or North America shall be considered an attack against them all and consequently they agree that, if such an armed attack occurs, each of them, in exercise of the right of individual or collective self-defence recognised by Article 51 of the Charter of the United Nations, will assist the Party or Parties so attacked by taking forthwith, individually and in concert with the other Parties, such action as it deems necessary, including the use of armed force, to restore and maintain the security of the North Atlantic area.

Any such armed attack and all measures taken as a result thereof shall immediately be reported to the Security Council. Such measures shall be terminated when the Security Council has taken the measures necessary to restore and maintain international peace and security.

Article 6

[1]For the purpose of Article 5, an armed attack on one or more of the Parties is deemed to include an armed attack:

  • on the territory of any of the Parties in Europe or North America, on the Algerian Departments of France [2], on the territory of or on the Islands under the jurisdiction of any of the Parties in the North Atlantic area north of the Tropic of Cancer;
  • on the forces, vessels, or aircraft of any of the Parties, when in or over these territories or any other area in Europe in which occupation forces of any of the Parties were stationed on the date when the Treaty entered into force or the Mediterranean Sea or the North Atlantic area north of the Tropic of Cancer.

Article 7

This Treaty does not affect, and shall not be interpreted as affecting in any way the rights and obligations under the Charter of the Parties which are members of the United Nations, or the primary responsibility of the Security Council for the maintenance of international peace and security.

Article 8

Each Party declares that none of the international engagements now in force between it and any other of the Parties or any third State is in conflict with the provisions of this Treaty, and undertakes not to enter into any international engagement in conflict with this Treaty.

Article 9

The Parties hereby establish a Council, on which each of them shall be represented, to consider matters concerning the implementation of this Treaty. The Council shall be so organised as to be able to meet promptly at any time. The Council shall set up such subsidiary bodies as may be necessary; in particular it shall establish immediately a defence committee which shall recommend measures for the implementation of Articles 3 and 5.

Article 10

The Parties may, by unanimous agreement, invite any other European State in a position to further the principles of this Treaty and to contribute to the security of the North Atlantic area to accede to this Treaty. Any State so invited may become a Party to the Treaty by depositing its instrument of accession with the Government of the United States of America. The Government of the United States of America will inform each of the Parties of the deposit of each such instrument of accession.

Article 11

This Treaty shall be ratified and its provisions carried out by the Parties in accordance with their respective constitutional processes. The instruments of ratification shall be deposited as soon as possible with the Government of the United States of America, which will notify all the other signatories of each deposit. The Treaty shall enter into force between the States which have ratified it as soon as the ratifications of the majority of the signatories, including the ratifications of Belgium, Canada, France, Luxembourg, the Netherlands, the United Kingdom and the United States, have been deposited and shall come into effect with respect to other States on the date of the deposit of their ratifications. [3]

Article 12

After the Treaty has been in force for ten years, or at any time thereafter, the Parties shall, if any of them so requests, consult together for the purpose of reviewing the Treaty, having regard for the factors then affecting peace and security in the North Atlantic area, including the development of universal as well as regional arrangements under the Charter of the United Nations for the maintenance of international peace and security.

Article 13

After the Treaty has been in force for twenty years, any Party may cease to be a Party one year after its notice of denunciation has been given to the Government of the United States of America, which will inform the Governments of the other Parties of the deposit of each notice of denunciation.

Article 14

This Treaty, of which the English and French texts are equally authentic, shall be deposited in the archives of the Government of the United States of America. Duly certified copies will be transmitted by that Government to the Governments of other signatories.

Footnotes

  1. Jump up The definition of the territories to which Article 5 applies was revised by Article 2 of the Protocol to the North Atlantic Treaty on the accession of Greece and Turkey signed on 22 October 1951.
  2. Jump up On 16 January 1963, the North Atlantic Council noted that insofar as the former Algerian Departments of France were concerned, the relevant clauses of this Treaty had become inapplicable as from 3 July 1962.
  3. Jump up Treaty came into force on 24 August 1949, after the deposition of the ratifications of all signatory states.

https://en.wikisource.org/wiki/North_Atlantic_Treaty#Article_5

Story 2: NSA Violate The Fourth Amendment Rights of American Citizens — Spying Without Warrants — Nothing New — Congress Will Do Nothing As Usual — Videos 

Image result for NSA buildingsImage result for NSA Spying on Americans without warrants

Image result for NSA buildings

OBAMA SECRETLY CONDUCTED ILLEGAL SEARCHES ON AMERICANS FOR YEARS

Published on May 24, 2017

The National Security Agency, under Obama, routinely violated American privacy protections while scouring through overseas intercepts, and failed to disclose the extent of the problems until the final days before Trump was elected president last fall (according to once top-secret documents that chronicle some of the most serious constitutional abuses to date by the U.S. intelligence community).

More than 5 percent, or one out of every 20 searches seeking upstream Internet data on Americans inside the NSA’s so-called Section 702 database, violated the safeguards Obama and his intelligence chiefs vowed to follow in 2011.

The Obama administration self-disclosed the problems at a closed-door hearing Oct. 26 before the Foreign Intelligence Surveillance Court that set off alarm. Trump was elected less than two weeks later.

The normally supportive court censured administration officials, saying the failure to disclose the extent of the violations earlier amounted to an “institutional lack of candor” and that the improper searches constituted a “very serious Fourth Amendment issue,” according to a recently unsealed court document dated April 26, 2017.

The admitted violations undercut one of the primary defenses that the intelligence community and Obama officials have used in recent weeks to justify their snooping into incidental NSA intercepts about Americans.

Circa has reported that there was a three-fold increase in NSA data searches about Americans and a rise in the unmasking of U.S. person’s identities in intelligence reports after Obama loosened the privacy rules in 2011.

Officials like former National Security Adviser Susan Rice have argued their activities were legal under the so-called minimization rule changes Obama made, and that the intelligence agencies were strictly monitored to avoid abuses.

The intelligence court and the NSA’s own internal watchdog found that not to be true.
“Since 2011, NSA’s minimization procedures have prohibited use of U.S.-person identifiers to query the results of upstream Internet collections under Section 702,” the unsealed court ruling declared. “The Oct. 26, 2016 notice informed the court that NSA analysts had been conducting such queries in violation of that prohibition, with much greater frequency than had been previously disclosed to the Court.”

The American Civil Liberties Union said the newly disclosed violations are some of the most serious to ever be documented and strongly call into question the U.S. intelligence community’s ability to police itself and safeguard American’s privacy as guaranteed by the Constitution’s Fourth Amendment protections against unlawful search and seizure.
“I think what this emphasizes is the shocking lack of oversight of these programs,” said Neema Singh Guliani, the ACLU’s legislative counsel in Washington.

“You have these problems going on for years that only come to the attention of the court late in the game and then it takes additional years to change its practices.

Released Documents Prove Obama’s Administration Routinely Violated Fourth Amendment

Judge Napolitano: Lack Of Outrage Over NSA’s Illegal Searches Is ‘Astounding’

Obama seriously violated the 4th Amendment

NSA Spying On Americans ‘Widespread’ – Let Sec. 702 Expire!

New evidence Obama’s NSA conducted illegal searches

Fallout from NSA revelations

Networks Blackout Massive Constitutional Violations By Obama’s NSA

FISA Court: Obama’s Politicized NSA “A Very Serious 4th Amend Issue”

Judge Napolitano on a report that the NSA conducted illegal searches under Obama

BREAKING: Obama Era Crime Revealed Under Cover of Fake Russia “Scandal”

Obama Didn’t Need FISA To Spy On Trump – Judge Andrew Napolitano

President Obama went to British intelligence to spy on Trump for him! – Judge Napolitano

FISA Court: Obama’s Politicized NSA “A Very Serious 4th Amend Issue”

Mark Levin On Why Obama May Have Been Spying On Trump

“Whats The Law?” NSA ,CIA “FISA” Electronic Surveillance Act on Americans

Whistleblower: NSA is Tapping Everyone, Even Obama in 2004!

NSA Whistleblower: ‘Everyone In US Under Virtual Surveillance’

NSA Whistleblower Bill Binney on Tucker Carlson 03.24.2017

William Binney – The Government is Profiling You (The NSA is Spying on You)

Beehive 4.2 Lecture: Big Data & Mass Surveillance by Bill Binney

NSA Whistleblower William Binney The Future of FREEDOM

How the Government Tracks You: NSA Surveillance

10 Scary Surveillance Technologies

The National Security Agency under former President Barack Obama routinely violated American privacy protections while scouring through overseas intercepts and failed to disclose the extent of the problems until the final days before Donald Trump was elected president last fall, according to once top-secret documents that chronicle some of the most serious constitutional abuses to date by the U.S. intelligence community.

More than 5 percent, or one out of every 20 searches seeking upstream Internet data on Americans inside the NSA’s so-called Section 702 database violated the safeguards Obama and his intelligence chiefs vowed to follow in 2011, according to one classified internal report reviewed by Circa.

The Obama administration self-disclosed the problems at a closed-door hearing Oct. 26 before the Foreign Intelligence Surveillance Court that set off alarm. Trump was elected less than two weeks later.

WATCH |  Circa’s Sara Carter looks at a classified document from the Foreign Intelligence Surveillance Court.

The normally supportive court censured administration officials, saying the failure to disclose the extent of the violations earlier amounted to an “institutional lack of candor” and that the improper searches constituted a “very serious Fourth Amendment issue,” according to a recently unsealed court document dated April 26, 2017.

The admitted violations undercut one of the primary defenses that the intelligence community and Obama officials have used in recent weeks to justify their snooping into incidental NSA intercepts about Americans.

The FISA court opinion

Circa has reported that there was a three-fold increase in NSA data searches about Americans and a rise in the unmasking of U.S. person’s identities in intelligence reports after Obama loosened the privacy rules in 2011.

Officials like former National Security Adviser Susan Rice have argued their activities were legal under the so-called minimization rule changes Obama made, and that the intelligence agencies were strictly monitored to avoid abuses.

The intelligence court and the NSA’s own internal watchdog found that not to be true.

“Since 2011, NSA’s minimization procedures have prohibited use of U.S.-person identifiers to query the results of upstream Internet collections under Section 702,” the unsealed court ruling declared. “The Oct. 26, 2016 notice informed the court that NSA analysts had been conducting such queries inviolation of that prohibition, with much greater frequency than had been previously disclosed to the Court.”

Speaking Wednesday on Fox News, Sen. Rand Paul (R-KY) said there was an apparent effort under the Obama Administration to increase the number of unmaskings of Americans.

“If we determine this to be true, this is an enormous abuse of power,” Paul said. “This will dwarf all other stories.”

“There are hundreds and hundreds of people,” Paul added.

The American Civil Liberties Union said the newly disclosed violations are some of the most serious to ever be documented and strongly call into question the U.S. intelligence community’s ability to police itself and safeguard American’s privacy as guaranteed by the Constitution’s Fourth Amendment protections against unlawful search and seizure.

“I think what this emphasizes is the shocking lack of oversight of these programs,” said Neema Singh Guliani, the ACLU’s legislative counsel in Washington.

“You have these problems going on for years that only come to the attention of the court late in the game and then it takes additional years to change its practices.

“I think it does call into question all those defenses that we kept hearing, that we always have a robust oversight structure and we have culture of adherence to privacy standards,” she added. “And the headline now is they actually haven’t been in compliacne for years and the FISA court itself says in its opinion is that the NSA suffers from a culture of a lack of candor.”

The NSA acknowledged it self-disclosed the mass violations to the court last fall and that in April it took the extraordinary step of suspending the type of searches that were violating the rules, even deleting prior collected data on Americans to avoid any further violations.

“NSA will no longer collect certain internet communications that merely mention a foreign intelligence target,” the agency said in the statement that was dated April 28 and placed on its Web site without capturing much media or congressional attention.

In question is the collection of what is known as upstream “about data”about an American that is collected even though they were not directly in contact with a foreigner that the NSA was legally allowed to intercept.

The NSA said it doesn’t have the ability to stop collecting ‘about’ information on Americans, “without losing some other important data. ” It, however, said it would stop the practice to “reduce the chance that it would acquire communication of U.S. persons or others who are not in direct contact with a foreign intelligence target.”

The NSA said it also plans to “delete the vast majority of its upstream internet data to further protect the privacy of U.S. person communications.”

Agency officials called the violations “inadvertent compliance lapses.” But the court and IG documents suggest the NSA had not developed a technological way to comply with the rules they had submitted to the court in 2011.

Officials “explained that NSA query compliance is largely maintained through a series of manual checks” and had not “included the proper limiters” to prevent unlawful searches, the NSA internal watchdog reported in a top secret report in January that was just declassified. A new system is being developed now, officials said.

The NSA conducts thousand of searches a year on data involving Americans and the actual numbers of violations were redacted from the documents Circa reviewed.

But a chart in the report showed there three types of violations, the most frequent being 5.2 percent of the time when NSA Section 702 upstream data on U.S. persons was searched.

The inspector general also found  noncompliance between 0.7 percent and 1.4 percent of the time involving NSA activities in which there was a court order to target an American for spying  but the rules were still not followed. Those activities are known as Section 704 and Section 705 spying.

Review | The NSA inspector general’s highly redacted chart showing privacy violations.

The IG report spared few words for the NSA’s efforts before the disclosure to ensure it was complying with practices, some that date to rules issued in 2008 in the final days of the Bush administration and others that Obama put into effect in 2011.

“We found that the Agency controls for monitoring query compliance have not been completely developed,” the inspector general reported, citing problems ranging from missing requirements for documentation to the failure to complete controls that would ensure “query compliance.”

 

Obama’s NSA rebuked for snooping on Americans; journo says it proves wide pattern

The secret court that oversees government snooping took the Obama administration to task late last year, suggesting it created “a very serious Fourth Amendment issue” by violating rules the government itself had implemented regarding the surveillance of Americans.

According to top-secret documents made public by the Foreign Intelligence Surveillance Court – often referred to as the FISA court – the government admitted that, just days before the 2016 election, NSA analysts were violating surveillance rules on a regular basis. This pattern of overreach, coupled with the timing of the government’s disclosure, resulted in an unusually harsh rebuke of the administration’s practices and principles.

A former CBS journalist suing the federal government for allegedly spying on her said the documents prove the illegal snooping was pervasive and widely abused.

POTENTIAL ‘SMOKING GUN’ SHOWING OBAMA ADMINISTRATION SPIED ON TRUMP TEAM, SOURCE SAYS

“Sources of mine have indicated that political players have increasingly devised premises to gather intel on political targets by wrapping them up in ‘incidental’ collection of foreigners, as if by accident,” Sharyl Attkisson, who is pursuing a federal lawsuit the Department of Justice has tried to dismiss, told the Fox News Investigative Unit.

According to the FISA Court opinion, it was on September 26, 2016 that the government submitted an undisclosed number of “certifications” for the court to review. The review process was supposed to be completed within 30 days, or by October 26, 2016.

Just two days before that review was to be completed – and less than two weeks before the 2016 election – the government informed the court that NSA analysts had been violating rules, established in 2011, designed to protect the internet communications of Americans.

The NSA has suggested these were “inadvertent compliance lapses,” and points out that the agency “self-reported” these problems, meaning they were the ones to bring this issue to the attention of the court.

There was just one problem.

The violations that the government disclosed on October 24, 2016, were based on a report from the NSA’s Inspector General that had been released 10 months earlier, in January 2016. This means that when the government submitted its certifications for review in September, they were likely aware of that IG report – but failed to mention the malpractice going on at the NSA.

The Court at the time blamed an institutional “lack of candor” for the government’s failure to disclose that information weeks earlier, and gave the government until April 28, 2017, to come up with a solution. After failing to come to an agreement, the NSA announced that it was stopping the type of surveillance in question.

The so-called “lapses” among NSA staffers had to do with Section 702 of the Foreign Intelligence Surveillance Act, and the “upstream” surveillance of what the intelligence community refers to as “about” communications.

REPORT: OBAMA LIED AND OBAMA SPIED

According to the NSA, Section 702 “allows the intelligence community to conduct surveillance on only specific foreign targets located outside the United States to collect foreign intelligence, including intelligence needed in the fight against international terrorism and cyber threats.”

Upstream surveillance, according to the ACLU, was first disclosed by NSA leaker Edward Snowden, and “involves the NSA’s bulk interception and searching of Americans’ international internet communications — including emails, chats, and web-browsing traffic.”

Until the NSA stopped it, the “upstream” snooping program notified them directly if someone inside the U.S. composed an email that contained the email address of a foreign intelligence agent who was being monitored. According to an NSA declaration reportedly made during the Bush administration, these communications did not have to be to or from the foreign agent, they simply had to mention the email address.

According to the FISA Court documents just made public, the notifications sent to the NSA often led to the unmasking of American citizens caught up in monitoring. And as the court pointed out, many of the requests being made to unmask the Americans taking part in these communications were in direct violation of safeguards established by the Obama administration.

According to the FISA Court documents, so-called “minimization procedures” adopted in 2011 to curb unlawful surveillance “have prohibited use of U.S.-person identifiers to query the results of upstream Internet collections under Section 702.”

And, according to the government’s October 26, 2016 admission, “NSA analysts had been conducting such queries in violation of that prohibition, with much greater frequency than had been previously disclosed.”

The suspended surveillance program has been a target of fierce criticism from Republican and Democratic lawmakers, as well as journalists and even Snowden.

Sen. Rand Paul, R-Kentucky, told Fox & Friends on Wednesday that the “terrible” program was basically “a back doorway to sort of get at Americans’ privacy without using a warrant.”

When the NSA announced it was stopping certain Section 702 activities, Senate Intelligence Committee member Ron Wyden, D-Oregon, said he had raised concerns for years “that this amounted to an end run around the Fourth Amendment.”

Snowden tweeted that the NSA’s actions represented “the most substantive of the post-2013 NSA reforms, if the principle is applied to all other programs.”

Attkisson, who sued to determine who had access to a government IP address that she says was discovered on her CBS work computer during a forensics exam, said she’s concerned the truth will never come out.

“I’m told by sources that it should only take a day or a week, at most, for the intel community to provide [lawmakers with] the details of which Americans, journalists and public officials were ‘incidentally’ surveilled, which ones were unmasked, who requested the unmaskings, when, and for what supposed purpose,” Attkisson said. “Yet months have gone by. I’m afraid that as time passes, any evidence becomes less likely to persist.”

http://www.foxnews.com/politics/2017/05/25/obama-s-nsa-rebuked-for-snooping-on-americans-journo-says-it-proves-wide-pattern.html

Release of 2015 Section 702 Minimization Procedures

August 11, 2016

Today the ODNI, in consultation with the Department of Justice, is releasing in redacted form the current Section 702 Minimization Procedures, as updated in 2015, in keeping with the Principles of Intelligence Transparency for the Intelligence Community.  These procedures are intended to protect the privacy and civil liberties of U.S. persons, as required by the Fourth Amendment and the Foreign Intelligence Surveillance Act, in connection with the foreign intelligence activities undertaken by the CIA, FBI, NSA and the National Counterterrorism Center.

Background

Section 702 was enacted as part of the FISA Amendments Act of 2008 , and it authorizes the Attorney General and the DNI to provide to the Foreign Intelligence Surveillance Court annual certifications authorizing the Intelligence Community to target non-U.S. persons reasonably believed to be located outside of the United States to acquire certain categories of foreign intelligence information. The FAA is a carefully constructed framework that provides the government with the tools necessary to collect vital foreign intelligence information and includes a robust scheme for protecting the privacy and civil liberties of U.S. persons.  This framework is implemented in part through a detailed set of procedures designed to minimize the acquisition, retention, use and dissemination of U.S. person information acquired under Section 702.

Additional Section 702 certification information, including the 2014 minimization procedures and the FISC’s August 2014 Opinion, was released on IC on the Record Sept. 29, 2015.

The 2015 Minimization Procedures

The 2015 Section 702 Minimization Procedures were approved by the Attorney General and submitted to the FISC as part of the government’s July 15, 2015, submission of reauthorization certifications pursuant to Section 702.  After thorough consideration, the FISC approved these minimization procedures in its Nov. 6, 2015, Memorandum Opinion and Order (released, in redacted form, in April 2016 on IC on the Record), finding that the minimization procedures comport with the Fourth Amendment of the United States Constitution and the FAA.

The 2015 Section 702 minimization procedures incorporated certain modifications to the 2014 Section 702 minimization procedures, including changes made to implement recommendations the Privacy and Civil Liberties Oversight Board made in its 2014 report reviewing the Section 702 program.  Modifications made in the 2015 minimization procedures include:

  • Improvements to provisions in NSA’s and CIA’s minimization procedures that ensure the preservation of information related to criminal and civil litigation;
  • Enhancements to NSA’s, CIA’s and FBI’s protections for attorney-client communications;
  • Clarification of NSA’s, CIA’s and FBI’s 2015 documentation or other requirements with respect to the querying of Section 702 information.

These procedures identified below are released:

https://icontherecord.tumblr.com/post/148797010498/release-of-2015-section-702-minimization

Nets Blackout Massive Constitutional Violations by Obama’s NSA

All of the negative news about President Donald Trump provided a convenient smokescreen to obscure a story highly damaging to former President Barack Obama on Wednesday. As first reported by Circa News, “The National Security Agency under former President Barack Obama routinely violated American privacy protections while scouring through overseas intercepts and failed to disclose the extent of the problems until the final days before Donald Trump was elected president last fall.” As would be expected, the Big Three Networks (ABC, CBS, and NBC) completely omitted from their evening broadcasts.

“More than one in 20 internet searches conducted by the National Security Agency, involving Americans, during the Obama administration violated constitutional privacy protections,” announced Fox News’ Bret Baier near the top of Special Report. “And that practice went on for years. Not only that. But the Obama administration was harshly rebuked by the FISA court for doing it.”

The report was handed off to Chief Washington Correspondent James Rosen, who wasted no time in getting to the heart of the matter. “On the day President Obama visited Los Angeles last October to yuk it up with Jimmy Kimmel, lawyers for the National Security Agency were quietly informing the Foreign Intelligence Surveillance Court that NSA had systematically violated the rights of countless Americans,” he quipped.

“Declassified documents, first obtained by the news site Circa, show the FISA court sharply rebuked the administration,” Rosen noted as he began to read a passage from the FISA court’s opinion. “’With greater frequency than previously disclosed to the Court, NSA analysts had used U.S. person identifiers to query the results of internet ‘upstream’ collection, even though NSA’s Section 702 minimization procedures prohibited such queries.’”

The Fox News reporter was intrigued by the documents because: “These disclosers are timely though, as Section 702 of the FISA Amendments Act—one of the primary means by which U.S. citizens are caught up in incidental surveillance—is up for reauthorization, Bret, by the Congress at year’s end.”

John Soloman, one of the Circa reporters who broke the story, talked with Rosen and told him that “tonight, for the first time, we can say confidently that there’s been a finding that some of that espionage, that spying on Americans, actually violated the law.”

The condemning evidence seemed to have no end, as Rosen reported that:

The documents show it was back in 2011 that the FISA court first determined NSA’s procedures to be, quote, “statutorily and constitutionally deficient with respect to their protection of U.S. person information.” Five years later, two weeks before Election Day, the judges learned that NSA had never adequately enacted the changes it had promised to make. The NSA inspector general and its office of compliance for operations “have been conducting other reviews covering different time periods,” the judges noted, “with preliminary results suggesting that the problem is widespread during all periods of review.”

Rosen had also mentioned how “the judges blasted NSA’s ‘institutional ‘lack of candor’’ and added ‘This is a very serious fourth amendment issue.’”

The lack of coverage by the Big Three, and the liberal media in general shows their bias against Trump and their favoritism to Obama. They rather focus on alleged accusations that so far have bared little fruit, instead of the legal opinion of federal judges exposing the highly illegal actions of a segment of President Obama’s administration.

http://www.newsbusters.org/blogs/nb/nicholas-fondacaro/2017/05/25/nets-blackout-massive-constitutional-violations-obamas-nsa

All of the negative news about President Donald Trump provided a convenient smokescreen to obscure a story highly damaging to former President Barack Obama on Wednesday. As first reported by Circa News, “The National Security Agency under former President Barack Obama routinely violated American privacy protections while scouring through overseas intercepts and failed to disclose the extent of the problems until the final days before Donald Trump was elected president last fall.” As would be expected, the Big Three Networks (ABC, CBS, and NBC) completely omitted from their evening broadcasts.

“More than one in 20 internet searches conducted by the National Security Agency, involving Americans, during the Obama administration violated constitutional privacy protections,” announced Fox News’ Bret Baier near the top of Special Report. “And that practice went on for years. Not only that. But the Obama administration was harshly rebuked by the FISA court for doing it.”

The report was handed off to Chief Washington Correspondent James Rosen, who wasted no time in getting to the heart of the matter. “On the day President Obama visited Los Angeles last October to yuk it up with Jimmy Kimmel, lawyers for the National Security Agency were quietly informing the Foreign Intelligence Surveillance Court that NSA had systematically violated the rights of countless Americans,” he quipped.

“Declassified documents, first obtained by the news site Circa, show the FISA court sharply rebuked the administration,” Rosen noted as he began to read a passage from the FISA court’s opinion. “’With greater frequency than previously disclosed to the Court, NSA analysts had used U.S. person identifiers to query the results of internet ‘upstream’ collection, even though NSA’s Section 702 minimization procedures prohibited such queries.’”

The Fox News reporter was intrigued by the documents because: “These disclosers are timely though, as Section 702 of the FISA Amendments Act—one of the primary means by which U.S. citizens are caught up in incidental surveillance—is up for reauthorization, Bret, by the Congress at year’s end.”

John Soloman, one of the Circa reporters who broke the story, talked with Rosen and told him that “tonight, for the first time, we can say confidently that there’s been a finding that some of that espionage, that spying on Americans, actually violated the law.”

The condemning evidence seemed to have no end, as Rosen reported that:

The documents show it was back in 2011 that the FISA court first determined NSA’s procedures to be, quote, “statutorily and constitutionally deficient with respect to their protection of U.S. person information.” Five years later, two weeks before Election Day, the judges learned that NSA had never adequately enacted the changes it had promised to make. The NSA inspector general and its office of compliance for operations “have been conducting other reviews covering different time periods,” the judges noted, “with preliminary results suggesting that the problem is widespread during all periods of review.”

Rosen had also mentioned how “the judges blasted NSA’s ‘institutional ‘lack of candor’’ and added ‘This is a very serious fourth amendment issue.’”

The lack of coverage by the Big Three, and the liberal media in general shows their bias against Trump and their favoritism to Obama. They rather focus on alleged accusations that so far have bared little fruit, instead of the legal opinion of federal judges exposing the highly illegal actions of a segment of President Obama’s administration.

http://www.newsbusters.org/blogs/nb/nicholas-fondacaro/2017/05/25/nets-blackout-massive-constitutional-violations-obamas-nsa

REPORT: Obama lied and Obama spied

A new report out this morning details just how much Obama spied on Americans during his administration and it’s a lot. Even the liberal ACLU organization says these new disclosures are some of the most serious to ever be documented:

CIRCA – The National Security Agency under former President Barack Obama routinely violated American privacy protections while scouring through overseas intercepts and failed to disclose the extent of the problems until the final days before Donald Trump was elected president last fall, according to once top-secret documents that chronicle some of the most serious constitutional abuses to date by the U.S. intelligence community.

More than 5 percent, or one out of every 20 searches seeking upstream Internet data on Americans inside the NSA’s so-called Section 702 database violated the safeguards Obama and his intelligence chiefs vowed to follow in 2011, according to one classified internal report reviewed by Circa.

The Obama administration self-disclosed the problems at a closed-door hearing Oct. 26 before the Foreign Intelligence Surveillance Court that set off alarm. Trump was elected less than two weeks later.

The normally supportive court censured administration officials, saying the failure to disclose the extent of the violations earlier amounted to an “institutional lack of candor” and that the improper searches constituted a “very serious Fourth Amendment issue,” according to a recently unsealed court document dated April 26, 2017.

The admitted violations undercut one of the primary defenses that the intelligence community and Obama officials have used in recent weeks to justify their snooping into incidental NSA intercepts about Americans.

Circa has reported that there was a three-fold increase in NSA data searches about Americans and a rise in the unmasking of U.S. person’s identities in intelligence reports after Obama loosened the privacy rules in 2011.

Officials like former National Security Adviser Susan Rice have argued their activities were legal under the so-called minimization rule changes Obama made, and that the intelligence agencies were strictly monitored to avoid abuses.

The intelligence court and the NSA’s own internal watchdog found that not to be true.

The American Civil Liberties Union said the newly disclosed violations are some of the most serious to ever be documented and strongly call into question the U.S. intelligence community’s ability to police itself and safeguard American’s privacy as guaranteed by the Constitution’s Fourth Amendment protections against unlawful search and seizure.

Mark Levin wants to know where is the special prosecutor:

Obama spied on journalists and the American people, yet we’re supposed to just ignore that he spied on Trump all because of Trump’s tweet? The media pretends like it’s not a big deal at all and even seems to take Susan Rice at her word that her unmasking of details of the Trump campaign’s communications were appropriate.

Yeah I think we need a special prosecutor to get to the bottom of all of this and pronto.

http://therightscoop.com/report-obama-lied-and-obama-spied/

Story 3: Montana Congressional Candidate Gianforte Will Win Despite Roughing up Aggressive Reporter — Setup of A Political Assassination by Big Lie Media — Videos

Greg Gianforte wins Montana special election

Published on May 25, 2017

The Republican candidate won a seat in the House of Representatives.

Bill Bennet on Gianfortes special election win in Montana

‘Great Win in Montana’, President Trump Praises Greg Gianforte from G7 Summit [VIDEO]

Greg Gianforte Apologizes To reporter Ben jacobs Gianforte Wins Montana Congressional Election

Montana GOP candidate Gianforte charged with assault

Guardian Reporter Ben Jacobs vs GOP Candidate Greg Gianforte, Montana, EYE WITNESS CHANGES STORY

Greg Gianforte body slams Guardian reporter Ben Jacobs in Montana Video

This is NOT the Actual VIDEO but is a representation of what could have happened.

Published on May 25, 2017

Greg Gianforte body slams Guardian reporter Ben Jacobs in Montana Republican candidate charged with assault after ‘body-slamming’ Guardian reporter
The is Audio of Greg Gianforte attacking Ben Jacobs corroborated by Fox News journalists in the room, who described candidate ‘slamming him to the ground’
Support the Guardian’s fearless journalism by making a contribution or becoming a member

The Republican candidate for Montana’s congressional seat has been charged with misdemeanor assault after he is alleged to have slammed a Guardian reporter to the floor on the eve of the state’s special election, breaking his glasses and shouting, “Get the hell out of here.”

Ben Jacobs, a Guardian political reporter, was asking Greg Gianforte, a tech millionaire endorsed by Donald Trump, about the Republican healthcare plan when the candidate allegedly “body-slammed” the reporter.

GOP candidate Greg Gianforte has financial ties to US-sanctioned Russian companies
Read more
“He took me to the ground,” Jacobs said by phone from the back of an ambulance. “I think he wailed on me once or twice … He got on me and I think he hit me … This is the strangest thing that has ever happened to me in reporting on politics.”

Fox News reporter Alicia Acuna, field producer Faith Mangan and photographer Keith Railey witnessed the incident at Gianforte’s campaign headquarters in Montana, according to an account published by foxnews.com. After Jacobs asked Gianforte his question, Acuna wrote: “Gianforte grabbed Jacobs by the neck with both hands and slammed him into the ground behind him.

“Faith, Keith and I watched in disbelief as Gianforte then began punching the man, as he moved on top the reporter and began yelling something to the effect of ‘I’m sick and tired of this!’ … To be clear, at no point did any of us who witnessed this assault see Jacobs show any form of physical aggression toward Gianforte, who left the area after giving statements to local sheriff’s deputies.”

Jacobs subsequently reported the incident to the police. The Gallatin county sheriff’s office said on Wednesday night it had completed its investigation and that Gianforte had been issued with a charge of misdemeanour assault.

“Following multiple interviews and an investigation by the Gallatin county sheriff’s office it was determined there was probable cause to issue a citation to Greg Gianforte for misdemeanor assault,” sheriff Brian Gootkin said in a statement. “The nature of the injuries did not meet the statutory elements of felony assault. Greg Gianforte received a citation on Wednesday night and is scheduled to appear in Gallatin county justice court between now and June 7, 2017.”

A statement by campaign spokesman Shane Scanlon blamed Jacobs for the altercation, saying that he “entered the office without permission, aggressively shoved a recorder in Greg’s face, and began asking badgering questions”.

“Jacobs was asked to leave,” the statement reads. “After asking Jacobs to lower the recorder, Jacobs declined. Greg then attempted to grab the phone that was pushed in his face. Jacobs grabbed Greg’s wrist, and spun away from Greg, pushing them both to the ground.

“It’s unfortunate that this aggressive behavior from a liberal journalist created this scene at our campaign volunteer BBQ.”

Scanlon’s account is contradicted by audio of the abortive interview recorded by Jacobs, as well as the Fox News account. The audio does not capture Jacobs being asked to leave or lower his recorder, but does contain an apparent reference to the Guardian’s previous attempts to report on Gianforte. “I’m sick and tired of you guys,” Gianforte said. “The last guy who came here did the same thing. Get the hell out of here. Get the hell out of here. The last guy did the same thing. Are you with the Guardian?”

“Yes! You just broke my glasses,” Jacobs replied.

Ben Jacobs with his broken glasses being carted off in the ambulance.
Facebook Twitter Pinterest
Ben Jacobs with his broken glasses being carted off in the ambulance. Photograph: Ben Jacobs for the Guardian
“The last guy did the same damn thing,” Gianforte said.

“You just body slammed me and broke my glasses,” Jacobs said.

“Get the hell out of here,” Gianforte yelled.

At a press conference on Wednesday evening, sheriff Brian Gootkin said that there had been four witnesses to the altercation, in addition to Gianforte and Jacobs. Gianforte briefly spoke with sheriff’s deputies following the altercation but has not been interviewed. Gootkin said that he was not aware of any video of the incident. He also requested that reporters and members of the public stop calling Gallatin’s 911 dispatch.

According to campaign finance filings, Gootkin donated $250 to Gianforte’s campaign in March. Gootkin’s later statement acknowledged the contribution but said it had “nothing to do with our investigation which is now complete”.

This is NOT the Actual VIDEO but is a representation of what could have happened.

Montana GOP candidate Gianforte charged with assault

Reaction to Montana GOP candidate allegedly body-slamming reporter

GOP candidate in Montana charged with assault on reporter

 

The Pronk Pops Show Podcasts Portfolio

Listen To Pronk Pops Podcast or Download Shows 897-900

Listen To Pronk Pops Podcast or Download Shows 889-896

Listen To Pronk Pops Podcast or Download Shows 884-888

Listen To Pronk Pops Podcast or Download Shows 878-883

Listen To Pronk Pops Podcast or Download Shows 870-877

Listen To Pronk Pops Podcast or Download Shows 864-869

Listen To Pronk Pops Podcast or Download Shows 857-863

Listen To Pronk Pops Podcast or Download Shows 850-856

Listen To Pronk Pops Podcast or Download Shows 845-849

Listen To Pronk Pops Podcast or Download Shows 840-844

Listen To Pronk Pops Podcast or Download Shows 833-839

Listen To Pronk Pops Podcast or Download Shows 827-832

Listen To Pronk Pops Podcast or Download Shows 821-826

Listen To Pronk Pops Podcast or Download Shows 815-820

Listen To Pronk Pops Podcast or Download Shows 806-814

Listen To Pronk Pops Podcast or Download Shows 800-805

Listen To Pronk Pops Podcast or Download Shows 793-799

Listen To Pronk Pops Podcast or Download Shows 785-792

Listen To Pronk Pops Podcast or Download Shows 777-784

Listen To Pronk Pops Podcast or Download Shows 769-776

Listen To Pronk Pops Podcast or Download Shows 759-768

Listen To Pronk Pops Podcast or Download Shows 751-758

Listen To Pronk Pops Podcast or Download Shows 745-750

Listen To Pronk Pops Podcast or Download Shows 738-744

Listen To Pronk Pops Podcast or Download Shows 732-737

Listen To Pronk Pops Podcast or Download Shows 727-731

Listen To Pronk Pops Podcast or Download Shows 720-726

Listen To Pronk Pops Podcast or DownloadShows 713-719

Listen To Pronk Pops Podcast or DownloadShows 705-712

Listen To Pronk Pops Podcast or Download Shows 695-704

Listen To Pronk Pops Podcast or Download Shows 685-694

Listen To Pronk Pops Podcast or Download Shows 675-684

Listen To Pronk Pops Podcast or Download Shows 668-674

Listen To Pronk Pops Podcast or Download Shows 660-667

Listen To Pronk Pops Podcast or Download Shows 651-659

Listen To Pronk Pops Podcast or Download Shows 644-650

Listen To Pronk Pops Podcast or Download Shows 637-643

Listen To Pronk Pops Podcast or Download Shows 629-636

Listen To Pronk Pops Podcast or Download Shows 617-628

Listen To Pronk Pops Podcast or Download Shows 608-616

Listen To Pronk Pops Podcast or Download Shows 599-607

Listen To Pronk Pops Podcast or Download Shows 590-598

Listen To Pronk Pops Podcast or Download Shows 585- 589

Listen To Pronk Pops Podcast or Download Shows 575-584

Listen To Pronk Pops Podcast or Download Shows 565-574

Listen To Pronk Pops Podcast or Download Shows 556-564

Listen To Pronk Pops Podcast or Download Shows 546-555

Listen To Pronk Pops Podcast or Download Shows 538-545

Listen To Pronk Pops Podcast or Download Shows 532-537

Listen To Pronk Pops Podcast or Download Shows 526-531

Listen To Pronk Pops Podcast or Download Shows 519-525

Listen To Pronk Pops Podcast or Download Shows 510-518

Listen To Pronk Pops Podcast or Download Shows 500-509

Listen To Pronk Pops Podcast or Download Shows 490-499

Listen To Pronk Pops Podcast or Download Shows 480-489

Listen To Pronk Pops Podcast or Download Shows 473-479

Listen To Pronk Pops Podcast or Download Shows 464-472

Listen To Pronk Pops Podcast or Download Shows 455-463

Listen To Pronk Pops Podcast or Download Shows 447-454

Listen To Pronk Pops Podcast or Download Shows 439-446

Listen To Pronk Pops Podcast or Download Shows 431-438

Listen To Pronk Pops Podcast or Download Shows 422-430

Listen To Pronk Pops Podcast or Download Shows 414-421

Listen To Pronk Pops Podcast or Download Shows 408-413

Listen To Pronk Pops Podcast or Download Shows 400-407

Listen To Pronk Pops Podcast or Download Shows 391-399

Listen To Pronk Pops Podcast or Download Shows 383-390

Listen To Pronk Pops Podcast or Download Shows 376-382

Listen To Pronk Pops Podcast or Download Shows 369-375

Listen To Pronk Pops Podcast or Download Shows 360-368

Listen To Pronk Pops Podcast or Download Shows 354-359

Listen To Pronk Pops Podcast or Download Shows 346-353

Listen To Pronk Pops Podcast or Download Shows 338-345

Listen To Pronk Pops Podcast or Download Shows 328-337

Listen To Pronk Pops Podcast or Download Shows 319-327

Listen To Pronk Pops Podcast or Download Shows 307-318

Listen To Pronk Pops Podcast or Download Shows 296-306

Listen To Pronk Pops Podcast or Download Shows 287-295

Listen To Pronk Pops Podcast or Download Shows 277-286

Listen To Pronk Pops Podcast or Download Shows 264-276

Listen To Pronk Pops Podcast or Download Shows 250-263

Listen To Pronk Pops Podcast or Download Shows 236-249

Listen To Pronk Pops Podcast or Download Shows 222-235

Listen To Pronk Pops Podcast or Download Shows 211-221

Listen To Pronk Pops Podcast or Download Shows 202-210

Listen To Pronk Pops Podcast or Download Shows 194-201

Listen To Pronk Pops Podcast or Download Shows 184-193

Listen To Pronk Pops Podcast or Download Shows 174-183

Listen To Pronk Pops Podcast or Download Shows 165-173

Listen To Pronk Pops Podcast or Download Shows 158-164

Listen To Pronk Pops Podcast or Download Shows151-157

Listen To Pronk Pops Podcast or Download Shows 143-150

Listen To Pronk Pops Podcast or Download Shows 135-142

Listen To Pronk Pops Podcast or Download Shows 131-134

Listen To Pronk Pops Podcast or Download Shows 124-130

Listen To Pronk Pops Podcast or Download Shows 121-123

Listen To Pronk Pops Podcast or Download Shows 118-120

Listen To Pronk Pops Podcast or Download Shows 113 -117

Listen To Pronk Pops Podcast or Download Show 112

Listen To Pronk Pops Podcast or Download Shows 108-111

Listen To Pronk Pops Podcast or Download Shows 106-108

Listen To Pronk Pops Podcast or Download Shows 104-105

Listen To Pronk Pops Podcast or Download Shows 101-103

Listen To Pronk Pops Podcast or Download Shows 98-100

Listen To Pronk Pops Podcast or Download Shows 94-97

Listen To Pronk Pops Podcast or Download Show 93

Listen To Pronk Pops Podcast or Download Show 92

Listen To Pronk Pops Podcast or Download Show 91

Listen To Pronk Pops Podcast or Download Shows 88-90

Listen To Pronk Pops Podcast or Download Shows 84-87

Listen To Pronk Pops Podcast or Download Shows 79-83

Listen To Pronk Pops Podcast or Download Shows 74-78

Listen To Pronk Pops Podcast or Download Shows 71-73

Listen To Pronk Pops Podcast or Download Shows 68-70

Listen To Pronk Pops Podcast or Download Shows 65-67

Listen To Pronk Pops Podcast or Download Shows 62-64

Listen To Pronk Pops Podcast or Download Shows 58-61

Listen To Pronk Pops Podcast or Download Shows 55-57

Listen To Pronk Pops Podcast or Download Shows 52-54

Listen To Pronk Pops Podcast or Download Shows 49-51

Listen To Pronk Pops Podcast or Download Shows 45-48

Listen To Pronk Pops Podcast or Download Shows 41-44

Listen To Pronk Pops Podcast or Download Shows 38-40

Listen To Pronk Pops Podcast or Download Shows 34-37

Listen To Pronk Pops Podcast or Download Shows 30-33

Listen To Pronk Pops Podcast or Download Shows 27-29

Listen To Pronk Pops Podcast or Download Shows 17-26

Listen To Pronk Pops Podcast or Download Shows 16-22

Listen To Pronk Pops Podcast or Download Shows 10-15

Listen To Pronk Pops Podcast or Download Shows 1-9

Read Full Post | Make a Comment ( None so far )

The Pronk Pops Show 894, May 16, 2017, Story 1: Trump Whipping The Washington Post — More Fake News From Big Lie Media — Open Source New al Qaeda and Islamic State Laptop Battery Bombs May Evade Airport Security — Videos — Story 2: The Real Danger To The Our Republic Is Progressive Propaganda About Trump — American People Are Ignoring Them As They Get Trump Media Fatigue — Videos

Posted on May 16, 2017. Filed under: American History, Blogroll, Breaking News, Business, Central Intelligence Agency, Communications, Congress, Constitutional Law, Corruption, Countries, Crime, Donald J. Trump, Donald Trump, Foreign Policy, Freedom of Speech, Hate Speech, History, House of Representatives, Human Behavior, Islamic State, Israel, Language, Law, Lying, Media, National Interest, National Security Agency, News, Philosophy, Photos, Politics, President Barack Obama, President Trump, Radio, Raymond Thomas Pronk, Scandals, Security, Senate, Spying, Success, United States of America, Videos, War, Wealth, Wisdom | Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , |

Project_1

The Pronk Pops Show Podcasts

Pronk Pops Show 894,  May 16, 2017

Pronk Pops Show 893,  May 15, 2017

Pronk Pops Show 892,  May 12, 2017

Pronk Pops Show 891,  May 11, 2017

Pronk Pops Show 891,  May 11, 2017

Pronk Pops Show 890,  May 10, 2017

Pronk Pops Show 889,  May 9, 2017

Pronk Pops Show 888,  May 8, 2017

Pronk Pops Show 887,  May 5, 2017

Pronk Pops Show 886,  May 4, 2017

Pronk Pops Show 885,  May 3, 2017

Pronk Pops Show 884,  May 1, 2017

Pronk Pops Show 883 April 28, 2017

Pronk Pops Show 882: April 27, 2017

Pronk Pops Show 881: April 26, 2017

Pronk Pops Show 880: April 25, 2017

Pronk Pops Show 879: April 24, 2017

Pronk Pops Show 878: April 21, 2017

Pronk Pops Show 877: April 20, 2017

Pronk Pops Show 876: April 19, 2017

Pronk Pops Show 875: April 18, 2017

Pronk Pops Show 874: April 17, 2017

Pronk Pops Show 873: April 13, 2017

Pronk Pops Show 872: April 12, 2017

Pronk Pops Show 871: April 11, 2017

Pronk Pops Show 870: April 10, 2017

Pronk Pops Show 869: April 7, 2017

Pronk Pops Show 868: April 6, 2017

Pronk Pops Show 867: April 5, 2017

Pronk Pops Show 866: April 3, 2017

Pronk Pops Show 865: March 31, 2017

Pronk Pops Show 864: March 30, 2017

Pronk Pops Show 863: March 29, 2017

Pronk Pops Show 862: March 28, 2017

Pronk Pops Show 861: March 27, 2017

Pronk Pops Show 860: March 24, 2017

Pronk Pops Show 859: March 23, 2017

Pronk Pops Show 858: March 22, 2017

Pronk Pops Show 857: March 21, 2017

Pronk Pops Show 856: March 20, 2017

Pronk Pops Show 855: March 10, 2017

Pronk Pops Show 854: March 9, 2017

Pronk Pops Show 853: March 8, 2017

Pronk Pops Show 852: March 6, 2017

Pronk Pops Show 851: March 3, 2017

Pronk Pops Show 850: March 2, 2017

Pronk Pops Show 849: March 1, 2017

Pronk Pops Show 848: February 28, 2017

Pronk Pops Show 847: February 27, 2017

Pronk Pops Show 846: February 24, 2017

Pronk Pops Show 845: February 23, 2017

Pronk Pops Show 844: February 22, 2017

Pronk Pops Show 843: February 21, 2017

Pronk Pops Show 842: February 20, 2017

Pronk Pops Show 841: February 17, 2017

Pronk Pops Show 840: February 16, 2017

Pronk Pops Show 839: February 15, 2017

Pronk Pops Show 838: February 14, 2017

Pronk Pops Show 837: February 13, 2017

Pronk Pops Show 836: February 10, 2017

Pronk Pops Show 835: February 9, 2017

Pronk Pops Show 834: February 8, 2017

Pronk Pops Show 833: February 7, 2017

Pronk Pops Show 832: February 6, 2017

Pronk Pops Show 831: February 3, 2017

Pronk Pops Show 830: February 2, 2017

Pronk Pops Show 829: February 1, 2017

Image result for trump and russian foreign minister and ambassadorImage result for mcmaster statement white house may 16, 2017Image result for May 16, 2016 cartoons trump and washingon post

Story 1: Trump Whipping The Washington Post — More Fake News From Big Lie Media — Israel Was The Primary Original Source — Open Source New al Qaeda and Islamic State Laptop Battery Bombs May Evade Airport Security — Videos — 

Image result for cartoons washingon post fake newsImage result for cartoons washingon post fake news

Image result for cartoons washingon post fake news

Story 1: Trump Whipping The Washington Post — More Fake News From Big Lie Media — It didn’t happen. — Videos — 

UPDATED: Trump revealed highly classified material to Russian officials, Washington Post reports

MCMaster on Trump revealed secret classified information to the russians 5/15/2017

Former US Ambass To Russia On Trump Defends Giving Highly Classified Info To Russians | CNN

Israel was source of leaked terrorism intel Trump told Russians

Trump defends giving Russia highly classified intelligence

Panel on Sources: Trump Shared Classified Information with Russians. @thelauracoates #Breaking

National Security Adviser Denies Trump Gave Russians Secrets

Natl. Security Advisor McMaster PRESS BRIEFING on Trump’s Upcoming Trip, Classified Info to Russians

Published on May 16, 2017

Brought to you by Desert Diamond: http://ddcaz.com
President Donald Trump’s national security adviser plans to brief reporters at the White House. The White House says H.R. McMaster will hold an on-camera briefing before noon. He was originally scheduled to appear with press secretary Sean Spicer, but Spicer plans to hold a separate, off-camera session with reporters later in the day, after McMaster’s appearance. Reporters had been promised a briefing from McMaster about Trump’s first overseas trip, which opens Friday. But McMaster is likely to face questions about reports that Trump shared classified intelligence information with Russian officials when they met in the Oval Office last week. McMaster has denied the reports, telling reporters Monday after the story broke: “I was in the room. It didn’t happen.”

BREAKING: General McMaster Just Dropped BOMBSHELL Proves Trump Never Leaked To Russia

Is the intel community undermining the Trump presidency?

Deep State Leaks Highly Classified Info to Washington Post to Smear President Trump

U.S. bans large electronics on inbound foreign flights from 8 countries

Laptops, tablets banned from some flights to US

New Laptop Bombs May Evade Airport Security

Published on Mar 31, 2017

US intelligence and law enforcement agencies believe that ISIS and other terrorist organizations have developed innovative ways to plant explosives in electronic devices that FBI testing shows can evade some commonly used airport security screening methods, CNN has learned

Intelligence officials received information on ISIS testing laptop bombs

Trump revealed highly classified information to Russian foreign minister and ambassador

May 15 at 7:45 PM

Trump revealed highly classified intel in Oval Office meeting with Russians
President Trump revealed highly classified intel in Oval Office meeting with Russians (Photo: Russian Foreign Ministry/The Washington Post)

President Trump revealed highly classified information to the Russian foreign minister and ambassador in a White House meeting last week, according to current and former U.S. officials, who said Trump’s disclosures jeopardized a critical source of intelligence on the Islamic State.

The information the president relayed had been provided by a U.S. partner through an intelligence-sharing arrangement considered so sensitive that details have been withheld from allies and tightly restricted even within the U.S. government, officials said.

The partner had not given the United States permission to share the material with Russia, and officials said Trump’s decision to do so endangers cooperation from an ally that has access to the inner workings of the Islamic State. After Trump’s meeting, senior White House officials took steps to contain the damage, placing calls to the CIA and the National Security Agency.

“This is code-word information,” said a U.S. official familiar with the matter, using terminology that refers to one of the highest classification levels used by American spy agencies. Trump “revealed more information to the Russian ambassador than we have shared with our own allies.

 
Washington reacts to Trump’s disclosure of classified information
The White House and lawmakers reacted May 15 to Washington Post revelations that President Trump disclosed classified information during a meeting with Russian officials.

The revelation comes as the president faces rising legal and political pressure on multiple Russia-related fronts. Last week, he fired FBI Director James B. Comey in the midst of a bureau investigation into possible links between the Trump campaign and Moscow. Trump’s subsequent admission that his decision was driven by “this Russia thing” was seen by critics as attempted obstruction of justice.

One day after dismissing Comey, Trump welcomed Russian Foreign Minister Sergei Lavrov and Ambassador Sergey Kislyak — a key figure in earlier Russia controversies — into the Oval Office. It was during that meeting, officials said, that Trump went off script and began describing details of an Islamic State terrorist threat related to the use of laptop computers on aircraft.

For almost anyone in government, discussing such matters with an adversary would be illegal. As president, Trump has broad authority to declassify government secrets, making it unlikely that his disclosures broke the law.

White House officials involved in the meeting said Trump discussed only shared concerns about terrorism.

“The president and the foreign minister reviewed common threats from terrorist organizations to include threats to aviation,” said H.R. McMaster, the national security adviser, who participated in the meeting. “At no time were any intelligence sources or methods discussed, and no military operations were disclosed that were not already known publicly.”

McMaster reiterated his statement in a subsequent appearance at the White House on Monday and described the Washington Post story as “false,” but did not take any questions.

McMaster: Trump ‘did not disclose any military operations that were not already publicly known’
National Security Advisor H.R. McMaster denied recent reporting that President Trump revealed classified information in a meeting with Russian officials. (Reuters)

In their statements, White House officials emphasized that Trump had not discussed specific intelligence sources and methods, rather than addressing whether he had disclosed information drawn from sensitive sources.

The CIA declined to comment, and the NSA did not respond to requests for comment.

But officials expressed concern about Trump’s handling of sensitive information as well as his grasp of the potential consequences. Exposure of an intelligence stream that has provided critical insight into the Islamic State, they said, could hinder the United States’ and its allies’ ability to detect future threats.

“It is all kind of shocking,” said a former senior U.S. official who is close to current administration officials. “Trump seems to be very reckless and doesn’t grasp the gravity of the things he’s dealing with, especially when it comes to intelligence and national security. And it’s all clouded because of this problem he has with Russia.”

In his meeting with Lavrov, Trump seemed to be boasting about his inside knowledge of the looming threat. “I get great intel. I have people brief me on great intel every day,” the president said, according to an official with knowledge of the exchange.

Trump went on to discuss aspects of the threat that the United States learned only through the espionage capabilities of a key partner. He did not reveal the specific intelligence-gathering method, but he described how the Islamic State was pursuing elements of a specific plot and how much harm such an attack could cause under varying circumstances. Most alarmingly, officials said, Trump revealed the city in the Islamic State’s territory where the U.S. intelligence partner detected the threat.

What Trump’s classified revelations to Russian officials mean for allies
Washington Post national security reporter Greg Miller explains what President Trump’s potential disclosures to Russian officials means going forward. (The Washington Post)

The Post is withholding most plot details, including the name of the city, at the urging of officials who warned that revealing them would jeopardize important intelligence capabilities.

“Everyone knows this stream is very sensitive, and the idea of sharing it at this level of granularity with the Russians is troubling,” said a former senior U.S. counterterrorism official who also worked closely with members of the Trump national security team. He and others spoke on the condition of anonymity, citing the sensitivity of the subject.

The identification of the location was seen as particularly problematic, officials said, because Russia could use that detail to help identify the U.S. ally or intelligence capability involved. Officials said the capability could be useful for other purposes, possibly providing intelligence on Russia’s presence in Syria. Moscow would be keenly interested in identifying that source and perhaps disrupting it.

“Russia could identify our sources or techniques,” the senior U.S. official said.

A former intelligence official who handled high-level intelligence on Russia said that given the clues Trump provided, “I don’t think that it would be that hard [for Russian spy services] to figure this out.”

At a more fundamental level, the information wasn’t the United States’ to provide to others. Under the rules of espionage, governments — and even individual agencies — are given significant control over whether and how the information they gather is disseminated, even after it has been shared. Violating that practice undercuts trust considered essential to sharing secrets.

The officials declined to identify the ally but said it has previously voiced frustration with Washington’s inability to safeguard sensitive information related to Iraq and Syria.

“If that partner learned we’d given this to Russia without their knowledge or asking first, that is a blow to that relationship,” the U.S. official said.

Trump also described measures the United States has taken or is contemplating to counter the threat, including military operations in Iraq and Syria, as well as other steps to tighten security, officials said.

The officials would not discuss details of those measures, but the Department of Homeland Security recently disclosed that it is considering banning laptops and other large electronic devices from carry-on bags on flights between Europe and the United States. The United States and Britain imposed a similar ban in March affecting travelers passing through airports in 10 Muslim-majority countries.

Trump cast the countermeasures in wistful terms. “Can you believe the world we live in today?” he said, according to one official. “Isn’t it crazy?”

Lavrov and Kislyak were also accompanied by aides.

A Russian photographer took photos of part of the session that were released by the Russian state-owned Tass news agency. No U.S. news organization was allowed to attend any part of the meeting.

Senior White House officials appeared to recognize quickly that Trump had overstepped and moved to contain the potential fallout. Thomas P. Bossert, assistant to the president for homeland security and counterterrorism, placed calls to the directors of the CIA and the NSA, the services most directly involved in the intelligence-sharing arrangement with the partner.

One of Bossert’s subordinates also called for the problematic portion of Trump’s discussion to be stricken from internal memos and for the full transcript to be limited to a small circle of recipients, efforts to prevent sensitive details from being disseminated further or leaked.

White House officials defended Trump. “This story is false,” said Dina Powell, deputy national security adviser for strategy. “The president only discussed the common threats that both countries faced.”

But officials could not explain why staff members nevertheless felt it necessary to alert the CIA and the NSA.

Sen. Bob Corker (R-Tenn.) said he would rather comment on the revelations in the Post story after “I know a little bit more about it,” but added: “Obviously, they are in a downward spiral right now and have got to figure out a way to come to grips with all that’s happening. And the shame of it is, there’s a really good national security team in place.”

Corker also said, “The chaos that is being created by the lack of discipline is creating an environment that I think makes — it creates a worrisome environment.”

Trump has repeatedly gone off-script in his dealings with high-ranking foreign officials, most notably in his contentious introductory conversation with the Australian prime minister earlier this year. He has also faced criticism for seemingly lax attention to security at his Florida retreat, Mar-a-Lago, where he appeared to field preliminary reports of a North Korea missile launch in full view of casual diners.

U.S. officials said that the National Security Council continues to prepare multi-page briefings for Trump to guide him through conversations with foreign leaders, but that he has insisted that the guidance be distilled to a single page of bullet points — and often ignores those.

“He seems to get in the room or on the phone and just goes with it, and that has big downsides,” the second former official said. “Does he understand what’s classified and what’s not? That’s what worries me.”

Lavrov’s reaction to the Trump disclosures was muted, officials said, calling for the United States to work more closely with Moscow on fighting terrorism.

Kislyak has figured prominently in damaging stories about the Trump administration’s ties to Russia. Trump’s first national security adviser, Michael Flynn, was forced to resign just 24 days into the job over his contacts with Kislyak and his misleading statements about them. Attorney General Jeff Sessions was forced to recuse himself from matters related to the FBI’s Russia investigation after it was revealed that he had met and spoke with Kislyak, despite denying any contact with Russian officials during his confirmation hearing.

The White House readout of the meeting with Lavrov and Kislyak made no mention of the discussion of a terrorist threat.

“Trump emphasized the need to work together to end the conflict in Syria,” the summary said. The president also “raised Ukraine” and “emphasized his desire to build a better relationship between the United States and Russia.”

Julie Tate and Ellen Nakashima contributed to this report.

https://www.washingtonpost.com/world/national-security/trump-revealed-highly-classified-information-to-russian-foreign-minister-and-ambassador/2017/05/15/530c172a-3960-11e7-9e48-c4f199710b69_story.html?utm_term=.7825502d7181

To the Washington Post, the New York Times and other left-wing outlets, journalism is blood sport.

It’s not about a mission to deliver facts, but to fulfill an agenda.

That couldn’t be clearer this week when Washington Post “Fact Checker” columnist Glenn Kessler tweeted on Monday that there was “applause in the newsroom as the Russia-leak scoop breaks the Hollywood Access record for most readers per minute.”

Applause in the newsroom as the Russia-leak scoop breaks the Hollywood Access record for most readers per minute

It’s not the first time the mask slipped and reporters applauded in the newsroom.

On Tuesday morning, Matt Drudge tweeted a link to a Politico story from 2009 which contained a pool report about President-Elect Barack Obama’s visit to the newsroom.

After three and a half  hours at his transition office, PEOTUS obama took another 6 minute ride through washington, arriving at 157 pm at the nondescript soviet-style building at 15th and L street that houses the washington post.

Around 100 people–Post reporters perhaps?–awaited PEOTUS’s arrival, cheering and bobbing their coffee cups.

Pool is holding in a van outside, while Mr obama does his washington post interview, and will exercise enormous restraint by ending report before saying what really thinks about this turn of events.

After the Post’s story broke, the president’s National Security Advisor denied the allegations:

“The president and the foreign minister reviewed common threats from terrorist organizations to include threats to aviation,” said H.R. McMaster, the national security adviser, who participated in the meeting. “At no time were any intelligence sources or methods discussed, and no military operations were disclosed that were not already known publicly.”

McMaster reiterated his statement in a subsequent appearance at the White House on Monday and described the Washington Post story as “false,” but did not take any questions.

http://www.theamericanmirror.com/washpost-reporters-cheer-trump-russia-leak-story-just-like-obama-09-visit/

Donald Trump said Amazon and Jeff Bezos have a ‘huge antitrust problem.’ Now they may.

The president-elect is certainly one to hold grudges.

https://www.recode.net/2016/11/9/13573926/donald-trump-amazon-jeff-bezos-antitrust-taxes

Did Washington Post Just Publish Its 4th Major #FakeNews Story in Last Week?

The Washington Post has had a very busy week.

The DC paper has published screaming headline after headline that turn out to be complete trash.
Even the National Enquirer would be red-faced after at this point.

It’s as if the WaPo will print anything for clicks.
They’ve become a click-bait site.

What a disgrace.

Here are the four completely inaccurate reports published by the Trump-bashing Washington Post this past week.

1.) The Washington Post was completely off in their fake news reports last week Comey asking for more funds to investigate Trump before he was fired.

On Wednesday the Washington Post reported that former FBI Director James Comey sought more resources for his Russia probe just days before he was fired by President Trump.

Comey was fired by President Trump on Tuesday.
Too bad the story was complete garbage.

The Department of Justice refuted the report Wednesday saying Comey DID NOT ask Deputy Attorney General Rosenstein for more resourses for the Russian conspiracy probe.

DOJ is pushing back hard- they say any reporting that Comey asked Rosenstein for more resources is “completely false” -now working Sen Intel https://twitter.com/thehill/status/862338205504475136 

2.) The Washington Post was wrong about Deputy Attorney General Rosenstein threatening to resign

The Washington Post reported Wednesday night that “Rosenstein threatened to resign after the narrative emerging from the White House on Tuesday evening cast him as a prime mover of the decision to fire Comey,” citing an unnamed source close to the White House.

This was completely inaccurate.

Deputy Attorney General Rod Rosenstein told WJLA reporter Michelle Macoluso he DID NOT threaten to quit over James Comey firing.

3.) The Washington Post claimed Sean Spicer was “hiding in the bushes.”

Mr. Spicer WAS NOT hiding in the bushes as the Washington Post reported.

Mediaite reported

The Washington Post offered a correction to their readers on Wednesday, in order to clarify a really strange account about how Sean Spicer tried to avoid talking to reporters after President Trump fired FBI Director James Comey.

Shortly after Comey’s firing set of a political firestorm this week, the White House had to scramble in order to control the impact and respond to overwhelming media intrigue. During this time, WaPo released a report stating that Spicer was hiding in the White House’s bushes on Tuesday night, and that he only emerged from the shrubbery once reporters promised not to film him while he took some of their questions…

…WaPo has since amended the original article with an editor’s note saying Spicer was among the bushes instead of inside them:

4.) The Washington Post accuses President Trump of releasing top secret information to the Russians during his meeting in the White House last week.

National Security Advisor, H.R. McMaster refuted the claim tonight with a statement to the press.

Natl Security Adviser McMaster made a statement denying a report that @POTUS revealed classified info to Russia. http://fxn.ws/2rkAYib 

Secretary of State Rex Tillerson, who was also in the room during the meeting between President Trump and Russian officials, also denied the allegations by the Washington Post.

It was complete crap:

WH source with direct knowledge just told me @washingtonpost didn’t talk to ANY U.S. official at mtg w/ Lavrov. “It’s Fake News”

U.S. to Ban Laptops in All Cabins of Flights From Europe, Officials Say

Acting on fears that terrorists can build bombs into laptops, Homeland Security has decided to expand the ban it imposed on Middle Eastern flights. Computers will now be checked as baggage.

The Department of Homeland Security plans to ban laptops in the cabins of all flights from Europe to the United States, European security officials told The Daily Beast. The announcement is expected Thursday.Initially a ban on laptops and tablets was applied only to U.S.-bound flights from 10 airports in North Africa and the Middle East. The ban was based on U.S. fears that terrorists have found a way to convert laptops into bombs capable of bringing down an airplane. It is unclear if the European ban will also apply to tablets.

DHS said in a statement to The Daily Beast: “No final decisions have been made on expanding the restriction on large electronic devices in aircraft cabins; however, it is under consideration. DHS continues to evaluate the threat environment and will make changes when necessary to keep air travelers safe.”

However, this move is increasing fears in the aviation industry that as well as guarding against bombs this ban could actually endanger flights. Laptops and tablets denied access to the cabin and added to checked baggage means that devices with a history of lithium-ion battery fires could set off a deadly conflagration in a cargo hold — where no one can put out the fires.

The FAA recorded 33 incidents in 2016 of personal electronic devices carried into cabins by passengers causing fire emergencies during flights, according to an FAA document reviewed by The Daily Beast. Of these, three were in laptops and two in tablets.

Two of the most serious were on Delta flights and both involved laptops.

On January 15, 2016 on a flight from Minneapolis to Atlanta fire broke out in a bag in an overhead bin shortly before landing. The smoke in the cabin became so overwhelming that when the flight reached the gate, passengers opened emergency exits over the wings and staff on the ramp helped them escape directly from the wings.

Flight attendants used halon fire suppressant extinguishers and water extinguishers to put out the fire, which had originated in two laptops.

On December 3, 2016 fire broke out in an overhead bin on a flight from Honolulu to Atlanta. Cabin crew needed three halon extinguishers and two water extinguishers to put out a fire originating in a laptop. For the rest of the flight the laptop was placed in a cooler with ice and monitored.

The FAA stressed that the 33 incidents are only ones that they are aware of. “This should not be considered as a complete listing of all such incidents…nor do they include all investigative and enforcement actions taken,” the documented stated.

Tests carried in 2015 by the FAA’s Fire Safety Branch have shown that halon gas is ineffective against fires originating in the kind of lithium-ion batteries used in laptops and tablets.

Even more to the point, these tests have revealed that the quantity of halon gas used in the automatic fire suppression systems of airplane cargo holds had no effect on a fire that begins as what is called a thermal runaway in a lithium-ion battery. Panels in the cargo hold designed to contain a fire were actually blown out in the tests, creating an explosion that would destroy an airplane.

By clicking “Subscribe,” you agree to have read the Terms of Use and Privacy Policy

Commenting on these tests, the Federation of Airline Pilots’ Associations, IFALPA, representing airline pilots worldwide, said, “In fact, the fire proceeded is if the halon were not present.”

Some Middle East airlines complained to the International Civil Aviation Organization that they had been unduly penalized by the original 10-country ban. In response, the ICAO said that it accepted that improvised explosive devices in electronic devices have been “the greatest security risk to commercial aircraft for some years.”

At the same time, they said, they have asked experts to examine the safety risk of a sudden influx of electronic devices in cargo holds. And Patrick Ky, a European safety regulator, told Reuters that his agency wants airlines to avoid placing all the electronic devices in checked baggage being in the same container in the cargo hold.

At London’s Heathrow Airport, where 17 percent of all flights to the U.S. originate, is adding an extra layer of security screening for those flights at the gates.

As The Daily Beast reported in March, the original ban placed on the 10 airports in North Africa and the Middle East followed intelligence gathered during a raid on Al Qaeda in Yemen in January. Bomb makers had managed to insert into batteries an explosive device powerful enough to bring down an airplane.

First indications of this came in 2016 when a hole was blown in the fuselage of an Airbus A320 as it was on its ascent from Mogadishu, Somalia. The airplane was able to make an emergency landing. The insurgent group Al-Shababb claimed that it had equipped a passenger with a laptop rigged as a bomb.

http://www.thedailybeast.com/articles/2017/05/10/u-s-to-ban-laptops-in-all-cabins-of-flights-from-europe

U.S. Raid in Yemen Led to Laptop Ban on Flights, Officials Say

Intel sources fear terrorists can make bombs as small as computer batteries, provoking the ban on carry-on electronics at sensitive foreign airports.

Three intelligence sources told The Daily Beast that the ban on carry-on electronics aboard U.S.-bound flights from 10 airports in North Africa and the Middle East was the result of information seized during a U.S. raid on Al Qaeda in Yemen in January. The United Kingdom joined the U.S. ban Tuesday.Information from the raid shows al Qaeda’s successful development of compact, battery bombs that fit inside laptops or other devices believed to be strong enough to bring down an aircraft, the sources said. The battery bombs would need to be manually triggered, a source explained, which is why the electronics ban is only for the aircraft cabin not checked luggage.The U.S. Department of Homeland Security publicly cited two attacks on flights in the last two years, the downing of a Russian jet over the Egyptian Sinai in October 2015 and an attempt that nearly succeeded in bringing down a jet that had taken off from Mogadishu, Somalia last year and made an emergency landing after an explosion ripped open its cabin. The insurgent group Al-Shababb claimed credit for getting a laptop onboard the flight that had been rigged as a bomb.“Since they weren’t high enough, the explosion wasn’t catastrophic to the plane and they were able to land,” one source told The Daily Beast. “The bomber got sucked out of the hole, but it was proof of concept.”DHS declined to comment on the intelligence, saying only “we employ a variety of measures, both seen and unseen, to protect air travelers.”

A former British Army intelligence analyst told The Daily Beast that an investigation into the device suggested that it used a military grade high explosive that generates a supersonic shock wave. It was probably the same explosive used by “shoe bomber” Richard Reid: PETN, or pentaerythritol tritinate, which is hard to detect. It delivers high yield for its weight: just 100 grams can destroy a car. 

Although the ban on laptops is based on the belief that the compact explosive inside a battery would have to be triggered by the bomber in the airplane the British analyst believes that a laptop might actually be equipped with a timer. “The timing mechanism can be quite small. In fact, it is believed that the Somali bomb was pre-timed. Therefore a ban that still allows laptops in the cargo hold does little to negate the threat.”

He also points out such a device could not be triggered remotely: “There is no phone reception at 30,000 feet and installing a link to a satellite connection would be too bulky.”

The chief bomb maker for Al Qaeda in the Arabian Peninsula, Ibrahim al-Asiri, has been working on packing even smaller devices, the source added. CNN first reported the news on Tuesday evening.

The problem with this theory is that it implies that the security screening of electronic devices at the 10 airports is no better than at the airport in a failed state like Somalia. The pilot of the Airbus A320 involved in that incident said of that airport: “the security is zero.” Airport employees had conspired with the bomber to get the laptop through security.

One source said the foreign countries included in the ban were selected because of their exposure to al Qaeda groups and members who might try to bring a battery bomb on a plane heading for the U.S.

Egyptian intelligence officials were briefed over the weekend, according to one source, and have long been concerned about another plane departing from Cairo being brought down like the Metrojet plane in Oct. 2015. And there is another disaster, EgyptAir Flight 804, from Paris Charles De Gaulle airport to Cairo in May that crashed into the eastern Mediterranean and killed 66 people.

The crash has subsequently been shrouded in mystery. In December the Egyptian authorities announced that a criminal investigation had been opened. They had had six months in which to analyze data from the airplane’s two flight recorders recovered from the wreck. But there was a dispute between the Egyptian and French about the cause. The French air crash investigators said that it was not possible at that stage to draw conclusions about the origin of the accident.

It is known from data transmitted from the Airbus A320 as it spiraled down from its cruise height of 37,000 feet that it suffered a rapid cascade of failures, beginning with an electrical problem in the cockpit. This escalated into a fire in the electronics bay below the cockpit that effectively fried the computers controlling the flight.

There were indications that the disastrous sequence started with some kind of explosion in the passenger toilet immediately above the electronics bay and behind the cockpit. Video taken of the wreck showed heat damage beneath the cockpit.

Before leaving Paris the airplane had flown from Asmara in Eritrea, to Cairo and then onward to Tunis and Paris. That means that investigators would be looking at the possibility of an explosive device being placed on the airplane at any of those airports.

In early March, a Russian passenger on a Turkish Airways flight from Alexandria to Istanbul was arrested after an improvised explosive was found in his luggage, according to a DHS alert in early March citing Egyptian media.

The gravity of the move had been underscored by the political response to it. Representative Adam Schiff, Californian Democrat and ranking member of the House Permanent Select Committee on Intelligence, said in a statement:

“Over the weekend I received an additional briefing by the Department of Homeland Security and I fully support the new security precautions. These steps are both necessary and proportional to the threat.”

Several Federal Air Marshals told The Daily Beast they were angry they were blindsided by the ban, only to learn about it from CNN or BBC news reports circulated by management. (President Donald Trump has repeatedly referred to CNN as “fake news.”) But DHS spokesman said they shouldn’t be surprised to not receive notification about something they aren’t involved in.

“FAMS aren’t involved in this particular action so why would they be notified of an action that doesn’t directly affect their duties?” DHS spokesman David Lapan told The Daily Beast.

Federal Air Marshals only fly on U.S. carriers and the electronics ban involves direct flights into the U.S. from countries served by foreign airlines.

The most consequential impact of the new measures will be on the three airlines operating out of the Persian Gulf states: Emirates, Etihad and Qatar Airways. In the last decade there has been a major transformation of the connections between inter-continental airline routes. Led by Emirates from their hub in Dubai this has put the three airlines in a dominant position to connect flights from Asia, Africa, the Middle East and Europe and, significantly, to directly fly passengers from those regions to the United States.

Moreover, these airlines have set new standards of service, particularly for business class passengers. Anyone flying business class with these carriers finds the cabins glowing with the glare from many laptops as workaholic executives and managers use their flight time to catch up on work.

The three major U.S. international carriers, Delta, American and United, have found themselves left with fleets of older airplanes that can’t match the quality of cabin amenities of the Gulf airlines, who use latest generation jets like the Airbus A380 super jumbo and the Airbus A350. Over the last few years those airlines have pushed into major U.S. business centers like New York, Dallas, Houston, Chicago, Los Angeles, Boston and Seattle – scooping up, for example, major players in the energy and tech industries.

Craig Jenks, President of a New York base consultancy, Airline/Aircraft projects, pointed out that the ban’s effects reach far beyond the named airports.

In particular, Emirates, Etihad and Qatar Airways all have a high volume of passengers originating in Indian cities. Among these are many in high tech industries flying on from hubs in the Gulf directly to U.S. tech business centers like San Francisco, Seattle, Boston and New York.

“Now, all of a sudden, you arrive at a Gulf airport headed for San Francisco with your light carry-on and you discover, no laptop on board nor even while in transit at the hub. Intentionally or not, this is a negative for the Gulf carriers,” Jenks said.

Now that the ban has been joined by the UK, which has said that passengers on 14 airlines would not be able to carry laptops into the cabin of direct flights to London from Turkey, Lebanon, Jordan, Egypt, Tunisia and Saudi Arabia, the disruption to business travelers has become even more widespread.

Air travel remains a priority target for terrorists. And, once more, the mere threat of terror attacks has proved itself as costly, at least in economic impact, as the act of terror.

For example, one recent casualty has been Turkish Airlines. In 2015 it was following the Gulf airlines’ model to exploit the strategic location of Istanbul as a hub for the Middle East and Africa. In that year it made a profit of $872 million. Last year that became a loss of $463 million. Two events, a terror attack on Istanbul airport and the failed coup in July, as well as fear of new terror attacks, have put the airline into a financial crisis. Istanbul is on both the U.S. and U.K. list of airports covered by the new ban.

Story 2: The Real Danger To The Our Republic Is Progressive Propaganda About Trump — American People Are Ignoring Them As They Get Trump Media Fatigue — Videos 

Tucker: Hate of Trump has blinded media

‘We are getting Trump fatigue … to his benefit!’ — Lionel

The Pronk Pops Show Podcasts Portfolio

Listen To Pronk Pops Podcast or Download Shows 889-894

Listen To Pronk Pops Podcast or Download Shows 884-888

Listen To Pronk Pops Podcast or Download Shows 878-883

Listen To Pronk Pops Podcast or Download Shows 870-877

Listen To Pronk Pops Podcast or Download Shows 864-869

Listen To Pronk Pops Podcast or Download Shows 857-863

Listen To Pronk Pops Podcast or Download Shows 850-856

Listen To Pronk Pops Podcast or Download Shows 845-849

Listen To Pronk Pops Podcast or Download Shows 840-844

Listen To Pronk Pops Podcast or Download Shows 833-839

Listen To Pronk Pops Podcast or Download Shows 827-832

Listen To Pronk Pops Podcast or Download Shows 821-826

Listen To Pronk Pops Podcast or Download Shows 815-820

Listen To Pronk Pops Podcast or Download Shows 806-814

Listen To Pronk Pops Podcast or Download Shows 800-805

Listen To Pronk Pops Podcast or Download Shows 793-799

Listen To Pronk Pops Podcast or Download Shows 785-792

Listen To Pronk Pops Podcast or Download Shows 777-784

Listen To Pronk Pops Podcast or Download Shows 769-776

Listen To Pronk Pops Podcast or Download Shows 759-768

Listen To Pronk Pops Podcast or Download Shows 751-758

Listen To Pronk Pops Podcast or Download Shows 745-750

Listen To Pronk Pops Podcast or Download Shows 738-744

Listen To Pronk Pops Podcast or Download Shows 732-737

Listen To Pronk Pops Podcast or Download Shows 727-731

Listen To Pronk Pops Podcast or Download Shows 720-726

Listen To Pronk Pops Podcast or DownloadShows 713-719

Listen To Pronk Pops Podcast or DownloadShows 705-712

Listen To Pronk Pops Podcast or Download Shows 695-704

Listen To Pronk Pops Podcast or Download Shows 685-694

Listen To Pronk Pops Podcast or Download Shows 675-684

Listen To Pronk Pops Podcast or Download Shows 668-674

Listen To Pronk Pops Podcast or Download Shows 660-667

Listen To Pronk Pops Podcast or Download Shows 651-659

Listen To Pronk Pops Podcast or Download Shows 644-650

Listen To Pronk Pops Podcast or Download Shows 637-643

Listen To Pronk Pops Podcast or Download Shows 629-636

Listen To Pronk Pops Podcast or Download Shows 617-628

Listen To Pronk Pops Podcast or Download Shows 608-616

Listen To Pronk Pops Podcast or Download Shows 599-607

Listen To Pronk Pops Podcast or Download Shows 590-598

Listen To Pronk Pops Podcast or Download Shows 585- 589

Listen To Pronk Pops Podcast or Download Shows 575-584

Listen To Pronk Pops Podcast or Download Shows 565-574

Listen To Pronk Pops Podcast or Download Shows 556-564

Listen To Pronk Pops Podcast or Download Shows 546-555

Listen To Pronk Pops Podcast or Download Shows 538-545

Listen To Pronk Pops Podcast or Download Shows 532-537

Listen To Pronk Pops Podcast or Download Shows 526-531

Listen To Pronk Pops Podcast or Download Shows 519-525

Listen To Pronk Pops Podcast or Download Shows 510-518

Listen To Pronk Pops Podcast or Download Shows 500-509

Listen To Pronk Pops Podcast or Download Shows 490-499

Listen To Pronk Pops Podcast or Download Shows 480-489

Listen To Pronk Pops Podcast or Download Shows 473-479

Listen To Pronk Pops Podcast or Download Shows 464-472

Listen To Pronk Pops Podcast or Download Shows 455-463

Listen To Pronk Pops Podcast or Download Shows 447-454

Listen To Pronk Pops Podcast or Download Shows 439-446

Listen To Pronk Pops Podcast or Download Shows 431-438

Listen To Pronk Pops Podcast or Download Shows 422-430

Listen To Pronk Pops Podcast or Download Shows 414-421

Listen To Pronk Pops Podcast or Download Shows 408-413

Listen To Pronk Pops Podcast or Download Shows 400-407

Listen To Pronk Pops Podcast or Download Shows 391-399

Listen To Pronk Pops Podcast or Download Shows 383-390

Listen To Pronk Pops Podcast or Download Shows 376-382

Listen To Pronk Pops Podcast or Download Shows 369-375

Listen To Pronk Pops Podcast or Download Shows 360-368

Listen To Pronk Pops Podcast or Download Shows 354-359

Listen To Pronk Pops Podcast or Download Shows 346-353

Listen To Pronk Pops Podcast or Download Shows 338-345

Listen To Pronk Pops Podcast or Download Shows 328-337

Listen To Pronk Pops Podcast or Download Shows 319-327

Listen To Pronk Pops Podcast or Download Shows 307-318

Listen To Pronk Pops Podcast or Download Shows 296-306

Listen To Pronk Pops Podcast or Download Shows 287-295

Listen To Pronk Pops Podcast or Download Shows 277-286

Listen To Pronk Pops Podcast or Download Shows 264-276

Listen To Pronk Pops Podcast or Download Shows 250-263

Listen To Pronk Pops Podcast or Download Shows 236-249

Listen To Pronk Pops Podcast or Download Shows 222-235

Listen To Pronk Pops Podcast or Download Shows 211-221

Listen To Pronk Pops Podcast or Download Shows 202-210

Listen To Pronk Pops Podcast or Download Shows 194-201

Listen To Pronk Pops Podcast or Download Shows 184-193

Listen To Pronk Pops Podcast or Download Shows 174-183

Listen To Pronk Pops Podcast or Download Shows 165-173

Listen To Pronk Pops Podcast or Download Shows 158-164

Listen To Pronk Pops Podcast or Download Shows151-157

Listen To Pronk Pops Podcast or Download Shows 143-150

Listen To Pronk Pops Podcast or Download Shows 135-142

Listen To Pronk Pops Podcast or Download Shows 131-134

Listen To Pronk Pops Podcast or Download Shows 124-130

Listen To Pronk Pops Podcast or Download Shows 121-123

Listen To Pronk Pops Podcast or Download Shows 118-120

Listen To Pronk Pops Podcast or Download Shows 113 -117

Listen To Pronk Pops Podcast or Download Show 112

Listen To Pronk Pops Podcast or Download Shows 108-111

Listen To Pronk Pops Podcast or Download Shows 106-108

Listen To Pronk Pops Podcast or Download Shows 104-105

Listen To Pronk Pops Podcast or Download Shows 101-103

Listen To Pronk Pops Podcast or Download Shows 98-100

Listen To Pronk Pops Podcast or Download Shows 94-97

Listen To Pronk Pops Podcast or Download Show 93

Listen To Pronk Pops Podcast or Download Show 92

Listen To Pronk Pops Podcast or Download Show 91

Listen To Pronk Pops Podcast or Download Shows 88-90

Listen To Pronk Pops Podcast or Download Shows 84-87

Listen To Pronk Pops Podcast or Download Shows 79-83

Listen To Pronk Pops Podcast or Download Shows 74-78

Listen To Pronk Pops Podcast or Download Shows 71-73

Listen To Pronk Pops Podcast or Download Shows 68-70

Listen To Pronk Pops Podcast or Download Shows 65-67

Listen To Pronk Pops Podcast or Download Shows 62-64

Listen To Pronk Pops Podcast or Download Shows 58-61

Listen To Pronk Pops Podcast or Download Shows 55-57

Listen To Pronk Pops Podcast or Download Shows 52-54

Listen To Pronk Pops Podcast or Download Shows 49-51

Listen To Pronk Pops Podcast or Download Shows 45-48

Listen To Pronk Pops Podcast or Download Shows 41-44

Listen To Pronk Pops Podcast or Download Shows 38-40

Listen To Pronk Pops Podcast or Download Shows 34-37

Listen To Pronk Pops Podcast or Download Shows 30-33

Listen To Pronk Pops Podcast or Download Shows 27-29

Listen To Pronk Pops Podcast or Download Shows 17-26

Listen To Pronk Pops Podcast or Download Shows 16-22

Listen To Pronk Pops Podcast or Download Shows 10-15

Listen To Pronk Pops Podcast or Download Shows 1-9

Read Full Post | Make a Comment ( None so far )

The Pronk Pops Show 892, May 12, 2017, Story 1: Lester _______ (Bolt, Colt, Dolt, Holt, Jolt, Volt) Interviews President Donald J. Trump — The Real Scandal Is Obama Surveillance and Spying On Republican Party Presidential Candidates Using The Intelligent Community (CIA, NSA, FBI, …) Product–Unmasked and Leaked! — Videos– Story 2: Big Lie Media Crazy Credibility Crisis — Fake News is Media McCarthyism — Videos — Story 3: President Trump Voter Fraud Commission — Videos

Posted on May 12, 2017. Filed under: Addiction, American History, Benghazi, Blogroll, Breaking News, Cartoons, Communications, Computers, Congress, Corruption, Countries, Crime, Culture, Donald J. Trump, Donald J. Trump, Donald Trump, Donald Trump, Economics, Education, Elections, Empires, Employment, Fast and Furious, Federal Bureau of Investigation (FBI), Federal Government, Foreign Policy, Freedom of Speech, Government, Government Dependency, Government Spending, Hate Speech, High Crimes, History, House of Representatives, Human, Human Behavior, Illegal Immigration, Iran Nuclear Weapons Deal, IRS, Language, Law, Life, Lying, Marco Rubio, Media, National Interest, National Security Agency, News, Obama, Philosophy, Photos, Politics, Polls, President Barack Obama, President Trump, Progressives, Radio, Rand Paul, Raymond Thomas Pronk, Regulation, Scandals, Security, Senate, Servers, Software, Spying, Surveillance and Spying On American People, Surveillance/Spying, Taxation, Terror, Terrorism, Trump Surveillance/Spying, United States of America, Videos, Violence, War, Wealth, Wisdom | Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , |

Project_1

The Pronk Pops Show Podcasts

Pronk Pops Show 892,  May 12, 2017

Pronk Pops Show 891,  May 11, 2017

Pronk Pops Show 891,  May 11, 2017

Pronk Pops Show 890,  May 10, 2017

Pronk Pops Show 889,  May 9, 2017

Pronk Pops Show 888,  May 8, 2017

Pronk Pops Show 887,  May 5, 2017

Pronk Pops Show 886,  May 4, 2017

Pronk Pops Show 885,  May 3, 2017

Pronk Pops Show 884,  May 1, 2017

Pronk Pops Show 883 April 28, 2017

Pronk Pops Show 882: April 27, 2017

Pronk Pops Show 881: April 26, 2017

Pronk Pops Show 880: April 25, 2017

Pronk Pops Show 879: April 24, 2017

Pronk Pops Show 878: April 21, 2017

Pronk Pops Show 877: April 20, 2017

Pronk Pops Show 876: April 19, 2017

Pronk Pops Show 875: April 18, 2017

Pronk Pops Show 874: April 17, 2017

Pronk Pops Show 873: April 13, 2017

Pronk Pops Show 872: April 12, 2017

Pronk Pops Show 871: April 11, 2017

Pronk Pops Show 870: April 10, 2017

Pronk Pops Show 869: April 7, 2017

Pronk Pops Show 868: April 6, 2017

Pronk Pops Show 867: April 5, 2017

Pronk Pops Show 866: April 3, 2017

Pronk Pops Show 865: March 31, 2017

Pronk Pops Show 864: March 30, 2017

Pronk Pops Show 863: March 29, 2017

Pronk Pops Show 862: March 28, 2017

Pronk Pops Show 861: March 27, 2017

Pronk Pops Show 860: March 24, 2017

Pronk Pops Show 859: March 23, 2017

Pronk Pops Show 858: March 22, 2017

Pronk Pops Show 857: March 21, 2017

Pronk Pops Show 856: March 20, 2017

Pronk Pops Show 855: March 10, 2017

Pronk Pops Show 854: March 9, 2017

Pronk Pops Show 853: March 8, 2017

Pronk Pops Show 852: March 6, 2017

Pronk Pops Show 851: March 3, 2017

Pronk Pops Show 850: March 2, 2017

Pronk Pops Show 849: March 1, 2017

Pronk Pops Show 848: February 28, 2017

Pronk Pops Show 847: February 27, 2017

Pronk Pops Show 846: February 24, 2017

Pronk Pops Show 845: February 23, 2017

Pronk Pops Show 844: February 22, 2017

Pronk Pops Show 843: February 21, 2017

Pronk Pops Show 842: February 20, 2017

Pronk Pops Show 841: February 17, 2017

Pronk Pops Show 840: February 16, 2017

Pronk Pops Show 839: February 15, 2017

Pronk Pops Show 838: February 14, 2017

Pronk Pops Show 837: February 13, 2017

Pronk Pops Show 836: February 10, 2017

Pronk Pops Show 835: February 9, 2017

Pronk Pops Show 834: February 8, 2017

Pronk Pops Show 833: February 7, 2017

Pronk Pops Show 832: February 6, 2017

Pronk Pops Show 831: February 3, 2017

Pronk Pops Show 830: February 2, 2017

Pronk Pops Show 829: February 1, 2017

 

Story 1: Lester _______ (Bolt, Colt, Dolt, Holt, Jolt, Volt) Interviews President Donald J. Trump — The Real Scandal Is Obama Surveillance and Spying On Trump and Associates Using The Intelligent Community (CIA, NSA, FBI, …) Product!  —  Videos — 

 

Image result for obama surveillance of trumpImage result for cartoons obama surveillance of trumpImage result for trump crisisImage result for cartoons obama surveillance of trumpImage result for cartoons obama surveillance of trumpImage result for cartoons obama surveillance of trumpImage result for cartoons obama surveillance of trumpImage result for cartoons obama surveillance of trump

Image result for intelligence community

Image result for intelligence community

President Trump Full Interview with Lester Holt NBC 5/11/17

“This Is TOTALLY FAKE!” Tucker Loses His Temper on Russia Conspiracy

Obama Might have Spied on Rand Paul and Other Republicans

Obama Administration Spying on Rand Paul | Michael Savage (Audio)

Did President Obama Spy On Donald Trump? | True News

The Truth About FBI Director James Comey: You’re Fired!

Hannity: James Comey is a national embarrassment

Full || FBI Director James Comey Press Conference On Hillary Clinton Email Investigation (7-5-16)

United States Intelligence Community

From Wikipedia, the free encyclopedia
United States Intelligence Community
United States Intelligence Community Seal.svg

Seal of the United States Intelligence Community
Agency overview
Formed December 4, 1981
Agency executive

The United States Intelligence Community (IC)[1] is a federation of 16 separate United States government agencies that work separately and together to conduct intelligence activities considered necessary for the conduct of foreign relations and national security of the United States. Member organizations of the IC include intelligence agencies, military intelligence, and civilian intelligence and analysis offices within federal executive departments. The IC is headed by the Director of National Intelligence (DNI), who reports to the President of the United States.

Among their varied responsibilities, the members of the Community collect and produce foreign and domestic intelligence, contribute to military planning, and perform espionage. The IC was established by Executive Order 12333, signed on December 4, 1981, by U.S. PresidentRonald Reagan.[2]

The Washington Post reported in 2010 that there were 1,271 government organizations and 1,931 private companies in 10,000 locations in the United States that are working on counterterrorism, homeland security, and intelligence, and that the intelligence community as a whole includes 854,000 people holding top-secret clearances.[3] According to a 2008 study by the Office of the Director of National Intelligence, private contractors make up 29% of the workforce in the U.S. intelligence community and account for 49% of their personnel budgets.[4]

Etymology

The term “Intelligence Community” was first used during Lt. Gen. Walter Bedell Smith‘s tenure as Director of Central Intelligence (1950–1953).[5]

History

Intelligence is information that agencies collect, analyze, and distribute in response to government leaders’ questions and requirements. Intelligence is a broad term that entails:

Collection, analysis, and production of sensitive information to support national security leaders, including policymakers, military commanders, and Members of Congress. Safeguarding these processes and this information through counterintelligence activities. Execution of covert operations approved by the President. The IC strives to provide valuable insight on important issues by gathering raw intelligence, analyzing that data in context, and producing timely and relevant products for customers at all levels of national security—from the war-fighter on the ground to the President in Washington.[6]

Executive Order 12333 charged the IC with six primary objectives:[7]

  • Collection of information needed by the President, the National Security Council, the Secretary of State, the Secretary of Defense, and other executive branch officials for the performance of their duties and responsibilities;
  • Production and dissemination of intelligence;
  • Collection of information concerning, and the conduct of activities to protect against, intelligence activities directed against the U.S., international terrorist and/or narcotics activities, and other hostile activities directed against the U.S. by foreign powers, organizations, persons and their agents;
  • Special activities (defined as activities conducted in support of U.S. foreign policy objectives abroad which are planned and executed so that the “role of the United States Government is not apparent or acknowledged publicly”, and functions in support of such activities, but which are not intended to influence United States political processes, public opinion, policies, or media and do not include diplomatic activities or the collection and production of intelligence or related support functions);
  • Administrative and support activities within the United States and abroad necessary for the performance of authorized activities and
  • Such other intelligence activities as the President may direct from time to time.

Organization

Members

The IC is headed by the Director of National Intelligence (DNI), whose statutory leadership is exercised through the Office of the Director of National Intelligence (ODNI). The 16 members of the IC are:[8]

The official seals of U.S. Intelligence Community members.

Agency/Office Parent Agency Federal Department Date est.
Defense Intelligence Agency none Defense 1961
National Geospatial-Intelligence Agency none Defense 1996
National Reconnaissance Office none Defense 1961
National Security Agency none Defense 1952
Military Intelligence Corps United States Army Defense 1863
Office of Naval Intelligence United States Navy Defense 1882
Twenty-Fifth Air Force United States Air Force Defense 1948
Marine Corps Intelligence United States Marine Corps Defense 1939
Coast Guard Intelligence United States Coast Guard Homeland Security 1915
Office of Intelligence and Analysis none Homeland Security 2007
Central Intelligence Agency none Independent agency 1947
Bureau of Intelligence and Research none State 1945
Office of Terrorism and Financial Intelligence none Treasury 2004
Office of National Security Intelligence Drug Enforcement Administration Justice 2006
Intelligence Branch Federal Bureau of Investigation Justice 2005
Office of Intelligence and Counterintelligence none Energy 1977

Programs

The IC performs under two separate programs:

  • The National Intelligence Program (NIP), formerly known as the National Foreign Intelligence Program as defined by the National Security Act of 1947 (as amended), “refers to all programs, projects, and activities of the intelligence community, as well as any other programs of the intelligence community designated jointly by the Director of National Intelligence (DNI) and the head of a United States department or agency or by the President. Such term does not include programs, projects, or activities of the military departments to acquire intelligence solely for the planning and conduct of tactical military operations by United States Armed Forces”. Under the law, the DNI is responsible for directing and overseeing the NIP, though the ability to do so is limited (see the Organization structure and leadership section).
  • The Military Intelligence Program (MIP) refers to the programs, projects, or activities of the military departments to acquire intelligence solely for the planning and conduct of tactical military operations by United States Armed Forces. The MIP is directed and controlled by the Under Secretary of Defense for Intelligence. In 2005 the Department of Defense combined the Joint Military Intelligence Program and the Tactical Intelligence and Related Activities program to form the MIP.

Since the definitions of the NIP and MIP overlap when they address military intelligence, assignment of intelligence activities to the NIP and MIP sometimes proves problematic.

Organizational structure and leadership

IC Circle.jpg

The overall organization of the IC is primarily governed by the National Security Act of 1947 (as amended) and Executive Order12333. The statutory organizational relationships were substantially revised with the 2004 Intelligence Reform and Terrorism Prevention Act (IRTPA) amendments to the 1947 National Security Act.

Though the IC characterizes itself as a federation of its member elements, its overall structure is better characterized as a confederation due to its lack of a well-defined, unified leadership and governance structure. Prior to 2004, the Director of Central Intelligence (DCI) was the head of the IC, in addition to being the director of the CIA. A major criticism of this arrangement was that the DCI had little or no actual authority over the budgetary authorities of the other IC agencies and therefore had limited influence over their operations.

Following the passage of IRTPA in 2004, the head of the IC is the Director of National Intelligence (DNI). The DNI exerts leadership of the IC primarily through statutory authorities under which he or she:

  • controls the “National Intelligence Program” budget;
  • establishes objectives, priorities, and guidance for the IC; and
  • manages and directs the tasking of, collection, analysis, production, and dissemination of national intelligence by elements of the IC.

However, the DNI has no authority to direct and control any element of the IC except his own staff—the Office of the DNI—neither does the DNI have the authority to hire or fire personnel in the IC except those on his own staff. The member elements in the executive branch are directed and controlled by their respective department heads, all cabinet-level officials reporting to the President. By law, only the Director of the Central Intelligence Agency reports to the DNI.

In light of major intelligence failures in recent years that called into question how well Intelligence Community ensures U.S. national security, particularly those identified by the 9/11 Commission (National Commission on Terrorist Attacks Upon the United States), and the “WMD Commission” (Commission on the Intelligence Capabilities of the United States Regarding Weapons of Mass Destruction), the authorities and powers of the DNI and the overall organizational structure of the IC have become subject of intense debate in the United States.

Interagency cooperation

Previously, interagency cooperation and the flow of information among the member agencies was hindered by policies that sought to limit the pooling of information out of privacy and security concerns. Attempts to modernize and facilitate interagency cooperation within the IC include technological, structural, procedural, and cultural dimensions. Examples include the Intellipediawiki of encyclopedic security-related information; the creation of the Office of the Director of National Intelligence, National Intelligence Centers, Program Manager Information Sharing Environment, and Information Sharing Council; legal and policy frameworks set by the Intelligence Reform and Terrorism Prevention Act of 2004, information sharing Executive Orders 13354 and Executive Order 13388, and the 2005 National Intelligence Strategy.

Budget

Data visualization of U.S. intelligence black budget (2013)

The U.S. intelligence budget (excluding the Military Intelligence Program) in fiscal year 2013 was appropriated as $52.7 billion, and reduced by the amount sequestered to $49.0 billion.[9] In fiscal year2012 it peaked at $53.9 billion, according to a disclosure required under a recent law implementing recommendations of the 9/11 Commission.[10]The 2012 figure was up from $53.1 billion in 2010,[11] $49.8 billion in 2009,[12] $47.5 billion in 2008,[13] $43.5 billion in 2007,[14] and $40.9 billion in 2006.[15]

About 70 percent of the intelligence budget went to contractors for the procurement of technology and services (including analysis), according to the May 2007 chart from the ODNI. Intelligence spending has increased by a third over ten years ago, in inflation-adjusted dollars, according to the Center for Strategic and Budgetary Assessments.[citation needed]

In a statement on the release of newdeclassified figures, DNI Mike McConnell said[when?] there would be no additional disclosures of classified budget information beyond the overall spending figure because “such disclosures could harm national security”. How the money is divided among the 16 intelligence agencies and what it is spent on is classified. It includes salaries for about 100,000 people, multibillion-dollar satellite programs, aircraft, weapons, electronic sensors, intelligence analysis, spies, computers, and software.

On August 29, 2013 the Washington Post published the summary of the Office of the Director of National Intelligence’s multivolume FY 2013 Congressional Budget Justification, the U.S. intelligence community’s top-secret “black budget.”[16][17][18] The IC’s FY 2013 budget details, how the 16 spy agencies use the money and how it performs against the goals set by the president and Congress. Experts said that access to such details about U.S. spy programs is without precedent. Steven Aftergood, Federation of American Scientists, which provides analyses of national security issues stated that “It was a titanic struggle just to get the top-line budget number disclosed, and that has only been done consistently since 2007 … but a real grasp of the structure and operations of the intelligence bureaucracy has been totally beyond public reach. This kind of material, even on a historical basis, has simply not been available.”[19] Access to budget details will enable an informed public debate on intelligence spending for the first time said the co-chair of the 9/11 Commission Lee H. Hamilton. He added that Americans should not be excluded from the budget process because the intelligence community has a profound impact on the life of ordinary Americans.[19]

Oversight

Intelligence Community Oversight duties are distributed to both the Executive and Legislative branches. Primary Executive oversight is performed by the President’s Foreign Intelligence Advisory Board, the Joint Intelligence Community Council, the Office of the Inspector General, and the Office of Management and Budget. Primary congressional oversight jurisdiction over the IC is assigned to two committees: the United States House Permanent Select Committee on Intelligence and the United States Senate Select Committee on Intelligence. The House Armed Services Committee and Senate Armed Services Committee draft bills to annually authorize the budgets of DoD intelligence activities, and both the House and Senate appropriations committees annually draft bills to appropriate the budgets of the IC. The Senate Committee on Homeland Security and Governmental Affairs took a leading role in formulating the intelligence reform legislation in the 108th Congress.

See also

References

  1. Jump up^ Agrawal, Nina. “There’s more than the CIA and FBI: The 17 agencies that make up the U.S. intelligence community”. latimes.com. Retrieved 2017-01-30.
  2. Jump up^ “Executive Order 12333”. Cia.gov. Retrieved 2013-01-23.
  3. Jump up^ Dana Priest & William M Arkin (19 July 2010). “A hidden world, growing beyond control”. The Washington Post.
  4. Jump up^ Priest, Dana (2011). Top Secret America: The Rise of the New American Security State. Little, Brown and Company. p. 320. ISBN 0-316-18221-4.
  5. Jump up^ Michael Warner; Kenneth McDonald. “US Intelligence Community Reform Studies Since 1947” (PDF). CIA. p. 4. Retrieved 28 June 2013.
  6. Jump up^ Rosenbach, Eric & Aki J. Peritz (12 June 2009). “Confrontation or Collaboration? Congress and the Intelligence Community” (PDF). Belfer Center for Science and International Affairs, Harvard Kennedy School. Retrieved 21 July 2009.
  7. Jump up^ Executive Order 12333 text
  8. Jump up^ User, Super. “Members of the IC”.
  9. Jump up^ “DNI Releases Budget Figure for 2013 National Intelligence Program”. Office of the Director of National Intelligence. 30 October 2013. Retrieved 2 August 2014.
  10. Jump up^ DNI Releases FY 2012 Appropriated Budget Figure. Dni.gov (2012-10-30). Retrieved on 2013-08-16.
  11. Jump up^ “DNI Releases Budget Figure for 2010 National Intelligence Program”(PDF). Office of the Director of National Intelligence. 2010-10-28. Retrieved 15 June 2013.
  12. Jump up^ “DNI Releases Budget Figure for 2009 National Intelligence Program”(PDF). Retrieved 15 June 2013.
  13. Jump up^ “DNI Releases Budget Figure for 2008 National Intelligence Program”(PDF). Retrieved 15 June 2013.
  14. Jump up^ “DNI Releases Budget Figure for 2007 National Intelligence Program”(PDF). Retrieved 15 June 2013.
  15. Jump up^ Hacket, John F. (2010-10-28). “FY2006 National Intelligence Program Budget, 10-28-10” (PDF). Office of the Director of National Intelligence. Retrieved 15 June 2013.
  16. Jump up^ Matt DeLong (29 August 2013). “Inside the 2013 U.S. intelligence ‘black budget'”. The Washington Post. Retrieved 31 August 2013.
  17. Jump up^ Matthews, Dylan (29 August 2013). “America’s secret intelligence budget, in 11 (nay, 13) charts”. The Washington Post. Retrieved 31 August 2013.
  18. Jump up^ DeLong, Matt (29 August 2013). “2013 U.S. intelligence budget: Additional resources”. The Washington Post. Retrieved 31 August 2013.
  19. ^ Jump up to:a b Barton Gellman & Greg Miller (29 August 2013). “U.S. spy network’s successes, failures and objectives detailed in ‘black budget’ summary”. The Washington Post. Retrieved 31 August 2013.

Further reading

External links

https://en.wikipedia.org/wiki/United_States_Intelligence_Community

National Security Agency

From Wikipedia, the free encyclopedia
National Security Agency
Seal of the U.S. National Security Agency.svg

Seal of the National Security Agency
Flag of the U.S. National Security Agency.svg

Flag of the National Security Agency
National Security Agency headquarters, Fort Meade, Maryland.jpg
NSA Headquarters, Fort Meade, Maryland
Agency overview
Formed November 4, 1952; 64 years ago[1]
Preceding agency
  • Armed Forces Security Agency
Headquarters Fort Meade, Maryland, U.S.
39°6′32″N 76°46′17″WCoordinates: 39°6′32″N 76°46′17″W
Motto “Defending Our Nation. Securing The Future.”
Employees Classified (30,000–40,000 estimate)[2][3][4][5]
Annual budget Classified (estimated $10.8 billion, 2013)[6][7]
Agency executives
Parent agency United States Department of Defense
Website www.nsa.gov

The National Security Agency (NSA) is a military intelligence organization and a constituent of the United States Department of Defense (DOD). The NSA is responsible for global monitoring, collection, and processing of information and data for foreign intelligence and counterintelligence purposes, a discipline known as signals intelligence (SIGINT). NSA is concurrently charged with protection of U.S. government communications and information systems against penetration and network warfare.[8][9] Although many of NSA’s programs rely on “passive” electronic collection, the agency is authorized to accomplish its mission through active clandestine means,[10] among which are physically bugging electronic systems[11] and allegedly engaging in sabotage through subversive software.[12][13] Moreover, NSA maintains physical presence in a large number of countries across the globe, where its Special Collection Service (SCS) inserts eavesdropping devices in difficult-to-reach places. SCS collection tactics allegedly encompass “close surveillance, burglary, wiretapping, breaking and entering.”[14][15]

Unlike the Defense Intelligence Agency (DIA) and the Central Intelligence Agency (CIA), both of which specialize primarily in foreign human espionage, NSA does not unilaterally conduct human-source intelligence gathering, despite often being portrayed so in popular culture. Instead, NSA is entrusted with assistance to and coordination of SIGINT elements at other government organizations, which are prevented by law from engaging in such activities without the approval of the NSA via the Defense Secretary.[16] As part of these streamlining responsibilities, the agency has a co-located organization called the Central Security Service (CSS), which was created to facilitate cooperation between NSA and other U.S. military cryptanalysis components. Additionally, the NSA Director simultaneously serves as the Commander of the United States Cyber Command and as Chief of the Central Security Service.

Originating as a unit to decipher coded communications in World War II, it was officially formed as the NSA by President Harry S. Truman in 1952. Since then, it has become one of the largest U.S. intelligence organizations in terms of personnel and budget,[6][17] operating as part of the Department of Defense and simultaneously reporting to the Director of National Intelligence.

NSA surveillance has been a matter of political controversy on several occasions, such as its spying on anti-Vietnam-war leaders or economic espionage. In 2013, the extent of some of the NSA’s secret surveillance programs was revealed to the public by Edward Snowden. According to the leaked documents, the NSA intercepts the communications of over a billion people worldwide, many of whom are United States citizens, and tracks the movement of hundreds of millions of people using cellphones. Internationally, research has pointed to the NSA’s ability to surveil the domestic Internet traffic of foreign countries through “boomerang routing”.[18]

Contents

 [show

History

Army predecessor

The origins of the National Security Agency can be traced back to April 28, 1917, three weeks after the U.S. Congress declared war on Germany in World War I. A code and cipher decryption unit was established as the Cable and Telegraph Section which was also known as the Cipher Bureau. It was headquartered in Washington, D.C. and was part of the war effort under the executive branch without direct Congressional authorization. During the course of the war it was relocated in the army’s organizational chart several times. On July 5, 1917, Herbert O. Yardley was assigned to head the unit. At that point, the unit consisted of Yardley and two civilian clerks. It absorbed the navy’s cryptoanalysis functions in July 1918. World War I ended on November 11, 1918, and MI-8 moved to New York City on May 20, 1919, where it continued intelligence activities as the Code Compilation Company under the direction of Yardley.[19][20]

Black Chamber

Western Union allowed MI-8 to monitor telegraphic communications passing through the company’s wires until 1929.[21]

MI-8 also operated the so-called “Black Chamber“.[22] The Black Chamber was located on East 37th Street in Manhattan. Its purpose was to crack the communications codes of foreign governments. Jointly supported by the State Department and the War Department, the chamber persuaded Western Union, the largest U.S. telegram company, to allow government officials to monitor private communications passing through the company’s wires.[23]

Other “Black Chambers” were also found in Europe. They were established by the French and British governments to read the letters of targeted individuals, employing a variety of techniques to surreptitiously open, copy, and reseal correspondence before forwarding it to unsuspecting recipients.[24]

Despite the American Black Chamber’s initial successes, it was shut down in 1929 by U.S. Secretary of State Henry L. Stimson, who defended his decision by stating: “Gentlemen do not read each other’s mail”.[21]

World War II and its aftermath

During World War II, the Signal Security Agency (SSA) was created to intercept and decipher the communications of the Axis powers.[25] When the war ended, the SSA was reorganized as the Army Security Agency (ASA), and it was placed under the leadership of the Director of Military Intelligence.[25]

On May 20, 1949, all cryptologic activities were centralized under a national organization called the Armed Forces Security Agency (AFSA).[25] This organization was originally established within the U.S. Department of Defense under the command of the Joint Chiefs of Staff.[26] The AFSA was tasked to direct Department of Defense communications and electronic intelligence activities, except those of U.S. military intelligence units.[26] However, the AFSA was unable to centralize communications intelligence and failed to coordinate with civilian agencies that shared its interests such as the Department of State, Central Intelligence Agency (CIA) and the Federal Bureau of Investigation (FBI).[26] In December 1951, President Harry S. Truman ordered a panel to investigate how AFSA had failed to achieve its goals. The results of the investigation led to improvements and its redesignation as the National Security Agency.[27]

The agency was formally established by Truman in a memorandum of October 24, 1952, that revised National Security Council Intelligence Directive (NSCID) 9.[28] Since President Truman’s memo was a classified document,[28] the existence of the NSA was not known to the public at that time. Due to its ultra-secrecy the U.S. intelligence community referred to the NSA as “No Such Agency”.[29]

Vietnam War

In the 1960s, the NSA played a key role in expanding America’s commitment to the Vietnam War by providing evidence of a North Vietnamese attack on the American destroyer USS Maddox during the Gulf of Tonkin incident.[30]

A secret operation, code-named “MINARET“, was set up by the NSA to monitor the phone communications of Senators Frank Church and Howard Baker, as well as major civil rights leaders, including Martin Luther King, Jr., and prominent U.S. journalists and athletes who criticized the Vietnam War.[31] However, the project turned out to be controversial, and an internal review by the NSA concluded that its Minaret program was “disreputable if not outright illegal”.[31]

The NSA mounted a major effort to secure tactical communications among U.S. forces during the war with mixed success. The NESTOR family of compatible secure voice systems it developed was widely deployed during the Vietnam War, with about 30,000 NESTOR sets produced. However a variety of technical and operational problems limited their use, allowing the North Vietnamese to exploit intercepted U.S. communications.[32] :Vol I, p.79

Church Committee hearings

In the aftermath of the Watergate scandal, a congressional hearing in 1975 led by Sen. Frank Church[33] revealed that the NSA, in collaboration with Britain’s SIGINT intelligence agency Government Communications Headquarters (GCHQ), had routinely intercepted the international communications of prominent anti-Vietnam war leaders such as Jane Fonda and Dr. Benjamin Spock.[34] Following the resignation of President Richard Nixon, there were several investigations of suspected misuse of FBI, CIA and NSA facilities.[35] Senator Frank Church uncovered previously unknown activity,[35] such as a CIA plot (ordered by the administration of President John F. Kennedy) to assassinate Fidel Castro.[36] The investigation also uncovered NSA’s wiretaps on targeted American citizens.[37]

After the Church Committee hearings, the Foreign Intelligence Surveillance Act of 1978 was passed into law. This was designed to limit the practice of mass surveillance in the United States.[35]

From 1980s to 1990s

In 1986, the NSA intercepted the communications of the Libyan government during the immediate aftermath of the Berlin discotheque bombing. The White House asserted that the NSA interception had provided “irrefutable” evidence that Libya was behind the bombing, which U.S. President Ronald Reagan cited as a justification for the 1986 United States bombing of Libya.[38][39]

In 1999, a multi-year investigation by the European Parliament highlighted the NSA’s role in economic espionage in a report entitled ‘Development of Surveillance Technology and Risk of Abuse of Economic Information’.[40] That year, the NSA founded the NSA Hall of Honor, a memorial at the National Cryptologic Museum in Fort Meade, Maryland.[41] The memorial is a, “tribute to the pioneers and heroes who have made significant and long-lasting contributions to American cryptology”.[41] NSA employees must be retired for more than fifteen years to qualify for the memorial.[41]

NSA’s infrastructure deteriorated in the 1990s as defense budget cuts resulted in maintenance deferrals. On January 24, 2000, NSA headquarters suffered a total network outage for three days caused by an overloaded network. Incoming traffic was successfully stored on agency servers, but it could not be directed and processed. The agency carried out emergency repairs at a cost of $3 million to get the system running again. (Some incoming traffic was also directed instead to Britain’s GCHQ for the time being.) Director Michael Hayden called the outage a “wake-up call” for the need to invest in the agency’s infrastructure.[42]

War on Terror

After Osama bin Laden moved to Afghanistan in the 1980s, the NSA recorded all of his phone calls via satellite, logging over 2,000 minutes of conversation[43]

In the aftermath of the September 11 attacks, the NSA created new IT systems to deal with the flood of information from new technologies like the Internet and cellphones. ThinThread contained advanced data mining capabilities. It also had a “privacy mechanism”; surveillance was stored encrypted; decryption required a warrant. The research done under this program may have contributed to the technology used in later systems. ThinThread was cancelled when Michael Hayden chose Trailblazer, which did not include ThinThread’s privacy system.[44]

Trailblazer Project ramped up in 2002 and was worked on by Science Applications International Corporation (SAIC), Boeing, Computer Sciences Corporation, IBM, and Litton Industries. Some NSA whistleblowers complained internally about major problems surrounding Trailblazer. This led to investigations by Congress and the NSA and DoD Inspectors General. The project was cancelled in early 2004.

Turbulence started in 2005. It was developed in small, inexpensive “test” pieces, rather than one grand plan like Trailblazer. It also included offensive cyber-warfare capabilities, like injecting malware into remote computers. Congress criticized Turbulence in 2007 for having similar bureaucratic problems as Trailblazer.[45] It was to be a realization of information processing at higher speeds in cyberspace.[46]

Global surveillance disclosures

The massive extent of the NSA’s spying, both foreign and domestic, was revealed to the public in a series of detailed disclosures of internal NSA documents beginning in June 2013. Most of the disclosures were leaked by former NSA contractor, Edward Snowden.

Scope of surveillance

It was revealed that the NSA intercepts telephone and Internet communications of over a billion people worldwide, seeking information on terrorism as well as foreign politics, economics[47] and “commercial secrets”.[48] In a declassified document it was revealed that 17,835 phone lines were on an improperly permitted “alert list” from 2006 to 2009 in breach of compliance, which tagged these phone lines for daily monitoring.[49][50][51] Eleven percent of these monitored phone lines met the agency’s legal standard for “reasonably articulable suspicion” (RAS).[49][52]

A dedicated unit of the NSA locates targets for the CIA for extrajudicial assassination in the Middle East.[53] The NSA has also spied extensively on the European Union, the United Nations and numerous governments including allies and trading partners in Europe, South America and Asia.[54][55]

The NSA tracks the locations of hundreds of millions of cellphones per day, allowing it to map people’s movements and relationships in detail.[56] It reportedly has access to all communications made via Google, Microsoft, Facebook, Yahoo, YouTube, AOL, Skype, Apple and Paltalk,[57] and collects hundreds of millions of contact lists from personal email and instant messaging accounts each year.[58] It has also managed to weaken much of the encryption used on the Internet (by collaborating with, coercing or otherwise infiltrating numerous technology companies), so that the majority of Internet privacy is now vulnerable to the NSA and other attackers.[59][60]

Domestically, the NSA collects and stores metadata records of phone calls,[61] including over 120 million US Verizon subscribers,[62] as well as Internet communications,[57] relying on a secret interpretation of the Patriot Act whereby the entirety of US communications may be considered “relevant” to a terrorism investigation if it is expected that even a tiny minority may relate to terrorism.[63] The NSA supplies foreign intercepts to the DEA, IRS and other law enforcement agencies, who use these to initiate criminal investigations. Federal agents are then instructed to “recreate” the investigative trail via parallel construction.[64]

The NSA also spies on influential Muslims to obtain information that could be used to discredit them, such as their use of pornography. The targets, both domestic and abroad, are not suspected of any crime but hold religious or political views deemed “radical” by the NSA.[65]

Although NSA’s surveillance activities are controversial, government agencies and private enterprises have common needs, and sometimes cooperate at subtle and complex technical levels. Big data is becoming more advantageous, justifying the cost of required computer hardware, and social media lead the trend. The interests of NSA and Silicon Valley began to converge as advances in computer storage technology drastically reduced the costs of storing enormous amounts of data and at the same time the value of the data for use in consumer marketing began to rise. On the other hand, social media sites are growing as voluntary data mining operations on a scale that rivals or exceeds anything the government could attempt on its own.[66]

According to a report in The Washington Post in July 2014, relying on information provided by Snowden, 90% of those placed under surveillance in the U.S. are ordinary Americans, and are not the intended targets. The newspaper said it had examined documents including emails, text messages, and online accounts that support the claim.[67]

Legal accountability

Despite President Obama’s claims that these programs have congressional oversight, members of Congress were unaware of the existence of these NSA programs or the secret interpretation of the Patriot Act, and have consistently been denied access to basic information about them.[68] Obama has also claimed that there are legal checks in place to prevent inappropriate access of data and that there have been no examples of abuse;[69] however, the secret FISC court charged with regulating the NSA’s activities is, according to its chief judge, incapable of investigating or verifying how often the NSA breaks even its own secret rules.[70] It has since been reported that the NSA violated its own rules on data access thousands of times a year, many of these violations involving large-scale data interceptions;[71] and that NSA officers have even used data intercepts to spy on love interests.[72] The NSA has “generally disregarded the special rules for disseminating United States person information” by illegally sharing its intercepts with other law enforcement agencies.[73] A March 2009 opinion of the FISC court, released by court order, states that protocols restricting data queries had been “so frequently and systemically violated that it can be fairly said that this critical element of the overall … regime has never functioned effectively.”[74][75] In 2011 the same court noted that the “volume and nature” of the NSA’s bulk foreign Internet intercepts was “fundamentally different from what the court had been led to believe”.[73] Email contact lists (including those of US citizens) are collected at numerous foreign locations to work around the illegality of doing so on US soil.[58]

Legal opinions on the NSA’s bulk collection program have differed. In mid-December 2013, U.S. District Court Judge Richard Leon ruled that the “almost-Orwellian” program likely violates the Constitution, and wrote, “I cannot imagine a more ‘indiscriminate’ and ‘arbitrary invasion’ than this systematic and high-tech collection and retention of personal data on virtually every single citizen for purposes of querying and analyzing it without prior judicial approval. Surely, such a program infringes on ‘that degree of privacy’ that the Founders enshrined in the Fourth Amendment. Indeed, I have little doubt that the author of our Constitution, James Madison, who cautioned us to beware ‘the abridgement of freedom of the people by gradual and silent encroachments by those in power,’ would be aghast.”[76]

Later that month, U.S. District Judge William Pauley ruled that the NSA’s collection of telephone records is legal and valuable in the fight against terrorism. In his opinion, he wrote, “a bulk telephony metadata collection program [is] a wide net that could find and isolate gossamer contacts among suspected terrorists in an ocean of seemingly disconnected data” and noted that a similar collection of data prior to 9/11 might have prevented the attack.[77]

An October 2014 United Nations report condemned mass surveillance by the United States and other countries as violating multiple international treaties and conventions that guarantee core privacy rights.[78]

Official responses

On March 20, 2013 the Director of National Intelligence, Lieutenant General James Clapper, testified before Congress that the NSA does not wittingly collect any kind of data on millions or hundreds of millions of Americans, but he retracted this in June after details of the PRISM program were published, and stated instead that meta-data of phone and Internet traffic are collected, but no actual message contents.[79] This was corroborated by the NSA Director, General Keith Alexander, before it was revealed that the XKeyscore program collects the contents of millions of emails from US citizens without warrant, as well as “nearly everything a user does on the Internet”. Alexander later admitted that “content” is collected, but stated that it is simply stored and never analyzed or searched unless there is “a nexus to al-Qaida or other terrorist groups”.[69]

Regarding the necessity of these NSA programs, Alexander stated on June 27 that the NSA’s bulk phone and Internet intercepts had been instrumental in preventing 54 terrorist “events”, including 13 in the US, and in all but one of these cases had provided the initial tip to “unravel the threat stream”.[80] On July 31 NSA Deputy Director John Inglis conceded to the Senate that these intercepts had not been vital in stopping any terrorist attacks, but were “close” to vital in identifying and convicting four San Diego men for sending US$8,930 to Al-Shabaab, a militia that conducts terrorism in Somalia.[81][82][83]

The U.S. government has aggressively sought to dismiss and challenge Fourth Amendment cases raised against it, and has granted retroactive immunity to ISPs and telecoms participating in domestic surveillance.[84][85] The U.S. military has acknowledged blocking access to parts of The Guardian website for thousands of defense personnel across the country,[86][87] and blocking the entire Guardian website for personnel stationed throughout Afghanistan, the Middle East, and South Asia.[88]

Organizational structure

Michael S. Rogers, the director of the NSA.

The NSA is led by the Director of the National Security Agency (DIRNSA), who also serves as Chief of the Central Security Service (CHCSS) and Commander of the United States Cyber Command (USCYBERCOM) and is the highest-ranking military official of these organizations. He is assisted by a Deputy Director, who is the highest-ranking civilian within the NSA/CSS.

NSA also has an Inspector General, head of the Office of the Inspector General (OIG), a General Counsel, head of the Office of the General Counsel (OGC) and a Director of Compliance, who is head of the Office of the Director of Compliance (ODOC).[89]

Unlike other intelligence organizations such as CIA or DIA, NSA has always been particularly reticent concerning its internal organizational structure.

As of the mid-1990s, the National Security Agency was organized into five Directorates:

  • The Operations Directorate, which was responsible for SIGINT collection and processing.
  • The Technology and Systems Directorate, which develops new technologies for SIGINT collection and processing.
  • The Information Systems Security Directorate, which was responsible for NSA’s communications and information security missions.
  • The Plans, Policy and Programs Directorate, which provided staff support and general direction for the Agency.
  • The Support Services Directorate, which provided logistical and administrative support activities.[90]

Each of these directorates consisted of several groups or elements, designated by a letter. There were for example the A Group, which was responsible for all SIGINT operations against the Soviet Union and Eastern Europe, and G Group, which was responsible for SIGINT related to all non-communist countries. These groups were divided in units designated by an additional number, like unit A5 for breaking Soviet codes, and G6, being the office for the Middle East, North Africa, Cuba, Central and South America.[91][92]

Structure

As of 2013, NSA has about a dozen directorates, which are designated by a letter, although not all of them are publicly known. The directorates are divided in divisions and units starting with the letter of the parent directorate, followed by a number for the division, the sub-unit or a sub-sub-unit.

The main elements of the organizational structure of the NSA are:[93]

  • F – Directorate only known from unit F6, the Special Collection Service (SCS), which is a joint program created by CIA and NSA in 1978 to facilitate clandestine activities such as bugging computers throughout the world, using the expertise of both agencies.[94]
  • G – Directorate only known from unit G112, the office that manages the Senior Span platform, attached to the U2 spy planes.[95]
  • I – Information Assurance Directorate (IAD), which ensures availability, integrity, authentication, confidentiality, and non-repudiation of national security and telecommunications and information systems (national security systems).
  • J – Directorate only known from unit J2, the Cryptologic Intelligence Unit
  • L – Installation and Logistics
  • M – Human Resources
  • Q – Security and Counterintelligence
  • R – Research Directorate, which conducts research on signals intelligence and on information assurance for the U.S. Government.[96]
  • S – Signals Intelligence Directorate (SID), which is responsible for the collection, analysis, production and dissemination of signals intelligence. This directorate is led by a director and a deputy director. The SID consists of the following divisions:
    • S1 – Customer Relations
    • S2 – Analysis and Production Centers, with the following so-called Product Lines:
      • S2A: South Asia, S2B: China and Korea, S2C: International Security, S2E: Middle East/Asia, S2F: International Crime, S2G: Counter-proliferation, S2H: Russia, S2I: Counter-terrorism, S2J: Weapons and Space, S2T: Current Threats
    • S3 – Data Acquisition, with these divisions for the main collection programs:
      • S31 – Cryptanalysis and Exploitation Services (CES)
      • S32 – Tailored Access Operations (TAO), which hacks into foreign computers to conduct cyber-espionage and reportedly is “the largest and arguably the most important component of the NSA’s huge Signal Intelligence (SIGINT) Directorate, consisting of over 1,000 military and civilian computer hackers, intelligence analysts, targeting specialists, computer hardware and software designers, and electrical engineers.”[97]
      • S33 – Global Access Operations (GAO), which is responsible for intercepts from satellites and other international SIGINT platforms.[98] A tool which details and maps the information collected by this unit is code-named Boundless Informant.
      • S34 – Collections Strategies and Requirements Center
      • S35 – Special Source Operations (SSO), which is responsible for domestic and compartmented collection programs, like for example the PRISM program.[98] Special Source Operations is also mentioned in connection to the FAIRVIEW collection program.[99]
  • T – Technical Directorate (TD)
  • Directorate for Education and Training
  • Directorate for Corporate Leadership
  • Foreign Affairs Directorate, which acts as liaison with foreign intelligence services, counter-intelligence centers and the UKUSA-partners.
  • Acquisitions and Procurement Directorate
  • Information Sharing Services (ISS), led by a chief and a deputy chief.[100]

In the year 2000, a leadership team was formed, consisting of the Director, the Deputy Director and the Directors of the Signals Intelligence (SID), the Information Assurance (IAD) and the Technical Directorate (TD). The chiefs of other main NSA divisions became associate directors of the senior leadership team.[101]

After president George W. Bush initiated the President’s Surveillance Program (PSP) in 2001, the NSA created a 24-hour Metadata Analysis Center (MAC), followed in 2004 by the Advanced Analysis Division (AAD), with the mission of analyzing content, Internet metadata and telephone metadata. Both units were part of the Signals Intelligence Directorate.[102]

A 2016 proposal would combine the Signals Intelligence Directorate with the Information Assurance Directorate into a Directorate of Operations.[103]

Watch centers

The NSA maintains at least two watch centers:

  • National Security Operations Center (NSOC), which is the NSA’s current operations center and focal point for time-sensitive SIGINT reporting for the United States SIGINT System (USSS). This center was established in 1968 as the National SIGINT Watch Center (NSWC) and renamed into National SIGINT Operations Center (NSOC) in 1973. This “nerve center of the NSA” got its current name in 1996.[104]
  • NSA/CSS Threat Operations Center (NTOC), which is the primary NSA/CSS partner for Department of Homeland Security response to cyber incidents. The NTOC establishes real-time network awareness and threat characterization capabilities to forecast, alert, and attribute malicious activity and enable the coordination of Computer Network Operations. The NTOC was established in 2004 as a joint Information Assurance and Signals Intelligence project.[105]

Employees

The number of NSA employees is officially classified[4] but there are several sources providing estimates. In 1961, NSA had 59,000 military and civilian employees, which grew to 93,067 in 1969, of which 19,300 worked at the headquarters at Fort Meade. In the early 1980s NSA had roughly 50,000 military and civilian personnel. By 1989 this number had grown again to 75,000, of which 25,000 worked at the NSA headquarters. Between 1990 and 1995 the NSA’s budget and workforce were cut by one third, which led to a substantial loss of experience.[106]

In 2012, the NSA said more than 30,000 employees worked at Fort Meade and other facilities.[2] In 2012, John C. Inglis, the deputy director, said that the total number of NSA employees is “somewhere between 37,000 and one billion” as a joke,[4] and stated that the agency is “probably the biggest employer of introverts.”[4] In 2013 Der Spiegel stated that the NSA had 40,000 employees.[5] More widely, it has been described as the world’s largest single employer of mathematicians.[107] Some NSA employees form part of the workforce of the National Reconnaissance Office (NRO), the agency that provides the NSA with satellite signals intelligence.

As of 2013 about 1,000 system administrators work for the NSA.[108]

Security issues

The NSA received criticism early on in 1960 after two agents had defected to the Soviet Union. Investigations by the House Un-American Activities Committee and a special subcommittee of the United States House Committee on Armed Services revealed severe cases of ignorance in personnel security regulations, prompting the former personnel director and the director of security to step down and leading to the adoption of stricter security practices.[109] Nonetheless, security breaches reoccurred only a year later when in an issue of Izvestia of July 23, 1963, a former NSA employee published several cryptologic secrets.

The very same day, an NSA clerk-messenger committed suicide as ongoing investigations disclosed that he had sold secret information to the Soviets on a regular basis. The reluctance of Congressional houses to look into these affairs had prompted a journalist to write, “If a similar series of tragic blunders occurred in any ordinary agency of Government an aroused public would insist that those responsible be officially censured, demoted, or fired.” David Kahn criticized the NSA’s tactics of concealing its doings as smug and the Congress’ blind faith in the agency’s right-doing as shortsighted, and pointed out the necessity of surveillance by the Congress to prevent abuse of power.[109]

Edward Snowden‘s leaking of the existence of PRISM in 2013 caused the NSA to institute a “two-man rule“, where two system administrators are required to be present when one accesses certain sensitive information.[108]Snowden claims he suggested such a rule in 2009.[110]

Polygraphing

Defense Security Service (DSS) polygraph brochure given to NSA applicants

The NSA conducts polygraph tests of employees. For new employees, the tests are meant to discover enemy spies who are applying to the NSA and to uncover any information that could make an applicant pliant to coercion.[111] As part of the latter, historically EPQs or “embarrassing personal questions” about sexual behavior had been included in the NSA polygraph.[111]The NSA also conducts five-year periodic reinvestigation polygraphs of employees, focusing on counterintelligence programs. In addition the NSA conducts periodic polygraph investigations in order to find spies and leakers; those who refuse to take them may receive “termination of employment”, according to a 1982 memorandum from the director of the NSA.[112]

File:NSApolygraphvideo.webm

NSA-produced video on the polygraph process

There are also “special access examination” polygraphs for employees who wish to work in highly sensitive areas, and those polygraphs cover counterintelligence questions and some questions about behavior.[112] NSA’s brochure states that the average test length is between two and four hours.[113] A 1983 report of the Office of Technology Assessment stated that “It appears that the NSA [National Security Agency] (and possibly CIA) use the polygraph not to determine deception or truthfulness per se, but as a technique of interrogation to encourage admissions.”[114] Sometimes applicants in the polygraph process confess to committing felonies such as murder, rape, and selling of illegal drugs. Between 1974 and 1979, of the 20,511 job applicants who took polygraph tests, 695 (3.4%) confessed to previous felony crimes; almost all of those crimes had been undetected.[111]

In 2010 the NSA produced a video explaining its polygraph process.[115] The video, ten minutes long, is titled “The Truth About the Polygraph” and was posted to the Web site of the Defense Security Service. Jeff Stein of The Washington Post said that the video portrays “various applicants, or actors playing them — it’s not clear — describing everything bad they had heard about the test, the implication being that none of it is true.”[116] AntiPolygraph.org argues that the NSA-produced video omits some information about the polygraph process; it produced a video responding to the NSA video.[115] George Maschke, the founder of the Web site, accused the NSA polygraph video of being “Orwellian“.[116]

After Edward Snowden revealed his identity in 2013, the NSA began requiring polygraphing of employees once per quarter.[117]

Arbitrary firing

The number of exemptions from legal requirements has been criticized. When in 1964 the Congress was hearing a bill giving the director of the NSA the power to fire at will any employee,The Washington Post wrote: “This is the very definition of arbitrariness. It means that an employee could be discharged and disgraced on the basis of anonymous allegations without the slightest opportunity to defend himself.” Yet, the bill was accepted by an overwhelming majority.[109]

Insignia and memorials

Seal of the U.S. National Security Agency.svg

The heraldic insignia of NSA consists of an eagle inside a circle, grasping a key in its talons.[118] The eagle represents the agency’s national mission.[118] Its breast features a shield with bands of red and white, taken from the Great Seal of the United States and representing Congress.[118] The key is taken from the emblem of Saint Peter and represents security.[118]

When the NSA was created, the agency had no emblem and used that of the Department of Defense.[119] The agency adopted its first of two emblems in 1963.[119] The current NSA insignia has been in use since 1965, when then-Director, LTG Marshall S. Carter (USA) ordered the creation of a device to represent the agency.[120]

The NSA’s flag consists of the agency’s seal on a light blue background.

National Cryptologic Memorial

Crews associated with NSA missions have been involved in a number of dangerous and deadly situations.[121] The USS Liberty incident in 1967 and USS Pueblo incident in 1968 are examples of the losses endured during the Cold War.[121]

The National Security Agency/Central Security Service Cryptologic Memorial honors and remembers the fallen personnel, both military and civilian, of these intelligence missions.[122] It is made of black granite, and has 171 names carved into it, as of 2013 .[122] It is located at NSA headquarters. A tradition of declassifying the stories of the fallen was begun in 2001.[122]

NSANet (NSA’s intranet)

Behind the Green Door – Secure communications room with separate computer terminals for access to SIPRNET, GWAN, NSANET, and JWICS

NSANet stands for National Security Agency Network and is the official NSA intranet.[123] It is a classified network,[124] for information up to the level of TS/SCI[125] to support the use and sharing of intelligence data between NSA and the signals intelligence agencies of the four other nations of the Five Eyes partnership. The management of NSANet has been delegated to the Central Security Service Texas (CSSTEXAS).[126]

NSANet is a highly secured computer network consisting of fiber-optic and satellite communication channels which are almost completely separated from the public Internet. The network allows NSA personnel and civilian and military intelligence analysts anywhere in the world to have access to the agency’s systems and databases. This access is tightly controlled and monitored. For example, every keystroke is logged, activities are audited at random and downloading and printing of documents from NSANet are recorded.[127]

In 1998, NSANet, along with NIPRNET and SIPRNET, had “significant problems with poor search capabilities, unorganized data and old information”.[128] In 2004, the network was reported to have used over twenty commercial off-the-shelf operating systems.[129] Some universities that do highly sensitive research are allowed to connect to it.[130]

The thousands of Top Secret internal NSA documents that were taken by Edward Snowden in 2013 were stored in “a file-sharing location on the NSA’s intranet site” so they could easily be read online by NSA personnel. Everyone with a TS/SCI-clearance had access to these documents and as a system administrator, Snowden was responsible for moving accidentally misplaced highly sensitive documents to more secure storage locations.[131]

National Computer Security Center

The DoD Computer Security Center was founded in 1981 and renamed the National Computer Security Center (NCSC) in 1985. NCSC was responsible for computer security throughout the federal government.[132] NCSC was part of NSA,[133] and during the late 1980s and the 1990s, NSA and NCSC published Trusted Computer System Evaluation Criteria in a six-foot high Rainbow Series of books that detailed trusted computing and network platform specifications.[134] The Rainbow books were replaced by the Common Criteria, however, in the early 2000s.[134]

Facilities

Headquarters

National Security Agency headquarters in Fort Meade, 2013

Headquarters for the National Security Agency is located at 39°6′32″N 76°46′17″W in Fort George G. Meade, Maryland, although it is separate from other compounds and agencies that are based within this same military installation. Ft. Meade is about 20 mi (32 km) southwest of Baltimore,[135] and 25 mi (40 km) northeast of Washington, DC.[136] The NSA has its own exit off Maryland Route 295 South labeled “NSA Employees Only”.[137][138] The exit may only be used by people with the proper clearances, and security vehicles parked along the road guard the entrance.[139]

NSA is the largest employer in the U.S. state of Maryland, and two-thirds of its personnel work at Ft. Meade.[140] Built on 350 acres (140 ha; 0.55 sq mi)[141] of Ft. Meade’s 5,000 acres (2,000 ha; 7.8 sq mi),[142] the site has 1,300 buildings and an estimated 18,000 parking spaces.[136][143]

NSA headquarters building in Fort Meade (left), NSOC (right)

The main NSA headquarters and operations building is what James Bamford, author of Body of Secrets, describes as “a modern boxy structure” that appears similar to “any stylish office building.”[144] The building is covered with one-way dark glass, which is lined with copper shielding in order to prevent espionage by trapping in signals and sounds.[144] It contains 3,000,000 square feet (280,000 m2), or more than 68 acres (28 ha), of floor space; Bamford said that the U.S. Capitol “could easily fit inside it four times over.”[144]

The facility has over 100 watchposts,[145] one of them being the visitor control center, a two-story area that serves as the entrance.[144] At the entrance, a white pentagonal structure,[146] visitor badges are issued to visitors and security clearances of employees are checked.[147] The visitor center includes a painting of the NSA seal.[146]

The OPS2A building, the tallest building in the NSA complex and the location of much of the agency’s operations directorate, is accessible from the visitor center. Bamford described it as a “dark glass Rubik’s Cube“.[148] The facility’s “red corridor” houses non-security operations such as concessions and the drug store. The name refers to the “red badge” which is worn by someone without a security clearance. The NSA headquarters includes a cafeteria, a credit union, ticket counters for airlines and entertainment, a barbershop, and a bank.[146] NSA headquarters has its own post office, fire department, and police force.[149][150][151]

The employees at the NSA headquarters reside in various places in the Baltimore-Washington area, including Annapolis, Baltimore, and Columbia in Maryland and the District of Columbia, including the Georgetown community.[152]

Power consumption

Due to massive amounts of data processing, NSA is the largest electricity consumer in Maryland.[140]

Following a major power outage in 2000, in 2003 and in follow-ups through 2007, The Baltimore Sun reported that the NSA was at risk of electrical overload because of insufficient internal electrical infrastructure at Fort Meade to support the amount of equipment being installed. This problem was apparently recognized in the 1990s but not made a priority, and “now the agency’s ability to keep its operations going is threatened.”[153]

Baltimore Gas & Electric (BGE, now Constellation Energy) provided NSA with 65 to 75 megawatts at Ft. Meade in 2007, and expected that an increase of 10 to 15 megawatts would be needed later that year.[154] In 2011, NSA at Ft. Meade was Maryland’s largest consumer of power.[140] In 2007, as BGE’s largest customer, NSA bought as much electricity as Annapolis, the capital city of Maryland.[153]

One estimate put the potential for power consumption by the new Utah Data Center at US$40 million per year.[155]

History of headquarters

Headquarters at Fort Meade circa 1950s

When the agency was established, its headquarters and cryptographic center were in the Naval Security Station in Washington, D.C. The COMINT functions were located in Arlington Hall in Northern Virginia, which served as the headquarters of the U.S. Army‘s cryptographic operations.[156] Because the Soviet Union had detonated a nuclear bomb and because the facilities were crowded, the federal government wanted to move several agencies, including the AFSA/NSA. A planning committee considered Fort Knox, but Fort Meade, Maryland, was ultimately chosen as NSA headquarters because it was far enough away from Washington, D.C. in case of a nuclear strike and was close enough so its employees would not have to move their families.[157]

Construction of additional buildings began after the agency occupied buildings at Ft. Meade in the late 1950s, which they soon outgrew.[157] In 1963 the new headquarters building, nine stories tall, opened. NSA workers referred to the building as the “Headquarters Building” and since the NSA management occupied the top floor, workers used “Ninth Floor” to refer to their leaders.[158] COMSEC remained in Washington, D.C., until its new building was completed in 1968.[157] In September 1986, the Operations 2A and 2B buildings, both copper-shielded to prevent eavesdropping, opened with a dedication by President Ronald Reagan.[159] The four NSA buildings became known as the “Big Four.”[159] The NSA director moved to 2B when it opened.[159]

Fort Meade shooting

On March 30, 2015, shortly before 9 am, a stolen sports utility vehicle approached an NSA police vehicle blocking the road near the gate of Fort Meade, after it was told to leave the area. NSA officers fired on the SUV, killing the 27-year-old driver, Mya Hall, and seriously injuring her 20-year-old passenger. An NSA officer’s arm was injured when Hall subsequently crashed into his vehicle.[160][161]

The two women were transgender[162] and had just gotten off from a night of partying at a motel with the man they’d stolen the SUV from that morning. They “attempted to drive a vehicle into the National Security Agency portion of the installation without authorization”, according to an NSA statement.[163] FBI spokeswoman Amy Thoreson said the incident is not believed to be related to terrorism.[164] In June 2015 the FBI closed its investigation into the incident and federal prosecutors have declined to bring charges against anyone involved.[165]

An anonymous police official told The Washington Post, “This was not a deliberate attempt to breach the security of NSA. This was not a planned attack.” The two are believed to have made a wrong turn off the highway, while fleeing from the motel after stealing the vehicle. A small amount of cocaine was found in the SUV. A local CBS reporter initially said a gun was found,[166] but her later revision does not.[167] Dozens of journalists were corralled into a parking lot blocks away from the scene, and were barred from photographing the area.[168]

Computing

In 1995, The Baltimore Sun reported that the NSA is the owner of the single largest group of supercomputers.[169]

NSA held a groundbreaking ceremony at Ft. Meade in May 2013 for its High Performance Computing Center 2, expected to open in 2016.[170] Called Site M, the center has a 150 megawatt power substation, 14 administrative buildings and 10 parking garages.[149] It cost $3.2 billion and covers 227 acres (92 ha; 0.355 sq mi).[149] The center is 1,800,000 square feet (17 ha; 0.065 sq mi)[149] and initially uses 60 megawatts of electricity.[171]

Increments II and III are expected to be completed by 2030, and would quadruple the space, covering 5,800,000 square feet (54 ha; 0.21 sq mi) with 60 buildings and 40 parking garages.[149] Defense contractors are also establishing or expanding cybersecurity facilities near the NSA and around the Washington metropolitan area.[149]

Other U.S. facilities

Buckley Air Force Base in Colorado

Utah Data Center

As of 2012, NSA collected intelligence from four geostationary satellites.[155] Satellite receivers were at Roaring Creek Station in Catawissa, Pennsylvania and Salt Creek Station in Arbuckle, California.[155] It operated ten to twenty taps on U.S. telecom switches. NSA had installations in several U.S. states and from them observed intercepts from Europe, the Middle East, North Africa, Latin America, and Asia.[155]

NSA had facilities at Friendship Annex (FANX) in Linthicum, Maryland, which is a 20 to 25-minute drive from Ft. Meade;[172] the Aerospace Data Facility at Buckley Air Force Base in Aurora outside Denver, Colorado; NSA Texas in the Texas Cryptology Center at Lackland Air Force Base in San Antonio, Texas; NSA Georgia at Fort Gordon in Augusta, Georgia; NSA Hawaii in Honolulu; the Multiprogram Research Facility in Oak Ridge, Tennessee, and elsewhere.[152][155]

On January 6, 2011 a groundbreaking ceremony was held to begin construction on NSA’s first Comprehensive National Cyber-security Initiative (CNCI) Data Center, known as the “Utah Data Center” for short. The $1.5B data center is being built at Camp Williams, Utah, located 25 miles (40 km) south of Salt Lake City, and will help support the agency’s National Cyber-security Initiative.[173] It is expected to be operational by September 2013.[155]

In 2009, to protect its assets and to access more electricity, NSA sought to decentralize and expand its existing facilities in Ft. Meade and Menwith Hill,[174] the latter expansion expected to be completed by 2015.[175]

The Yakima Herald-Republic cited Bamford, saying that many of NSA’s bases for its Echelon program were a legacy system, using outdated, 1990s technology.[176] In 2004, NSA closed its operations at Bad Aibling Station (Field Station 81) in Bad Aibling, Germany.[177] In 2012, NSA began to move some of its operations at Yakima Research Station, Yakima Training Center, in Washington state to Colorado, planning to leave Yakima closed.[178] As of 2013, NSA also intended to close operations at Sugar Grove, West Virginia.[176]

International stations

RAF Menwith Hill has the largest NSA presence in the United Kingdom.[175]

Following the signing in 1946–1956[179] of the UKUSA Agreement between the United States, United Kingdom, Canada, Australia and New Zealand, who then cooperated on signals intelligence and ECHELON,[180] NSA stations were built at GCHQ Bude in Morwenstow, United Kingdom; Geraldton, Pine Gap and Shoal Bay, Australia; Leitrim and Ottawa, Canada; Misawa, Japan; and Waihopai and Tangimoana,[181] New Zealand.[182]

NSA operates RAF Menwith Hill in North Yorkshire, United Kingdom, which was, according to BBC News in 2007, the largest electronic monitoring station in the world.[183] Planned in 1954, and opened in 1960, the base covered 562 acres (227 ha; 0.878 sq mi) in 1999.[184]

The agency’s European Cryptologic Center (ECC), with 240 employees in 2011, is headquartered at a US military compound in Griesheim, near Frankfurt in Germany. A 2011 NSA report indicates that the ECC is responsible for the “largest analysis and productivity in Europe” and focusses on various priorities, including Africa, Europe, the Middle East and counterterrorism operations.[185]

In 2013, a new Consolidated Intelligence Center, also to be used by NSA, is being built at the headquarters of the United States Army Europe in Wiesbaden, Germany.[186] NSA’s partnership with Bundesnachrichtendienst (BND), the German foreign intelligence service, was confirmed by BND president Gerhard Schindler.[186]

Thailand

Thailand is a “3rd party partner” of the NSA along with nine other nations.[187] These are non-English-speaking countries that have made security agreements for the exchange of SIGINT raw material and end product reports.

Thailand is the site of at least two US SIGINT collection stations. One is at the US Embassy in Bangkok, a joint NSA-CIA Special Collection Service (SCS) unit. It presumably eavesdrops on foreign embassies, governmental communications, and other targets of opportunity.[188]

The second installation is a FORNSAT (foreign satellite interception) station in the Thai city of Khon Kaen. It is codenamed IND