The Pronk Pops Show 914, June 19, 2017, Story 1: Otto Warmbier Died After Being Released From North Korea in A Coma — Videos — Story 2: Time For Strategic Patience Is Over — Take Out The Korean Dictator, Missiles, Nuclear Bomb Facilities, Artillery and Rocket Launchers In Range of South Korea — Regularly Planned and Scheduled War — Videos — Story 3: U.S. Navy F-18 Fighter Shoots Down Syrian SU -22 Fighter Over Raqqa, Syria After U.S. Allies On Ground Bombed– Russia Warns U.S. Planes Will Be Considered Targets — Videos — Story 4: Interventionist Foreign Policy of Progressive Democrats and Republicans (Neocons) Projecting Power of American Empire — No War Ever Declared Or American People Consulted — Videos

Posted on June 19, 2017. Filed under: American History, Blogroll, Breaking News, Communications, Congress, Constitutional Law, Countries, Crime, Culture, Defense Spending, Diet, Donald J. Trump, Donald J. Trump, Donald J. Trump, Donald Trump, Donald Trump, Education, Empires, Exercise, Food, Foreign Policy, Former President Barack Obama, Freedom of Speech, Government Spending, Health, Health Care, History, House of Representatives, Human, Human Behavior, Independence, Japan, Language, Law, Life, Lying, Media, Medicine, National Interest, News, North Korea, Obama, People, Philosophy, Photos, Politics, Polls, President Trump, Progressives, Raymond Thomas Pronk, Resources, Scandals, Security, Senate, Social Science, South Korea, Success, Taxation, Taxes, Terror, Terrorism, Unemployment, United States of America, Videos, War, Wealth, Wisdom | Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , |

Project_1

The Pronk Pops Show Podcasts

Pronk Pops Show 914,  June 19, 2017

Pronk Pops Show 913,  June 16, 2017

Pronk Pops Show 912,  June 15, 2017

Pronk Pops Show 911,  June 14, 2017

Pronk Pops Show 910,  June 13, 2017

Pronk Pops Show 909,  June 12, 2017

Pronk Pops Show 908,  June 9, 2017

Pronk Pops Show 907,  June 8, 2017

Pronk Pops Show 906,  June 7, 2017

Pronk Pops Show 905,  June 6, 2017

Pronk Pops Show 904,  June 5, 2017

Pronk Pops Show 903,  June 1, 2017

Pronk Pops Show 902,  May 31, 2017

Pronk Pops Show 901,  May 30, 2017

Pronk Pops Show 900,  May 25, 2017

Pronk Pops Show 899,  May 24, 2017

Pronk Pops Show 898,  May 23, 2017

Pronk Pops Show 897,  May 22, 2017

Pronk Pops Show 896,  May 18, 2017

Pronk Pops Show 895,  May 17, 2017

Pronk Pops Show 894,  May 16, 2017

Pronk Pops Show 893,  May 15, 2017

Pronk Pops Show 892,  May 12, 2017

Pronk Pops Show 891,  May 11, 2017

Pronk Pops Show 890,  May 10, 2017

Pronk Pops Show 889,  May 9, 2017

Pronk Pops Show 888,  May 8, 2017

Pronk Pops Show 887,  May 5, 2017

Pronk Pops Show 886,  May 4, 2017

Pronk Pops Show 885,  May 3, 2017

Pronk Pops Show 884,  May 1, 2017

Pronk Pops Show 883 April 28, 2017

Pronk Pops Show 882: April 27, 2017

Pronk Pops Show 881: April 26, 2017

Pronk Pops Show 880: April 25, 2017

Pronk Pops Show 879: April 24, 2017

Pronk Pops Show 878: April 21, 2017

Pronk Pops Show 877: April 20, 2017

Pronk Pops Show 876: April 19, 2017

Pronk Pops Show 875: April 18, 2017

Pronk Pops Show 874: April 17, 2017

Pronk Pops Show 873: April 13, 2017

Pronk Pops Show 872: April 12, 2017

Pronk Pops Show 871: April 11, 2017

Pronk Pops Show 870: April 10, 2017

Pronk Pops Show 869: April 7, 2017

Pronk Pops Show 868: April 6, 2017

Pronk Pops Show 867: April 5, 2017

Pronk Pops Show 866: April 3, 2017

Pronk Pops Show 865: March 31, 2017

Pronk Pops Show 864: March 30, 2017

Pronk Pops Show 863: March 29, 2017

Pronk Pops Show 862: March 28, 2017

Pronk Pops Show 861: March 27, 2017

Pronk Pops Show 860: March 24, 2017

Pronk Pops Show 859: March 23, 2017

Pronk Pops Show 858: March 22, 2017

Pronk Pops Show 857: March 21, 2017

Pronk Pops Show 856: March 20, 2017

Pronk Pops Show 855: March 10, 2017

Pronk Pops Show 854: March 9, 2017

Pronk Pops Show 853: March 8, 2017

Pronk Pops Show 852: March 6, 2017

Pronk Pops Show 851: March 3, 2017

Pronk Pops Show 850: March 2, 2017

Pronk Pops Show 849: March 1, 2017

Image result for otto warmbierImage result for map of war with north korea june 2017

Image result for map of syria and ISIS territory u.s. f-18 shots Russian SU-22 Image result for us navy fighter shot down syrian fighter june 18, 2017Image result for Russian SU-22Image result for russia warns us will shot down us planes

Story 1: Otto Warmbier Died After Being Released From North Korea in A Coma — Videos

GLOBALNEWS: North Korea Invites More Western Tourists To Visit Days After Sending One Home In A Coma

Trump administration weighs options after Warmbier death

Should the US retaliate against North Korea for the death of Otto Warmbier?

HOT NEWS: Lt. Col. Tony Shaffer Drops A BOMB And Reveals Real Reason Otto Warmbier Died- This is BIG

North Korea ‘murdered’ Otto Warmbier: Gen. Keane

Family announces Otto Warmbier has died

Otto Warmbier’s Dad Destroys Obama With 5 Words After Trump Brings His Son Home From N. Korea

Father of Otto Warmbier give a press conference and questions following the release of his son, now

‘North Korea Crossed the Line’ | Tucker Carlson Interviews Otto Warmbier’s Father

Doctors update public on Otto Warmbier’s health

North Korea releases American in a coma

Dr. Siegel: Very unlikely Otto Warmbier will ever wake up

Otto Warmbier, Just released from North Korea, Has Died! # 2

Otto Warmbier, American student held in North Korea, dead at 22, family says

American Doctors Examine Otto Warmbier – They JUST Found Something SHOCKING!

Man in vegetative state for 12 years wakes up to tell remarkable story || Full story

Vegetative State

NCBC: What is Persistent Vegetative State, or PVS?

What happened to Otto Warmbier?

The Truth About ‘Truth Serum’

MacGyver – Truth Serum

Otto Warmbier has died, hospital says

CINCINNATI — Otto Warmbier has died, University of Cincinnati Medical Center announced Monday.

Warmbier died at 2:20 p.m. Monday, days after he was released from captivity in North Korea.

In a statement, family members said Warmbier had been unable to speak, see or react to verbal commands since his return to Cincinnati June 13.

“He looked very uncomfortable – almost anguished,” family members said. “Although we would never hear his voice again, within a day the countenance of his face changed – he was at peace. He was home and we believe he could sense that.”

Family members thanked the hospital’s staff for the care they provided Warmbier but said ” the awful torturous mistreatment our son received at the hands of the North Koreans ensured that no other outcome was possible beyond the sad one we experienced today.”

“It would be easy at a moment like this to focus on all that we lost – future time that won’t be spent with a warm, engaging, brilliant young man whose curiosity and enthusiasm for life knew no bounds,” the family said. “But we choose to focus on the time we were given to be with this remarkable person. You can tell from the outpouring of emotion from the communities that he touched – Wyoming, Ohio and the University of Virginia to name just two – that the love for Otto went well beyond his immediate family.”

Check back for more on this breaking story.

Sodium thiopental

From Wikipedia, the free encyclopedia
Sodium thiopental
Sodium thiopental.svg
Sodium-thiopental-3D-vdW-2.png
Clinical data
AHFS/Drugs.com Monograph
Routes of
administration
Intravenous (most common), oral or rectal
ATC code
Legal status
Legal status
Pharmacokinetic data
Biological half-life 5.5[1]-26 hours[2]
Identifiers
CAS Number
  • 71-73-8 Yes (sodium salt)
    76-75-5 (free acid)
PubChem CID
DrugBank
ChemSpider
UNII
KEGG
ChEBI
ChEMBL
ECHA InfoCard 100.000.896
Chemical and physical data
Formula C11H17N2NaO2S
Molar mass 264.32 g/mol
3D model (Jmol)
Chirality Racemic mixture
 Yes (what is this?)  (verify)

Sodium thiopental, also known as Sodium Pentothal (a trademark of Abbott Laboratories, not to be confused with pentobarbital), thiopental, thiopentone, or Trapanal (also a trademark), is a rapid-onset short-acting barbiturate general anesthetic that is an analogue of thiobarbital. Sodium thiopental was a core medicine in the World Health Organization‘s “Essential Drugs List“, which is a list of minimum medical needs for a basic healthcare system, but was supplanted by propofol.[3] It was previously the first of three drugs administered during most lethal injections in the United States, but the U.S. manufacturer Hospira stopped manufacturing the drug and the EU banned the export of the drug for this purpose.[4]

Uses

Anesthesia

Sodium thiopental is an ultra-short-acting barbiturate and has been used commonly in the induction phase of general anesthesia. Its use has been largely replaced with that of propofol, but retains popularity as an induction agent for rapid sequence intubation and in obstetrics.[citation needed] Following intravenous injection, the drug rapidly reaches the brain and causes unconsciousness within 30–45 seconds. At one minute, the drug attains a peak concentration of about 60% of the total dose in the brain. Thereafter, the drug distributes to the rest of the body, and in about 5–10 minutes the concentration is low enough in the brain that consciousness returns.[citation needed]

A normal dose of sodium thiopental (usually 4–6 mg/kg) given to a pregnant woman for operative delivery (caesarian section) rapidly makes her unconscious, but the baby in her uterus remains conscious. However, larger or repeated doses can depress the baby.[5]

Sodium thiopental is not used to maintain anesthesia in surgical procedures because, in infusion, it displays zero-order elimination kinetics, leading to a long period before consciousness is regained. Instead, anesthesia is usually maintained with an inhaled anesthetic (gas) agent. Inhaled anesthetics are eliminated relatively quickly, so that stopping the inhaled anesthetic will allow rapid return of consciousness. Sodium thiopental would have to be given in large amounts to maintain an anesthetic plane, and because of its 11.5- to 26-hour half-life, consciousness would take a long time to return.[6]

In veterinary medicine, sodium thiopental is used to induce anesthesia in animals. Since it is redistributed to fat, certain lean breeds of dogs such as sight hounds will have prolonged recoveries from sodium thiopental due to their lack of body fat and their lean body mass. Conversely, obese animals will have rapid recoveries, but it will be some time[vague] before it is entirely removed (metabolized) from their bodies. Sodium thiopental is always administered intravenously, as it can be fairly irritating; severe tissue necrosis and sloughing can occur if it is injected incorrectly into the tissue around a vein.[citation needed]

Sodium thiopental decreases the cardiac stroke volume, which results in a decrease in cardiac output. The decrease in cardiac output occurs in conjunction with a decrease in systemic vascular resistance, which results in hypotension. However, in comparison with propofol, the reflex tachycardia seen during states of hypotension is relatively spared (a bradycardia is common after administration of propofol) and therefore the observed fall in blood pressure is generally less severe.

Medically induced coma

In addition to anesthesia induction, sodium thiopental was historically used to induce medical comas.[7] It has now been superseded by drugs such as propofol because their effects wear off more quickly than thiopental. Patients with brain swelling, causing elevation of intracranial pressure, either secondary to trauma or following surgery, may benefit from this drug. Sodium thiopental, and the barbiturate class of drugs, decrease neuronal activity and therefore decrease the production of osmotically active metabolites, which in turn decreases swelling. Patients with significant swelling have improved outcomes following the induction of coma. Reportedly, thiopental has been shown to be superior to pentobarbital in reducing intracranial pressure.[8] This phenomenon is also called a reverse steal effect.[citation needed]

Status epilepticus

In refractory status epilepticus, thiopental may be used to terminate a seizure.

Euthanasia

Sodium thiopental is used intravenously for the purposes of euthanasia. In both Belgium and the Netherlands, where active euthanasia is allowed by law, the standard protocol recommends sodium thiopental as the ideal agent to induce coma, followed by pancuronium bromide.[9]

Intravenous administration is the most reliable and rapid way to accomplish euthanasia. A coma is first induced by intravenous administration of 20 mg/kg thiopental sodium (Nesdonal) in a small volume (10 ml physiological saline). Then, a triple dose of a non-depolarizing neuromuscular blocking drug is given, such as 20 mg pancuronium bromide (Pavulon) or 20 mg vecuronium bromide (Norcuron). The muscle relaxant should be given intravenously to ensure optimal availability but pancuronium bromide may be administered intramuscularly at an increased dosage level of 40 mg.[9]

Lethal injection

Along with pancuronium bromide and potassium chloride, thiopental is used in 34 states of the U.S. to execute prisoners by lethal injection. A very large dose is given to ensure rapid loss of consciousness. Although death usually occurs within ten minutes of the beginning of the injection process, some have been known to take longer.[10] The use of sodium thiopental in execution protocols was challenged in court after a study in the medical journal The Lancet reported autopsies of executed inmates showed the level of thiopental in their bloodstream was insufficient to cause unconsciousness.

On December 8, 2009, the State of Ohio became the first to use a single dose of sodium thiopental for its capital execution, following the failed use of the standard three-drug cocktail during a recent execution, due to inability to locate suitable veins. Kenneth Biros was executed using the single-drug method.[11]

The state of Washington is now the second state in the U.S. to use the single-dose sodium thiopental injections for death penalty executions. On September 10, 2010, Cal Coburn Brown was executed. This was the first execution in the state to use a single dose, single drug injection. His death was pronounced approximately one and a half minutes after the intravenous administration of five grams of the drug.[12]

After its use for execution of Jeffrey Landrigan in the U.S., the UK introduced a ban on the export of sodium thiopental in December 2010,[13] after it was established that no European supplies to the U.S. were being used for any other purpose.[14] The restrictions were based on “the European Union Torture Regulation (including licensing of drugs used in execution by lethal injection)”.[15] From 21 December 2011 the European Union extended trade restrictions to prevent the export of certain medicinal products for capital punishment, stating that “the Union disapproves of capital punishment in all circumstances and works towards its universal abolition”.[16]

Truth serum

Thiopental (Pentothal) is still used in some places as a truth serum to weaken the resolve of a subject and make them more compliant to pressure.[17] The barbiturates as a class decrease higher cortical brain functioning. Some psychiatrists hypothesize that because lying is more complex than telling the truth, suppression of the higher cortical functions may lead to the uncovering of the truth. The drug tends to make subjects loquacious and cooperative with interrogators; however, the reliability of confessions made under thiopental is questionable.[18] “Sodium pentathol” as a truth serum has become a trope in films, comics and literature, and even appears in popular music.[19]

Psychiatry

Psychiatrists have used thiopental to desensitize patients with phobias,[20] and to “facilitate the recall of painful repressed memories.”[21] One psychiatrist who worked with thiopental is the Dutch Professor Jan Bastiaans, who used this procedure to help relieve trauma in surviving victims of the Holocaust.[22]

Mechanism of action

Sodium thiopental is a member of the barbiturate class of drugs, which are relatively non-selective compounds that bind to an entire superfamily of ligand-gated ion channels, of which the GABAA receptor channel is one of several representatives. This superfamily of ion channels includes the neuronal nAChR channel, the 5HT3R channel, the GlyR channel and others. Surprisingly, while GABAA receptor currents are increased by barbiturates (and other general anesthetics), ligand-gated ion channels that are predominantly permeable for cationic ions are blocked by these compounds. For example, neuronal nAChR channels are blocked by clinically relevant anesthetic concentrations of both sodium thiopental and pentobarbital.[23] Such findings implicate (non-GABA-ergic) ligand-gated ion channels, e.g. the neuronal nAChR channel, in mediating some of the (side) effects of barbiturates.[24]The GABAA receptor is an inhibitory channel that decreases neuronal activity, and barbiturates enhance the inhibitory action of the GABAA receptor.[25]

Controversies

Following a shortage that led a court to delay an execution in California, a company spokesman for Hospira, the sole American manufacturer of the drug, objected to the use of thiopental in lethal injection. “Hospira manufactures this product because it improves or saves lives, and the company markets it solely for use as indicated on the product labeling. The drug is not indicated for capital punishment and Hospira does not support its use in this procedure.”[26] On January 21, 2011, the company announced that it would stop production of sodium thiopental from its plant in Italy because Italian authorities couldn’t guarantee that exported quantities of the drug would not be used in executions. Italy was the only viable place where the company could produce sodium thiopental, leaving the United States without a supplier.[27]

Metabolism

Thiopental rapidly and easily crosses the blood brain barrier as it is a lipophilic molecule. As with all lipid-soluble anaesthetic drugs, the short duration of action of sodium thiopental is due almost entirely to its redistribution away from central circulation towards muscle and fat tissue, due to its very high fat:water partition coefficient (aprx 10), leading to sequestration in fat tissue. Once redistributed, the free fraction in the blood is metabolized in the liver. Sodium thiopental is mainly metabolized to pentobarbital,[28] 5-ethyl-5-(1′-methyl-3′-hydroxybutyl)-2-thiobarbituric acid, and 5-ethyl-5-(1′-methyl-3′-carboxypropyl)-2-thiobarbituric acid.[29]

Dosage

The usual dose range for induction of anesthesia using thiopental is from 3 to 6 mg/kg; however, there are many factors that can alter this. Premedication with sedatives such as benzodiazepines or clonidine will reduce requirements, as do specific disease states and other patient factors. Among patient factors are: age, sex, and lean body mass. Specific disease conditions that can alter the dose requirements of thiopentone and for that matter any other intravenous anaesthetic are: hypovolemia, burns, azotemia, hepatic failure, hypoproteinemia, etc.[citation needed]

Side effects

As with nearly all anesthetic drugs, thiopental causes cardiovascular and respiratory depression resulting in hypotension, apnea and airway obstruction. For these reasons, only suitably trained medical personnel should give thiopental in an environment suitably equipped to deal with these effects. Side effects include headache, agitated emergence, prolonged somnolence, and nausea. Intravenous administration of sodium thiopental is followed instantly by an odor and/or taste sensation, sometimes described as being similar to rotting onions, or to garlic. The hangover from the side effects may last up to 36 hours.

Although individual molecules of thiopental contain one sulfur atom, it is not a sulfonamide, and does not show allergic reactions of sulfa/sulpha drugs.

Contraindications

Thiopental should be used with caution in cases of liver disease, Addison’s disease, myxedema, severe heart disease, severe hypotension, a severe breathing disorder, or a family history of porphyria.[30][31]

Co-administration of pentoxifylline and thiopental causes death by acute pulmonary edema in rats. This pulmonary edema was not mediated by cardiac failure or by pulmonary hypertension but was due to increased pulmonary vascular permeability.[32]

History

Sodium thiopental was discovered in the early 1930s by Ernest H. Volwiler and Donalee L. Tabern, working for Abbott Laboratories. It was first used in human beings on March 8, 1934, by Dr. Ralph M. Waters[33] in an investigation of its properties, which were short-term anesthesia and surprisingly little analgesia.[34] Three months later,[35] Dr. John S. Lundy started a clinical trial of thiopental at the Mayo Clinic at the request of Abbott.[36]Abbott continued to make the drug until 2004, when it spun off its hospital-products division as Hospira.

Thiopental is famously associated with a number of anesthetic deaths in victims of the attack on Pearl Harbor. These deaths, relatively soon after the drug’s introduction, were said to be due to excessive doses given to shocked trauma patients. However, recent evidence available through freedom of information legislation was reviewed in the British Journal of Anaesthesia,[37] which has suggested that this story was grossly exaggerated. Of the 344 wounded that were admitted to the Tripler Army Hospital only 13 did not survive and it is unlikely that thiopentone overdose was responsible for more than a few of these.

Thiopental is still rarely used as a recreational drug, usually stolen from veterinarians or other legitimate users of the drug; however, more common sedatives such as benzodiazepines are usually preferred as recreational drugs, and abuse of thiopental tends to be uncommon and opportunistic.[citation needed]

See also

https://en.wikipedia.org/wiki/Sodium_thiopental

Story 2: Time For Strategic Patience Is Over — Take Out The Korean Dictator, Missiles, Nuclear Bomb Facilities, Artillery and Rocket Launchers In Range of South Korea — Regularly Planned and Scheduled War — Videos

FRIEDMAN: US Attack on North Korea is Imminent

Crisis & Chaos: Are We Moving Toward World War III?

Inside North Korea’s Special Forces: The North Korea Nightmare

[News – Live] ‘China must be prepared to TOPPLE Kim Jong-un or WE’LL do it’, former US chief claim

A North Korean Mystery: Where Did Its Rockets and Missiles Come From?

‘North Korea would Lose in Nuclear War with USA’ Chief of Staff

HORRIFIC WAR WITH NORTH KOREA IS IMMANENT

WHY U.S IS NOT USING MILITARY OPTION AGAINST NORTH KOREA?

US ATTACK ON NORTH KOREA IS IMMINENT

U.S. defense secretary Mattis says war with North Korea would be “catastrophic”

WHY RUSSIA & CHINA SHOULD FEAR USS GERALD R. FORD? TOP 5 DEFINITIVE REASONS

Special: Attack Weapons on USS Ford Carrier

North Korea: 4th US Aircraft Carrier Joining the 3 Carriers Already in War Zone!

Show of Force: The US Deploys Third Aircraft Carrier to North Korea

Can North Korea Sink a US Aircraft Carrier? Analysis

Russia & China Warn USA: DO NOT use military force against N.Korea-China warns WW3 inevitable!

USA & Japan & South Korea VS Russia & China & North Korea Military Power Comparison 2017 – 2018

WHY U.S. WILL NEVER ATTACK NORTH KOREA?

Who Are North Korea’s Allies?

Why Did America Fight the Korean War?

Why Korea Split Into North and South Korea

Russia warning after US shoots down Syrian jet

The Breathtaking Incoherence of American Foreign Policy as to North Korea and Syria

Story 3: U.S. Navy F-18 Fighter Shoots Down Syrian SU -22 Fighter Over Raqqa, Syria After U.S. Allies On Ground Bombed– Russia Warns U.S. Planes Will Be Considered Targets — Videos

RED ALERT! U.S. Army Chief Threatens War With Russia – china and North Korea

US Navy fighter jet shoots down Syrian warplane

US Navy Fighter shoots down Syrian Warplane over Syria

NEWS ALERT – Syrian warplane shot down by US-led coalition

Russia Vows to Shoot Down Any Aircraft West of Euphrates River

U.S. Warplane Shoots Down Syrian Army Jet, Russia Threatens to Target U.S. Aircraft

Bombshell ‘Army Readiness is at 30% ‘U.S. Army Chief of Staff

‘Extremely Lethal and Fast’ Army Warns Future War with Russia/China

US Shoots Down Syrian Jet, Russia Threatens to Track and Attack Anything West of Euphrates

Russia to treat US jets in Syria as ‘targets’ after America guns down first regime warplane

Communication channel between Washington and Moscow to be suspended immediately

Russia has said it will treat US warplanes operating in parts of Syria where its air forces are also present as “targets” amid a diplomatic row caused by the downing of a Syrian jet.

The country’s defence ministry said it would track US-led coalition aircraft with missile systems and military aircraft, but stopped short of saying it would shoot them down.

A hotline set up between Russia and the US to prevent mid-air collisions will also be suspended.

“All kinds of airborne vehicles, including aircraft and UAVs of the international coalition detected to the west of the Euphrates River will be tracked by the Russian SAM systems as air targets,” the Russian Defence Ministry said in a statement.

The warning comes after a US F-18 Super Hornet shot down a Syrian army SU-22 jet on Sunday in the countryside southwest of Raqqa – the first such downing of a Syrian jet by the US since the start of the country’s civil war in 2011.

Washington said the jet had dropped bombs near US-backed forces but Damascus said the plane was downed while flying a mission against Isis militants.

Russia’s defence ministry said the suspension of its communication line with the Americans would begin immediately.

The US did not use its hotline with Russia ahead of the downing of the Syrian government warplane, said the ministry, which accused the US of a “deliberate failure to make good on its commitments” under the deconfliction deal.

“The shooting down of a Syrian Air Force jet in Syria’s airspace is a cynical violation of Syria’s sovereignty,” the ministry said.

“The US’ repeated combat operations under the guise of ‘combating terrorism’ against the legitimate armed forces of a UN member-country are a flagrant violation of international law and an actual military aggression against the Syrian Arab Republic.”

Theresa May appealed to Russia to continue the use of “deconfliction” measures over the skies of Syria to reduce the risk of misunderstandings in what is a crowded airspace.

Russia, which has been providing air cover for Syria’s President, Bashar al-Assad, since 2015, has an agreement with the US aimed at preventing incidents involving either country’s warplanes engaged in operations in Syria.

Downing the jet was akin to “helping the terrorists that the US is fighting against”, Sergei Ryabkov, Russia’s deputy foreign minister, said.

A statement released by US Central Command on Sunday said the Syrian jet was “immediately shot down… in accordance with rules of engagement and in collective self-defence of Coalition partnered forces”.

“The Coalition’s mission is to defeat Isis in Iraq and Syria. The Coalition does not seek to fight Syrian regime, Russian, or pro-regime forces partnered with them, but will not hesitate to defend Coalition or partner forces from any threat,” it added.

“The Coalition presence in Syria addresses the imminent threat Isis in Syria poses globally. The demonstrated hostile intent and actions of pro-regime forces toward Coalition and partner forces in Syria conducting legitimate counter-Isis operations will not be tolerated.”

Tensions rise in Syria as Russia, Iran send US warnings

By BASSEM MROUE and NATALIYA VASILYEVA, Associated PressTHE ASSOCIATED PRESS STATEMENT OF NEWS VALUES AND PRINCIPLES

(AP) — Russia on Monday threatened aircraft from the U.S.-led coalition in Syrian-controlled airspace and suspended a hotline intended to avoid collisions in retaliation for the U.S. military shooting down a Syrian warplane.

The U.S. said it had downed the Syrian jet a day earlier after it dropped bombs near the U.S.-backed Syrian Democratic Forces conducting operations against the Islamic State group, adding that was something it would not tolerate.

The downing of the warplane — the first time in the six-year conflict that the U.S. has shot down a Syrian jet — came amid another first: Iran fired several ballistic missiles Sunday night at IS positions in eastern Syria in what it said was a message to archrival Saudi Arabia and the United States.

The developments added to already-soaring regional tensions and reflect the intensifying rivalry among the major players in Syria’s civil war that could spiral out of control just as the fight against the Islamic State group in its stronghold of Raqqa is gaining ground.

Russia, a key ally of Syrian President Bashar Assad, called on the U.S. military to provide a full accounting as to why it decided to shoot down the Syrian Su-22 bomber.

The U.S. military confirmed that one of its F-18 Super Hornets shot down a Syrian jet that had dropped bombs near the U.S. partner forces SDF. Those forces, which are aligned with the U.S. in the campaign against the Islamic State group, warned Syrian government troops to stop their attacks or face retaliation.

The Russian Defense Ministry said in a statement that as of Monday, all coalition jets and drones flying west of the Euphrates River will be tracked as potential targets.

Areas of northern Syria west of the Euphrates were controlled by IS before Syrian government forces captured most of them in recent months. The Russians, who have been providing air cover for Assad’s forces since 2015, appear to want to avoid further U.S. targeting of Syrian warplanes or ground troops that have come under U.S. attack in eastern Syria recently.

It was the second time Russia suspended a hotline intended to minimize incidents with the U.S. in Syrian airspace. In April, Russia briefly suspended cooperation after the U.S. military fired 59 missiles at a Syrian air base following a chemical weapons attack that Washington blamed on the Assad government.

Gen. Joseph Dunford, chairman of the Joint Chiefs of Staff, said Washington is working to re-establish communications aimed at avoiding mishaps involving U.S. and Russian air operations in Syria.

Speaking in Washington, the top U.S. military officer said the two sides were in delicate discussions to lower tensions.

“The worst thing any of us could do right now is address this with hyperbole,” Dunford said.

Viktor Ozerov, chairman of the defense and security committee at the upper chamber of Russian parliament, described his Defense Ministry’s statement as a warning.

“I’m sure that because of this, neither the U.S. nor anyone else will take any actions to threaten our aircraft,” he told the state-owned RIA Novosti news agency. “That’s why there’s no threat of direct confrontation between Russia and American aircraft.”

Ozerov insisted that Russia will be tracking the coalition’s jets, not shooting them down, but he added that “a threat for those jets may appear only if they take action that pose a threat to Russian aircraft.”

Iran said the missile strike by its powerful Revolutionary Guard hit Syria’s eastern city of Deir el-Zour on Sunday night and was in retaliation for two attacks in Tehran earlier this month that killed 17 people and were claimed by the Islamic State group.

It appeared to be Iran’s first missile attack abroad in over 15 years and its first in the Syrian conflict, in which it has provided crucial support to Assad. The muscle-flexing comes amid the worsening of a long-running feud between Shiite powerhouse Iran and Saudi Arabia, with supports Syrian rebels and has led recent efforts to isolate the Gulf nation of Qatar.

“The Saudis and Americans are especially receivers of this message,” Gen. Ramazan Sharif of the Revolutionary Guard told Iranian state TV in an interview.

It also raised questions about how U.S. President Donald Trump’s administration, which had previously put Iran “on notice” for its ballistic missile tests, will respond. Israel also is concerned about Iran’s missiles and has deployed a multilayered missile-defense system.

The missile attack came amid recent confrontations in Syria between U.S.-backed forces and Iranian-backed pro-government factions. The U.S. recently deployed a truck-mounted missile system in Syria as Iranian-backed forces cut off the advance of the U.S.-supported rebels along the Iraqi border.

Iranian officials threatened more strikes. Former Guard chief Gen. Mohsen Rezai wrote on Twitter: “The bigger slap is yet to come.”

U.S.-backed opposition fighters said Assad’s forces have been attacking them in the northern province of Raqqa and warned that if such attacks continue, the fighters will take action.

Clashes between Syrian troops and the SDF would escalate tensions and open a new front line in the many complex battlefields of the civil war, now in its seventh year. Clashes between the Kurdish-led SDF and Syrian forces have been rare and some rebel groups have even accused them of coordinating on the battlefield.

Both sides are battling the Islamic State group, with SDF fighters focusing on their march into the northern city of Raqqa, which the extremist group has declared to be its capital.

Syrian government forces have also been attacking IS in northern, central and southern parts of the country, seizing 25,000 square kilometers (9,600 square miles) and reaching the Iraqi border for the first time in years.

SDF spokesman Talal Sillo said the government wants to thwart the SDF offensive to capture Raqqa. He said government forces began attacking the SDF on Saturday, using warplanes, artillery and tanks in areas that SDF had liberated from IS.

Sillo also warned that if “the regime continues in its offensive against our positions in Raqqa province, this will force us to retaliate with force.”

The Britain-based Syrian Observatory for Human Rights, which tracks Syria’s war, said government forces expanded their presence in Raqqa province by capturing from IS the town of Rasafa.

___

Vasilyeva reported from Moscow. Associated Press writers Nasser Karimi in Tehran and Jon Gambrell in Dubai, United Arab Emirates, contributed.

http://hosted2.ap.org/APDefault/*/Article_2017-06-19-Syria/id-371357b2c20e4aaa982d07da071a7f7a

Story 4: Interventionist Foreign Policy of Progressive Democrats and Republicans (Neocons) Projecting Power of American Empire — No War Ever Declared Or American People Consulted — Videos

Ron Paul – Neo-CONNED!

Should America be the World’s Policeman?

Ron Paul Americans Are Forced to Pay for U S Government’s Interventionist Foreign Policy

Outline of US foreign interventions

CIA Covert Operations and U.S. Interventions Since World War II Full documentary

Overthrowing Governments 101, CIA Coups

Ron Paul explains he’s not an Isolationist

The Middle East Problem

The Pronk Pops Show Podcasts Portfolio

Listen To Pronk Pops Podcast or Download Shows 906-914

Listen To Pronk Pops Podcast or Download Shows 889-896

Listen To Pronk Pops Podcast or Download Shows 884-888

Listen To Pronk Pops Podcast or Download Shows 878-883

Listen To Pronk Pops Podcast or Download Shows 870-877

Listen To Pronk Pops Podcast or Download Shows 864-869

Listen To Pronk Pops Podcast or Download Shows 857-863

Listen To Pronk Pops Podcast or Download Shows 850-856

Listen To Pronk Pops Podcast or Download Shows 845-849

Listen To Pronk Pops Podcast or Download Shows 840-844

Listen To Pronk Pops Podcast or Download Shows 833-839

Listen To Pronk Pops Podcast or Download Shows 827-832

Listen To Pronk Pops Podcast or Download Shows 821-826

Listen To Pronk Pops Podcast or Download Shows 815-820

Listen To Pronk Pops Podcast or Download Shows 806-814

Listen To Pronk Pops Podcast or Download Shows 800-805

Listen To Pronk Pops Podcast or Download Shows 793-799

Listen To Pronk Pops Podcast or Download Shows 785-792

Listen To Pronk Pops Podcast or Download Shows 777-784

Listen To Pronk Pops Podcast or Download Shows 769-776

Listen To Pronk Pops Podcast or Download Shows 759-768

Listen To Pronk Pops Podcast or Download Shows 751-758

Listen To Pronk Pops Podcast or Download Shows 745-750

Listen To Pronk Pops Podcast or Download Shows 738-744

Listen To Pronk Pops Podcast or Download Shows 732-737

Listen To Pronk Pops Podcast or Download Shows 727-731

Listen To Pronk Pops Podcast or Download Shows 720-726

Listen To Pronk Pops Podcast or DownloadShows 713-719

Listen To Pronk Pops Podcast or DownloadShows 705-712

Listen To Pronk Pops Podcast or Download Shows 695-704

Listen To Pronk Pops Podcast or Download Shows 685-694

Listen To Pronk Pops Podcast or Download Shows 675-684

Listen To Pronk Pops Podcast or Download Shows 668-674

Listen To Pronk Pops Podcast or Download Shows 660-667

Listen To Pronk Pops Podcast or Download Shows 651-659

Listen To Pronk Pops Podcast or Download Shows 644-650

Listen To Pronk Pops Podcast or Download Shows 637-643

Listen To Pronk Pops Podcast or Download Shows 629-636

Listen To Pronk Pops Podcast or Download Shows 617-628

Listen To Pronk Pops Podcast or Download Shows 608-616

Listen To Pronk Pops Podcast or Download Shows 599-607

Listen To Pronk Pops Podcast or Download Shows 590-598

Listen To Pronk Pops Podcast or Download Shows 585- 589

Listen To Pronk Pops Podcast or Download Shows 575-584

Listen To Pronk Pops Podcast or Download Shows 565-574

Listen To Pronk Pops Podcast or Download Shows 556-564

Listen To Pronk Pops Podcast or Download Shows 546-555

Listen To Pronk Pops Podcast or Download Shows 538-545

Listen To Pronk Pops Podcast or Download Shows 532-537

Listen To Pronk Pops Podcast or Download Shows 526-531

Listen To Pronk Pops Podcast or Download Shows 519-525

Listen To Pronk Pops Podcast or Download Shows 510-518

Listen To Pronk Pops Podcast or Download Shows 500-509

Listen To Pronk Pops Podcast or Download Shows 490-499

Listen To Pronk Pops Podcast or Download Shows 480-489

Listen To Pronk Pops Podcast or Download Shows 473-479

Listen To Pronk Pops Podcast or Download Shows 464-472

Listen To Pronk Pops Podcast or Download Shows 455-463

Listen To Pronk Pops Podcast or Download Shows 447-454

Listen To Pronk Pops Podcast or Download Shows 439-446

Listen To Pronk Pops Podcast or Download Shows 431-438

Listen To Pronk Pops Podcast or Download Shows 422-430

Listen To Pronk Pops Podcast or Download Shows 414-421

Listen To Pronk Pops Podcast or Download Shows 408-413

Listen To Pronk Pops Podcast or Download Shows 400-407

Listen To Pronk Pops Podcast or Download Shows 391-399

Listen To Pronk Pops Podcast or Download Shows 383-390

Listen To Pronk Pops Podcast or Download Shows 376-382

Listen To Pronk Pops Podcast or Download Shows 369-375

Listen To Pronk Pops Podcast or Download Shows 360-368

Listen To Pronk Pops Podcast or Download Shows 354-359

Listen To Pronk Pops Podcast or Download Shows 346-353

Listen To Pronk Pops Podcast or Download Shows 338-345

Listen To Pronk Pops Podcast or Download Shows 328-337

Listen To Pronk Pops Podcast or Download Shows 319-327

Listen To Pronk Pops Podcast or Download Shows 307-318

Listen To Pronk Pops Podcast or Download Shows 296-306

Listen To Pronk Pops Podcast or Download Shows 287-295

Listen To Pronk Pops Podcast or Download Shows 277-286

Listen To Pronk Pops Podcast or Download Shows 264-276

Listen To Pronk Pops Podcast or Download Shows 250-263

Listen To Pronk Pops Podcast or Download Shows 236-249

Listen To Pronk Pops Podcast or Download Shows 222-235

Listen To Pronk Pops Podcast or Download Shows 211-221

Listen To Pronk Pops Podcast or Download Shows 202-210

Listen To Pronk Pops Podcast or Download Shows 194-201

Listen To Pronk Pops Podcast or Download Shows 184-193

Listen To Pronk Pops Podcast or Download Shows 174-183

Listen To Pronk Pops Podcast or Download Shows 165-173

Listen To Pronk Pops Podcast or Download Shows 158-164

Listen To Pronk Pops Podcast or Download Shows151-157

Listen To Pronk Pops Podcast or Download Shows 143-150

Listen To Pronk Pops Podcast or Download Shows 135-142

Listen To Pronk Pops Podcast or Download Shows 131-134

Listen To Pronk Pops Podcast or Download Shows 124-130

Listen To Pronk Pops Podcast or Download Shows 121-123

Listen To Pronk Pops Podcast or Download Shows 118-120

Listen To Pronk Pops Podcast or Download Shows 113 -117

Listen To Pronk Pops Podcast or Download Show 112

Listen To Pronk Pops Podcast or Download Shows 108-111

Listen To Pronk Pops Podcast or Download Shows 106-108

Listen To Pronk Pops Podcast or Download Shows 104-105

Listen To Pronk Pops Podcast or Download Shows 101-103

Listen To Pronk Pops Podcast or Download Shows 98-100

Listen To Pronk Pops Podcast or Download Shows 94-97

Listen To Pronk Pops Podcast or Download Show 93

Listen To Pronk Pops Podcast or Download Show 92

Listen To Pronk Pops Podcast or Download Show 91

Listen To Pronk Pops Podcast or Download Shows 88-90

Listen To Pronk Pops Podcast or Download Shows 84-87

Listen To Pronk Pops Podcast or Download Shows 79-83

Listen To Pronk Pops Podcast or Download Shows 74-78

Listen To Pronk Pops Podcast or Download Shows 71-73

Listen To Pronk Pops Podcast or Download Shows 68-70

Listen To Pronk Pops Podcast or Download Shows 65-67

Listen To Pronk Pops Podcast or Download Shows 62-64

Listen To Pronk Pops Podcast or Download Shows 58-61

Listen To Pronk Pops Podcast or Download Shows 55-57

Listen To Pronk Pops Podcast or Download Shows 52-54

Listen To Pronk Pops Podcast or Download Shows 49-51

Listen To Pronk Pops Podcast or Download Shows 45-48

Listen To Pronk Pops Podcast or Download Shows 41-44

Listen To Pronk Pops Podcast or Download Shows 38-40

Listen To Pronk Pops Podcast or Download Shows 34-37

Listen To Pronk Pops Podcast or Download Shows 30-33

Listen To Pronk Pops Podcast or Download Shows 27-29

Listen To Pronk Pops Podcast or Download Shows 17-26

Listen To Pronk Pops Podcast or Download Shows 16-22

Listen To Pronk Pops Podcast or Download Shows 10-15

Listen To Pronk Pops Podcast or Download Shows 1-9

Read Full Post | Make a Comment ( None so far )

The Pronk Pops Show 913, June 16, 2017, Story 1: President Trump Reverses Obama’s Cuba Policies — Videos — Story 2: Political Elitist Establishment vs. The American People — Three Sticks Mueller Hires Clinton and Obama Donors and Lawyers For Elite Political Hit Squad Targeting President Trump For Fake Obstruction of Justice —  Trump Should Fire Mueller and Initiate A Justice Department and FBI Criminal Investigation of Barack Obama,Valery Jarrett, Hillary and Bill Clinton, Susan Rice, Loretta Lynch, James Comey and Their Staffs For Massive Criminal Activity Including Miss Handling Of Classified Documents and Destruction of Government Records, Public Corruption, Misconduct in Office, Obstruction of Justice, Perjury and Conspiracy to commit perjury and Using Intelligence Community To Spy on American People Including Republican Candidates and Trump For Political Purposes — Videos

Posted on June 16, 2017. Filed under: 2016 Presidential Candidates, Addiction, American History, Barack H. Obama, Ben Carson, Bernie Sanders, Bill Clinton, Blogroll, Books, Breaking News, Communications, Computers, Congress, Constitutional Law, Corruption, Countries, Crime, Culture, Donald J. Trump, Donald J. Trump, Donald J. Trump, Donald Trump, Donald Trump, Education, Empires, Employment, Federal Bureau of Investigation (FBI), Federal Government, Freedom of Speech, Government, Government Dependency, Government Spending, Hillary Clinton, Hillary Clinton, Hillary Clinton, History, House of Representatives, Human Behavior, Illegal Immigration, Immigration, Independence, Insurance, Investments, Jeb Bush, Language, Law, Legal Immigration, Lying, Marco Rubio, Mike Pence, National Security Agency, People, Rand Paul, Senate, United States of America | Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , |

 

Project_1

The Pronk Pops Show Podcasts

Pronk Pops Show 913,  June 16, 2017

Pronk Pops Show 912,  June 15, 2017

Pronk Pops Show 911,  June 14, 2017

Pronk Pops Show 910,  June 13, 2017

Pronk Pops Show 909,  June 12, 2017

Pronk Pops Show 908,  June 9, 2017

Pronk Pops Show 907,  June 8, 2017

Pronk Pops Show 906,  June 7, 2017

Pronk Pops Show 905,  June 6, 2017

Pronk Pops Show 904,  June 5, 2017

Pronk Pops Show 903,  June 1, 2017

Pronk Pops Show 902,  May 31, 2017

Pronk Pops Show 901,  May 30, 2017

Pronk Pops Show 900,  May 25, 2017

Pronk Pops Show 899,  May 24, 2017

Pronk Pops Show 898,  May 23, 2017

Pronk Pops Show 897,  May 22, 2017

Pronk Pops Show 896,  May 18, 2017

Pronk Pops Show 895,  May 17, 2017

Pronk Pops Show 894,  May 16, 2017

Pronk Pops Show 893,  May 15, 2017

Pronk Pops Show 892,  May 12, 2017

Pronk Pops Show 891,  May 11, 2017

Pronk Pops Show 890,  May 10, 2017

Pronk Pops Show 889,  May 9, 2017

Pronk Pops Show 888,  May 8, 2017

Pronk Pops Show 887,  May 5, 2017

Pronk Pops Show 886,  May 4, 2017

Pronk Pops Show 885,  May 3, 2017

Pronk Pops Show 884,  May 1, 2017

Pronk Pops Show 883 April 28, 2017

Pronk Pops Show 882: April 27, 2017

Pronk Pops Show 881: April 26, 2017

Pronk Pops Show 880: April 25, 2017

Pronk Pops Show 879: April 24, 2017

Pronk Pops Show 878: April 21, 2017

Pronk Pops Show 877: April 20, 2017

Pronk Pops Show 876: April 19, 2017

Pronk Pops Show 875: April 18, 2017

Pronk Pops Show 874: April 17, 2017

Pronk Pops Show 873: April 13, 2017

Pronk Pops Show 872: April 12, 2017

Pronk Pops Show 871: April 11, 2017

Pronk Pops Show 870: April 10, 2017

Pronk Pops Show 869: April 7, 2017

Pronk Pops Show 868: April 6, 2017

Pronk Pops Show 867: April 5, 2017

Pronk Pops Show 866: April 3, 2017

Pronk Pops Show 865: March 31, 2017

Pronk Pops Show 864: March 30, 2017

Pronk Pops Show 863: March 29, 2017

Pronk Pops Show 862: March 28, 2017

Pronk Pops Show 861: March 27, 2017

Pronk Pops Show 860: March 24, 2017

Pronk Pops Show 859: March 23, 2017

Pronk Pops Show 858: March 22, 2017

Pronk Pops Show 857: March 21, 2017

Pronk Pops Show 856: March 20, 2017

Pronk Pops Show 855: March 10, 2017

Pronk Pops Show 854: March 9, 2017

Pronk Pops Show 853: March 8, 2017

Pronk Pops Show 852: March 6, 2017

Pronk Pops Show 851: March 3, 2017

Pronk Pops Show 850: March 2, 2017

Pronk Pops Show 849: March 1, 2017

Image result for president trump speech 16 june 2017 florida on cuba

Image result for trump tweets on special counsel leaks colllusion and now obstructionImage result for mueller hit squad of lawyers

Story 1: President Trump Reverses Obama’s Cuba Policies — Videos —

Image result for president trump speech 16 june 2017 florida on cuba Image result for trump speech on cuba in florida June 16, 2017

Trump’s new Cuba policy, explained

Image result for branco cartoon on mueller

Image result for cartoons on trump reversing cuba policies

President Trump cancels Obama-era policy on Cuba, restores embargo

FULL SPEECH: President Donald Trump: “I am cancelling” Obama’s deal with Cuba! MAGA MUST SHARE 6/16

Watch Marco Rubio Slam Obama And Praise President Donald Trump For Support Of Cuba 6/16/2017

President Donald Trump Cuba Policy Change Speech Full

Cuba

Trump ‘canceling’ Obama’s Cuba policy but leaves much in place

Ramon Espinosa/AP
WATCHTrump ‘canceling’ Obama Cuba policy but leaves much in place

After nearly three years of warming relations between the United States and Cuba, President Donald Trump has announced that his administration will unravel many of his predecessor’s policies on the communist state.

Speaking in Miami, Florida, Trump announced changes to President Barack Obama’s historic rapprochement with Cuba — fulfilling a promise to the anti-Castro voting bloc he believes helped his campaign clinch the state, but stirring fear among others he could set back business interests and Cuba’s potential for a more prosperous private sector.

The Cuban government said in a statement published in the state-run newspaper Granma, “Again, the United States Government resorted to coercive methods of the past, adopting measures to intensify the blockade, in force since February 1962, which not only causes damage and deprivation to the Cuban people and constitutes an undeniable obstacle to the development of our economy, but also affects the sovereignty and interests of other countries, inciting international rejection.”

The statement continues, “The Cuban Government denounces the new measures to tighten the blockade, which are destined to fail as has been shown repeatedly in the past, and which will not achieve its purpose to weaken the revolution or to defeat the Cuban people, whose resistance to the aggressions of any type and origin has been proven over almost six decades.”

Decades of contention before Obama

In one form or another, the embargo on Cuba has been in place since the Eisenhower administration. But beginning in late 2014, Obama and Cuban President Raul Castro began a process that gradually thawed diplomatic tensions and eased commercial and travel restrictions between the two countries.

This process culminated in significant economic opportunities for both the U.S. and Cuba. American businesses, including airlines, cruise lines, and telecommunications companies, earned 26 agreements with the Cuban government from 2015 to 2017.

Hundreds of millions of U.S. dollars flowed into privately owned businesses in Cuba, The Associated Press reported , spurring the growth of a nascent middle-class that could thrive independent from the government.

For Cuba, there have been tangible benefits in tourism and telecommunications. According to the Cuban Ministry, 74 percent more American citizens visited the island in 2016 than in 2015 and, following through on a pledge to Obama, Castro opened nearly 400 new public Wi-Fi access points around Cuba.

However, the U.S. International Trade Administration told ABC News it hasn’t yet released its 2016 statistics on outbound travel and therefore could not confirm those numbers from the Cuban Ministry on U.S. tourism.

While Obama did not end the embargo on Cuba, since only Congress has that power, the U.S. and Cuba reopened embassies in each other’s capitals for the first time since 1961. The U.S. and Cuba have also signed multiple bilateral agreements to work together on everything from human and drug trafficking to maritime security and migration.

Finally, Obama ended the “wet foot, dry foot” immigration policy that applied only to Cubans. Previously, Cubans who reached U.S. shores earned automatic visas. Now, Cubans have to follow the same process as other refugees and immigrants.

What is Trump reversing?

Trump is not reversing all of Obama’s changes, but he is redefining what it means to be part of the Cuban military, which could prevent U.S. companies from doing business in Cuba. The White House explained in a fact sheet released earlier today that the policy aims to keep the Grupo de Administración Empresarial (GAESA), a conglomerate managed by the Cuban military, from benefiting from the opening in U.S.-Cuba relations.

“The profits from investment and tourism flow directly to the military. The regime takes the money and owns the industry,” Trump said. “The outcome of last administration’s executive action has been only more repression and a move to crush the peaceful democratic movement. Therefore, effective immediately, I am canceling the last administration’s completely one-sided deal with Cuba.”

This comes amid concerns that the Cuban military could be the beneficiary of increased American private investment, at a time when Castro has failed to take action on human rights. In 2016, there were 9,940 short-term detentions of protesters, up from 8,899 in 2014, the AP reports.

According to senior White House officials, Trump is also revisiting trade and travel policies toward Cuba, clamping down on individual people-to-people travel. There will still be certain exceptions under which Americans can travel to Cuba and family travel will continue to be authorized. Importantly, no changes will go into effect until the Treasury and Commerce Departments issue new regulations that conform with the administration’s policy.

Trump continued, “We will not lift sanctions on the Cuban regime until all political prisoners are free, freedoms of assembly and expression are respected, all political parties are legalized and free and internationally supervised elections are scheduled.”

The changes will certainly harm relations between Cuba and the U.S. In a hearing before the Senate Foreign Relations Committee on Tuesday, Secretary of State Rex Tillerson explained, “The general approach, if I can say that, is to allow as much of this continued commercial and engagement activity to go on as possible because we do see the sunny side, as I described it. We do see the benefits of that to the Cuban people.”

But then Tillerson qualified his statement. “On the other hand, we think we’ve achieved very little in terms of changing the behavior of the regime in Cuba and its treatment of people,” he said, “and it has little incentive to change that.”

What about diplomatic ties?

Senior White House officials say that Trump will not close the newly re-opened U.S. Embassy in Havana. He will also not reinstate the “wet foot, dry foot” policy.

To avoid alienating the Cuban-American community, which largely votes Republican, Trump will not re-implement limits on remittances — U.S. based money transfers — that Cuban-Americans can give their families back on the island. But if the administration follows through on redefining what it means to be part of the Cuban military, that could affect policies on remittances down the line.

PHOTO: Tourists ride in classic American convertible cars past the United States embassy in Havana, Cuba, Jan. 12, 2017. Ramon Espinosa/AP, file
Tourists ride in classic American convertible cars past the United States embassy in Havana, Cuba, Jan. 12, 2017.

Lobbying Trump on Cuba

Sen. Marco Rubio and Rep. Mario Diaz-Balart, both Republican, Cuban-American hardliners, lobbied Trump hard toward reversal. Importantly, the Trump administration wants to build good rapport with both. Rubio sits on the Senate Intelligence Committee, which is currently looking into the Trump campaign’s supposed contacts with Russian officials. He spoke in Miami briefly before Trump took the stage.

Rubio and Diaz-Balart won out, though there’s no shortage of actors lobbying the White House the other way. Last week, a group of House Republicans sent a letter to Trump opposing “reversing course” on Cuba. A similar group of Senate Republicans wrote to Tillerson and national security adviser H.R. McMaster, citing the entrepreneurial and national security benefits of continued engagement. Airbnb, Google and other notable businesses have also spoken out recently in support of maintaining current policies.

Tillerson had privately expressed support for Obama’s Cuba policy during the transition, according to sources. Secretary of Agriculture Sonny Perdue, when governor of Georgia in 2010, led a delegation to Cuba and said at the time to the Atlanta Journal-Constitution, “I think business cures a lot of ills.”

Leading human rights organizations, including Amnesty International and Human Rights Watch, have also urged the administration to keep Cuba open.

“More travel, more communications access, and more dialogue with Cuba are the way forward for human rights in Cuba,” Amnesty International wrote in a blog post, adding that Obama’s trip to Cuba last year opened the door to “scrutiny and transparency” of human rights on the island for the first time in nearly 10 years.

Reversing policy is bad for Cubans, Human Rights Watch said in a statement, “and insisting on human rights progress as a precondition to a new policy is unlikely to bring about change.”

What did Candidate Trump say?

During the campaign, Candidate Trump slammed Obama’s Cuba policy, telling a crowd in Miami: “All the concessions that Barack Obama has granted the Castro regime were done through executive order, which means the next president can reverse them. And that I will do unless the Castro regime meets our demands.”

But at the same time, Trump often criticizes regulations on the business community as “burdensome” and “job-killing.”

Today’s speech

Delivering a speech at the historic Manuel Artime Theater in Miami’s Little Havana neighborhood, Trump made his policy known in the center of the Cuban-American community. The president fed off of a boisterous, rowdy crowd, seeming to even attempt a Cuban accent, shouting “Little Havana!” when he took the stage. By rescinding certain Obama-era Cuba policies, he went against the advice of Democrats, Republicans and business interests. He did, however, fulfill a campaign promise.

ABC News’ Katherine Faulders, Serena Marshall and Adam Kelsey contributed to this report. 

http://abcnews.go.com/Politics/trumps-cuba-policy/story?id=48058622

Trump’s Cuba Policy Will Fail

The architect of Obama’s Cuba opening argues that the president’s rollback is a pointless mistake.

Juan Carlos Ulate / Reuters
One of the most depressing things about President Donald Trump’s decision to roll back elements of the Cuba opening is how predictable it was. A Republican candidate for president makes last-minute campaign promises to a hard-line Cuban American audience in South Florida. Senator Marco Rubio and Congressman Mario Diaz-Balart hold him to those promises. The U.S. government announces changes that will hurt ordinary Cubans, harm the image of the United States, and make it harder for Americans to do business and travel somewhere they want to go.

While President Obama raised the hopes of Americans and Cubans alike with a forward-looking opening in diplomatic, commercial and people-to-people ties, President Trump is turning back the clock to a tragically failed Cold War mindset by reimposing restrictions on those activities. While not a full reversal of the Obama opening, Trump’s actions have put relations between the United States and Cuba back into the prison of the past—setting back the prospects for reform inside of Cuba, and ignoring the voices of the Cuban people and a majority of Americans just so that he can reward a small and dwindling political constituency.

It didn’t have to be this way, and it won’t stay this way.

 

In the fall of 2014, after 16 months of secret negotiations, I travelled to the Vatican to tell representatives of Pope Francis that the United States and Cuba were prepared to begin normalizing relations. The Vatican diplomats met separately with the U.S. and Cuban delegations to verify that we were telling the truth. Then we all met together and read aloud the steps we were prepared to take. A Cardinal said the world would be moved by this example of former adversaries putting aside the past. One Vatican official who had lived in Cuba had tears in his eyes, a look of deep remembrance on his face.Cuba has long played an outsized role in the world’s imagination. To Americans, it has been the setting for the drama of mobsters, Castros, the Cold War, assassination attempts, boatlifts, and ideological conflict—mixed with the allure of a culture that finds full expression in Miami. To Latin America, Cuba has been a symbol for how United States tries to dictate the politics of the hemisphere—a legacy of democracy and economic progress, as well as coups and death squads. To the developing world, Cuba has been a symbol of sovereignty and resistance, and a supporter of revolution—for good or bad. From the Missile Crisis to the anti-apartheid movement; from the Kennedys to Obama era, this small island has put itself at the center of world events.

But Cuba is also a place where more than 11 million people live, and for decades they have suffered because of the U.S. embargo stacked on top of socialist economics and stifled political dissent. Basic goods are unavailable. Businesses cannot attract investment. Farmers are denied equipment to grow more food. Those classic cars? Cubans have had to keep them running because they’re imprisoned in an economy that is not allowed to grow along with the rest of the world. Meanwhile, Americans—who are supposed to value freedom above everything else—have been told that the only country in the world where we cannot travel is 90 miles from Florida.

Yes, the Cuban government shoulders its share of the blame. But there are dozens of authoritarian governments; we do not impose embargoes on China or Vietnam, Kazakhstan or Egypt. Last month, President Trump travelled to Saudi Arabia—a country ruled by a family, where people are beheaded and women can’t drive. He announced tens of billions of dollars in arms sales, and said: “We are not here to lecture. We are not here to tell other people how to live.” Can anyone credibly argue that Trump’s Cuba policy is motivated by a commitment to promote human rights around the world? No. Moreover, as a democracy-promotion vehicle, the embargo has been a failure. For more than 50 years, it has been in place; for more than 50 years, a Castro has governed Cuba. If anything, the embargo has provided a justification for the Cuban government to suppress political dissent in the name of protecting Cuban sovereignty.By breaking with this past, the Obama administration improved the lives of the Cuban people, and brought hope to people who had learned to live without it. The nascent Cuban private sector—shops, restaurants, taxis—grew dramatically, fueled by unlimited remittances from the United States. Over a quarter of Cubans today work in the private sector. This represents both an improvement in their quality of life, and in their human rights, as they are no longer reliant on the state for their livelihoods.
With the establishment of direct flights, cruise lines, and broadened authorization for travel to Cuba, the number of Americans visiting increased by 50 percent to over 500,000 in 2016. These travelers brought new ideas and more resources directly to the Cuban people—Airbnb estimates that $40 million in revenue have reached Cuban hosts since April 2015. Cuba also expanded access to the Internet and mobile phones. U.S. technology companies like Google took advantage of the opening to forge new agreements, including one that enhances access to the Internet for Cubans.Two governments that once plotted how to undermine one another began working together. Embassies were opened, and bilateral cooperation was initiated on the types of issues that usually guide diplomacy between neighbors: counter-narcotics, law enforcement, agriculture, testing vaccines for cancer, and responding to natural disasters like oil spills and hurricanes. In the final days of the Obama administration, the so-called Wet Foot Dry Foot policy was terminated, ending an arrangement in which any Cuban who reached the United States was paroled into the country—a hostile policy that endangered the lives of Cubans who made long overland crossings, and robbed Cuba of young people who simply came to the United States.The opening to Cuba also opened up new opportunities in Latin America and around the world. In 2015, instead of spending a Summit of the Americas defending why Cuba wasn’t allowed to attend, the United States found itself in the new position of being celebrated. U.S. diplomats participated in Cuban-hosted talks that helped end Colombia’s 40-year civil war. Cuban health care workers helped us stamp out the Ebola epidemic in West Africa.
While Trump did not take dramatic steps to restrict travel, he made it more difficult. U.S. travelers now have to go through the absurd process of figuring out if a hotel they’re staying at is owned by the Cuban military, which applies to most of Old Havana. Ominous language about requiring Americans to document their activities, and warning that they could be audited, will have a chilling effect. Despite rhetoric about supporting Cuban entrepreneurs, any reduction in travel is going to hit them—common sense suggests that someone who stays at a military-owned hotel will also ride in taxis, eat in restaurants, and shop at stores owned by ordinary Cubans. Those are the Cubans that Trump is hurting—not hotel owners who will still welcome tourists other countries.
The consequences in Latin America, and around the world, are even worse. Critics of Obama’s opening accused us of making concessions to the Cuban government. But by restoring diplomatic relations, we brought about a symbolic end to the U.S.-Cuban conflict even though we did not lift the embargo or return Guantanamo Naval Base. It’s not a “concession” to allow Americans to travel and do business somewhere. But Trump just gave the Cuban government a huge concession: Even though he didn’t fully reverse Obama’s policy, Cuba will now claim the high ground in a renewed ideological conflict with the U.S., and will find support for that position around the world.The instinct for isolation that Trump embraced will fail. Ironically, the hard-liners who pressed Trump to make these changes are only condemning themselves to future irrelevance. Polls show that over 70 percent of Americans—including a majority of Republicans—support lifting the embargo. Younger Cuban Americans are far more likely to support lifting the embargo than their parents and grandparents. Fifty-five senators have co-sponsored a bill to lift the travel ban, and Republicans from states that depend on agriculture want to promote business in Cuba. Meanwhile, the Washington Post reported that a poll showed 97 percent of the Cuban people supporting normalization with the United States.Donald Trump is delivering his remarks on Cuba at the Manuel Artime Theater, named for a leader of the Bay of Pigs Invasion. He couldn’t have found a better symbol for the past. But ultimately, the past must give way to the wishes of the people. Fidel Castro is dead. A new generation, in Cuba and the United States, doesn’t want to be defined by quarrels that pre-date their birth. The embargo should—and will—be discarded. Engagement should—and will—prevail. That is why Trump’s announcement should be seen for what it is: not as a step forward for democracy, but as the last illogical gasp of a strain of American politics with a 50-year track record of failure; one that wrongly presumes we can control what happens in Cuba. The future of Cuba will be determined by the Cuban people, and those Americans who want to help them, not hurt them.https://www.theatlantic.com/international/archive/2017/06/cuba-trump-obama-opening/530568/

Story 2: Political Elitist Establishment vs. The American People — Three Sticks Mueller Hires Clinton and Obama Donors and Lawyers For Elite Political Hit Squad Targeting President Trump For Fake Obstruction of Justice —  Trump Should Fire Mueller and Initiate A Justice Department and FBI Investigation of Barack Obama,Valery Jarrett, Hillary and Bill Clinton, Susan Rice, Loretta Lynch, James Comey and Their Staffs For Massive Criminal Activity Including Miss Handling Of Classified Documents and Destruction of Government Records, Public Corruption, Obstruction of Justice and Using Intelligence Community To Spy on American People Including Republican Candidates and Trump For Political Purposes — Videos

Image result for cartoons on obama spying on trump and american people

Image result for cartoons on obama spying on trump and american people

Image result for trump tweets june 16, 2017 They made up a phony collusion with the Russians story, found zero proof, so now they go for obstruction of justice on the phony story. Nice

Image result for branco cartoon on mueller

Image result for branco cartoon on mueller

Image result for branco cartoon on muellerImage result for branco cartoon on mueller

Image result for branco cartoon on mueller

Image result for branco cartoon on mueller

Image result for cartoons on obama spying on trump and american people

Image result for branco cartoon on mueller

Image result for cartoons on obama spying on trump and american people

Image result for cartoons on obama spying on trump and american people

Image result for cartoons on obama spying on trump and american people

Image result for branco cartoon on mueller

Image result for branco cartoon on mueller

Image result for branco cartoon on muellerImage result for cartoons on obama spying on trump and american people

Image result for cartoons on obama spying on trump and american peopleImage result for cartoons on obama spying on trump and american peopleTrump lashes out over reported obstruction of justice probe

President Trump now under INVESTIGATION for obstruction of justice by Robert Mueller 6/14/2017

Gingrich calls for special counsel to probe special counsel

Anderson Cooper CNN Panel on reports that President Trump is now under investigation by Robert Mueller

Jay Sekulow on The Laura Ingraham Show (6/16/2017)

Jared Kushner’s business dealings now under investigation by Robert Mueller 6/15/2017

HANNITY – FIRE ROBERT MUELLER. Massive conflicts of interests

Trump confidant Christopher Ruddy says Mueller has ‘real conflicts’ as special counsel

What Would Happen If President Donald Trump Tried To Fire Robert Mueller? | For The Record | MSNBC

Rosenstein says only he can fire special counsel

Mark Levin: Robert Mueller is investigating Trump for possible obstruction of justice (June 15 2017)

Rush Limbaugh: It wouldn’t bother me if Trump fired special counsel Robert Mueller… (06-13-2017)

Should Mueller recuse himself from the Trump-Russia inquiry?

Roger Stone: Mueller Coached Comey For Last Week Testimony

Roger Stone The Fix Is In, Mueller Hired To Indict The President

Mueller is Out for Trump’s Head! Dick Morris TV: Lunch ALERT!

Ben Shapiro: Jeff Sesstios hearing, Trump’s Cabinet meeting, Can Bob Mueller be fired & other topics

Trump Has Discovered Why Deep State Is Desperate To Stop Him

Tom Fitton discusses Prosecution of Trump, Pursuit of Comey Memos, & Lawsuit over Obama Shakedown

Justice department names Robert Mueller as special counsel in Russia investigation

Mueller assembles elite team of prosecutors

Newt Gingrich – On Special Counsel “THESE ARE BAD PEOPLE” – GMA

Michele Malkin & Lou Dobbs Target The Deep Deep Dark State Cabal That Is Rosenstein,Mueller & Comey

You Gotta Watch Jay Sekulow The President’s Lawyer Prosecute The Case Against The Deep State

Lou Dobbs & Legal Expert Delineate The Number Of Crimes Comey & Mueller Have Already Committed

Jay Sekulow The President’s Lawyer Explains Why Trump Must Clean His Legal House Now! 6 / 14 / 2017

Lou Dobbs : Is the left trying to overthrow Trump’s presidency? : 6/15/2017

Should President Trump fire special counsel Mueller?

“It’s Utterly Outrageous!” Tucker and Ann Coulter React to Comey Testimony

Fox and Friends : Ingraham slams ‘fake news’ about Trump firing Mueller : 6/13/2017

Lou Dobbs : Lt. Col. Shaffer: White House needs to get on the offensive : 6/13/2017

Lou Dobbs : Rep. Biggs: We need to turn the tables on Trump’s enemies : 6/13/2017

Trump dropped biggest bombshell on Loretta Lynch: Judge Napolitano

Judge Jeanine Talks To Jay Sekulow On Why Comey My Face Serious Legal Matters

Russia Collusion is a total hoax – 6/9/2017 – with Victor Davis Hanson

BREAKING: Kellyanne Reveals Sick Thing Special Counsel Mueller Is Doing to Trump. Should He Be Fired

Report: Mueller Team Investigating Trump Has Major Obama-Hillary Ties

Calls for Special Counsel Mueller to Step Down or Recuse.

A New Interview with Kellyanne Conway! She is So Good!

Ann Coulter Finally Weighs in on the James Comey Thimgamabob!

Must See… The Always Amazing Ann Coulter Tear It Up On Tucker 6 / 2 / 2017

Should the special counsel’s probe be shut down?

Gohmert: “Get Rid of Mueller – He Created All Kinds of Problems …”

Gohmert: ‘We Have a Conspiracy Remaining Afoot in Department of Justice’

Gohmert: ‘There’s So Much Collusion – Real Collusion in the Justice Department’

Gohmert on Comey Hearing: “He was 100% Loyal to Loretta Lynch & Hillary Clinton”

Gohmert on Comey: ‘The More We Find Out, This Guy Needed To Go’

As Calls Get Louder To Investigate Loretta Lynch So Do The Calls For Mueller Firing

Hume: Mueller-Comey friendship raises an ethical question

Sen Rand Paul Speaks on Gingrich: GOP “DELUSIONAL” to think Mueller Will Be Fair. #RandPaul

While Most Sing Mueller’s Praises, Louie Gohmert Says He’s a Big Problem!

Trump dropped biggest bombshell on Loretta Lynch: Judge Napolitano

Kurtz: Mueller on the hot seat

Gregg Jarrett: Mueller should resign as special counsel

Lou Dobbs : Rep. Gohmert: James Comey is loyal to Lynch and Clinton : 6/8/2017

Cavuto : Can Democrats move beyond James Comey and the Russia probe? : 6/9/2017

Lou Dobbs : Chris Farrell: Comey’s testimony proved he is a dirty cop : 6/8/2017

Will media admit they were ‘dead wrong’ about Russia?

Leftist Host Chris Matthews Admits Russia Collusion Narrative Destroyed

Roger Stone: It Is Time For Us To Go On Attack

 

Rosenstein warns Americans to ‘exercise caution’ about anonymous reports

Deputy Attorney General Rod Rosenstein said Thursday evening that Americans should “exercise caution” before believing anonymously sourced reports, an apparent reference to ongoing leaks surrounding the investigation into alleged connections between Russian officials and President Trump’s campaign.

“Americans should exercise caution before accepting as true any stories any stories attributed to anonymous ‘officials,'” Rosenstein said in a statement, “particularly when they do not identify the country — let alone the branch or agency of government — with which the alleged sources supposedly are affiliated.”

Though Rosenstein’s statement did not reference the Russia investigation specifically, it was released hours after the Washington Post reported that Special Counsel Robert Mueller is investigating Jared Kushner — Trump’s senior adviser and son-in-law — over his finances and business dealings.

ROBERT MUELLER APPOINTMENT TO LEAD RUSSIA PROBE WINS BIPARTISAN PRAISE

Peter Carr, a spokesman for Mueller, did not comment on the Post report when reached by Fox News, but did say that the special counsel’s office “has undertaken stringent controls to prohibit unauthorized disclosures that deal severely with any member who engages in this conduct.”

Trump and his supporters have repeatedly complained about leaked reports about the progress of Mueller’s investigation, many of which have appeared in either the Post or The New York Times.

On Wednesday, the Post reported that Mueller was examining whether Trump has tried to obstruct justice and was seeking interviews with three administration officials: Dan Coats, the director of national intelligence; Michael Rogers, the head of the National Security Agency; and Richard Ledgett, the former NSA deputy director.

Mark Corallo, a spokesman for Trump’s personal lawyer, responded Wednesday evening to the Post report by saying: “The FBI leak of information regarding the president is outrageous, inexcusable and illegal.”

The Post report cited anonymous sources who were briefed on requests made by investigators. It was not immediately clear whether the FBI was the source of the information.

The president himself took to Twitter Wednesday morning to complain about the “phony story” in the Post, then did so again in the afternoon to question why Hillary Clinton’s conduct during the probe of her private email server was not under more scrutiny.

Rosenstein, who appointed Mueller special counsel in the Russia investigation last month, testified to lawmakers Tuesday that he has seen no evidence of good cause to fire Mueller and that he is confident that Mueller will have “the full independence he needs” to investigate thoroughly.

http://www.foxnews.com/politics/2017/06/16/rosenstein-warns-americans-to-exercise-caution-about-anonymous-reports.html

 

CORRECTED: Three members of Mueller’s team have donated to Democrats

CORRECTED: Three members of Mueller's team have donated to Democrats
© Greg Nash

Three members of special counsel Robert Mueller’s team on the Russia probe have donated to Democratic presidential campaigns and organizations, according to Federal Election Commission filings.

Jeannie Rhee, a member of Mueller’s team, donated $5,400 to Hillary Clinton’s presidential campaign PAC Hillary for America. 

Andrew Weissmann, who serves in a top post within the Justice Department’s fraud practice, is the most senior lawyer on the special counsel team, Bloomberg reported. He served as the FBI’s general counsel and the assistant director to Mueller when the special counsel was FBI director.

Before he worked at the FBI or Justice Department, Weissman worked at the law firm Jenner & Block LLP, during which he donated six times to political action committees for Obama in 2008 for a total of $4,700.

James Quarles, who served as an assistant special prosecutor on the Watergate Special Prosecution Force, has donated to over a dozen Democratic PACs since the late 1980s. He was also identified by the Washington Post as a member of Mueller’s team.

Starting in 1987, Quarles donated to Democratic candidate Michael Dukakis’s presidential PAC, Dukakis for President. Since then, he has also contributed in 1999 to Sen. Al Gore’s run for the presidency, then-Sen. John Kerry’s (D-Mass.) presidential bid in 2005, Obama’s presidential PAC in 2008 and 2012, and Clinton’s presidential pac Hillary for America in 2016.

He also donated to two Republicans, Rep. Jason Chaffetz (R-Utah) in 2015 and Sen. George Allen (R-Va.) in 2005.

The political affiliations of Mueller’s team have been spotlighted by former House Speaker Newt Gingrich (R-Ga.) an ally of Trump.

After initially hailing Mueller’s appointment as special counsel, Gingrich questioned for former FBI director’s ability to be impartial on Monday because of “who he is hiring.”

Michael R. Dreeben, who serves as the Justice Department’s deputy solicitor general, is working on a part-time basis for Mueller, The Washington Post reported Friday.

The FEC database shows a donation from a Michael W. Dreeben in 2006 of $1,000 dollars to Hillary Clinton’s Senate political action committee (PAC), Friends of Hillary. But a spokesman for the special counsel said this is not the Dreeben working for Mueller, who has a different middle initial. The FEC database identifies the Dreeben who made the contribution as deputy solicitor general in the Justice Department.

Several of the figures on Mueller’s team are well known and respected for their work at the Department of Justice.

Dreeben has reportedly received bipartisan praise for his handling of the department’s criminal appellate cases, the Post reported.

Weissmann is well-known for his work in the investigation on Volkswagen cheating on their diesel emissions tests, which they pleaded guilty to earlier this year.

Mueller, who formerly served as FBI director, was first appointed by Republican President George W. Bush in 2001.

Deputy Attorney General Rod Rosenstein appointed Mueller as special counsel last month.

CORRECTION: This story was updated at 10:03 a.m. to reflect the special counsel spokesman’s statement that Dreeben did not give a donation to Clinton. 

http://thehill.com/homenews/administration/337428-four-top-legal-experts-on-muellers-team-donated-to-democratic-causes

 

TWEET STORM

Trump Declares War on Rosenstein: ‘He Has No Qualms About Throwing Him Under a Bus’

With one tweet, the president confirmed he’s under investigation and put the man in charge of that investigation on blast.

President Donald Trump woke up on Friday and decided to publicly confirm that he is under criminal investigation—and to put his deputy attorney general in the line of fire.

After 48 hours of Trump’s allies lobbing allegations of illegal “deep state” leaks and fake-news hit jobs, Trump took to Twitter and corroborated a Wednesday report by The Washington Post that he is the target of a federal investigation into potential obstruction of justice after firing FBI Director James Comey.

“I am being investigated for firing the FBI Director by the man who told me to fire the FBI Director!” Trump wrote, apparently referring to Deputy Attorney General Rod Rosenstein. Since Rosenstein is the senior Justice Department official overseeing the inquiry after Attorney General Jeff Sessions recused himself.

Trump has stewed with anger at the Justice Department over the Russia probe, to the point where Sessions had reportedly offered his resignation. For his part, Sessions testified to the Senate on Tuesday that he was merely concurring with Rosenstein when he assented to firing Comey.

“He’s furious at Rosenstein, but the list of his people who enrage him is ever-growing,” a longtime Trump confidant, who recently spoke to the president, told The Daily Beast. “He has no qualms about throwing [Rosenstein] under a bus.”

That single tweet threatens to upend the administration’s legal and public-relations strategies surrounding an FBI probe into alleged Russian election-meddling that has expanded in recent months to include an obstruction investigation and a probe of the finances of Trump aides and associates.

 A frustrated senior Trump administration official quipped in response to the tweet, “Has anyone read him his Miranda rights?” The implication being that Trump would do well to remain silent on the issue of his own criminal investigation.

Officials spoke on the condition of anonymity so as to speak freely.

Trump digs hole, keeps going

The escalation of the probe is packed with irony. Trump’s insistence that he was not personally under investigation led him to fire the man leading the probe, which ensured a special prosecutor, which ensured Trump came personally under investigation. Now, in raging against circumstances his actions brought about, Trump has given Mueller another building block for the investigation.

“It’s clear that this tweet has not been vetted by his [Trump’s] attorney,” said former federal prosecutor Renato Mariotti. “In addition to confirming that he is under investigation, the tweet makes a factual statement regarding the president’s decision to fire James Comey, which is a subject of the investigation. You can bet that when the president testifies regarding his role in Comey’s firing, he will be asked about this tweet.”

Mueller will inevitably investigate the exact circumstances leading to the Comey firing, which he is likely to interview both Trump and Rosenstein—now in conflict with each other—about.

Even Trump’s senior aides blame the president for bringing the obstruction inquiry upon himself and the White House.

“The president did this to himself,” one senior administration official told The Daily Beast on Wednesday.

In recent weeks, the president has become increasingly convinced that forces in the FBI and the “deep state” are “out for his scalp,” as one White House aide described it. This sentiment is shared by some of his closest advisers, including his chief strategist Steve Bannon.

One senior White House official told The Daily Beast that the Trump tweet was directed, of course, specifically at Rosenstein. The official noted that it reflects what the president has been venting privately for the past couple of days regarding the “irony” of Rosenstein having a role in the sacking of Comey and his current role in the investigations that have taken over as Trump’s main obsession.

The line, according to the White House official, is emerging as one of President Trump’s preferred talking points and complaints.

Another White House official said Friday morning that they are not shocked anymore whenever the president goes off script during early-morning tweetstorms, and for “all the heartburn and misery” they might cause internally, senior aides and advisers should all have a tough callus at this stage in the presidency.

“If you haven’t made this a settled factor in your morning routine, why are you still here?” the official asked, rhetorically.

But while the president is stewing, the White House is still trying to maintain its official separation from dealing with the fallout from the investigation. Instead they’re directing press inquiries to Trump’s personal lawyer.

Asked to clarify that Trump’s tweet was referring specifically to Rosenstein, White House deputy press secretary Sarah Sanders told The Daily Beast: “Best to contact Marc Kasowitz and his team for all questions related to this matter.”

Dianne Feinstein, the senior Democrat on the Senate Judiciary Committee, took it as a direct threat to the deputy AG.

“I’m growing increasingly concerned that the president will attempt to fire not only Robert Mueller, the special counsel investigating possible obstruction of justice, but also Deputy Attorney General Rosenstein who appointed Mueller,” she said in a statement.

Can or should Rosenstein stay?

Former Justice Department officials said that Trump’s tweet has put Rosenstein, who just months ago enjoyed a sterling reputation, in an untenable position. At the minimum, Rosenstein is likely to come under overwhelming pressure to recuse himself from his role overseeing special counsel Robert Mueller’s investigation of Trump.

A former senior DOJ official said Trump’s tweet accuses Rosenstein of lying to Congress. Trump claims Rosenstein “told me to fire the FBI Director!” Shortly after Comey was fired, Rosenstein said in a statement to Congress that the memo said was “not a statement of reasons to justify a for-cause termination,” even though he “thought it was appropriate to seek a new leader” for the FBI.

“The question is, is this a bridge too far for Rod?” the former official said.

The last time the White House characterized Rosenstein as the hatchet man, he “drew a line in the sand,” as the official put it, and reportedly threatened to resign. Shortly after, Trump told NBC News that he would have fired Comey regardless of Rosenstein’s memo.

Still, it’s undeniable that Rosenstein’s memo aided Trump in firing Comey. That means the senior Justice Department official responsible for Mueller’s investigation is also a likely witness in that investigation.

“It’s long seemed to me that Rosenstein would inevitably have to recuse himself in this investigation, because he was a witness to the events surrounding the firing of James Comey and may have participated in the firing of Mr. Comey,” Mariotti continued.

“This latest statement by the president may hasten Rosenstein’s recusal or put pressure on Rosenstein to step aside or step down.”

Rosenstein has quietly acknowledged that he may need to step aside, according to ABC News. He has already testified to a House panel that he is in consultation with Justice Department ethics officials to determine if his recusal is necessary.

“You don’t recuse yourself from an investigation because a subject of the investigation is accusing you of misconduct,” said Ed Dowd, a former U.S. Attorney who helped run the special counsel investigation of the Waco raid. “This may be putting pressure on Rosenstein to say, ‘Do I really need this?’ It may be putting pressure on him to get out, but that is not a proper reason to recuse himself, there’s no question about that.”

“It should not have an effect on him in terms of recusing himself. He should not recuse himself based on tweets by someone who’s under investigation”

It has been a spectacular fall for Rosenstein. As recently as February, pillars of the legal establishment breathed a sigh of relief when the highly respected prosecutor became deputy attorney general. Instead, they have watched in horror as he wrote a legal memo in May at Trump’s request that was widely seen as a pretext for firing the FBI chief. Brookings Institution scholar Ben Wittes, editor of the influential legal blog Lawfare and a friend of Comey’s, has speculated that Rosenstein might have given Trump the “loyalty” assurance the president sought unsuccessfully from the ex-FBI director.

As respected as Rosenstein was, he also has a reputation for ambition. The view of him in legal circles, according to a former Justice Department official who wished to remain anonymous, is, “he’s wanted to be the DAG [deputy attorney general] for a long, long time.”

Should Rosenstein recuse himself—or lose his job—the next Justice Department official in line to oversee the Mueller probe is Associate Attorney General Rachel Brand, who was legal-policy chief in the George W. Bush-era department and more recently served on the government’s privacy watchdog, the Privacy and Civil Liberties Oversight Board. The conservative Brand has a reputation, former colleagues say, for extreme intelligence and integrity. Of course, the same used to be said of Rosenstein.

During one of his rare public appearances as FBI director, he laid out his position on the tyranny of the law: “We live in dangerous times, but we are not the first generation of Americans to face threats to our security,” he explained. “Like those before us, we will be judged by future generations on how we react to this crisis. And by that I mean not just whether we win the war on terrorism, because I believe we will, but also whether, as we fight that war, we safeguard for our citizens the very liberties for which we are fighting.”

Unlike many in Washington, where such sentiments can often sound like platitudes, he really means it. As former Attorney General Richard Thornburgh, who has known Mueller for more than 30 years, explained to me, “People are smart not to test him on those issues.” Larry Thompson, who, like Comey, also served as deputy attorney general under Ashcroft, told me, “When he has a point of view, you know it’s held honestly and openly. There’s no subterranean agenda.”

Mueller overall sees little gray in the world; he’s a black-or-white guy, right or wrong. His father, who was captain of a World War II Navy sub chaser, impressed on him early the importance of credibility and integrity. “You did not shade or even consider shading with him,” Mueller recalls, and ever since, matters of honor and principle had been simple. “Occasionally he’ll be a pain in the ass because he’s so strait-laced,” his late college friend and one-time FBI counselor Lee Rawls told me years ago. “There have been a couple of instances I’ve advocated cowardice and flight, and he wouldn’t have it.”

Cowardice and flight is indeed not Mueller’s style. After he and Rawls graduated from Princeton in the 1960s, before Vietnam had become the political and cultural flash point that it did later in the decade, Mueller volunteered to join the Marines and fight—earning a Purple Heart and a Bronze Star with valor for his role in an intense firefight. In Officer Candidate School, his only demerit came in a trait that would be familiar to anyone who later dealt with him as FBI director and one that should, again, worry the Trump White House today: Robert Swan Mueller III received a D in “Delegation.”

Mueller’s longtime friend Tom Wilner explained to me, “Bob’s the best of the old prep school tradition. He stands for service, integrity and has the confidence to never bend. He doesn’t do anything for himself.”

“The things that most of us would struggle with the most come relatively easy to him because his moral compass is so straight,” one aide at the FBI told me, with reflection and envy. “It’s got to be quite comforting in its own way.”

Mueller was at home at the FBI in part because it removed any hint of partisanship. The FBI, Mueller believes, is the government’s honest broker—an agency free of political interference and pressure, priding itself on objectivity and independence. “You’re free to do what you think is right,” he told me. “It’s much easier than if you have to consider the political currents.”

He had a deep appreciation as director for the bureau’s traditions and its esprit de corps. He famously, almost religiously, wore white shirts and dark suits as director—the picture of a stereotypical Hoover-era G-man—and would even gently mock aides and agents who dared to show up in his office wearing, horror of horrors, pink or even blue shirts. I long attributed his habit to his personal style and strait-laced nature, but, after he finished as director, I once asked him: Why the cult of the white shirt? He answered more philosophically than I’d ever seen him speak before—explaining that he knew he was leading the FBI through a period of wrenching change, converting it to a global intelligence agency focused around counterterrorism, and that he felt it important to keep recognizable totems of the past in place—like the tradition of the white shirt—to help agents understand it was still the same FBI they’d signed up to join.

***

A year after the showdown over STELLAR WIND, Comey journeyed from the Justice Department up the Baltimore-Washington Parkway to Fort Meade, Maryland, the headquarters of the NSA. His speech that day was purportedly in recognition of Law Day, but it carried a coded message for those few in the room who knew what had transpired in the showdown of the Terrorist Surveillance Program.

The nation of the United States, Comey explained, was a country of laws, not men. Public officials swore oaths to the Constitution, not to the president. It’s the job of the lawyers, he explained, to remove the looming crisis from a decision and examine how it will look down the road.

He then continued with words that echo more than a decade later and presage the weeks to come on Capitol Hill, where he will once again be in his element. “We know that our actions, and those of the agencies we support, will be held up in a quiet, dignified, well-lit room, where they can be viewed with the perfect, and brutally unfair, vision of hindsight,” he told the gathered NSA crowd. “We know they will be reviewed in hearing rooms or courtrooms where it is impossible to capture even a piece of the urgency and exigency felt during a crisis.”

That perfect hindsight, he argued was why the most important thing in a lawyer’s life was understanding the test of history. As he said, “‘No’ must be spoken into a storm of crisis, with loud voices all around.”

Sometime soon, in a quiet, dignified, well-lit room on Capitol Hill, Jim Comey’s going to get another chance to explain why he said no. And while he does, Bob Mueller will be toiling away, reaching deep into the government and the annals of the Trump campaign, to understand exactly what transpired last year and the events that led up to Comey’s firing.

Even at 72, Mueller has plenty of energy left—where his predecessor Louis Freeh had the same chief of staff for nearly his entire tenure, Mueller burned through chiefs of staff almost every year. “He drives at such speed that he can burn up people around him,” Comey told me of Mueller. “Some people burn people up because they’re assholes. Bob burns them up by sheer exertion.”

The night of the STELLAR WIND showdown, Mueller arrived at the hospital moments after the White House aides departed after they were unable to get Comey or Ashcroft to reauthorize the program. Mueller spoke briefly with Comey in the hallway and then entered Ashcroft’s hospital room.

“Bob, I don’t know what’s happening,” the confused attorney general told him.

“There comes a time in every man’s life when he’s tested, and you passed your test tonight,” Mueller replied, comfortingly.

While Comey and Mueller might have both thought that they had aced their biggest challenge in the early 2000s, keeping the nation safe after 9/11, as it turns out, they’re both now embarking on what history will likely remember as their ultimate test.

CORRECTION: An earlier version of this piece misidentified the mafia boss Comey prosecuted. His name was John Gotti.

http://www.politico.com/magazine/story/2017/05/18/james-comey-trump-special-prosecutor-robert-mueller-fbi-215154

Special counsel is investigating Trump for possible obstruction of justice, officials say

Special counsel investigating Trump for possible obstruction of justice
The special counsel overseeing the investigation into Russia’s role in the 2016 election is interviewing senior intelligence officials to determine whether President Trump attempted to obstruct justice, officials said. (Patrick Martin, McKenna Ewen/The Washington Post)
The special counsel overseeing the investigation into Russia’s role in the 2016 election is interviewing senior intelligence officials as part of a widening probe that now includes an examination of whether President Trump attempted to obstruct justice, officials said.The move by special counsel Robert S. Mueller III to investigate Trump’s conduct marks a major turning point in the nearly year-old FBI investigation, which until recently focused on Russian meddling during the presidential campaign and on whether there was any coordination between the Trump campaign and the Kremlin. Investigators have also been looking for any evidence of possible financial crimes among Trump associates, officials said.

Trump had received private assurances from then-FBI Director James B. Comey starting in January that he was not personally under investigation. Officials say that changed shortly after Comey’s firing.

Five people briefed on the interview requests, speaking on the condition of anonymity because they were not authorized to discuss the matter publicly, said that Daniel Coats, the current director of national intelligence, Mike Rogers, head of the National Security Agency, and Rogers’s recently departed deputy, Richard Ledgett, agreed to be interviewed by Mueller’s investigators as early as this week. The investigation has been cloaked in secrecy, and it is unclear how many others have been questioned by the FBI.

The NSA said in a statement that it will “fully cooperate with the special counsel” and declined to comment further. The office of the director of national intelligence and Ledgett declined to comment.

The White House now refers all questions about the Russia investigation to Trump’s personal attorney, Marc Kasowitz.

“The FBI leak of information regarding the president is outrageous, inexcusable and illegal,” said Mark Corallo, a spokesman for Kasowitz.

The officials said Coats, Rogers and Ledgett would appear voluntarily, though it remains unclear whether they will describe in full their conversations with Trump and other top officials or will be directed by the White House to invoke executive privilege. It is doubtful that the White House could ultimately use executive privilege to try to block them from speaking to Mueller’s investigators. Experts point out that the Supreme Court ruled during the Watergate scandal that officials cannot use privilege to withhold evidence in criminal prosecutions.

The obstruction-of-justice investigation of the president began days after Comey was fired on May 9, according to people familiar with the matter. Mueller’s office has taken up that work, and the preliminary interviews scheduled with intelligence officials indicate that his team is actively pursuing potential witnesses inside and outside the government.

The interviews suggest that Mueller sees the question of attempted obstruction of justice as more than just a “he said, he said” dispute between the president and the fired FBI director, an official said.

With the term whirling around Washington, a former federal prosecutor explains what to know about the criminal charge of obstruction of justice. (Jenny Starrs/The Washington Post)

Investigating Trump for possible crimes is a complicated affair, even if convincing evidence of a crime were found. The Justice Department has long held that it would not be appropriate to indict a sitting president. Instead, experts say, the onus would be on Congress to review any findings of criminal misconduct and then decide whether to initiate impeachment proceedings.

Comey confirmed publicly in congressional testimony on March 20 that the bureau was investigating possible coordination between the Trump campaign and the Russians.

Comey’s statement before the House Intelligence Committee upset Trump, who has repeatedly denied that any coordination with the Russians took place. Trump had wanted Comey to disclose publicly that he was not personally under investigation, but the FBI director refused to do so.

Soon after, Trump spoke to Coats and Rogers about the Russia investigation.

Officials said one of the exchanges of potential interest to Mueller took place on March 22, less than a week after Coats was confirmed by the Senate to serve as the nation’s top intelligence official.

Coats was attending a briefing at the White House with officials from several other government agencies. When the briefing ended, as The Washington Post previously reported, Trump asked everyone to leave the room except for Coats and CIA Director Mike Pompeo.

Coats told associates that Trump had asked him whether Coats could intervene with Comey to get the bureau to back off its focus on former national security adviser Michael Flynn in its Russia probe, according to officials. Coats later told lawmakers that he never felt pressured to intervene.

A day or two after the March 22 meeting, Trump telephoned Coats and Rogers to separately ask them to issue public statements denying the existence of any evidence of coordinationbetween his campaign and the Russian government.

Coats and Rogers refused to comply with the president’s requests, officials said.

It is unclear whether Ledgett had direct contact with Trump or other top officials about the Russia probe, but he wrote an internal NSA memo documenting the president’s phone call with Rogers, according to officials.

As part of the probe, the special counsel has also gathered Comey’s written accounts of his conversations with Trump. The president has accused Comey of lying about those encounters.

Mueller is overseeing a host of investigations involving people who are or were in Trump’s orbit, people familiar with the probe said. The investigation is examining possible contacts with Russian operatives as well as any suspicious financial activity related to those individuals.

Last week, Comey told the Senate Intelligence Committee that he had informed Trump that there was no investigation of the president’s personal conduct, at least while he was leading the FBI.

Comey’s carefully worded comments, and those of Andrew McCabe, who took over as acting FBI director, suggested to some officials that an investigation of Trump for attempted obstruction may have been launched after Comey’s departure, particularly in light of Trump’s alleged statements regarding Flynn.

“I took it as a very disturbing thing, very concerning, but that’s a conclusion I’m sure the special counsel will work towards, to try and understand what the intention was there, and whether that’s an offense,” Comey testified last week.

Mueller has not publicly discussed his work, and a spokesman for the special counsel declined to comment.

Accounts by Comey and other officials of their conversations with the president could become central pieces of evidence if Mueller decides to pursue an obstruction case.

Investigators will also look for any statements the president may have made publicly and privately to people outside the government about his reasons for firing Comey and his concerns about the Russia probe and other related investigations, people familiar with the matter said.

Comey testified before the Senate Intelligence Committee last week that he was certain his firing was due to the president’s concerns about the Russia probe, rather than over his handling of a now-closed FBI investigation into Hillary Clinton’s use of a private email server as secretary of state, as the White House had initially asserted. “It’s my judgment that I was fired because of the Russia investigation,” Comey said. “I was fired, in some way, to change — or the endeavor was to change the way the Russia investigation was being conducted.”

The fired FBI director said ultimately it was up to Mueller to make a determination whether the president crossed a legal line.

In addition to describing his interactions with the president, Comey told the Intelligence Committee that while he was FBI director he told Trump on three occasions that he was not under investigation as part of a counterintelligence probe looking at Russian meddling in the election.

Republican lawmakers seized on Comey’s testimony to point out that Trump was not in the FBI’s crosshairs when Comey led the bureau.

After Comey’s testimony, in which he acknowledged telling Trump that he was not under investigation, Trump tweeted that he felt “total and complete vindication.” It is unclear whether McCabe, Comey’s successor, has informed Trump of the change in the scope of the probe.

https://www.washingtonpost.com/world/national-security/special-counsel-is-investigating-trump-for-possible-obstruction-of-justice/2017/06/14/9ce02506-5131-11e7-b064-828ba60fbb98_story.html?utm_term=.ddf5961ef89d

Eight Laws Hillary Clinton Could Be Indicted For Breaking

Photo of Kenneth P. Bergquist

KENNETH P. BERGQUIST
Brigadier General, U.S. Army (Ret)

As a former Justice Department official, I have, of late, been asked by both Democratic and Republican friends whether Hillary Clinton could be indicted for her email related actions. The simple answer is yes — she, and perhaps some of her senior staff, could be indicted for violating a number of federal criminal statutes. But for reasons that will be discussed later, it is unlikely that she will be.

Nevertheless, it is well worth discussing the various criminal provisions of federal law that she and others may have been violated based on mainstream news reports. Remember that news reporting can be incorrect or incomplete — and that Hillary Clinton, and anyone else involved, deserves every presumption of innocence. Also keep in mind that an indictment is not a conviction but rather the informed opinion of a grand jury that probable cause exists to believe one or more violations of federal criminal statutes have transpired.

This intellectual and legal research exercise should commence with a brief review of the basics of criminal jurisprudence: There are two elements of a criminal offense: the prohibited conduct as defined in statute; and the mens rea or mental intent of the individual or individuals engaging in the prohibited conduct. Thus, to gain a conviction on a criminal count in an indictment, a prosecutor must prove beyond a reasonable doubt that: (1) the prohibited conduct occurred, (2) the prohibited conduct was undertaken by the defendant, and (3) the defendant had the requisite mens rea or intent at the time.

1.) 18 U.S. Code § 793 – Gathering, transmitting or losing defense information
18 U.S. Code § 798 – Disclosure of classified information

A federal prosecutor would naturally focus first on the most serious allegations: willfully transmitting or willfully retaining Top Secret and Compartmented (TS/SCI) material using a private server system. The individual who transmits and the individual who receives and retains TS/SCI information on a private server jointly share the culpability for risking the compromise and exploitation of the information by hostile intelligence services. The prosecutor’s charging document would likely include felony counts under 18 U.S. Code § 793 and under 18 U.S. Code § 798 against each transmitting individual as well as separate counts against each receiving and retaining individual. Violation of either provision of the U.S. Code cited above is a felony with a maximum prison term of ten years.

The prohibited conduct is the insecure transmission of highly classified information, as well as the receipt and retention of highly classified information in an unapproved manner. The requisite mens rea is the willful commission of the prohibited conduct and the knowledge that compromised information could result in prejudice or injury to the United States or advantage to any foreign nation. Proof of intent to disclose the classified information is not required.

2.) U.S. Code § 1924 – Unauthorized removal and retention of classified documents or material

If the federal prosecutors are of a charitable disposition and an accused person has been cooperative, the felony charges under 18 U.S. Code § 793 and 18 U.S. Code § 798 may be “pled-down” to a single or to multiple misdemeanor counts under 18 U.S. Code § 1924. A misdemeanor conviction would probably result in a period of probation and a less significant fine. The prohibited conduct is the unauthorized removal of classified information from government control or its retention in an unauthorized location. The mens rea required is the intent to remove from government control or the intent to store the classified information in an unauthorized location.

3.) 18 U.S. Code § 2071(b) — Concealment, removal, or mutilation generally

To sustain a charge under 18 U.S. Code § 2071(b), a federal prosecutor need only prove that the accused transferred and held the only copies of official government records (whether classified or not), the very existence of which was concealed from government records custodians. The mens rea required is that an accused knows that official government records were transferred or removed from the control of government records custodians. Violation of 18 U.S. Code § 2071(b) is a felony with a maximum prison term of three years.

4.) 18 U.S. Code § 641 – Public money, property or records

Again, if the federal prosecutors are of a charitable disposition and accused has been cooperative, the felony charges under 18 U.S. Code § 2071(b) can be “pled down” to a misdemeanor under 18 U.S. Code § 641. The prohibited conduct is the conversion of official records (whether classified or not) to the accused’s exclusive use and the mens rea is simply the intent to do so. Conviction on the lesser misdemeanor charge would likely result in a period of probation and the imposition of a fine.

5.) 18 U.S. Code § 1505 – Obstruction of proceedings before departments, agencies, and committees

If it can be proven that an accused destroyed, withheld, or concealed the existence of official records being sought under subpoena by a committee of Congress, the accused can be convicted of obstruction under 18 U.S. Code § 1505. The prohibited conduct includes destruction, concealment and withholding of documents, thereby impeding or obstructing the committee’s rightful pursuit of information. The mens rea is knowledge of the committee’s interest in obtaining the official records in the accused’s custody or control. Violation of 18 U.S. Code § 1505 is a felony with a maximum prison term of five years.

6.) 18 U.S. Code § 1519 — Destruction, alteration, or falsification of records in federal investigations

If it can be proven that an accused knowingly concealed the existence of official records being sought by the Department of State Inspector General (DOS/IG) or by the Federal Bureau of Investigation (FBI), such accused can be convicted of obstruction. The prohibited conduct is the concealment and withholding of documents that impede or obstruct an investigation. The mens rea is the intent to conceal or withhold. Violation of 18 U.S. Code § 1519 is a felony with a maximum prison term of twenty years.

7.) 18 U.S. Code § 1031 — Fraud against the United States
18 U.S. Code § 1343 – Fraud by wire, radio or television
18 U.S. Code § 1346 — Definition of “scheme or artifice to defraud”
18 U.S. Code § 371 – Conspiracy to defraud the United States

If it can be proven that an accused arranged for the Department of State to hire an Information Technology (IT) specialist to primarily administer and maintain a private server system owned by the accused, then the accused can be convicted of conspiracy to commit honest services fraud and probably wire fraud. The prohibited conduct is having the United States pay an employee salary and/or official travel funds for performing private services on behalf of accused. The mens rea is simply the knowledge of the employee’s status as a public servant and that the government was not fully reimbursed for the costs to the government of such services. The wire fraud conviction can be sought if it can be proven that accused used electronic means of communication in undertaking such scheme or artifice to defraud.

8.) 18 U.S. Code § 371 – Conspiracy to commit a federal offense

If any accused and any third party can be proven to have colluded in any violation of federal, criminal law, then all involved can be charged with criminal conspiracy as well as being charged with the underlying offense.

Indictment?

The old adage, that a good prosecutor can get a ham sandwich indicted, is bad news for any public servant who risks the compromise of classified information or otherwise violates any of the other federal criminal statutes listed above. Specifically, this Administration has a history of vigorously prosecuting and winning convictions in the mishandling of classified information and other criminal violations of the public trust.

However, Hillary Clinton is anything but a ham sandwich; and she knows it. She and her senior aides will not even be formally investigated by this Justice Department, much less indicted. The president will allow Hillary Clinton and her aides to “tough it out” for as long it is politically possible. However, if and when the political and public opinion costs of a “tough it out” tactic become too great, President Obama will simply use that famous pen of his to issue a succinct pardon and make formal mockery of the concept of equal justice.

Kenneth Bergquist served as a Deputy Assistant Attorney General in the United States Department of Justice during the Reagan Administration and serves now aspro bono legal counsel to the Special Operations Education Fund (OPSEC).

http://dailycaller.com/2015/09/21/eight-laws-hillary-clinton-could-be-indicted-for-breaking/

Yes, There Could Be Serious Legal Problems if Obama Admin Involved in Illegal Surveillance

President Trump recently tweeted claiming that former President Obama wiretapped him during his campaign. One can only imagine how nuts the media would have gone if the roles had been reversed: President Trump wiretapping either Obama or the Clintons, though his DOJ could have authority to do just that given the expansive leaks of intelligence information by Obama and Clinton supporters the last few months. Heck, he could wiretap the media at this point, legally and legitimately, as the sources of these unlawful leaks, for which Obama himself set precedent. Do liberals understand what Pandora’s Box Obama opened up by Obama using the powers of the NSA, CIA and FBI to spy on his political opponents? Even Nixon never did that.

If the stories are correct, Obama or his officials might even face prosecution. But, we are still early in all of this and there are a lot of rumors flying around so the key is if the reports are accurate. We just don’t know at this time. The stories currently are three-fold: first, that Obama’s team tried to get a warrant from a regular, Article III federal court on Trump, and was told no by someone along the way (maybe the FBI), as the evidence was that weak or non-existent; second, Obama’s team then tried to circumvent the federal judiciary’s independent role by trying to mislabel the issue one of “foreign agents,” and tried to obtain a warrant from the Foreign Intelligence Surveillance Act “courts”, and were again turned down, when the court saw Trump named (an extremely rare act of FISA court refusal of the government, suggesting the evidence was truly non-existent against Trump); and so, third, Obama circumvented both the regular command of the FBI and the regularly appointed federal courts, by placing the entire case as a FISA case (and apparently under Sally Yates at DOJ) as a “foreign” case, and then omitted Trump’s name from a surveillance warrant submitted to the FISA court, which the FISA court unwittingly granted, which Obama then misused to spy on Trump and many connected to Trump. Are these allegations true? We don’t know yet, but if any part of them are then Obama and/or his officials could face serious trouble.

Can a President be charged with a crime? Only once out of office. While in office, impeachment remains the exclusive remedy in order to avoid a single judicial branch trying to overturn an election, such as a grand jury in any part of the country could. Once out of office, a President remains immune from civil liability for his duties while President, under a 1982 decision of the United States Supreme Court. However, as the Nixon pardon attests, nothing forecloses a criminal prosecution of the President after his presidency is complete for crimes against the country. Obama, the Constitutional lawyer, should know that.

What crimes could have been committed? Ironically, for Democrats falsely accusing Attorney General Sessions, perjury and conspiracy to commit perjury, as well as intentional violations of FISA. Rather shockingly, no law currently forbids misusing the power of the presidency to spy on one’s adversaries. What the law does forbid is lying to any judicial officer to obtain any means of surveillance. What the law does forbid, under criminal penalty, is the misuse of FISA. Both derive from the protections of the Fourth Amendment itself. Under section 1809, FISA makes it a crime for anyone to either “engage in” electronic surveillance under “color of law” under FISA without following the law’s restrictions, or “disclose” or “use” information gathered from it in contravention of the statute’s sharp constrictions.

FISA, 50 USC 1801, et seq., is a very limited method of obtaining surveillance authority. The reason for its strict limits is that FISA evades the regular federal court process, by not allowing regularly, Constitutionally appointed federal judges and their magistrates to authorize surveillance the Fourth Amendment would otherwise forbid. Instead, the Chief Justice handpicks the FISA court members, who have shown an exceptional deference to the executive branch. This is because FISA court members trust the government is only bringing them surveillance about pending terror attacks or “grave hostile” war-like attacks, as the FISA statute limits itself to. Thus, a FISA application can only be used in very limited circumstances.

One important reminder about electronic surveillance. Occasionally, a law enforcement officer will hear or see or record information not allowed by the warrant, but incidental or accidental to otherwise lawful surveillance. Their job is to immediately stop listening, stop recording, and to delete such information. This is what you occasionally see in films where the agent in the van hears the conversation turn away from something criminal to a personal discussion, and the agent then turns off the listening device and stops the recording. Such films simply recognize long-standing legal practice.

FISA can only be used for “foreign intelligence information.” Now that sounds broad, but is in fact very limited under the law. The only “foreign intelligence information” allowed as a basis for surveillance is information necessary to protect the United States against actual or potential “grave” “hostile” attack, war-like sabotage or international terror. Second, it can only be used to eavesdrop on conversations where the parties to the conversation are a foreign power or an agent of a foreign power. An agent of a foreign power cannot be a United States person unless they are knowingly involved in criminal espionage. No warrant is allowed on that person unless a FISA court finds probable cause the United States person is knowingly engaged in criminal espionage. Even then, if it involves a United States person, special steps must be taken to “minimize the acquisition and retention, and prohibit the dissemination, of non publicly available information concerning un-consenting United States persons.”

This includes procedures that require they never identify the person, or the conversation, being surveilled, to the public where that information is not evidence of a particular crime. Third, the kind of information sought concerns solely information about a pending or actual attack on the country. That is why the law limits itself to sabotage incidents involving war, not any form or kind of “sabotage,” explicitly limiting itself to those acts identified in section 105 of Title 18 of the United States Code.

This bring us to Watergate-on-Steroids, or #ObamaGate. Here are the problematic aspects of the Obama surveillance on Trump’s team, and on Trump himself. First, it is not apparent FISA could ever be invoked. Second, it is possible Obama’s team may have perjured themselves before the FISA court by withholding material information essential to the FISA court’s willingness to permit the government surveillance. Third, it could be that Obama’s team illegally disseminated and disclosed FISA information in direct violation of the statute precisely prohibiting such dissemination and disclosure. FISA prohibits, under criminal penalty, Obama’s team from doing any of the three.

At the outset, the NSA should have never been involved in a domestic US election. Investigating the election, or any hacking of the DNC or the phishing of Podesta’s emails, would not be a FISA matter. It does not fit the definition of war sabotage or a “grave” “hostile” war-like attack on the United States, as constrictively covered by FISA. It is your run-of-the-mill hacking case covered by existing United States laws that require use of the regular departments of the FBI, Department of Justice, and Constitutionally Senate-appointed federal district court judges, and their appointed magistrates, not secretive, deferential FISA courts.

Out of 35,000+ requests for surveillance, the FISA court has only ever rejected a whopping 12. Apparently, according to published reports, you can add one more to that — even the FISA court first rejected Obama’s request to spy on Trump’s team under the guise of an investigation into foreign agents of a pending war attack, intelligence agents apparently returned to the court, where, it is my assumption, that they did not disclose or divulge all material facts to the court when seeking the surveillance the second time around, some of which they would later wrongfully disseminate and distribute to the public. By itself, misuse of FISA procedures to obtain surveillance is itself, a crime.

This raises the second problem: Obama’s team submission of an affidavit to to the FISA court. An application for a warrant of any kind requires an affidavit, and that affidavit may not omit material factors. A fact is “material” if it could have the possible impact of impacting the judicial officer deciding whether to authorize the warrant. Such affidavits are the most carefully drawn up, reviewed, and approved affidavits of law enforcement in our system precisely because they must be fully-disclosing, forthcoming, and include any information a judge must know to decide whether to allow our government to spy on its own. My assumption would be that intelligence officials were trying to investigate hacking of DNC which is not even a FISA covered crime, so therefore serious questions arise about what Obama administration attorneys said to the FISA court to even consider the application. If the claim was “financial ties” to Russia, then Obama knew he had no basis to use FISA at all.

Since Trump was the obvious target, the alleged failure to disclose his name in the second application could be a serious and severe violation of the obligation to disclose all material facts. Lastly, given the later behavior, it is evident any promise in the affidavit to protect the surveilled information from ever being sourced or disseminated was a false promise, intended to induce the illicit surveillance. This is criminalized both by federal perjury statutes, conspiracy statutes, and the FISA criminal laws themselves.

That raises the third problem: it seems the FISA-compelled protocols for precluding the dissemination of the information were violated, and that Obama’s team issued orders to achieve precisely what the law forbids, if published reports are true about the administration sharing the surveilled information far-and-wide to promote unlawful leaks to the press. This, too, would be its own crime, as it brings back the ghost of Hillary’s emails — by definition, FISA information is strictly confidential or it’s information that never should have been gathered. FISA strictly segregates its surveilled information into two categories: highly confidential information of the most serious of crimes involving foreign acts of war; or, if not that, then information that should never have been gathered, should be immediately deleted, and never sourced nor disseminated. It cannot be both.

Recognizing this information did not fit FISA meant having to delete it and destroy it. According to published reports, Obama’s team did the opposite: order it preserved, ordered the NSA to search it, keep it, and share it; and then Obama’s Attorney General issued an order to allow broader sharing of information and, according to the New York Times, Obama aides acted to label the Trump information at a lower level of classification for massive-level sharing of the information. The problem for Obama is simple — if it could fit a lower level of classification, then it had to be deleted and destroyed, not disseminated and distributed, under crystal clear FISA law. Obama’s team’s admission it could be classified lower, yet taking actions to insure its broadest distribution, could even put Obama smack-middle of the biggest unlawful surveillance and political-opponent-smear campaign since Nixon. Except even Nixon didn’t use the FBI and NSA for his dirty tricks.

Watergate would have never happened if Nixon felt like he could just ask the FBI or NSA to tape the calls. This is Hoover-esque abuses of the kind Bob Woodward pal, former FBI Assistant Director Mark Felt (otherwise known as Deep Throat), routinely engaged in at the FBI until convicted and removed from office. (You didn’t know that Deep Throat was really a corrupt part of Deep State, did you? Guess who ran the famous COINTELPRO? That’s right — Deep Throat. How would the public have reacted if they knew the media had been in bed with the deep state all the way back then? Maybe that was the reason Woodward, Bernstein and Bradley kept Deep Throat’s identity secret all those years?)

Democrats may regret Sessions’ recusal, as his replacement is a mini-Sessions: a long-respected, a-political, highly ethical prosecutor, Dana Boente, whose reputation is well-warranted from his service at the Tax Division, and who won’t be limited by any perceived ties to Trump, given his prior appointment by Obama. Obama himself appeared scared of Boente, as he removed Boente from the successor-to-Sessions position during the lame-duck part of Obama’s presidency, but Trump restored Boente to that role earlier this month. Democrats may get the investigation they wanted, but it may be their own that end up named in the indictment.

Robert Barnes is a California-based trial attorney whose practice focuses on tax defense, civil rights and First Amendment law. You can follow him at @Barnes_Law

http://lawnewz.com/high-profile/yes-obama-could-be-prosecuted-if-involved-with-illegal-surveillance/

The Endless Ironies of Donald J. Trump

by VICTOR DAVIS HANSON June 13, 2017 4:00 AM @VDHANSON

Pandemonium can be a revivifying purgative.

Here are the ironies of Donald Trump as president. 1) For the Left (both Political and Media)

The Left was mostly untroubled for eight years about the often unconstitutional abuses of Barack Obama — given that they saw their shared noble aims as justifying almost any means necessary to achieve them.

There was the not uncommon Rice-Gruber-Rhodes-Holder sort of deception (on Benghazi, on the conduct of Bowe Bergdahl, on the Affordable Care Act, the Iran deal, on Fast and Furious, etc.) — a required tactic because so much of the Obama agenda was antithetical to the wishes and preferences of the American electorate and thus had to be disguised and camouflaged to become enacted.

There was the pen-and-phone mockery of established federal law (the suspension of the ACA employer mandate, the Chrysler creditor reversal, the non-enforcement of federal immigration law, the institutionalization of sanctuary-city nullification).

There was the constant mythmaking (from faux red lines, deadlines, and step-over lines to the fatuity of the Cairo Speech and Iran-deal harangues). There were the abuses of presidential power (the surveillance of journalists, the selective release of the bin Laden trove to pet journalists, the likely surveilling, unmasking, and leaking through reversed targeting of political enemies).

No one worried much when Obama promised on a hot mic to Medvedev that he would be more flexible with the Russians after his reelection, as if they were to conform to a desired sort of behavior in service to Obama that would earn them dividends from him later on — the kind of unapologetic partisan “collusion” that would have earned Trump a Comey-induced indictment.

No one cared that Obama pulled all peacekeepers out of Iraq and thereby ruined what the surge had saved.

Nor did anyone fret much about the serial scandals at the GSA, the VA, the IRS, and the Secret Service, or his disastrous reset policy with Russia and the implosion of the Middle East or the strange spectacles of Obama’s interview with GloZell or polarizing Oval Office guests, such as the rapper whose album cover portrayed celebrations over a dead white judge.

True, none of these were impeachable or even major offenses. But all of them recalibrated the bar of presidential behavior.

So along came the next Republican president, empowered by Obama’s exemptions to do almost anything he wished, albeit without the thin exculpatory veneer of Ivy League pretension, multicultural indemnity, and studied smoothness.

In biblical “there is a season” fashion, for every sermon about not building your business, making too much money, or profiting at the wrong time, there was a Trump retort to profit as never before.

For every too-frequent gala golf outing of a metrosexual Obama decked out in spiffy attire, there is a plumper Trump swinging away, oblivious to the angry pack of reporters that Obama once so carefully courted. For every rapper with an ankle bracelet that went off in the White House, there is now a White House photo-op with Ted Nugent.

For every executive-order suspension of federal immigration enforcement, there is an executive-order corrective.

For every lecture on the crusades, sermons on Western genocidal history, apology tour, or Islamic mythmaking, there is an American Greatness pride in everything.

The progressive ironies continued.

If the media were to be believed when they insisted that Obama was a “god,” or that he was the smartest man ever to achieve the presidency, or that the first lady was Jackie Kennedy incarnate, or that Obama was capable of sending electrical shocks down a reporter’s leg or was sure to be a brilliant president on the basis of his pants crease or because he talked in the manner of Washington elites, then surely it could not be believed when Trump was smeared as a veritable dunce, crook, buffoon, and naïf worthy of impeachment or that his wife (fluent in several languages) was an airhead former escort girl.

By their former unhinged adoration and obsequiousness, progressives and the media undermined all future credibility in their unhinged venom and loathing of Donald Trump. Now they live with the reality that by elevating Obama into a deity, they unleashed their own worst nightmare and have reduced themselves to irrelevance.

In the end, no one believes the current venom of a CNN or a New York Times precisely because no one could have believed their prior slavish adulation.

Anderson Cooper has become Keith Olbermann, as Nancy Pelosi and Chuck Schumer meld into Maxine Waters: now malevolent rather than previously sycophantic, but in their extremism still no more credible in 2017 than they were in 2009. 2) For the Orphaned Never Trump Right (as Overrepresented in the Punditocracy as Underrepresented in the Electorate)

Even the most die-hard Never Trump conservative has had to make some adjustments. Despite assurances that Trump would not get the nomination, he did. Despite assurances that he could never be elected, he was. Despite prognostications that Trump was a liberal wolf hiding in conservative fleece, Trump’s appointments, his executive orders, his legislation pending before the Congress, his abrupt withdrawal from the Paris global-warming accords, his fierce support for vouchers, his pro-life advocacy, and his immigration normality were so far orthodoxly conservative.

Most Never Trumpers now concede that something had gone terribly wrong with their top-down party, although they resent that it was raucous billionaire Donald Trump who administered the diagnosis.

Despite suspicions that Trump’s appeal to the working class was nursed on racism, fanatic nationalism, xenophobia, and nativism, the appeal instead grew from a shared disgust with blue-stocking Republicans who were perceived in word and deed as little different from coastal Democratic look-alikes. Most Never Trumpers now concede that something had gone terribly wrong with their top-down party, although they resent that it was raucous billionaire Donald Trump who administered the diagnosis.

Where Never Trump conservatives worried that Trump was too uninformed or too reckless (e.g., pulling out of an “obsolete” NATO, rejecting Article 5 of the NATO alliance, starting a trade war with China, or erecting tariffs in 1920s style), Trump was forced to separate his past rhetoric from present reality — confirming in a way his transparent art-of-the-deal negotiating style of asking for twice what he could acceptably settle for, or acting unhinged to unsettle negotiators, enemies, and rivals. Given these surprises, the Never Trump position has now receded to a simpler proposition: The uncouth character of Donald J. Trump is not worth the conservative agenda that he may well enact, as we all will eventually and inevitably learn. Or how can conservative moralists stomach such a supposedly immoral incarnation of their own views? Such a paradox hinges on four corollaries, many of them dubious.

One: The ideological trajectory of a probable 16 years of Obama–Hillary Clinton progressive transformation of the country was never as dangerous as turning over executive power to someone as purportedly uncouth and unpredictable as Trump.

Two: Trump’s character defects were like none other in a previous American president (which would include John Kennedy’s pathological and dangerous womanizing, Lyndon Johnson’s in-office profiteering and crudity, Richard Nixon’s disrespect for truth and the law, Bill Clinton’s demonstrable White House sex escapades and lying under oath) and thus would cancel out the entire gamut of renewed energy production, deregulation, tax reform, deterrent foreign policy, Obamacare reform, and the sort of Cabinet appointment that will prune back the deep state.

Three: Ideas matter more than politics and governance. Being 51 (or far more) percent preferable is still either not being preferable at all or at least not enough to warrant pragmatic assent.

Four: Even snarky and “see, how I was right” attacks on Trump from the right keep conservatism honest, rather than implode it in the manner that the Left most assiduously avoids. (Was there ever a “Never Hillary” movement after the Democratic convention to protest her pollution of the Democratic National Committee?)

For now, the fallback position of “I told you so” hinges on Trump’s proving, in a downward spiral, far more recklessly obstreperous in the future than he has been so far, and on his agenda’s either fossilizing or reverting to his own 1980s liberal outlook. 3) Always Trump There are few ironies for Always Trumpers who supported Trump from well before the primaries. They wished an iron wrecking ball to be thrown into the deep-state glass, and they certainly got what they wished for. The uncouthness of Trump is not vulgarity for them. It’s the necessary tough antidote to what they see as the polished crudity of the elite class, who are quite indecent in their sanctimonious lectures on amnesties or globalized free but unfair trade — while having the personal means of navigating around the deleterious consequences of their own advocacy. Trump’s nihilistic and self-destructive tweets are yet again, for the Always Trumpers, the Semtex that helps blow up the entire spectacle of the feeding frenzy Washington press conference, the embarrassment of the White House Correspondents Dinner, the soft-ball televised interview, and the moral preening of television’s talking heads. Dr. Sawbones Trump smelled a festering wound, ripped off the scab, and proclaimed that the exposure would aerate and cure the gangrenous mass below. For the Always Trumpers, without the Trump shock, we would never have fully appreciated just how politically crude a Stephen Colbert really was, or just how obscene was a Tom Perez or

3) Always Trump There are few ironies for Always Trumpers who supported Trump from well before the primaries. They wished an iron wrecking ball to be thrown into the deep-state glass, and they certainly got what they wished for. The uncouthness of Trump is not vulgarity for them. It’s the necessary tough antidote to what they see as the polished crudity of the elite class, who are quite indecent in their sanctimonious lectures on amnesties or globalized free but unfair trade — while having the personal means of navigating around the deleterious consequences of their own advocacy. Trump’s nihilistic and self-destructive tweets are yet again, for the Always Trumpers, the Semtex that helps blow up the entire spectacle of the feeding frenzy Washington press conference, the embarrassment of the White House Correspondents Dinner, the soft-ball televised interview, and the moral preening of television’s talking heads. Dr. Sawbones Trump smelled a festering wound, ripped off the scab, and proclaimed that the exposure would aerate and cure the gangrenous mass below. For the Always Trumpers, without the Trump shock, we would never have fully appreciated just how politically crude a Stephen Colbert really was, or just how obscene was a Tom Perez or a Senator Gillibrand, or how rankly partisan was a Chuck Schumer or how incapacitated a Nancy Pelosi. Dr. Sawbones Trump smelled a festering wound, ripped off the scab, and proclaimed that the exposure would aerate and cure the gangrenous mass below — however crudely administered the remedy without analgesics. In this view, Trump’s ostensibly counterproductive outbursts and Twitter rants are the unpleasant castor oil that was long ago needed to break up and pass on a constipated, corrupt, and incestuous elite.

4) Trump, Better Far Than the Alternative Lastly, there are the conservatives and Republicans (well over 90 percent) who voted for Trump on the grounds that, while he may not have been preferable to most of the alternatives in the primary, he most certainly was in the general election. For these pragmatists, there are both pleasant and occasionally worrisome ironies. On the upside, it seems clear that Trump is not just conservative to his word, but, in the first 100 days, conservative in terms of policy to a degree unlike any other Republican president or presidential nominee since Ronald Reagan. Mitt Romney would not have yanked the U.S. out of the jerry-rigged Paris climate accord. John McCain would not have appointed a Neal Gorsuch or proposed to radically recalibrate the tax code. Neither of the two Bushes would have felt politically secure enough to shut down the border to illegal immigration; neither would have pressed to finished the border wall. None since Reagan would have made the sort of conservative appointments at the cabinet and bureaucratic level as has Trump. If Trump were really a namby-pamby conservative, the sheer hatred of Trump the person by the progressive Left has had the predictable effect of making him against everything his loudest enemies are for. For the realist Trump supporters, Trump’s tweets or outbursts are often regrettable and occasionally bothersome, but not so much because they demonstrate an unprecedented level of presidential indecency. (Cynical realists with knowledge of history accept what FDR or JFK was capable of, and thus what they said in private conservations, and occasionally out loud.) Trump’s sin, then, is that he more often says out loud what prior presidents kept to their inner circle. Rather, their worry is more tactical and strategic: Trump, the bull-in-the-china-shop messenger, breaks up too much of the vital message of Trump. In public, they may cringe at Trump’s excesses (though enjoying in private how he forces sanctimonious progressives to melt down), but their worry over Trump’s overkill is mostly from the fear that no mortal 70-year-old male, without a traditionally loyal support staff, but with unhealthy sleep and diet habits, and under the stress of historic vituperation, could see through such an ambitious conservative agenda. They are worried, then, that the 24/7 and extraneous fights that Trump picks will eventually undo him, and with his demise will go his entire conservative resurgence for a generation. They admire enormously Mike Pence but concede that he would have been neither nominated nor elected. And should Trump fall, Pence would be unable amid the nuclear fallout to press the conservative agenda further. And yet there is some doubt even here as well. Trump’s tweets can be as prescient as they are reckless.

Take the infamous “Just found out that Obama had my ‘wires tapped’ in Trump Tower just before the victory” and substitute “Obama administration” for Obama, and “surveil” for “wires tapped,” and Trump’s tweet about the former president’s intelligence agencies improperly monitoring him may yet prove in a broad sense correct.

In other words, cringe-worthy Trump behavior so often is the lubricant that oils his success against cringe-worthy opponents, turning upside down the Heraclitean axiom that character is destiny, or rather redefining it, because Trump’s targets so often were hubristic and deserved the nemesis sent their way.

For the realist Trump supporters, Trump’s tweets or outbursts are often regrettable and occasionally bothersome, but not so much because they demonstrate an unprecedented level of presidential indecency. (Cynical realists with knowledge of history accept what FDR or JFK was capable of, and thus what they said in private conservations, and occasionally out loud.)

Trump’s sin, then, is that he more often says out loud what prior presidents kept to their inner circle. Rather, their worry is more tactical and strategic: Trump, the bull-in-the-china-shop messenger, breaks up too much of the vital message of Trump. In public, they may cringe at Trump’s excesses (though enjoying in private how he forces sanctimonious progressives to melt down), but their worry over Trump’s overkill is mostly from the fear that no mortal 70-year-old male, without a traditionally loyal support staff, but with unhealthy sleep and diet habits, and under the stress of historic vituperation, could see through such an ambitious conservative agenda.

They are worried, then, that the 24/7 and extraneous fights that Trump picks will eventually undo him, and with his demise will go his entire conservative resurgence for a generation.

They admire enormously Mike Pence but concede that he would have been neither nominated nor elected. And should Trump fall, Pence would be unable amid the nuclear fallout to press the conservative agenda further. And yet there is some doubt even here as well. Trump’s tweets can be as prescient as they are reckless. Take the infamous “Just found out that Obama had my ‘wires tapped’ in Trump Tower just before the victory” and substitute “Obama administration” for Obama, and “surveil” for “wires tapped,” and Trump’s tweet about the former president’s intelligence agencies improperly monitoring him may yet prove in a broad sense correct. In other words, cringe-worthy Trump behavior so often is the lubricant that oils his success against cringe-worthy opponents, turning upside down the Heraclitean axiom that character is destiny, or rather redefining it, because Trump’s targets so often were hubristic and deserved the nemesis sent their way.

It may not be that Trump earns hatred for unnecessary provocation and vitriol, but instead that he or any other Republican would have earned such venom anyway; thus his own searing tactics and narcissistic belief in his own destiny are predicated on the assumption that his unhinged enemies will vaporize first. And he may be right. James Comey has underestimated Donald Trump every bit as much as Marco Rubio or Hillary Clinton or Barack Obama did. In the end, the pragmatists apparently believe conservatives will hang together or hang separately.

Never have so many bright people proved so dense.

Never have polls and politics proved so unreliable or partisan. Never have unintended consequences so replaced predictable results.

Yes, we are in chaos, but we sense also that the pandemonium is purgative of the worse that prompted it — and it is unpleasant mostly because it has so long been overdue.

NRO contributor Victor Davis Hanson is a senior fellow at the Hoover Institution and the author of The Second World Wars: How the First Global Conflict Was Fought and Won, to appear in October from Basic Books.

 http://www.nationalreview.com/article/448562/donald-trump-ironies-wrecking-ball-long-overdue-may-benefit-country

The Pronk Pops Show Podcasts Portfolio

Listen To Pronk Pops Podcast or Download Shows 906-913

Listen To Pronk Pops Podcast or Download Shows 889-896

Listen To Pronk Pops Podcast or Download Shows 884-888

Listen To Pronk Pops Podcast or Download Shows 878-883

Listen To Pronk Pops Podcast or Download Shows 870-877

Listen To Pronk Pops Podcast or Download Shows 864-869

Listen To Pronk Pops Podcast or Download Shows 857-863

Listen To Pronk Pops Podcast or Download Shows 850-856

Listen To Pronk Pops Podcast or Download Shows 845-849

Listen To Pronk Pops Podcast or Download Shows 840-844

Listen To Pronk Pops Podcast or Download Shows 833-839

Listen To Pronk Pops Podcast or Download Shows 827-832

Listen To Pronk Pops Podcast or Download Shows 821-826

Listen To Pronk Pops Podcast or Download Shows 815-820

Listen To Pronk Pops Podcast or Download Shows 806-814

Listen To Pronk Pops Podcast or Download Shows 800-805

Listen To Pronk Pops Podcast or Download Shows 793-799

Listen To Pronk Pops Podcast or Download Shows 785-792

Listen To Pronk Pops Podcast or Download Shows 777-784

Listen To Pronk Pops Podcast or Download Shows 769-776

Listen To Pronk Pops Podcast or Download Shows 759-768

Listen To Pronk Pops Podcast or Download Shows 751-758

Listen To Pronk Pops Podcast or Download Shows 745-750

Listen To Pronk Pops Podcast or Download Shows 738-744

Listen To Pronk Pops Podcast or Download Shows 732-737

Listen To Pronk Pops Podcast or Download Shows 727-731

Listen To Pronk Pops Podcast or Download Shows 720-726

Listen To Pronk Pops Podcast or DownloadShows 713-719

Listen To Pronk Pops Podcast or DownloadShows 705-712

Listen To Pronk Pops Podcast or Download Shows 695-704

Listen To Pronk Pops Podcast or Download Shows 685-694

Listen To Pronk Pops Podcast or Download Shows 675-684

Listen To Pronk Pops Podcast or Download Shows 668-674

Listen To Pronk Pops Podcast or Download Shows 660-667

Listen To Pronk Pops Podcast or Download Shows 651-659

Listen To Pronk Pops Podcast or Download Shows 644-650

Listen To Pronk Pops Podcast or Download Shows 637-643

Listen To Pronk Pops Podcast or Download Shows 629-636

Listen To Pronk Pops Podcast or Download Shows 617-628

Listen To Pronk Pops Podcast or Download Shows 608-616

Listen To Pronk Pops Podcast or Download Shows 599-607

Listen To Pronk Pops Podcast or Download Shows 590-598

Listen To Pronk Pops Podcast or Download Shows 585- 589

Listen To Pronk Pops Podcast or Download Shows 575-584

Listen To Pronk Pops Podcast or Download Shows 565-574

Listen To Pronk Pops Podcast or Download Shows 556-564

Listen To Pronk Pops Podcast or Download Shows 546-555

Listen To Pronk Pops Podcast or Download Shows 538-545

Listen To Pronk Pops Podcast or Download Shows 532-537

Listen To Pronk Pops Podcast or Download Shows 526-531

Listen To Pronk Pops Podcast or Download Shows 519-525

Listen To Pronk Pops Podcast or Download Shows 510-518

Listen To Pronk Pops Podcast or Download Shows 500-509

Listen To Pronk Pops Podcast or Download Shows 490-499

Listen To Pronk Pops Podcast or Download Shows 480-489

Listen To Pronk Pops Podcast or Download Shows 473-479

Listen To Pronk Pops Podcast or Download Shows 464-472

Listen To Pronk Pops Podcast or Download Shows 455-463

Listen To Pronk Pops Podcast or Download Shows 447-454

Listen To Pronk Pops Podcast or Download Shows 439-446

Listen To Pronk Pops Podcast or Download Shows 431-438

Listen To Pronk Pops Podcast or Download Shows 422-430

Listen To Pronk Pops Podcast or Download Shows 414-421

Listen To Pronk Pops Podcast or Download Shows 408-413

Listen To Pronk Pops Podcast or Download Shows 400-407

Listen To Pronk Pops Podcast or Download Shows 391-399

Listen To Pronk Pops Podcast or Download Shows 383-390

Listen To Pronk Pops Podcast or Download Shows 376-382

Listen To Pronk Pops Podcast or Download Shows 369-375

Listen To Pronk Pops Podcast or Download Shows 360-368

Listen To Pronk Pops Podcast or Download Shows 354-359

Listen To Pronk Pops Podcast or Download Shows 346-353

Listen To Pronk Pops Podcast or Download Shows 338-345

Listen To Pronk Pops Podcast or Download Shows 328-337

Listen To Pronk Pops Podcast or Download Shows 319-327

Listen To Pronk Pops Podcast or Download Shows 307-318

Listen To Pronk Pops Podcast or Download Shows 296-306

Listen To Pronk Pops Podcast or Download Shows 287-295

Listen To Pronk Pops Podcast or Download Shows 277-286

Listen To Pronk Pops Podcast or Download Shows 264-276

Listen To Pronk Pops Podcast or Download Shows 250-263

Listen To Pronk Pops Podcast or Download Shows 236-249

Listen To Pronk Pops Podcast or Download Shows 222-235

Listen To Pronk Pops Podcast or Download Shows 211-221

Listen To Pronk Pops Podcast or Download Shows 202-210

Listen To Pronk Pops Podcast or Download Shows 194-201

Listen To Pronk Pops Podcast or Download Shows 184-193

Listen To Pronk Pops Podcast or Download Shows 174-183

Listen To Pronk Pops Podcast or Download Shows 165-173

Listen To Pronk Pops Podcast or Download Shows 158-164

Listen To Pronk Pops Podcast or Download Shows151-157

Listen To Pronk Pops Podcast or Download Shows 143-150

Listen To Pronk Pops Podcast or Download Shows 135-142

Listen To Pronk Pops Podcast or Download Shows 131-134

Listen To Pronk Pops Podcast or Download Shows 124-130

Listen To Pronk Pops Podcast or Download Shows 121-123

Listen To Pronk Pops Podcast or Download Shows 118-120

Listen To Pronk Pops Podcast or Download Shows 113 -117

Listen To Pronk Pops Podcast or Download Show 112

Listen To Pronk Pops Podcast or Download Shows 108-111

Listen To Pronk Pops Podcast or Download Shows 106-108

Listen To Pronk Pops Podcast or Download Shows 104-105

Listen To Pronk Pops Podcast or Download Shows 101-103

Listen To Pronk Pops Podcast or Download Shows 98-100

Listen To Pronk Pops Podcast or Download Shows 94-97

Listen To Pronk Pops Podcast or Download Show 93

Listen To Pronk Pops Podcast or Download Show 92

Listen To Pronk Pops Podcast or Download Show 91

Listen To Pronk Pops Podcast or Download Shows 88-90

Listen To Pronk Pops Podcast or Download Shows 84-87

Listen To Pronk Pops Podcast or Download Shows 79-83

Listen To Pronk Pops Podcast or Download Shows 74-78

Listen To Pronk Pops Podcast or Download Shows 71-73

Listen To Pronk Pops Podcast or Download Shows 68-70

Listen To Pronk Pops Podcast or Download Shows 65-67

Listen To Pronk Pops Podcast or Download Shows 62-64

Listen To Pronk Pops Podcast or Download Shows 58-61

Listen To Pronk Pops Podcast or Download Shows 55-57

Listen To Pronk Pops Podcast or Download Shows 52-54

Listen To Pronk Pops Podcast or Download Shows 49-51

Listen To Pronk Pops Podcast or Download Shows 45-48

Listen To Pronk Pops Podcast or Download Shows 41-44

Listen To Pronk Pops Podcast or Download Shows 38-40

Listen To Pronk Pops Podcast or Download Shows 34-37

Listen To Pronk Pops Podcast or Download Shows 30-33

Listen To Pronk Pops Podcast or Download Shows 27-29

Listen To Pronk Pops Podcast or Download Shows 17-26

Listen To Pronk Pops Podcast or Download Shows 16-22

Listen To Pronk Pops Podcast or Download Shows 10-15

Listen To Pronk Pops Podcast or Download Shows 1-9

Read Full Post | Make a Comment ( None so far )

The Pronk Pops Show 895, June 17, 2017, Breaking: Story 1: Deputy Attorney General Rod Rosenstein Appoints Former FBI Director Robert Mueller Special Counsel To Investigate Russia’s Influence in U.S. Presidential 2016 Election — Videos — Story 2: The President of United States Is The FBI Director’s Boss — Absolutely No Obstruction of Justice — Former FBI Director Went Along With President Obama and Let Hillary Clinton Off — A Real Case of Obstruction of Justice By Obama and Comey — Prosecute Clinton, Obama, and Comey — Videos — Story 3: President Trump Goes On Offense — “But you have to put your head down and fight, fight, fight. Never, ever, ever give up. Things will work out just fine.” — Videos —

Posted on May 17, 2017. Filed under: American History, Benghazi, Blogroll, Breaking News, Bribery, Central Intelligence Agency, Communications, Computers, Congress, Constitutional Law, Corruption, Countries, Crime, Deep State, Donald J. Trump, Donald J. Trump, Donald Trump, Donald Trump, Education, Elections, Empires, Fast and Furious, Federal Bureau of Investigation (FBI), Federal Government, Foreign Policy, Former President Barack Obama, Freedom of Speech, Government, Government Dependency, Government Spending, Hate Speech, High Crimes, Hillary Clinton, Hillary Clinton, Hillary Clinton, History, House of Representatives, Human, Illegal Immigration, Impeachment, Iran Nuclear Weapons Deal, Language, Law, Life, Lying, Medicare, National Security Agency, News, Obama, Philosophy, Photos, Politics, Polls, President Trump, Privacy, Progressives, Radio, Raymond Thomas Pronk, Rule of Law, Scandals, Senate, Social Security, Spying, Success, Taxation, Taxes, Terror, Terrorism, Unemployment, United Kingdom, United States Constitution, Videos, War, Wealth, Welfare Spending, Wisdom | Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , |

Project_1

The Pronk Pops Show Podcasts

Pronk Pops Show 895,  May 17, 2017

Pronk Pops Show 894,  May 16, 2017

Pronk Pops Show 893,  May 15, 2017

Pronk Pops Show 892,  May 12, 2017

Pronk Pops Show 891,  May 11, 2017

Pronk Pops Show 890,  May 10, 2017

Pronk Pops Show 889,  May 9, 2017

Pronk Pops Show 888,  May 8, 2017

Pronk Pops Show 887,  May 5, 2017

Pronk Pops Show 886,  May 4, 2017

Pronk Pops Show 885,  May 3, 2017

Pronk Pops Show 884,  May 1, 2017

Pronk Pops Show 883 April 28, 2017

Pronk Pops Show 882: April 27, 2017

Pronk Pops Show 881: April 26, 2017

Pronk Pops Show 880: April 25, 2017

Pronk Pops Show 879: April 24, 2017

Pronk Pops Show 878: April 21, 2017

Pronk Pops Show 877: April 20, 2017

Pronk Pops Show 876: April 19, 2017

Pronk Pops Show 875: April 18, 2017

Pronk Pops Show 874: April 17, 2017

Pronk Pops Show 873: April 13, 2017

Pronk Pops Show 872: April 12, 2017

Pronk Pops Show 871: April 11, 2017

Pronk Pops Show 870: April 10, 2017

Pronk Pops Show 869: April 7, 2017

Pronk Pops Show 868: April 6, 2017

Pronk Pops Show 867: April 5, 2017

Pronk Pops Show 866: April 3, 2017

Pronk Pops Show 865: March 31, 2017

Pronk Pops Show 864: March 30, 2017

Pronk Pops Show 863: March 29, 2017

Pronk Pops Show 862: March 28, 2017

Pronk Pops Show 861: March 27, 2017

Pronk Pops Show 860: March 24, 2017

Pronk Pops Show 859: March 23, 2017

Pronk Pops Show 858: March 22, 2017

Pronk Pops Show 857: March 21, 2017

Pronk Pops Show 856: March 20, 2017

Pronk Pops Show 855: March 10, 2017

Pronk Pops Show 854: March 9, 2017

Pronk Pops Show 853: March 8, 2017

Pronk Pops Show 852: March 6, 2017

Pronk Pops Show 851: March 3, 2017

Pronk Pops Show 850: March 2, 2017

Pronk Pops Show 849: March 1, 2017

Pronk Pops Show 848: February 28, 2017

Pronk Pops Show 847: February 27, 2017

Pronk Pops Show 846: February 24, 2017

Pronk Pops Show 845: February 23, 2017

Pronk Pops Show 844: February 22, 2017

Pronk Pops Show 843: February 21, 2017

Pronk Pops Show 842: February 20, 2017

Pronk Pops Show 841: February 17, 2017

Pronk Pops Show 840: February 16, 2017

Pronk Pops Show 839: February 15, 2017

Pronk Pops Show 838: February 14, 2017

Pronk Pops Show 837: February 13, 2017

Pronk Pops Show 836: February 10, 2017

Pronk Pops Show 835: February 9, 2017

Pronk Pops Show 834: February 8, 2017

Pronk Pops Show 833: February 7, 2017

Pronk Pops Show 832: February 6, 2017

Pronk Pops Show 831: February 3, 2017

Pronk Pops Show 830: February 2, 2017

Pronk Pops Show 829: February 1, 2017

 

Image result for Former FBI Director Mueller Appointed Special ProsecutorImage result for cartoon trump comey obstruction of justice

Image result for Former FBI Director Mueller Appointed Special counsel

Image result for president trump at coast guard academy

 

Breaking: Story 1: Deputy Attorney General Rod Rosenstein Appoints Former FBI Director Robert Mueller  Special Counsel To Investigate Russia’s Influence in U.S. Presidential 2016 Election — Videos — 

 

Robert Mueller named special counsel for FBI Russia probe– 

FBI Director Meuller to lead Trump-Russia probe

Robert Mueller Former FBI Director Named Special Counsel for Russia Investigation

FBI Director Mueller Reflects on His 12-Year Term

Published on Aug 30, 2013

On the eve of his departure from the FBI after 12 years as Director, Robert S. Mueller reflects on the important role of the Bureau’s personnel and partners in the FBI mission.

Leadership in Context: Transforming the FBI in an Uncertain World

Uploaded on Oct 13, 2009

FBI Director Robert Mueller assumed his role on September 4, 2001, only a week before the 9/11 attack. In his talk, he discussed efforts to radically change the focus and mindset at the FBI following the attacks, shifting from a reactive stance to one that prevents such events from occurring in the future. He discussed the shift in priorities immediately following 9/11, as well as leadership efforts in the years since to solidify and improve upon those initial changes. He talks about the challenges of running a large government agency, and some leadership lessons he has found to be useful for those managing in any large organization. The event was sponsored by the Stanford Law School. (Recorded: October 8, 2009)

 

Robert Mueller appointed special counsel

Last Updated May 17, 2017 6:10 PM EDT

Deputy Attorney General Rod Rosenstein has appointed former FBI Director Robert Mueller to serve as special counsel to oversee the previously confirmed investigation of Russian efforts to influential the 2016 Presidential election and related matters.

“I have determined that a Special Counsel is necessary in order for the American people to have full confidence in the outcome,” Rosenstein said in a statement.

The appointment comes as numerous Democratic lawmakers have called for a special counsel, colloquially known as a special prosecutor. Such calls increased in recent days after Mr. Trump fired FBI Director James Comey. On Tuesday, it was revealed the Comey had written a memo alleging that Mr. Trump had asked him to back off from investigation former National Security Adviser Michael Flynn.

Rosenstein’s letter announcing the appointment of Mueller says, “If the Special Counsel believes it is necessary and appropriate, the special counsel is authorized to prosecute federal crimes arising from the investigation of these matters.”

Mueller was appointed FBI director in 2001 and served in the position until 2013. FBI directors are appointed to ten-year terms, but President Barack Obama added two years to his tenure.

A career prosecutor and veteran of the Marine Corps during the Vietnam War, Mueller is a widely respected figure in Washington.

http://www.cbsnews.com/news/doj-appoints-special-counsel-in-wake-of-comey-developments/

WASHINGTON — The Justice Department has appointed Robert S. Mueller III, the former F.B.I. director, to serve as a special counsel to oversee its investigation into Russian meddling in the election, Deputy Attorney General Rod J. Rosenstein announced on Wednesday.

The appointment of Mr. Mueller dramatically raises the stakes for President Trump in the multiple investigations into his campaign’s ties to the Russians. It follows a swiftly moving series of developments that have roiled Washington, including Mr. Trump’s abrupt dismissal of the F.B.I. director, James B. Comey, and the disclosure that the president urged Mr. Comey to drop the bureau’s investigation into his former national security adviser, Michael T. Flynn.

Graphic: Why It’s So Hard to Have an Independent Russia Investigation

“I determined that it is in the public interest for me to exercise my authorities and appoint a special counsel to assume responsibility for this matter,” Mr. Rosenstein said in a statement. “My decision is not a finding that crimes have been committed or that any prosecution is warranted. I have made no such determination.”

While a special counsel would remain ultimately answerable to Mr. Rosenstein — and by extension, the president — he would have greater autonomy to run an investigation than a United States attorney.

Mr. Mueller is expected to announce his resignation from the law firm WilmerHale.

Robert Mueller

From Wikipedia, the free encyclopedia
Robert Mueller
Director Robert S. Mueller- III.jpg
6th Director of the Federal Bureau of Investigation
In office
September 4, 2001 – September 4, 2013
President George W. Bush
Barack Obama
Deputy Bruce Gebhardt
John Pistole
Timothy Murphy
Sean Joyce
Preceded by Thomas Pickard (Acting)
Succeeded by James Comey
United States Deputy Attorney General
Acting
In office
January 20, 2001 – May 10, 2001
President George W. Bush
Preceded by Eric Holder
Succeeded by Larry Thompson
United States Attorney for the Northern District of California
In office
1998–2001
President Bill Clinton
George W. Bush
Preceded by Michael Yamaguchi
Succeeded by Kevin Ryan
United States Assistant Attorney General for the Criminal Division
In office
1990–1993
President George H.W. Bush
Bill Clinton
Preceded by Edward Dennis
Succeeded by Jo Ann Harris
United States Attorney for the District of Massachusetts
Acting
In office
1986–1987
President Ronald Reagan
Preceded by William Weld
Succeeded by Frank L. McNamara
Personal details
Born Robert Swan Mueller III
August 7, 1944 (age 72)
New York City, New York, U.S.
Education Princeton University (BA)
New York University (MA)
University of Virginia (JD)
Military service
Allegiance  United States
Service/branch  United States Marine Corps
Unit 3RDMARDIV.png 3rd Marine Division
Battles/wars Vietnam War
Awards Bronze Star Medal ribbon.svg Bronze Star Medal
Purple Heart ribbon.svg Purple Heart
Vietnam gallantry cross-w-palm-3d.svg Gallantry Cross

Robert Swan Mueller III (born August 7, 1944) is an American lawyer who was the sixth Director of the Federal Bureau of Investigation (FBI) for 12 years, between September 4, 2001 and September 4, 2013.

On May 17 2017, the US Department of Justice announced that Mueller would serve as special counsel to oversee investigation into allegations of Russian meddling in the 2016 President Election and ties between President Trump’s campaign and Russia.

Early life and education

Mueller was born on August 7, 1944, in New York City, New York, the son of Alice C. (née Truesdale) and Robert Swan Mueller.[1] His maternal great-grandfather was railroad executive William Truesdale; his ancestry includes German, Scottish, and English.[2] Mueller grew up outside of Philadelphia, Pennsylvania. A 1962 graduate of St. Paul’s School, he went on to receive an A.B. from Princeton University in 1966, where he played lacrosse, an M.A. in international relations from New York University in 1967, and a Juris Doctor from the University of Virginia School of Law in 1973.

Military service

Mueller joined the United States Marine Corps, where he served as an officer for three years, leading a rifle platoon of the 3rd Marine Division during the Vietnam War. He is a recipient of the Bronze Star, two Navy Commendation Medals, the Purple Heart and the Vietnamese Cross of Gallantry.

Career

Following his military service, Mueller continued his studies at the University of Virginia Law School, eventually serving on the Law Review. After receiving his Juris Doctor degree, Mueller worked as a litigator in San Francisco until 1976.

He then served for 12 years in United States Attorney offices. He first worked in the office of the U.S. Attorney for the Northern District of California in San Francisco, where he rose to be chief of the criminal division, and in 1982, he moved to Boston to work in the office of the U.S. Attorney’s Office for the District of Massachusetts as Assistant United States Attorney, where he investigated and prosecuted major financial fraud, terrorism and public corruption cases, as well as narcotics conspiracies and international money launderers.

After serving as a partner at the Boston law firm of Hill and Barlow, Mueller returned to government service. In 1989, he served in the United States Department of Justice as an assistant to Attorney General Dick Thornburgh. The following year he took charge of its criminal division. During his tenure, he oversaw prosecutions that included Panamanian leader Manuel Noriega, the Pan Am Flight 103 (Lockerbie bombing) case, and the Gambino crime family boss John Gotti. In 1991, he was elected a fellow of the American College of Trial Lawyers.

In 1993, Mueller became a partner at Boston’s Hale and Dorr, specializing in white-collar crime litigation. He returned to public service in 1995 as senior litigator in the homicide section of the District of Columbia United States Attorney’s Office. In 1998, Mueller was named U.S. Attorney for the Northern District of California and held that position until 2001.

Federal Bureau of Investigation

Official portrait, circa 2001

At the memorial event of Giovanni Falcone, Mueller told the audience of American and Italian law enforcement that the relationships forged years ago between the Italian National Police and the FBI “have borne tremendous fruit in this age of international crime and terrorism. Those friendships have set the standard for global cooperation among law enforcement”.

Mueller was nominated for the position of FBI Director on July 5, 2001.[3] He and two other candidates were up for the job at the time, but he was always considered the front runner.[4] Washington lawyer George J. Terwilliger III and veteran Chicago prosecutor and white-collar defense lawyer Dan Webb were up for the job but both pulled out from consideration around mid-June. Confirmation hearings for Mueller, in front of the Senate Judiciary Committee, were quickly set for July 30, only three days before his prostate cancer surgery.[5][6] The vote on the Senate floor on August 2, 2001, passed unanimously, 98–0.[7] He served as Acting Deputy Attorney General of the United States Department of Justice for several months, before officially becoming the FBI Director on September 4, 2001, just one week before the September 11 attacks against the United States.

On May 12, 2011, it was reported that President Obama had asked Director Mueller to continue at the helm of the FBI for another 2 years beyond his normal term, expiring on September 4, 2013.[8] The Senate approved this request on July 27, 2011.[9] On September 4, 2013, Mueller was replaced by James Comey.[10]

Domestic wiretapping investigation

Director Mueller, along with Deputy Attorney General James B. Comey, offered to resign from office in March 2004 if the White House overruled a Department of Justice finding that domestic wiretapping without a court warrant was unconstitutional.[11] Attorney General John D. Ashcroft denied his consent to attempts by White House Chief of Staff Andrew Card and White House Counsel Alberto R. Gonzales to waive the Justice Department ruling and permit the domestic warrantless eavesdropping program to proceed. On March 12, 2004, President George W. Bush gave his support to changes in the program sufficient to satisfy the concerns of Mueller, Ashcroft and Comey.[11] The extent of the National Security Agency‘s domestic warrantless eavesdropping under the President’s Surveillance Program is still largely unknown.

Post-FBI Career

After leaving the FBI in 2013, Mueller became a visiting professor at Stanford University where his focus is on issues related to cyber-security.[12] In addition to his teaching position, Mueller also joined the law firm WilmerHale as a partner in their Washington, D.C. Office.[13]

On May 17, 2017, Deputy Attorney General Rod Rosenstein appointed Mueller as Special Counsel in connection with the FBI’s investigation of alleged Russian interference in the 2016 US Presidential election.[14]

Bibliography

See also

References

  1. Jump up^ “Robert Swan Mueller III”. Chicago Sun-Times. July 30, 2001. Retrieved 2007-12-02.[dead link]
  2. Jump up^ “Ancestry of Robert Mueller”. Freepages.genealogy.rootsweb.ancestry.com. Retrieved 2013-03-05.
  3. Jump up^ “Remarks by the President in Nominating Robert S. Mueller as Director of the FBI”. The White House. 2001-07-05. Retrieved 2007-09-28.
  4. Jump up^ “Bush Names Mueller FBI Director”. United Press. 2001-06-06. Archived from the original on 2013-01-29. Retrieved 2006-06-10.
  5. Jump up^ “Senate hearing set July 30 for FBI choice Mueller”. CNN. 2001-06-18. Retrieved 2006-06-10.
  6. Jump up^ “FBI director-designate has prostate cancer”. CNN. 2001-06-13. Retrieved 2006-06-10.
  7. Jump up^ “Robert S. Mueller, III, to be Director of the Federal Bureau of Investigation” (Plain Text). United States Senate. 2001-08-02. Retrieved 2006-06-10.
  8. Jump up^ “FBI Director to stay in post for another 2 years”. CNN. 2011-05-12. Retrieved 2011-05-12.
  9. Jump up^ “Senate Extends Term of F.B.I. Director”. New York Times. 2011-07-27. Retrieved 2011-09-13.
  10. Jump up^ “FBI — James B. Comey Sworn in as FBI Director”. FBI. Retrieved 14 June 2015.
  11. ^ Jump up to:a b Eggen, Dan; Kane, Paul (2007-05-16). “Gonzales Hospital Episode Detailed”. Washington Post. Retrieved 2007-09-28.
  12. Jump up^ Gorlick, Adam (2013-11-05). “Former FBI director to bolster security research at Stanford.” (Press release). Stanford, California: Stanford University. Retrieved 2016-04-22.
  13. Jump up^ “Former Director of the FBI Robert Mueller III Joins WilmerHale” (Press release). Wilmer Hale. 2014-03-24. Retrieved 2016-04-22.
  14. Jump up^ http://www.cnn.com/2017/05/17/politics/special-counsel-robert-mueller/index.html?sr=twCNN051717special-counsel-robert-mueller1002PMStoryPhoto&linkId=37706257

External links

Legal offices
Preceded by
Eric Holder
United States Deputy Attorney General
Acting

2001
Succeeded by
Larry Thompson
Government offices
Preceded by
Thomas Pickard
Acting
Director of the Federal Bureau of Investigation
2001–2013
Succeeded by
James Comey

 

Story 2: President Trump is FBI Director’s Boss — Absolutely No Obstruction of Justice — Former FBI Director Went Along With President Obama and Let Hillary Clinton Off For Numerous Felonies — A Real Case of Obstruction of Justice By Both Obama and Comey — Prosecute Clinton, Obama, and Comey — Videos

Image result for branco cartoon trump obstruction of justiceImage result for cartoon trump comey obstruction of justice

 

About That James Comey Memo. Let’s Dig Into It a Little!

Trey Gowdy on NYT Story that Trump Asked James Comey to Lay off Mike Flynn!

Krauthammer on Flynn: This is a cover-up without a crime

Lionel Nation Live Stream: J. Edgar Comey the Clown Exacts His Revenge While Fake News Revels

What qualifies as obstruction of justice?

Obama: Clinton Careless In Managing Emails

FBI director calls Clinton, her aides ‘extremely careless’

Exclusive: President Obama On FBI Reviewing Hillary Clinton Emails

Gregg Jarrett: Comey’s revenge is a gun without powder

Gregg Jarrett

James Comey was lying in wait.

His gun was cocked, he took aim and fired.  But his weapon was empty.

Three months ago, the then-FBI Director met with President Trump.  Following their private conversation, Comey did what he always does –he wrote a memorandum to himself memorializing the conversation.  Good lawyers do that routinely.

Now, only after Comey was fired, the memo magically surfaces in an inflammatory New York Times report which alleges that Mr. Trump asked Comey to end the Michael Flynn investigation.    

Those who don’t know the first thing about the law immediately began hurling words like “obstruction of justice”, “high crimes and misdemeanors” and “impeachment“.   Typically, these people don’t know what they don’t know. 

Here is what we do know.

Under the law, Comey is required to immediately inform the Department of Justice of any attempt to obstruct justice by any person, even the President of the United States.  Failure to do so would result in criminal charges against Comey.  (18 USC 4 and 28 USC 1361)  He would also, upon sufficient proof, lose his license to practice law. 

So, if Comey believed Trump attempted to obstruct justice, did he comply with the law by reporting it to the DOJ?  If not, it calls into question whether the events occurred as the Times reported it.

Obstruction requires what’s called “specific intent” to interfere with a criminal case.  If Comey concluded, however, that Trump’s language was vague, ambiguous or elliptical, then he has no duty under the law to report it because it does not rise to the level of specific intent.  Thus, no crime.

There is no evidence Comey ever alerted officials at the Justice Department, as he is duty-bound to do.  Surely if he had, that incriminating information would have made its way to the public either by an indictment or, more likely, an investigation that could hardly be kept confidential in the intervening months.

Comey’s memo is being treated as a “smoking gun” only because the media and Democrats, likely prompted by Comey himself, are now peddling it that way.

Comey will soon testify before Congress about this and other matters.  His memo will likely be produced pursuant to a subpoena.  The words and the context will matter.

But by writing a memo, Comey has put himself in a box.  If he now accuses the President of obstruction, he places himself in legal jeopardy for failing to promptly and properly report it.  If he says it was merely an uncomfortable conversation, he clears the president of wrongdoing and sullies his own image as a guy who attempted to smear the man who fired him.

Either way, James Comey comes out a loser.  No matter.  The media will hail him a hero.

After all, he gave them a good story that was better than the truth.

Gregg Jarrett is a Fox News Anchor and former defense attorney.

http://www.foxnews.com/opinion/2017/05/16/gregg-jarrett-comeys-revenge-is-gun-without-powder.html

MAY 17, 2017 1:59PM

Obstruction of Justice

President Trump is being accused of “obstruction of justice” because of a conversation that he may have had with former FBI Director James Comey.  According to the news stories, Trump may have asked Comey to lay off his former National Security advisor, Michael Flynn.  In this post I want to briefly examine the legal doctrine of obstruction of justice.

To begin, a basic principle of American criminal law is that the line between what’s lawful and what’s unlawful needs to be clear so we will know, in advance, what conduct might land us in a prison cell.  That’s the gist behind the constitutional prohibition of ex post facto laws.  Laws with vague terms raise the same danger.  When laws are vague, police and prosecutors can abuse their power and trap people.  And that’s the danger with a catch-all doctrine such as “obstruction of justice.”

“Obstruction” has sometimes been defined by the authorities as almost any action that “impedes” an investigation.  Invoking your constitutional right to silence, your right to speak with an attorney, or the attorney-client privilege are sometimes deemed “obstruction.”  Don’t the courts restrain those abuses?  Yes, sometimes they do.  I’m presently editing a book of Judge Alex Kozinski’s legal opinions.  One case, United States v. Caldwell, touches on this subject.  Here is Judge Kozinski:

Under the government’s theory, a husband who asks his wife to buy him a radar detector would be a felon — punishable by up to five years in prison and a fine of $10,000 — because their actions would obstruct the government function of catching speeders. So would a person who witnesses a crime and suggests to another witness (with no hint of threat) that they not tell the police anything unless specifically asked about it.So would the executives of a business that competes with a government-run enterprise and lowers its prices to siphon off the government’s customers. So would co-owners of land who refuse to sell it for use as a military base, forcing the government to go to the extra trouble of condemning it. So would have Elliot Richardson and William Ruckelshaus, had they agreed with each other to quit if asked by President Nixon to fire Archibald Cox. The federal government does lots of things, more and more every year, and many things private parties do can get in the government’s way. It can’t be that each such action is automatically a felony.

I should note that when James Comey served as a prosecutor in New York, he pursued Martha Stewart and went so far as to say that her assertion of innocence was itself a violation of the law!  When Comey worked as assistant attorney general, he also took a dangerously expansive view of what he considered “uncooperative” conduct by business firms.  He expected lawyers for business firms to act as deputies for the federal government, which raised constitutional problems—especially for employees who were unaware of the legal minefield all around them during a purported “internal” investigation.

Let’s also consider how the doctrine might work within the government itself.  Say a rookie cop busts a homeless man named Al, for possession of heroin.  Al is street wise so he offers to become a snitch if his charge is dropped.  Al says he was using heroin with the governor just the day before and that the governor told him that he kept a stash of other drugs in his desk at the mansion.  The rookie thinks this is a huge deal and proposes to use Al in a sting operation against the governor.  The police captain rejects the proposal and tells the rookie to forget the whole thing because it’s a made up story.  Has the captain obstructed the investigation or exercised appropriate supervision?

Another example.  Let’s say 50 FBI agents are working on the Russia investigation (improper, possibly illegal, actions involving Mr. Trump or others working on his campaign).  One agent is convinced that Mr. Trump is a traitor, taking bribes from Putin, and other illegal acts.  He proposes grand jury subpoenas for Mr. and Mrs. Trump so that they can be questioned under oath right away.  Only his FBI supervisor rejects the idea.  Has the FBI supervisor obstructed justice or exercised sound discretion?

One important difference, of course, is that neither the police captain nor the FBI supervisor, were targets (or around the targets) of the underlying investigation. Repeat: That is an important difference.  The main point of this post is simply to caution against wild and vague claims of “obstruction of justice.”  Legal rights should never be considered “obstruction.”  When judges, or prosecutors, or law enforcement supervisors restrain overzealous subordinates, that should not be considered “obstruction.”  Mr. Trump is not above the law, but investigators must also respect the law as they go about their work.

https://www.cato.org/blog/obstruction-justice

 

WASHINGTON — President Trump asked the F.B.I. director, James B. Comey, to shut down the federal investigation into Mr. Trump’s former national security adviser, Michael T. Flynn, in an Oval Office meeting in February, according to a memo Mr. Comey wrote shortly after the meeting.

“I hope you can let this go,” the president told Mr. Comey, according to the memo.

The documentation of Mr. Trump’s request is the clearest evidence that the president has tried to directly influence the Justice Department and F.B.I. investigation into links between Mr. Trump’s associates and Russia. Late Tuesday, Representative Jason Chaffetz, the Republican chairman of the House Oversight Committee, demanded that the F.B.I. turn over all “memoranda, notes, summaries and recordings” of discussions between Mr. Trump and Mr. Comey.

Such documents, Mr. Chaffetz wrote, would “raise questions as to whether the president attempted to influence or impede” the F.B.I.

Mr. Comey wrote the memo detailing his conversation with the president immediately after the meeting, which took place the day after Mr. Flynn resigned, according to two people who read the memo. It was part of a paper trail Mr. Comey created documenting what he perceived as the president’s improper efforts to influence a continuing investigation. An F.B.I. agent’s contemporaneous notes are widely held up in court as credible evidence of conversations.

Mr. Comey shared the existence of the memo with senior F.B.I. officials and close associates. The New York Times has not viewed a copy of the memo, which is unclassified, but one of Mr. Comey’s associates read parts of it to a Times reporter.

“I hope you can see your way clear to letting this go, to letting Flynn go,” Mr. Trump told Mr. Comey, according to the memo. “He is a good guy. I hope you can let this go.”

In a statement, the White House denied the version of events in the memo.

“While the president has repeatedly expressed his view that General Flynn is a decent man who served and protected our country, the president has never asked Mr. Comey or anyone else to end any investigation, including any investigation involving General Flynn,” the statement said. “The president has the utmost respect for our law enforcement agencies, and all investigations. This is not a truthful or accurate portrayal of the conversation between the president and Mr. Comey.”

GRAPHIC

The Events That Led to Comey’s Firing, and How the White House’s Story Changed

New disclosures on Tuesday allege that in February, President Trump asked James B. Comey, then the F.B.I. director, to shut down an investigation into Mr. Trump’s former national security adviser, Michael T. Flynn.

OPEN GRAPHIC

Mr. Chaffetz’s letter, sent to the acting F.B.I. director, Andrew G. McCabe, set a May 24 deadline for the internal documents to be delivered to the House committee. The congressman, a Republican, was criticized in recent months for showing little of the appetite he demonstrated in pursuing Hillary Clinton to pursue investigations into Mr. Trump’s associates.

But since announcing in April that he will not seek re-election in 2018, Mr. Chaffetz has shown more interest in the Russia investigation, and held out the potential for a subpoena on Tuesday, a notably aggressive move as most Republicans have tried to stay out of the fray.

Document: Representative Jason Chaffetz’s Letter to the F.B.I.

In testimony to the Senate last week, Mr. McCabe said, “There has been no effort to impede our investigation to date.” Mr. McCabe was referring to the broad investigation into possible collusion between Russia and the Trump campaign. The investigation into Mr. Flynn is separate.

A spokesman for the F.B.I. declined to comment.

Mr. Comey created similar memos — including some that are classified — about every phone call and meeting he had with the president, the two people said. It is unclear whether Mr. Comey told the Justice Department about the conversation or his memos.

Mr. Trump fired Mr. Comey last week. Trump administration officials have provided multiple, conflicting accounts of the reasoning behind Mr. Comey’s dismissal. Mr. Trump said in a television interview that one of the reasons was because he believed “this Russia thing” was a “made-up story.”

The Feb. 14 meeting took place just a day after Mr. Flynn was forced out of his job after it was revealed he had lied to Vice President Mike Pence about the nature of phone conversations he had had with the Russian ambassador to the United States.

Despite the conversation between Mr. Trump and Mr. Comey, the investigation of Mr. Flynn has proceeded. In Virginia, a federal grand jury has issued subpoenas in recent weeks for records related to Mr. Flynn. Part of the Flynn investigation is centered on his financial links to Russia and Turkey.

Mr. Comey had been in the Oval Office that day with other senior national security officials for a terrorism threat briefing. When the meeting ended, Mr. Trump told those present — including Mr. Pence and Attorney General Jeff Sessions — to leave the room except for Mr. Comey.

Five Contradictions in the White House’s Story About Comey’s Firing

The Trump administration has offered conflicting answers about how and why the F.B.I. director, James Comey, was fired.

Alone in the Oval Office, Mr. Trump began the discussion by condemning leaks to the news media, saying that Mr. Comey should consider putting reporters in prison for publishing classified information, according to one of Mr. Comey’s associates.

Mr. Trump then turned the discussion to Mr. Flynn.

After writing up a memo that outlined the meeting, Mr. Comey shared it with senior F.B.I. officials. Mr. Comey and his aides perceived Mr. Trump’s comments as an effort to influence the investigation, but they decided that they would try to keep the conversation secret — even from the F.B.I. agents working on the Russia investigation — so the details of the conversation would not affect the investigation.

Mr. Comey was known among his closest advisers to document conversations that he believed would later be called into question, according to two former confidants, who said Mr. Comey was uncomfortable at times with his relationship with Mr. Trump.

Mr. Comey’s recollection has been bolstered in the past by F.B.I. notes. In 2007, he told Congress about a now-famous showdown with senior White House officials over the Bush administration’s warrantless wiretapping program. The White House disputed Mr. Comey’s account, but the F.B.I. director at the time, Robert S. Mueller III, kept notes that backed up Mr. Comey’s story.

The White House has repeatedly crossed lines that other administrations have been reluctant to cross when discussing politically charged criminal investigations. Mr. Trump has disparaged the continuing F.B.I. investigation as a hoax and called for an inquiry into his political rivals. His representatives have taken the unusual step of declaring no need for a special prosecutor to investigate the president’s associates.

The Oval Office meeting occurred a little over two weeks after Mr. Trump summoned Mr. Comey to the White House for a lengthy, one-on-one dinner at the residence. At that dinner, on Jan. 27, Mr. Trump asked Mr. Comey at least two times for a pledge of loyalty — which Mr. Comey declined, according to one of Mr. Comey’s associates.

In a Twitter post on Friday, Mr. Trump said that “James Comey better hope that there are no ‘tapes’ of our conversations before he starts leaking to the press!”

After the meeting, Mr. Comey’s associates did not believe there was any way to corroborate Mr. Trump’s statements. But Mr. Trump’s suggestion last week that he was keeping tapes has made them wonder whether there are tapes that back up Mr. Comey’s account.

The Jan. 27 dinner came a day after White House officials learned that Mr. Flynn had been interviewed by F.B.I. agents about his phone calls with the Russian ambassador, Sergey I. Kislyak. On Jan. 26, the acting attorney general, Sally Q. Yates, told the White House counsel about the interview, and said Mr. Flynn could be subject to blackmail by the Russians because they knew he had lied about the content of the calls.

The Pronk Pops Show Podcasts Portfolio

Listen To Pronk Pops Podcast or Download Shows 889-895

Listen To Pronk Pops Podcast or Download Shows 884-888

Listen To Pronk Pops Podcast or Download Shows 878-883

Listen To Pronk Pops Podcast or Download Shows 870-877

Listen To Pronk Pops Podcast or Download Shows 864-869

Listen To Pronk Pops Podcast or Download Shows 857-863

Listen To Pronk Pops Podcast or Download Shows 850-856

Listen To Pronk Pops Podcast or Download Shows 845-849

Listen To Pronk Pops Podcast or Download Shows 840-844

Listen To Pronk Pops Podcast or Download Shows 833-839

Listen To Pronk Pops Podcast or Download Shows 827-832

Listen To Pronk Pops Podcast or Download Shows 821-826

Listen To Pronk Pops Podcast or Download Shows 815-820

Listen To Pronk Pops Podcast or Download Shows 806-814

Listen To Pronk Pops Podcast or Download Shows 800-805

Listen To Pronk Pops Podcast or Download Shows 793-799

Listen To Pronk Pops Podcast or Download Shows 785-792

Listen To Pronk Pops Podcast or Download Shows 777-784

Listen To Pronk Pops Podcast or Download Shows 769-776

Listen To Pronk Pops Podcast or Download Shows 759-768

Listen To Pronk Pops Podcast or Download Shows 751-758

Listen To Pronk Pops Podcast or Download Shows 745-750

Listen To Pronk Pops Podcast or Download Shows 738-744

Listen To Pronk Pops Podcast or Download Shows 732-737

Listen To Pronk Pops Podcast or Download Shows 727-731

Listen To Pronk Pops Podcast or Download Shows 720-726

Listen To Pronk Pops Podcast or DownloadShows 713-719

Listen To Pronk Pops Podcast or DownloadShows 705-712

Listen To Pronk Pops Podcast or Download Shows 695-704

Listen To Pronk Pops Podcast or Download Shows 685-694

Listen To Pronk Pops Podcast or Download Shows 675-684

Listen To Pronk Pops Podcast or Download Shows 668-674

Listen To Pronk Pops Podcast or Download Shows 660-667

Listen To Pronk Pops Podcast or Download Shows 651-659

Listen To Pronk Pops Podcast or Download Shows 644-650

Listen To Pronk Pops Podcast or Download Shows 637-643

Listen To Pronk Pops Podcast or Download Shows 629-636

Listen To Pronk Pops Podcast or Download Shows 617-628

Listen To Pronk Pops Podcast or Download Shows 608-616

Listen To Pronk Pops Podcast or Download Shows 599-607

Listen To Pronk Pops Podcast or Download Shows 590-598

Listen To Pronk Pops Podcast or Download Shows 585- 589

Listen To Pronk Pops Podcast or Download Shows 575-584

Listen To Pronk Pops Podcast or Download Shows 565-574

Listen To Pronk Pops Podcast or Download Shows 556-564

Listen To Pronk Pops Podcast or Download Shows 546-555

Listen To Pronk Pops Podcast or Download Shows 538-545

Listen To Pronk Pops Podcast or Download Shows 532-537

Listen To Pronk Pops Podcast or Download Shows 526-531

Listen To Pronk Pops Podcast or Download Shows 519-525

Listen To Pronk Pops Podcast or Download Shows 510-518

Listen To Pronk Pops Podcast or Download Shows 500-509

Listen To Pronk Pops Podcast or Download Shows 490-499

Listen To Pronk Pops Podcast or Download Shows 480-489

Listen To Pronk Pops Podcast or Download Shows 473-479

Listen To Pronk Pops Podcast or Download Shows 464-472

Listen To Pronk Pops Podcast or Download Shows 455-463

Listen To Pronk Pops Podcast or Download Shows 447-454

Listen To Pronk Pops Podcast or Download Shows 439-446

Listen To Pronk Pops Podcast or Download Shows 431-438

Listen To Pronk Pops Podcast or Download Shows 422-430

Listen To Pronk Pops Podcast or Download Shows 414-421

Listen To Pronk Pops Podcast or Download Shows 408-413

Listen To Pronk Pops Podcast or Download Shows 400-407

Listen To Pronk Pops Podcast or Download Shows 391-399

Listen To Pronk Pops Podcast or Download Shows 383-390

Listen To Pronk Pops Podcast or Download Shows 376-382

Listen To Pronk Pops Podcast or Download Shows 369-375

Listen To Pronk Pops Podcast or Download Shows 360-368

Listen To Pronk Pops Podcast or Download Shows 354-359

Listen To Pronk Pops Podcast or Download Shows 346-353

Listen To Pronk Pops Podcast or Download Shows 338-345

Listen To Pronk Pops Podcast or Download Shows 328-337

Listen To Pronk Pops Podcast or Download Shows 319-327

Listen To Pronk Pops Podcast or Download Shows 307-318

Listen To Pronk Pops Podcast or Download Shows 296-306

Listen To Pronk Pops Podcast or Download Shows 287-295

Listen To Pronk Pops Podcast or Download Shows 277-286

Listen To Pronk Pops Podcast or Download Shows 264-276

Listen To Pronk Pops Podcast or Download Shows 250-263

Listen To Pronk Pops Podcast or Download Shows 236-249

Listen To Pronk Pops Podcast or Download Shows 222-235

Listen To Pronk Pops Podcast or Download Shows 211-221

Listen To Pronk Pops Podcast or Download Shows 202-210

Listen To Pronk Pops Podcast or Download Shows 194-201

Listen To Pronk Pops Podcast or Download Shows 184-193

Listen To Pronk Pops Podcast or Download Shows 174-183

Listen To Pronk Pops Podcast or Download Shows 165-173

Listen To Pronk Pops Podcast or Download Shows 158-164

Listen To Pronk Pops Podcast or Download Shows151-157

Listen To Pronk Pops Podcast or Download Shows 143-150

Listen To Pronk Pops Podcast or Download Shows 135-142

Listen To Pronk Pops Podcast or Download Shows 131-134

Listen To Pronk Pops Podcast or Download Shows 124-130

Listen To Pronk Pops Podcast or Download Shows 121-123

Listen To Pronk Pops Podcast or Download Shows 118-120

Listen To Pronk Pops Podcast or Download Shows 113 -117

Listen To Pronk Pops Podcast or Download Show 112

Listen To Pronk Pops Podcast or Download Shows 108-111

Listen To Pronk Pops Podcast or Download Shows 106-108

Listen To Pronk Pops Podcast or Download Shows 104-105

Listen To Pronk Pops Podcast or Download Shows 101-103

Listen To Pronk Pops Podcast or Download Shows 98-100

Listen To Pronk Pops Podcast or Download Shows 94-97

Listen To Pronk Pops Podcast or Download Show 93

Listen To Pronk Pops Podcast or Download Show 92

Listen To Pronk Pops Podcast or Download Show 91

Listen To Pronk Pops Podcast or Download Shows 88-90

Listen To Pronk Pops Podcast or Download Shows 84-87

Listen To Pronk Pops Podcast or Download Shows 79-83

Listen To Pronk Pops Podcast or Download Shows 74-78

Listen To Pronk Pops Podcast or Download Shows 71-73

Listen To Pronk Pops Podcast or Download Shows 68-70

Listen To Pronk Pops Podcast or Download Shows 65-67

Listen To Pronk Pops Podcast or Download Shows 62-64

Listen To Pronk Pops Podcast or Download Shows 58-61

Listen To Pronk Pops Podcast or Download Shows 55-57

Listen To Pronk Pops Podcast or Download Shows 52-54

Listen To Pronk Pops Podcast or Download Shows 49-51

Listen To Pronk Pops Podcast or Download Shows 45-48

Listen To Pronk Pops Podcast or Download Shows 41-44

Listen To Pronk Pops Podcast or Download Shows 38-40

Listen To Pronk Pops Podcast or Download Shows 34-37

Listen To Pronk Pops Podcast or Download Shows 30-33

Listen To Pronk Pops Podcast or Download Shows 27-29

Listen To Pronk Pops Podcast or Download Shows 17-26

Listen To Pronk Pops Podcast or Download Shows 16-22

Listen To Pronk Pops Podcast or Download Shows 10-15

Listen To Pronk Pops Podcast or Download Shows 1-9

Read Full Post | Make a Comment ( None so far )

The Pronk Pops Show 892, May 12, 2017, Story 1: Lester _______ (Bolt, Colt, Dolt, Holt, Jolt, Volt) Interviews President Donald J. Trump — The Real Scandal Is Obama Surveillance and Spying On Republican Party Presidential Candidates Using The Intelligent Community (CIA, NSA, FBI, …) Product–Unmasked and Leaked! — Videos– Story 2: Big Lie Media Crazy Credibility Crisis — Fake News is Media McCarthyism — Videos — Story 3: President Trump Voter Fraud Commission — Videos

Posted on May 12, 2017. Filed under: Addiction, American History, Benghazi, Blogroll, Breaking News, Cartoons, Communications, Computers, Congress, Corruption, Countries, Crime, Culture, Donald J. Trump, Donald J. Trump, Donald Trump, Donald Trump, Economics, Education, Elections, Empires, Employment, Fast and Furious, Federal Bureau of Investigation (FBI), Federal Government, Foreign Policy, Freedom of Speech, Government, Government Dependency, Government Spending, Hate Speech, High Crimes, History, House of Representatives, Human, Human Behavior, Illegal Immigration, Iran Nuclear Weapons Deal, IRS, Language, Law, Life, Lying, Marco Rubio, Media, National Interest, National Security Agency, News, Obama, Philosophy, Photos, Politics, Polls, President Barack Obama, President Trump, Progressives, Radio, Rand Paul, Raymond Thomas Pronk, Regulation, Scandals, Security, Senate, Servers, Software, Spying, Surveillance and Spying On American People, Surveillance/Spying, Taxation, Terror, Terrorism, Trump Surveillance/Spying, United States of America, Videos, Violence, War, Wealth, Wisdom | Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , |

Project_1

The Pronk Pops Show Podcasts

Pronk Pops Show 892,  May 12, 2017

Pronk Pops Show 891,  May 11, 2017

Pronk Pops Show 891,  May 11, 2017

Pronk Pops Show 890,  May 10, 2017

Pronk Pops Show 889,  May 9, 2017

Pronk Pops Show 888,  May 8, 2017

Pronk Pops Show 887,  May 5, 2017

Pronk Pops Show 886,  May 4, 2017

Pronk Pops Show 885,  May 3, 2017

Pronk Pops Show 884,  May 1, 2017

Pronk Pops Show 883 April 28, 2017

Pronk Pops Show 882: April 27, 2017

Pronk Pops Show 881: April 26, 2017

Pronk Pops Show 880: April 25, 2017

Pronk Pops Show 879: April 24, 2017

Pronk Pops Show 878: April 21, 2017

Pronk Pops Show 877: April 20, 2017

Pronk Pops Show 876: April 19, 2017

Pronk Pops Show 875: April 18, 2017

Pronk Pops Show 874: April 17, 2017

Pronk Pops Show 873: April 13, 2017

Pronk Pops Show 872: April 12, 2017

Pronk Pops Show 871: April 11, 2017

Pronk Pops Show 870: April 10, 2017

Pronk Pops Show 869: April 7, 2017

Pronk Pops Show 868: April 6, 2017

Pronk Pops Show 867: April 5, 2017

Pronk Pops Show 866: April 3, 2017

Pronk Pops Show 865: March 31, 2017

Pronk Pops Show 864: March 30, 2017

Pronk Pops Show 863: March 29, 2017

Pronk Pops Show 862: March 28, 2017

Pronk Pops Show 861: March 27, 2017

Pronk Pops Show 860: March 24, 2017

Pronk Pops Show 859: March 23, 2017

Pronk Pops Show 858: March 22, 2017

Pronk Pops Show 857: March 21, 2017

Pronk Pops Show 856: March 20, 2017

Pronk Pops Show 855: March 10, 2017

Pronk Pops Show 854: March 9, 2017

Pronk Pops Show 853: March 8, 2017

Pronk Pops Show 852: March 6, 2017

Pronk Pops Show 851: March 3, 2017

Pronk Pops Show 850: March 2, 2017

Pronk Pops Show 849: March 1, 2017

Pronk Pops Show 848: February 28, 2017

Pronk Pops Show 847: February 27, 2017

Pronk Pops Show 846: February 24, 2017

Pronk Pops Show 845: February 23, 2017

Pronk Pops Show 844: February 22, 2017

Pronk Pops Show 843: February 21, 2017

Pronk Pops Show 842: February 20, 2017

Pronk Pops Show 841: February 17, 2017

Pronk Pops Show 840: February 16, 2017

Pronk Pops Show 839: February 15, 2017

Pronk Pops Show 838: February 14, 2017

Pronk Pops Show 837: February 13, 2017

Pronk Pops Show 836: February 10, 2017

Pronk Pops Show 835: February 9, 2017

Pronk Pops Show 834: February 8, 2017

Pronk Pops Show 833: February 7, 2017

Pronk Pops Show 832: February 6, 2017

Pronk Pops Show 831: February 3, 2017

Pronk Pops Show 830: February 2, 2017

Pronk Pops Show 829: February 1, 2017

 

Story 1: Lester _______ (Bolt, Colt, Dolt, Holt, Jolt, Volt) Interviews President Donald J. Trump — The Real Scandal Is Obama Surveillance and Spying On Trump and Associates Using The Intelligent Community (CIA, NSA, FBI, …) Product!  —  Videos — 

 

Image result for obama surveillance of trumpImage result for cartoons obama surveillance of trumpImage result for trump crisisImage result for cartoons obama surveillance of trumpImage result for cartoons obama surveillance of trumpImage result for cartoons obama surveillance of trumpImage result for cartoons obama surveillance of trumpImage result for cartoons obama surveillance of trump

Image result for intelligence community

Image result for intelligence community

President Trump Full Interview with Lester Holt NBC 5/11/17

“This Is TOTALLY FAKE!” Tucker Loses His Temper on Russia Conspiracy

Obama Might have Spied on Rand Paul and Other Republicans

Obama Administration Spying on Rand Paul | Michael Savage (Audio)

Did President Obama Spy On Donald Trump? | True News

The Truth About FBI Director James Comey: You’re Fired!

Hannity: James Comey is a national embarrassment

Full || FBI Director James Comey Press Conference On Hillary Clinton Email Investigation (7-5-16)

United States Intelligence Community

From Wikipedia, the free encyclopedia
United States Intelligence Community
United States Intelligence Community Seal.svg

Seal of the United States Intelligence Community
Agency overview
Formed December 4, 1981
Agency executive

The United States Intelligence Community (IC)[1] is a federation of 16 separate United States government agencies that work separately and together to conduct intelligence activities considered necessary for the conduct of foreign relations and national security of the United States. Member organizations of the IC include intelligence agencies, military intelligence, and civilian intelligence and analysis offices within federal executive departments. The IC is headed by the Director of National Intelligence (DNI), who reports to the President of the United States.

Among their varied responsibilities, the members of the Community collect and produce foreign and domestic intelligence, contribute to military planning, and perform espionage. The IC was established by Executive Order 12333, signed on December 4, 1981, by U.S. PresidentRonald Reagan.[2]

The Washington Post reported in 2010 that there were 1,271 government organizations and 1,931 private companies in 10,000 locations in the United States that are working on counterterrorism, homeland security, and intelligence, and that the intelligence community as a whole includes 854,000 people holding top-secret clearances.[3] According to a 2008 study by the Office of the Director of National Intelligence, private contractors make up 29% of the workforce in the U.S. intelligence community and account for 49% of their personnel budgets.[4]

Etymology

The term “Intelligence Community” was first used during Lt. Gen. Walter Bedell Smith‘s tenure as Director of Central Intelligence (1950–1953).[5]

History

Intelligence is information that agencies collect, analyze, and distribute in response to government leaders’ questions and requirements. Intelligence is a broad term that entails:

Collection, analysis, and production of sensitive information to support national security leaders, including policymakers, military commanders, and Members of Congress. Safeguarding these processes and this information through counterintelligence activities. Execution of covert operations approved by the President. The IC strives to provide valuable insight on important issues by gathering raw intelligence, analyzing that data in context, and producing timely and relevant products for customers at all levels of national security—from the war-fighter on the ground to the President in Washington.[6]

Executive Order 12333 charged the IC with six primary objectives:[7]

  • Collection of information needed by the President, the National Security Council, the Secretary of State, the Secretary of Defense, and other executive branch officials for the performance of their duties and responsibilities;
  • Production and dissemination of intelligence;
  • Collection of information concerning, and the conduct of activities to protect against, intelligence activities directed against the U.S., international terrorist and/or narcotics activities, and other hostile activities directed against the U.S. by foreign powers, organizations, persons and their agents;
  • Special activities (defined as activities conducted in support of U.S. foreign policy objectives abroad which are planned and executed so that the “role of the United States Government is not apparent or acknowledged publicly”, and functions in support of such activities, but which are not intended to influence United States political processes, public opinion, policies, or media and do not include diplomatic activities or the collection and production of intelligence or related support functions);
  • Administrative and support activities within the United States and abroad necessary for the performance of authorized activities and
  • Such other intelligence activities as the President may direct from time to time.

Organization

Members

The IC is headed by the Director of National Intelligence (DNI), whose statutory leadership is exercised through the Office of the Director of National Intelligence (ODNI). The 16 members of the IC are:[8]

The official seals of U.S. Intelligence Community members.

Agency/Office Parent Agency Federal Department Date est.
Defense Intelligence Agency none Defense 1961
National Geospatial-Intelligence Agency none Defense 1996
National Reconnaissance Office none Defense 1961
National Security Agency none Defense 1952
Military Intelligence Corps United States Army Defense 1863
Office of Naval Intelligence United States Navy Defense 1882
Twenty-Fifth Air Force United States Air Force Defense 1948
Marine Corps Intelligence United States Marine Corps Defense 1939
Coast Guard Intelligence United States Coast Guard Homeland Security 1915
Office of Intelligence and Analysis none Homeland Security 2007
Central Intelligence Agency none Independent agency 1947
Bureau of Intelligence and Research none State 1945
Office of Terrorism and Financial Intelligence none Treasury 2004
Office of National Security Intelligence Drug Enforcement Administration Justice 2006
Intelligence Branch Federal Bureau of Investigation Justice 2005
Office of Intelligence and Counterintelligence none Energy 1977

Programs

The IC performs under two separate programs:

  • The National Intelligence Program (NIP), formerly known as the National Foreign Intelligence Program as defined by the National Security Act of 1947 (as amended), “refers to all programs, projects, and activities of the intelligence community, as well as any other programs of the intelligence community designated jointly by the Director of National Intelligence (DNI) and the head of a United States department or agency or by the President. Such term does not include programs, projects, or activities of the military departments to acquire intelligence solely for the planning and conduct of tactical military operations by United States Armed Forces”. Under the law, the DNI is responsible for directing and overseeing the NIP, though the ability to do so is limited (see the Organization structure and leadership section).
  • The Military Intelligence Program (MIP) refers to the programs, projects, or activities of the military departments to acquire intelligence solely for the planning and conduct of tactical military operations by United States Armed Forces. The MIP is directed and controlled by the Under Secretary of Defense for Intelligence. In 2005 the Department of Defense combined the Joint Military Intelligence Program and the Tactical Intelligence and Related Activities program to form the MIP.

Since the definitions of the NIP and MIP overlap when they address military intelligence, assignment of intelligence activities to the NIP and MIP sometimes proves problematic.

Organizational structure and leadership

IC Circle.jpg

The overall organization of the IC is primarily governed by the National Security Act of 1947 (as amended) and Executive Order12333. The statutory organizational relationships were substantially revised with the 2004 Intelligence Reform and Terrorism Prevention Act (IRTPA) amendments to the 1947 National Security Act.

Though the IC characterizes itself as a federation of its member elements, its overall structure is better characterized as a confederation due to its lack of a well-defined, unified leadership and governance structure. Prior to 2004, the Director of Central Intelligence (DCI) was the head of the IC, in addition to being the director of the CIA. A major criticism of this arrangement was that the DCI had little or no actual authority over the budgetary authorities of the other IC agencies and therefore had limited influence over their operations.

Following the passage of IRTPA in 2004, the head of the IC is the Director of National Intelligence (DNI). The DNI exerts leadership of the IC primarily through statutory authorities under which he or she:

  • controls the “National Intelligence Program” budget;
  • establishes objectives, priorities, and guidance for the IC; and
  • manages and directs the tasking of, collection, analysis, production, and dissemination of national intelligence by elements of the IC.

However, the DNI has no authority to direct and control any element of the IC except his own staff—the Office of the DNI—neither does the DNI have the authority to hire or fire personnel in the IC except those on his own staff. The member elements in the executive branch are directed and controlled by their respective department heads, all cabinet-level officials reporting to the President. By law, only the Director of the Central Intelligence Agency reports to the DNI.

In light of major intelligence failures in recent years that called into question how well Intelligence Community ensures U.S. national security, particularly those identified by the 9/11 Commission (National Commission on Terrorist Attacks Upon the United States), and the “WMD Commission” (Commission on the Intelligence Capabilities of the United States Regarding Weapons of Mass Destruction), the authorities and powers of the DNI and the overall organizational structure of the IC have become subject of intense debate in the United States.

Interagency cooperation

Previously, interagency cooperation and the flow of information among the member agencies was hindered by policies that sought to limit the pooling of information out of privacy and security concerns. Attempts to modernize and facilitate interagency cooperation within the IC include technological, structural, procedural, and cultural dimensions. Examples include the Intellipediawiki of encyclopedic security-related information; the creation of the Office of the Director of National Intelligence, National Intelligence Centers, Program Manager Information Sharing Environment, and Information Sharing Council; legal and policy frameworks set by the Intelligence Reform and Terrorism Prevention Act of 2004, information sharing Executive Orders 13354 and Executive Order 13388, and the 2005 National Intelligence Strategy.

Budget

Data visualization of U.S. intelligence black budget (2013)

The U.S. intelligence budget (excluding the Military Intelligence Program) in fiscal year 2013 was appropriated as $52.7 billion, and reduced by the amount sequestered to $49.0 billion.[9] In fiscal year2012 it peaked at $53.9 billion, according to a disclosure required under a recent law implementing recommendations of the 9/11 Commission.[10]The 2012 figure was up from $53.1 billion in 2010,[11] $49.8 billion in 2009,[12] $47.5 billion in 2008,[13] $43.5 billion in 2007,[14] and $40.9 billion in 2006.[15]

About 70 percent of the intelligence budget went to contractors for the procurement of technology and services (including analysis), according to the May 2007 chart from the ODNI. Intelligence spending has increased by a third over ten years ago, in inflation-adjusted dollars, according to the Center for Strategic and Budgetary Assessments.[citation needed]

In a statement on the release of newdeclassified figures, DNI Mike McConnell said[when?] there would be no additional disclosures of classified budget information beyond the overall spending figure because “such disclosures could harm national security”. How the money is divided among the 16 intelligence agencies and what it is spent on is classified. It includes salaries for about 100,000 people, multibillion-dollar satellite programs, aircraft, weapons, electronic sensors, intelligence analysis, spies, computers, and software.

On August 29, 2013 the Washington Post published the summary of the Office of the Director of National Intelligence’s multivolume FY 2013 Congressional Budget Justification, the U.S. intelligence community’s top-secret “black budget.”[16][17][18] The IC’s FY 2013 budget details, how the 16 spy agencies use the money and how it performs against the goals set by the president and Congress. Experts said that access to such details about U.S. spy programs is without precedent. Steven Aftergood, Federation of American Scientists, which provides analyses of national security issues stated that “It was a titanic struggle just to get the top-line budget number disclosed, and that has only been done consistently since 2007 … but a real grasp of the structure and operations of the intelligence bureaucracy has been totally beyond public reach. This kind of material, even on a historical basis, has simply not been available.”[19] Access to budget details will enable an informed public debate on intelligence spending for the first time said the co-chair of the 9/11 Commission Lee H. Hamilton. He added that Americans should not be excluded from the budget process because the intelligence community has a profound impact on the life of ordinary Americans.[19]

Oversight

Intelligence Community Oversight duties are distributed to both the Executive and Legislative branches. Primary Executive oversight is performed by the President’s Foreign Intelligence Advisory Board, the Joint Intelligence Community Council, the Office of the Inspector General, and the Office of Management and Budget. Primary congressional oversight jurisdiction over the IC is assigned to two committees: the United States House Permanent Select Committee on Intelligence and the United States Senate Select Committee on Intelligence. The House Armed Services Committee and Senate Armed Services Committee draft bills to annually authorize the budgets of DoD intelligence activities, and both the House and Senate appropriations committees annually draft bills to appropriate the budgets of the IC. The Senate Committee on Homeland Security and Governmental Affairs took a leading role in formulating the intelligence reform legislation in the 108th Congress.

See also

References

  1. Jump up^ Agrawal, Nina. “There’s more than the CIA and FBI: The 17 agencies that make up the U.S. intelligence community”. latimes.com. Retrieved 2017-01-30.
  2. Jump up^ “Executive Order 12333”. Cia.gov. Retrieved 2013-01-23.
  3. Jump up^ Dana Priest & William M Arkin (19 July 2010). “A hidden world, growing beyond control”. The Washington Post.
  4. Jump up^ Priest, Dana (2011). Top Secret America: The Rise of the New American Security State. Little, Brown and Company. p. 320. ISBN 0-316-18221-4.
  5. Jump up^ Michael Warner; Kenneth McDonald. “US Intelligence Community Reform Studies Since 1947” (PDF). CIA. p. 4. Retrieved 28 June 2013.
  6. Jump up^ Rosenbach, Eric & Aki J. Peritz (12 June 2009). “Confrontation or Collaboration? Congress and the Intelligence Community” (PDF). Belfer Center for Science and International Affairs, Harvard Kennedy School. Retrieved 21 July 2009.
  7. Jump up^ Executive Order 12333 text
  8. Jump up^ User, Super. “Members of the IC”.
  9. Jump up^ “DNI Releases Budget Figure for 2013 National Intelligence Program”. Office of the Director of National Intelligence. 30 October 2013. Retrieved 2 August 2014.
  10. Jump up^ DNI Releases FY 2012 Appropriated Budget Figure. Dni.gov (2012-10-30). Retrieved on 2013-08-16.
  11. Jump up^ “DNI Releases Budget Figure for 2010 National Intelligence Program”(PDF). Office of the Director of National Intelligence. 2010-10-28. Retrieved 15 June 2013.
  12. Jump up^ “DNI Releases Budget Figure for 2009 National Intelligence Program”(PDF). Retrieved 15 June 2013.
  13. Jump up^ “DNI Releases Budget Figure for 2008 National Intelligence Program”(PDF). Retrieved 15 June 2013.
  14. Jump up^ “DNI Releases Budget Figure for 2007 National Intelligence Program”(PDF). Retrieved 15 June 2013.
  15. Jump up^ Hacket, John F. (2010-10-28). “FY2006 National Intelligence Program Budget, 10-28-10” (PDF). Office of the Director of National Intelligence. Retrieved 15 June 2013.
  16. Jump up^ Matt DeLong (29 August 2013). “Inside the 2013 U.S. intelligence ‘black budget'”. The Washington Post. Retrieved 31 August 2013.
  17. Jump up^ Matthews, Dylan (29 August 2013). “America’s secret intelligence budget, in 11 (nay, 13) charts”. The Washington Post. Retrieved 31 August 2013.
  18. Jump up^ DeLong, Matt (29 August 2013). “2013 U.S. intelligence budget: Additional resources”. The Washington Post. Retrieved 31 August 2013.
  19. ^ Jump up to:a b Barton Gellman & Greg Miller (29 August 2013). “U.S. spy network’s successes, failures and objectives detailed in ‘black budget’ summary”. The Washington Post. Retrieved 31 August 2013.

Further reading

External links

https://en.wikipedia.org/wiki/United_States_Intelligence_Community

National Security Agency

From Wikipedia, the free encyclopedia
National Security Agency
Seal of the U.S. National Security Agency.svg

Seal of the National Security Agency
Flag of the U.S. National Security Agency.svg

Flag of the National Security Agency
National Security Agency headquarters, Fort Meade, Maryland.jpg
NSA Headquarters, Fort Meade, Maryland
Agency overview
Formed November 4, 1952; 64 years ago[1]
Preceding agency
  • Armed Forces Security Agency
Headquarters Fort Meade, Maryland, U.S.
39°6′32″N 76°46′17″WCoordinates: 39°6′32″N 76°46′17″W
Motto “Defending Our Nation. Securing The Future.”
Employees Classified (30,000–40,000 estimate)[2][3][4][5]
Annual budget Classified (estimated $10.8 billion, 2013)[6][7]
Agency executives
Parent agency United States Department of Defense
Website www.nsa.gov

The National Security Agency (NSA) is a military intelligence organization and a constituent of the United States Department of Defense (DOD). The NSA is responsible for global monitoring, collection, and processing of information and data for foreign intelligence and counterintelligence purposes, a discipline known as signals intelligence (SIGINT). NSA is concurrently charged with protection of U.S. government communications and information systems against penetration and network warfare.[8][9] Although many of NSA’s programs rely on “passive” electronic collection, the agency is authorized to accomplish its mission through active clandestine means,[10] among which are physically bugging electronic systems[11] and allegedly engaging in sabotage through subversive software.[12][13] Moreover, NSA maintains physical presence in a large number of countries across the globe, where its Special Collection Service (SCS) inserts eavesdropping devices in difficult-to-reach places. SCS collection tactics allegedly encompass “close surveillance, burglary, wiretapping, breaking and entering.”[14][15]

Unlike the Defense Intelligence Agency (DIA) and the Central Intelligence Agency (CIA), both of which specialize primarily in foreign human espionage, NSA does not unilaterally conduct human-source intelligence gathering, despite often being portrayed so in popular culture. Instead, NSA is entrusted with assistance to and coordination of SIGINT elements at other government organizations, which are prevented by law from engaging in such activities without the approval of the NSA via the Defense Secretary.[16] As part of these streamlining responsibilities, the agency has a co-located organization called the Central Security Service (CSS), which was created to facilitate cooperation between NSA and other U.S. military cryptanalysis components. Additionally, the NSA Director simultaneously serves as the Commander of the United States Cyber Command and as Chief of the Central Security Service.

Originating as a unit to decipher coded communications in World War II, it was officially formed as the NSA by President Harry S. Truman in 1952. Since then, it has become one of the largest U.S. intelligence organizations in terms of personnel and budget,[6][17] operating as part of the Department of Defense and simultaneously reporting to the Director of National Intelligence.

NSA surveillance has been a matter of political controversy on several occasions, such as its spying on anti-Vietnam-war leaders or economic espionage. In 2013, the extent of some of the NSA’s secret surveillance programs was revealed to the public by Edward Snowden. According to the leaked documents, the NSA intercepts the communications of over a billion people worldwide, many of whom are United States citizens, and tracks the movement of hundreds of millions of people using cellphones. Internationally, research has pointed to the NSA’s ability to surveil the domestic Internet traffic of foreign countries through “boomerang routing”.[18]

Contents

 [show

History

Army predecessor

The origins of the National Security Agency can be traced back to April 28, 1917, three weeks after the U.S. Congress declared war on Germany in World War I. A code and cipher decryption unit was established as the Cable and Telegraph Section which was also known as the Cipher Bureau. It was headquartered in Washington, D.C. and was part of the war effort under the executive branch without direct Congressional authorization. During the course of the war it was relocated in the army’s organizational chart several times. On July 5, 1917, Herbert O. Yardley was assigned to head the unit. At that point, the unit consisted of Yardley and two civilian clerks. It absorbed the navy’s cryptoanalysis functions in July 1918. World War I ended on November 11, 1918, and MI-8 moved to New York City on May 20, 1919, where it continued intelligence activities as the Code Compilation Company under the direction of Yardley.[19][20]

Black Chamber

Western Union allowed MI-8 to monitor telegraphic communications passing through the company’s wires until 1929.[21]

MI-8 also operated the so-called “Black Chamber“.[22] The Black Chamber was located on East 37th Street in Manhattan. Its purpose was to crack the communications codes of foreign governments. Jointly supported by the State Department and the War Department, the chamber persuaded Western Union, the largest U.S. telegram company, to allow government officials to monitor private communications passing through the company’s wires.[23]

Other “Black Chambers” were also found in Europe. They were established by the French and British governments to read the letters of targeted individuals, employing a variety of techniques to surreptitiously open, copy, and reseal correspondence before forwarding it to unsuspecting recipients.[24]

Despite the American Black Chamber’s initial successes, it was shut down in 1929 by U.S. Secretary of State Henry L. Stimson, who defended his decision by stating: “Gentlemen do not read each other’s mail”.[21]

World War II and its aftermath

During World War II, the Signal Security Agency (SSA) was created to intercept and decipher the communications of the Axis powers.[25] When the war ended, the SSA was reorganized as the Army Security Agency (ASA), and it was placed under the leadership of the Director of Military Intelligence.[25]

On May 20, 1949, all cryptologic activities were centralized under a national organization called the Armed Forces Security Agency (AFSA).[25] This organization was originally established within the U.S. Department of Defense under the command of the Joint Chiefs of Staff.[26] The AFSA was tasked to direct Department of Defense communications and electronic intelligence activities, except those of U.S. military intelligence units.[26] However, the AFSA was unable to centralize communications intelligence and failed to coordinate with civilian agencies that shared its interests such as the Department of State, Central Intelligence Agency (CIA) and the Federal Bureau of Investigation (FBI).[26] In December 1951, President Harry S. Truman ordered a panel to investigate how AFSA had failed to achieve its goals. The results of the investigation led to improvements and its redesignation as the National Security Agency.[27]

The agency was formally established by Truman in a memorandum of October 24, 1952, that revised National Security Council Intelligence Directive (NSCID) 9.[28] Since President Truman’s memo was a classified document,[28] the existence of the NSA was not known to the public at that time. Due to its ultra-secrecy the U.S. intelligence community referred to the NSA as “No Such Agency”.[29]

Vietnam War

In the 1960s, the NSA played a key role in expanding America’s commitment to the Vietnam War by providing evidence of a North Vietnamese attack on the American destroyer USS Maddox during the Gulf of Tonkin incident.[30]

A secret operation, code-named “MINARET“, was set up by the NSA to monitor the phone communications of Senators Frank Church and Howard Baker, as well as major civil rights leaders, including Martin Luther King, Jr., and prominent U.S. journalists and athletes who criticized the Vietnam War.[31] However, the project turned out to be controversial, and an internal review by the NSA concluded that its Minaret program was “disreputable if not outright illegal”.[31]

The NSA mounted a major effort to secure tactical communications among U.S. forces during the war with mixed success. The NESTOR family of compatible secure voice systems it developed was widely deployed during the Vietnam War, with about 30,000 NESTOR sets produced. However a variety of technical and operational problems limited their use, allowing the North Vietnamese to exploit intercepted U.S. communications.[32] :Vol I, p.79

Church Committee hearings

In the aftermath of the Watergate scandal, a congressional hearing in 1975 led by Sen. Frank Church[33] revealed that the NSA, in collaboration with Britain’s SIGINT intelligence agency Government Communications Headquarters (GCHQ), had routinely intercepted the international communications of prominent anti-Vietnam war leaders such as Jane Fonda and Dr. Benjamin Spock.[34] Following the resignation of President Richard Nixon, there were several investigations of suspected misuse of FBI, CIA and NSA facilities.[35] Senator Frank Church uncovered previously unknown activity,[35] such as a CIA plot (ordered by the administration of President John F. Kennedy) to assassinate Fidel Castro.[36] The investigation also uncovered NSA’s wiretaps on targeted American citizens.[37]

After the Church Committee hearings, the Foreign Intelligence Surveillance Act of 1978 was passed into law. This was designed to limit the practice of mass surveillance in the United States.[35]

From 1980s to 1990s

In 1986, the NSA intercepted the communications of the Libyan government during the immediate aftermath of the Berlin discotheque bombing. The White House asserted that the NSA interception had provided “irrefutable” evidence that Libya was behind the bombing, which U.S. President Ronald Reagan cited as a justification for the 1986 United States bombing of Libya.[38][39]

In 1999, a multi-year investigation by the European Parliament highlighted the NSA’s role in economic espionage in a report entitled ‘Development of Surveillance Technology and Risk of Abuse of Economic Information’.[40] That year, the NSA founded the NSA Hall of Honor, a memorial at the National Cryptologic Museum in Fort Meade, Maryland.[41] The memorial is a, “tribute to the pioneers and heroes who have made significant and long-lasting contributions to American cryptology”.[41] NSA employees must be retired for more than fifteen years to qualify for the memorial.[41]

NSA’s infrastructure deteriorated in the 1990s as defense budget cuts resulted in maintenance deferrals. On January 24, 2000, NSA headquarters suffered a total network outage for three days caused by an overloaded network. Incoming traffic was successfully stored on agency servers, but it could not be directed and processed. The agency carried out emergency repairs at a cost of $3 million to get the system running again. (Some incoming traffic was also directed instead to Britain’s GCHQ for the time being.) Director Michael Hayden called the outage a “wake-up call” for the need to invest in the agency’s infrastructure.[42]

War on Terror

After Osama bin Laden moved to Afghanistan in the 1980s, the NSA recorded all of his phone calls via satellite, logging over 2,000 minutes of conversation[43]

In the aftermath of the September 11 attacks, the NSA created new IT systems to deal with the flood of information from new technologies like the Internet and cellphones. ThinThread contained advanced data mining capabilities. It also had a “privacy mechanism”; surveillance was stored encrypted; decryption required a warrant. The research done under this program may have contributed to the technology used in later systems. ThinThread was cancelled when Michael Hayden chose Trailblazer, which did not include ThinThread’s privacy system.[44]

Trailblazer Project ramped up in 2002 and was worked on by Science Applications International Corporation (SAIC), Boeing, Computer Sciences Corporation, IBM, and Litton Industries. Some NSA whistleblowers complained internally about major problems surrounding Trailblazer. This led to investigations by Congress and the NSA and DoD Inspectors General. The project was cancelled in early 2004.

Turbulence started in 2005. It was developed in small, inexpensive “test” pieces, rather than one grand plan like Trailblazer. It also included offensive cyber-warfare capabilities, like injecting malware into remote computers. Congress criticized Turbulence in 2007 for having similar bureaucratic problems as Trailblazer.[45] It was to be a realization of information processing at higher speeds in cyberspace.[46]

Global surveillance disclosures

The massive extent of the NSA’s spying, both foreign and domestic, was revealed to the public in a series of detailed disclosures of internal NSA documents beginning in June 2013. Most of the disclosures were leaked by former NSA contractor, Edward Snowden.

Scope of surveillance

It was revealed that the NSA intercepts telephone and Internet communications of over a billion people worldwide, seeking information on terrorism as well as foreign politics, economics[47] and “commercial secrets”.[48] In a declassified document it was revealed that 17,835 phone lines were on an improperly permitted “alert list” from 2006 to 2009 in breach of compliance, which tagged these phone lines for daily monitoring.[49][50][51] Eleven percent of these monitored phone lines met the agency’s legal standard for “reasonably articulable suspicion” (RAS).[49][52]

A dedicated unit of the NSA locates targets for the CIA for extrajudicial assassination in the Middle East.[53] The NSA has also spied extensively on the European Union, the United Nations and numerous governments including allies and trading partners in Europe, South America and Asia.[54][55]

The NSA tracks the locations of hundreds of millions of cellphones per day, allowing it to map people’s movements and relationships in detail.[56] It reportedly has access to all communications made via Google, Microsoft, Facebook, Yahoo, YouTube, AOL, Skype, Apple and Paltalk,[57] and collects hundreds of millions of contact lists from personal email and instant messaging accounts each year.[58] It has also managed to weaken much of the encryption used on the Internet (by collaborating with, coercing or otherwise infiltrating numerous technology companies), so that the majority of Internet privacy is now vulnerable to the NSA and other attackers.[59][60]

Domestically, the NSA collects and stores metadata records of phone calls,[61] including over 120 million US Verizon subscribers,[62] as well as Internet communications,[57] relying on a secret interpretation of the Patriot Act whereby the entirety of US communications may be considered “relevant” to a terrorism investigation if it is expected that even a tiny minority may relate to terrorism.[63] The NSA supplies foreign intercepts to the DEA, IRS and other law enforcement agencies, who use these to initiate criminal investigations. Federal agents are then instructed to “recreate” the investigative trail via parallel construction.[64]

The NSA also spies on influential Muslims to obtain information that could be used to discredit them, such as their use of pornography. The targets, both domestic and abroad, are not suspected of any crime but hold religious or political views deemed “radical” by the NSA.[65]

Although NSA’s surveillance activities are controversial, government agencies and private enterprises have common needs, and sometimes cooperate at subtle and complex technical levels. Big data is becoming more advantageous, justifying the cost of required computer hardware, and social media lead the trend. The interests of NSA and Silicon Valley began to converge as advances in computer storage technology drastically reduced the costs of storing enormous amounts of data and at the same time the value of the data for use in consumer marketing began to rise. On the other hand, social media sites are growing as voluntary data mining operations on a scale that rivals or exceeds anything the government could attempt on its own.[66]

According to a report in The Washington Post in July 2014, relying on information provided by Snowden, 90% of those placed under surveillance in the U.S. are ordinary Americans, and are not the intended targets. The newspaper said it had examined documents including emails, text messages, and online accounts that support the claim.[67]

Legal accountability

Despite President Obama’s claims that these programs have congressional oversight, members of Congress were unaware of the existence of these NSA programs or the secret interpretation of the Patriot Act, and have consistently been denied access to basic information about them.[68] Obama has also claimed that there are legal checks in place to prevent inappropriate access of data and that there have been no examples of abuse;[69] however, the secret FISC court charged with regulating the NSA’s activities is, according to its chief judge, incapable of investigating or verifying how often the NSA breaks even its own secret rules.[70] It has since been reported that the NSA violated its own rules on data access thousands of times a year, many of these violations involving large-scale data interceptions;[71] and that NSA officers have even used data intercepts to spy on love interests.[72] The NSA has “generally disregarded the special rules for disseminating United States person information” by illegally sharing its intercepts with other law enforcement agencies.[73] A March 2009 opinion of the FISC court, released by court order, states that protocols restricting data queries had been “so frequently and systemically violated that it can be fairly said that this critical element of the overall … regime has never functioned effectively.”[74][75] In 2011 the same court noted that the “volume and nature” of the NSA’s bulk foreign Internet intercepts was “fundamentally different from what the court had been led to believe”.[73] Email contact lists (including those of US citizens) are collected at numerous foreign locations to work around the illegality of doing so on US soil.[58]

Legal opinions on the NSA’s bulk collection program have differed. In mid-December 2013, U.S. District Court Judge Richard Leon ruled that the “almost-Orwellian” program likely violates the Constitution, and wrote, “I cannot imagine a more ‘indiscriminate’ and ‘arbitrary invasion’ than this systematic and high-tech collection and retention of personal data on virtually every single citizen for purposes of querying and analyzing it without prior judicial approval. Surely, such a program infringes on ‘that degree of privacy’ that the Founders enshrined in the Fourth Amendment. Indeed, I have little doubt that the author of our Constitution, James Madison, who cautioned us to beware ‘the abridgement of freedom of the people by gradual and silent encroachments by those in power,’ would be aghast.”[76]

Later that month, U.S. District Judge William Pauley ruled that the NSA’s collection of telephone records is legal and valuable in the fight against terrorism. In his opinion, he wrote, “a bulk telephony metadata collection program [is] a wide net that could find and isolate gossamer contacts among suspected terrorists in an ocean of seemingly disconnected data” and noted that a similar collection of data prior to 9/11 might have prevented the attack.[77]

An October 2014 United Nations report condemned mass surveillance by the United States and other countries as violating multiple international treaties and conventions that guarantee core privacy rights.[78]

Official responses

On March 20, 2013 the Director of National Intelligence, Lieutenant General James Clapper, testified before Congress that the NSA does not wittingly collect any kind of data on millions or hundreds of millions of Americans, but he retracted this in June after details of the PRISM program were published, and stated instead that meta-data of phone and Internet traffic are collected, but no actual message contents.[79] This was corroborated by the NSA Director, General Keith Alexander, before it was revealed that the XKeyscore program collects the contents of millions of emails from US citizens without warrant, as well as “nearly everything a user does on the Internet”. Alexander later admitted that “content” is collected, but stated that it is simply stored and never analyzed or searched unless there is “a nexus to al-Qaida or other terrorist groups”.[69]

Regarding the necessity of these NSA programs, Alexander stated on June 27 that the NSA’s bulk phone and Internet intercepts had been instrumental in preventing 54 terrorist “events”, including 13 in the US, and in all but one of these cases had provided the initial tip to “unravel the threat stream”.[80] On July 31 NSA Deputy Director John Inglis conceded to the Senate that these intercepts had not been vital in stopping any terrorist attacks, but were “close” to vital in identifying and convicting four San Diego men for sending US$8,930 to Al-Shabaab, a militia that conducts terrorism in Somalia.[81][82][83]

The U.S. government has aggressively sought to dismiss and challenge Fourth Amendment cases raised against it, and has granted retroactive immunity to ISPs and telecoms participating in domestic surveillance.[84][85] The U.S. military has acknowledged blocking access to parts of The Guardian website for thousands of defense personnel across the country,[86][87] and blocking the entire Guardian website for personnel stationed throughout Afghanistan, the Middle East, and South Asia.[88]

Organizational structure

Michael S. Rogers, the director of the NSA.

The NSA is led by the Director of the National Security Agency (DIRNSA), who also serves as Chief of the Central Security Service (CHCSS) and Commander of the United States Cyber Command (USCYBERCOM) and is the highest-ranking military official of these organizations. He is assisted by a Deputy Director, who is the highest-ranking civilian within the NSA/CSS.

NSA also has an Inspector General, head of the Office of the Inspector General (OIG), a General Counsel, head of the Office of the General Counsel (OGC) and a Director of Compliance, who is head of the Office of the Director of Compliance (ODOC).[89]

Unlike other intelligence organizations such as CIA or DIA, NSA has always been particularly reticent concerning its internal organizational structure.

As of the mid-1990s, the National Security Agency was organized into five Directorates:

  • The Operations Directorate, which was responsible for SIGINT collection and processing.
  • The Technology and Systems Directorate, which develops new technologies for SIGINT collection and processing.
  • The Information Systems Security Directorate, which was responsible for NSA’s communications and information security missions.
  • The Plans, Policy and Programs Directorate, which provided staff support and general direction for the Agency.
  • The Support Services Directorate, which provided logistical and administrative support activities.[90]

Each of these directorates consisted of several groups or elements, designated by a letter. There were for example the A Group, which was responsible for all SIGINT operations against the Soviet Union and Eastern Europe, and G Group, which was responsible for SIGINT related to all non-communist countries. These groups were divided in units designated by an additional number, like unit A5 for breaking Soviet codes, and G6, being the office for the Middle East, North Africa, Cuba, Central and South America.[91][92]

Structure

As of 2013, NSA has about a dozen directorates, which are designated by a letter, although not all of them are publicly known. The directorates are divided in divisions and units starting with the letter of the parent directorate, followed by a number for the division, the sub-unit or a sub-sub-unit.

The main elements of the organizational structure of the NSA are:[93]

  • F – Directorate only known from unit F6, the Special Collection Service (SCS), which is a joint program created by CIA and NSA in 1978 to facilitate clandestine activities such as bugging computers throughout the world, using the expertise of both agencies.[94]
  • G – Directorate only known from unit G112, the office that manages the Senior Span platform, attached to the U2 spy planes.[95]
  • I – Information Assurance Directorate (IAD), which ensures availability, integrity, authentication, confidentiality, and non-repudiation of national security and telecommunications and information systems (national security systems).
  • J – Directorate only known from unit J2, the Cryptologic Intelligence Unit
  • L – Installation and Logistics
  • M – Human Resources
  • Q – Security and Counterintelligence
  • R – Research Directorate, which conducts research on signals intelligence and on information assurance for the U.S. Government.[96]
  • S – Signals Intelligence Directorate (SID), which is responsible for the collection, analysis, production and dissemination of signals intelligence. This directorate is led by a director and a deputy director. The SID consists of the following divisions:
    • S1 – Customer Relations
    • S2 – Analysis and Production Centers, with the following so-called Product Lines:
      • S2A: South Asia, S2B: China and Korea, S2C: International Security, S2E: Middle East/Asia, S2F: International Crime, S2G: Counter-proliferation, S2H: Russia, S2I: Counter-terrorism, S2J: Weapons and Space, S2T: Current Threats
    • S3 – Data Acquisition, with these divisions for the main collection programs:
      • S31 – Cryptanalysis and Exploitation Services (CES)
      • S32 – Tailored Access Operations (TAO), which hacks into foreign computers to conduct cyber-espionage and reportedly is “the largest and arguably the most important component of the NSA’s huge Signal Intelligence (SIGINT) Directorate, consisting of over 1,000 military and civilian computer hackers, intelligence analysts, targeting specialists, computer hardware and software designers, and electrical engineers.”[97]
      • S33 – Global Access Operations (GAO), which is responsible for intercepts from satellites and other international SIGINT platforms.[98] A tool which details and maps the information collected by this unit is code-named Boundless Informant.
      • S34 – Collections Strategies and Requirements Center
      • S35 – Special Source Operations (SSO), which is responsible for domestic and compartmented collection programs, like for example the PRISM program.[98] Special Source Operations is also mentioned in connection to the FAIRVIEW collection program.[99]
  • T – Technical Directorate (TD)
  • Directorate for Education and Training
  • Directorate for Corporate Leadership
  • Foreign Affairs Directorate, which acts as liaison with foreign intelligence services, counter-intelligence centers and the UKUSA-partners.
  • Acquisitions and Procurement Directorate
  • Information Sharing Services (ISS), led by a chief and a deputy chief.[100]

In the year 2000, a leadership team was formed, consisting of the Director, the Deputy Director and the Directors of the Signals Intelligence (SID), the Information Assurance (IAD) and the Technical Directorate (TD). The chiefs of other main NSA divisions became associate directors of the senior leadership team.[101]

After president George W. Bush initiated the President’s Surveillance Program (PSP) in 2001, the NSA created a 24-hour Metadata Analysis Center (MAC), followed in 2004 by the Advanced Analysis Division (AAD), with the mission of analyzing content, Internet metadata and telephone metadata. Both units were part of the Signals Intelligence Directorate.[102]

A 2016 proposal would combine the Signals Intelligence Directorate with the Information Assurance Directorate into a Directorate of Operations.[103]

Watch centers

The NSA maintains at least two watch centers:

  • National Security Operations Center (NSOC), which is the NSA’s current operations center and focal point for time-sensitive SIGINT reporting for the United States SIGINT System (USSS). This center was established in 1968 as the National SIGINT Watch Center (NSWC) and renamed into National SIGINT Operations Center (NSOC) in 1973. This “nerve center of the NSA” got its current name in 1996.[104]
  • NSA/CSS Threat Operations Center (NTOC), which is the primary NSA/CSS partner for Department of Homeland Security response to cyber incidents. The NTOC establishes real-time network awareness and threat characterization capabilities to forecast, alert, and attribute malicious activity and enable the coordination of Computer Network Operations. The NTOC was established in 2004 as a joint Information Assurance and Signals Intelligence project.[105]

Employees

The number of NSA employees is officially classified[4] but there are several sources providing estimates. In 1961, NSA had 59,000 military and civilian employees, which grew to 93,067 in 1969, of which 19,300 worked at the headquarters at Fort Meade. In the early 1980s NSA had roughly 50,000 military and civilian personnel. By 1989 this number had grown again to 75,000, of which 25,000 worked at the NSA headquarters. Between 1990 and 1995 the NSA’s budget and workforce were cut by one third, which led to a substantial loss of experience.[106]

In 2012, the NSA said more than 30,000 employees worked at Fort Meade and other facilities.[2] In 2012, John C. Inglis, the deputy director, said that the total number of NSA employees is “somewhere between 37,000 and one billion” as a joke,[4] and stated that the agency is “probably the biggest employer of introverts.”[4] In 2013 Der Spiegel stated that the NSA had 40,000 employees.[5] More widely, it has been described as the world’s largest single employer of mathematicians.[107] Some NSA employees form part of the workforce of the National Reconnaissance Office (NRO), the agency that provides the NSA with satellite signals intelligence.

As of 2013 about 1,000 system administrators work for the NSA.[108]

Security issues

The NSA received criticism early on in 1960 after two agents had defected to the Soviet Union. Investigations by the House Un-American Activities Committee and a special subcommittee of the United States House Committee on Armed Services revealed severe cases of ignorance in personnel security regulations, prompting the former personnel director and the director of security to step down and leading to the adoption of stricter security practices.[109] Nonetheless, security breaches reoccurred only a year later when in an issue of Izvestia of July 23, 1963, a former NSA employee published several cryptologic secrets.

The very same day, an NSA clerk-messenger committed suicide as ongoing investigations disclosed that he had sold secret information to the Soviets on a regular basis. The reluctance of Congressional houses to look into these affairs had prompted a journalist to write, “If a similar series of tragic blunders occurred in any ordinary agency of Government an aroused public would insist that those responsible be officially censured, demoted, or fired.” David Kahn criticized the NSA’s tactics of concealing its doings as smug and the Congress’ blind faith in the agency’s right-doing as shortsighted, and pointed out the necessity of surveillance by the Congress to prevent abuse of power.[109]

Edward Snowden‘s leaking of the existence of PRISM in 2013 caused the NSA to institute a “two-man rule“, where two system administrators are required to be present when one accesses certain sensitive information.[108]Snowden claims he suggested such a rule in 2009.[110]

Polygraphing

Defense Security Service (DSS) polygraph brochure given to NSA applicants

The NSA conducts polygraph tests of employees. For new employees, the tests are meant to discover enemy spies who are applying to the NSA and to uncover any information that could make an applicant pliant to coercion.[111] As part of the latter, historically EPQs or “embarrassing personal questions” about sexual behavior had been included in the NSA polygraph.[111]The NSA also conducts five-year periodic reinvestigation polygraphs of employees, focusing on counterintelligence programs. In addition the NSA conducts periodic polygraph investigations in order to find spies and leakers; those who refuse to take them may receive “termination of employment”, according to a 1982 memorandum from the director of the NSA.[112]

File:NSApolygraphvideo.webm

NSA-produced video on the polygraph process

There are also “special access examination” polygraphs for employees who wish to work in highly sensitive areas, and those polygraphs cover counterintelligence questions and some questions about behavior.[112] NSA’s brochure states that the average test length is between two and four hours.[113] A 1983 report of the Office of Technology Assessment stated that “It appears that the NSA [National Security Agency] (and possibly CIA) use the polygraph not to determine deception or truthfulness per se, but as a technique of interrogation to encourage admissions.”[114] Sometimes applicants in the polygraph process confess to committing felonies such as murder, rape, and selling of illegal drugs. Between 1974 and 1979, of the 20,511 job applicants who took polygraph tests, 695 (3.4%) confessed to previous felony crimes; almost all of those crimes had been undetected.[111]

In 2010 the NSA produced a video explaining its polygraph process.[115] The video, ten minutes long, is titled “The Truth About the Polygraph” and was posted to the Web site of the Defense Security Service. Jeff Stein of The Washington Post said that the video portrays “various applicants, or actors playing them — it’s not clear — describing everything bad they had heard about the test, the implication being that none of it is true.”[116] AntiPolygraph.org argues that the NSA-produced video omits some information about the polygraph process; it produced a video responding to the NSA video.[115] George Maschke, the founder of the Web site, accused the NSA polygraph video of being “Orwellian“.[116]

After Edward Snowden revealed his identity in 2013, the NSA began requiring polygraphing of employees once per quarter.[117]

Arbitrary firing

The number of exemptions from legal requirements has been criticized. When in 1964 the Congress was hearing a bill giving the director of the NSA the power to fire at will any employee,The Washington Post wrote: “This is the very definition of arbitrariness. It means that an employee could be discharged and disgraced on the basis of anonymous allegations without the slightest opportunity to defend himself.” Yet, the bill was accepted by an overwhelming majority.[109]

Insignia and memorials

Seal of the U.S. National Security Agency.svg

The heraldic insignia of NSA consists of an eagle inside a circle, grasping a key in its talons.[118] The eagle represents the agency’s national mission.[118] Its breast features a shield with bands of red and white, taken from the Great Seal of the United States and representing Congress.[118] The key is taken from the emblem of Saint Peter and represents security.[118]

When the NSA was created, the agency had no emblem and used that of the Department of Defense.[119] The agency adopted its first of two emblems in 1963.[119] The current NSA insignia has been in use since 1965, when then-Director, LTG Marshall S. Carter (USA) ordered the creation of a device to represent the agency.[120]

The NSA’s flag consists of the agency’s seal on a light blue background.

National Cryptologic Memorial

Crews associated with NSA missions have been involved in a number of dangerous and deadly situations.[121] The USS Liberty incident in 1967 and USS Pueblo incident in 1968 are examples of the losses endured during the Cold War.[121]

The National Security Agency/Central Security Service Cryptologic Memorial honors and remembers the fallen personnel, both military and civilian, of these intelligence missions.[122] It is made of black granite, and has 171 names carved into it, as of 2013 .[122] It is located at NSA headquarters. A tradition of declassifying the stories of the fallen was begun in 2001.[122]

NSANet (NSA’s intranet)

Behind the Green Door – Secure communications room with separate computer terminals for access to SIPRNET, GWAN, NSANET, and JWICS

NSANet stands for National Security Agency Network and is the official NSA intranet.[123] It is a classified network,[124] for information up to the level of TS/SCI[125] to support the use and sharing of intelligence data between NSA and the signals intelligence agencies of the four other nations of the Five Eyes partnership. The management of NSANet has been delegated to the Central Security Service Texas (CSSTEXAS).[126]

NSANet is a highly secured computer network consisting of fiber-optic and satellite communication channels which are almost completely separated from the public Internet. The network allows NSA personnel and civilian and military intelligence analysts anywhere in the world to have access to the agency’s systems and databases. This access is tightly controlled and monitored. For example, every keystroke is logged, activities are audited at random and downloading and printing of documents from NSANet are recorded.[127]

In 1998, NSANet, along with NIPRNET and SIPRNET, had “significant problems with poor search capabilities, unorganized data and old information”.[128] In 2004, the network was reported to have used over twenty commercial off-the-shelf operating systems.[129] Some universities that do highly sensitive research are allowed to connect to it.[130]

The thousands of Top Secret internal NSA documents that were taken by Edward Snowden in 2013 were stored in “a file-sharing location on the NSA’s intranet site” so they could easily be read online by NSA personnel. Everyone with a TS/SCI-clearance had access to these documents and as a system administrator, Snowden was responsible for moving accidentally misplaced highly sensitive documents to more secure storage locations.[131]

National Computer Security Center

The DoD Computer Security Center was founded in 1981 and renamed the National Computer Security Center (NCSC) in 1985. NCSC was responsible for computer security throughout the federal government.[132] NCSC was part of NSA,[133] and during the late 1980s and the 1990s, NSA and NCSC published Trusted Computer System Evaluation Criteria in a six-foot high Rainbow Series of books that detailed trusted computing and network platform specifications.[134] The Rainbow books were replaced by the Common Criteria, however, in the early 2000s.[134]

Facilities

Headquarters

National Security Agency headquarters in Fort Meade, 2013

Headquarters for the National Security Agency is located at 39°6′32″N 76°46′17″W in Fort George G. Meade, Maryland, although it is separate from other compounds and agencies that are based within this same military installation. Ft. Meade is about 20 mi (32 km) southwest of Baltimore,[135] and 25 mi (40 km) northeast of Washington, DC.[136] The NSA has its own exit off Maryland Route 295 South labeled “NSA Employees Only”.[137][138] The exit may only be used by people with the proper clearances, and security vehicles parked along the road guard the entrance.[139]

NSA is the largest employer in the U.S. state of Maryland, and two-thirds of its personnel work at Ft. Meade.[140] Built on 350 acres (140 ha; 0.55 sq mi)[141] of Ft. Meade’s 5,000 acres (2,000 ha; 7.8 sq mi),[142] the site has 1,300 buildings and an estimated 18,000 parking spaces.[136][143]

NSA headquarters building in Fort Meade (left), NSOC (right)

The main NSA headquarters and operations building is what James Bamford, author of Body of Secrets, describes as “a modern boxy structure” that appears similar to “any stylish office building.”[144] The building is covered with one-way dark glass, which is lined with copper shielding in order to prevent espionage by trapping in signals and sounds.[144] It contains 3,000,000 square feet (280,000 m2), or more than 68 acres (28 ha), of floor space; Bamford said that the U.S. Capitol “could easily fit inside it four times over.”[144]

The facility has over 100 watchposts,[145] one of them being the visitor control center, a two-story area that serves as the entrance.[144] At the entrance, a white pentagonal structure,[146] visitor badges are issued to visitors and security clearances of employees are checked.[147] The visitor center includes a painting of the NSA seal.[146]

The OPS2A building, the tallest building in the NSA complex and the location of much of the agency’s operations directorate, is accessible from the visitor center. Bamford described it as a “dark glass Rubik’s Cube“.[148] The facility’s “red corridor” houses non-security operations such as concessions and the drug store. The name refers to the “red badge” which is worn by someone without a security clearance. The NSA headquarters includes a cafeteria, a credit union, ticket counters for airlines and entertainment, a barbershop, and a bank.[146] NSA headquarters has its own post office, fire department, and police force.[149][150][151]

The employees at the NSA headquarters reside in various places in the Baltimore-Washington area, including Annapolis, Baltimore, and Columbia in Maryland and the District of Columbia, including the Georgetown community.[152]

Power consumption

Due to massive amounts of data processing, NSA is the largest electricity consumer in Maryland.[140]

Following a major power outage in 2000, in 2003 and in follow-ups through 2007, The Baltimore Sun reported that the NSA was at risk of electrical overload because of insufficient internal electrical infrastructure at Fort Meade to support the amount of equipment being installed. This problem was apparently recognized in the 1990s but not made a priority, and “now the agency’s ability to keep its operations going is threatened.”[153]

Baltimore Gas & Electric (BGE, now Constellation Energy) provided NSA with 65 to 75 megawatts at Ft. Meade in 2007, and expected that an increase of 10 to 15 megawatts would be needed later that year.[154] In 2011, NSA at Ft. Meade was Maryland’s largest consumer of power.[140] In 2007, as BGE’s largest customer, NSA bought as much electricity as Annapolis, the capital city of Maryland.[153]

One estimate put the potential for power consumption by the new Utah Data Center at US$40 million per year.[155]

History of headquarters

Headquarters at Fort Meade circa 1950s

When the agency was established, its headquarters and cryptographic center were in the Naval Security Station in Washington, D.C. The COMINT functions were located in Arlington Hall in Northern Virginia, which served as the headquarters of the U.S. Army‘s cryptographic operations.[156] Because the Soviet Union had detonated a nuclear bomb and because the facilities were crowded, the federal government wanted to move several agencies, including the AFSA/NSA. A planning committee considered Fort Knox, but Fort Meade, Maryland, was ultimately chosen as NSA headquarters because it was far enough away from Washington, D.C. in case of a nuclear strike and was close enough so its employees would not have to move their families.[157]

Construction of additional buildings began after the agency occupied buildings at Ft. Meade in the late 1950s, which they soon outgrew.[157] In 1963 the new headquarters building, nine stories tall, opened. NSA workers referred to the building as the “Headquarters Building” and since the NSA management occupied the top floor, workers used “Ninth Floor” to refer to their leaders.[158] COMSEC remained in Washington, D.C., until its new building was completed in 1968.[157] In September 1986, the Operations 2A and 2B buildings, both copper-shielded to prevent eavesdropping, opened with a dedication by President Ronald Reagan.[159] The four NSA buildings became known as the “Big Four.”[159] The NSA director moved to 2B when it opened.[159]

Fort Meade shooting

On March 30, 2015, shortly before 9 am, a stolen sports utility vehicle approached an NSA police vehicle blocking the road near the gate of Fort Meade, after it was told to leave the area. NSA officers fired on the SUV, killing the 27-year-old driver, Mya Hall, and seriously injuring her 20-year-old passenger. An NSA officer’s arm was injured when Hall subsequently crashed into his vehicle.[160][161]

The two women were transgender[162] and had just gotten off from a night of partying at a motel with the man they’d stolen the SUV from that morning. They “attempted to drive a vehicle into the National Security Agency portion of the installation without authorization”, according to an NSA statement.[163] FBI spokeswoman Amy Thoreson said the incident is not believed to be related to terrorism.[164] In June 2015 the FBI closed its investigation into the incident and federal prosecutors have declined to bring charges against anyone involved.[165]

An anonymous police official told The Washington Post, “This was not a deliberate attempt to breach the security of NSA. This was not a planned attack.” The two are believed to have made a wrong turn off the highway, while fleeing from the motel after stealing the vehicle. A small amount of cocaine was found in the SUV. A local CBS reporter initially said a gun was found,[166] but her later revision does not.[167] Dozens of journalists were corralled into a parking lot blocks away from the scene, and were barred from photographing the area.[168]

Computing

In 1995, The Baltimore Sun reported that the NSA is the owner of the single largest group of supercomputers.[169]

NSA held a groundbreaking ceremony at Ft. Meade in May 2013 for its High Performance Computing Center 2, expected to open in 2016.[170] Called Site M, the center has a 150 megawatt power substation, 14 administrative buildings and 10 parking garages.[149] It cost $3.2 billion and covers 227 acres (92 ha; 0.355 sq mi).[149] The center is 1,800,000 square feet (17 ha; 0.065 sq mi)[149] and initially uses 60 megawatts of electricity.[171]

Increments II and III are expected to be completed by 2030, and would quadruple the space, covering 5,800,000 square feet (54 ha; 0.21 sq mi) with 60 buildings and 40 parking garages.[149] Defense contractors are also establishing or expanding cybersecurity facilities near the NSA and around the Washington metropolitan area.[149]

Other U.S. facilities

Buckley Air Force Base in Colorado

Utah Data Center

As of 2012, NSA collected intelligence from four geostationary satellites.[155] Satellite receivers were at Roaring Creek Station in Catawissa, Pennsylvania and Salt Creek Station in Arbuckle, California.[155] It operated ten to twenty taps on U.S. telecom switches. NSA had installations in several U.S. states and from them observed intercepts from Europe, the Middle East, North Africa, Latin America, and Asia.[155]

NSA had facilities at Friendship Annex (FANX) in Linthicum, Maryland, which is a 20 to 25-minute drive from Ft. Meade;[172] the Aerospace Data Facility at Buckley Air Force Base in Aurora outside Denver, Colorado; NSA Texas in the Texas Cryptology Center at Lackland Air Force Base in San Antonio, Texas; NSA Georgia at Fort Gordon in Augusta, Georgia; NSA Hawaii in Honolulu; the Multiprogram Research Facility in Oak Ridge, Tennessee, and elsewhere.[152][155]

On January 6, 2011 a groundbreaking ceremony was held to begin construction on NSA’s first Comprehensive National Cyber-security Initiative (CNCI) Data Center, known as the “Utah Data Center” for short. The $1.5B data center is being built at Camp Williams, Utah, located 25 miles (40 km) south of Salt Lake City, and will help support the agency’s National Cyber-security Initiative.[173] It is expected to be operational by September 2013.[155]

In 2009, to protect its assets and to access more electricity, NSA sought to decentralize and expand its existing facilities in Ft. Meade and Menwith Hill,[174] the latter expansion expected to be completed by 2015.[175]

The Yakima Herald-Republic cited Bamford, saying that many of NSA’s bases for its Echelon program were a legacy system, using outdated, 1990s technology.[176] In 2004, NSA closed its operations at Bad Aibling Station (Field Station 81) in Bad Aibling, Germany.[177] In 2012, NSA began to move some of its operations at Yakima Research Station, Yakima Training Center, in Washington state to Colorado, planning to leave Yakima closed.[178] As of 2013, NSA also intended to close operations at Sugar Grove, West Virginia.[176]

International stations

RAF Menwith Hill has the largest NSA presence in the United Kingdom.[175]

Following the signing in 1946–1956[179] of the UKUSA Agreement between the United States, United Kingdom, Canada, Australia and New Zealand, who then cooperated on signals intelligence and ECHELON,[180] NSA stations were built at GCHQ Bude in Morwenstow, United Kingdom; Geraldton, Pine Gap and Shoal Bay, Australia; Leitrim and Ottawa, Canada; Misawa, Japan; and Waihopai and Tangimoana,[181] New Zealand.[182]

NSA operates RAF Menwith Hill in North Yorkshire, United Kingdom, which was, according to BBC News in 2007, the largest electronic monitoring station in the world.[183] Planned in 1954, and opened in 1960, the base covered 562 acres (227 ha; 0.878 sq mi) in 1999.[184]

The agency’s European Cryptologic Center (ECC), with 240 employees in 2011, is headquartered at a US military compound in Griesheim, near Frankfurt in Germany. A 2011 NSA report indicates that the ECC is responsible for the “largest analysis and productivity in Europe” and focusses on various priorities, including Africa, Europe, the Middle East and counterterrorism operations.[185]

In 2013, a new Consolidated Intelligence Center, also to be used by NSA, is being built at the headquarters of the United States Army Europe in Wiesbaden, Germany.[186] NSA’s partnership with Bundesnachrichtendienst (BND), the German foreign intelligence service, was confirmed by BND president Gerhard Schindler.[186]

Thailand

Thailand is a “3rd party partner” of the NSA along with nine other nations.[187] These are non-English-speaking countries that have made security agreements for the exchange of SIGINT raw material and end product reports.

Thailand is the site of at least two US SIGINT collection stations. One is at the US Embassy in Bangkok, a joint NSA-CIA Special Collection Service (SCS) unit. It presumably eavesdrops on foreign embassies, governmental communications, and other targets of opportunity.[188]

The second installation is a FORNSAT (foreign satellite interception) station in the Thai city of Khon Kaen. It is codenamed INDRA, but has also been referred to as LEMONWOOD.[188] The station is approximately 40 ha (100 acres) in size and consists of a large 3,700–4,600 m2 (40,000–50,000 ft2) operations building on the west side of the ops compound and four radome-enclosed parabolic antennas. Possibly two of the radome-enclosed antennas are used for SATCOM intercept and two antennas used for relaying the intercepted material back to NSA. There is also a PUSHER-type circularly-disposed antenna array (CDAA) array just north of the ops compound.[189][190]

NSA activated Khon Kaen in October 1979. Its mission was to eavesdrop on the radio traffic of Chinese army and air force units in southern China, especially in and around the city of Kunming in Yunnan Province. Back in the late 1970s the base consisted only of a small CDAA antenna array that was remote-controlled via satellite from the NSA listening post at Kunia, Hawaii, and a small force of civilian contractors from Bendix Field Engineering Corp. whose job it was to keep the antenna array and satellite relay facilities up and running 24/7.[189]

According to the papers of the late General William Odom, the INDRA facility was upgraded in 1986 with a new British-made PUSHER CDAA antenna as part of an overall upgrade of NSA and Thai SIGINT facilities whose objective was to spy on the neighboring communist nations of Vietnam, Laos, and Cambodia.[189]

The base apparently fell into disrepair in the 1990s as China and Vietnam became more friendly towards the US, and by 2002 archived satellite imagery showed that the PUSHER CDAA antenna had been torn down, perhaps indicating that the base had been closed. At some point in the period since 9/11, the Khon Kaen base was reactivated and expanded to include a sizeable SATCOM intercept mission. It is likely that the NSA presence at Khon Kaen is relatively small, and that most of the work is done by civilian contractors.[189]

Mission

NSA’s eavesdropping mission includes radio broadcasting, both from various organizations and individuals, the Internet, telephone calls, and other intercepted forms of communication. Its secure communications mission includes military, diplomatic, and all other sensitive, confidential or secret government communications.[191]

According to the Washington Post, “[e]very day, collection systems at the National Security Agency intercept and store 1.7 billion e-mails, phone calls and other types of communications. The NSA sorts a fraction of those into 70 separate databases.”[192]

Because of its listening task, NSA/CSS has been heavily involved in cryptanalytic research, continuing the work of predecessor agencies which had broken many World War II codes and ciphers (see, for instance, Purple, Venona project, and JN-25).

In 2004, NSA Central Security Service and the National Cyber Security Division of the Department of Homeland Security (DHS) agreed to expand NSA Centers of Academic Excellence in Information Assurance Education Program.[193]

As part of the National Security Presidential Directive 54/Homeland Security Presidential Directive 23 (NSPD 54), signed on January 8, 2008 by President Bush, the NSA became the lead agency to monitor and protect all of the federal government’s computer networks from cyber-terrorism.[9]

Operations

Operations by the National Security Agency can be divided in three types:

  • Collection overseas, which falls under the responsibility of the Global Access Operations (GAO) division.
  • Domestic collection, which falls under the responsibility of the Special Source Operations (SSO) division.
  • Hacking operations, which falls under the responsibility of the Tailored Access Operations (TAO) division.

Collection overseas

Echelon

Echelon was created in the incubator of the Cold War.[194] Today it is a legacy system, and several NSA stations are closing.[176]

NSA/CSS, in combination with the equivalent agencies in the United Kingdom (Government Communications Headquarters), Canada (Communications Security Establishment), Australia (Defence Signals Directorate), and New Zealand (Government Communications Security Bureau), otherwise known as the UKUSA group,[195] was reported to be in command of the operation of the so-called ECHELON system. Its capabilities were suspected to include the ability to monitor a large proportion of the world’s transmitted civilian telephone, fax and data traffic.[196]

During the early 1970s, the first of what became more than eight large satellite communications dishes were installed at Menwith Hill.[197] Investigative journalist Duncan Campbell reported in 1988 on the ECHELON surveillance program, an extension of the UKUSA Agreement on global signals intelligence SIGINT, and detailed how the eavesdropping operations worked.[198] In November 3, 1999 the BBC reported that they had confirmation from the Australian Government of the existence of a powerful “global spying network” code-named Echelon, that could “eavesdrop on every single phone call, fax or e-mail, anywhere on the planet” with Britain and the United States as the chief protagonists. They confirmed that Menwith Hill was “linked directly to the headquarters of the US National Security Agency (NSA) at Fort Meade in Maryland”.[199]

NSA’s United States Signals Intelligence Directive 18 (USSID 18) strictly prohibited the interception or collection of information about “… U.S. persons, entities, corporations or organizations….” without explicit written legal permission from the United States Attorney General when the subject is located abroad, or the Foreign Intelligence Surveillance Court when within U.S. borders. Alleged Echelon-related activities, including its use for motives other than national security, including political and industrial espionage, received criticism from countries outside the UKUSA alliance.[200][201]

Protesters against NSA data mining in Berlin wearing Chelsea Manning and Edward Snowden masks.

Other SIGINT operations overseas

The NSA is also involved in planning to blackmail people with “SEXINT“, intelligence gained about a potential target’s sexual activity and preferences. Those targeted had not committed any apparent crime nor were charged with one.[202]

In order to support its facial recognition program, the NSA is intercepting “millions of images per day”.[203]

The Real Time Regional Gateway is a data collection program introduced in 2005 in Iraq by NSA during the Iraq War that consisted of gathering all electronic communication, storing it, then searching and otherwise analyzing it. It was effective in providing information about Iraqi insurgents who had eluded less comprehensive techniques.[204] This “collect it all” strategy introduced by NSA director, Keith B. Alexander, is believed by Glenn Greenwald of The Guardian to be the model for the comprehensive worldwide mass archiving of communications which NSA is engaged in as of 2013.[205]

BoundlessInformant

Edward Snowden revealed in June 2013 that between February 8 and March 8, 2013, the NSA collected about 124.8 billion telephone data items and 97.1 billion computer data items throughout the world, as was displayed in charts from an internal NSA tool codenamed Boundless Informant. It was reported that some of these data reflected eavesdropping on citizens in countries like Germany, Spain and France.[206]

BoundlessInformant employs big data databases, cloud computing technology, and Free and Open Source Software (FOSS) to analyze data collected worldwide by the NSA.[207]

Bypassing encryption

In 2013, reporters uncovered a secret memo that claims the NSA created and pushed for the adoption of the Dual_EC_DRBG encryption standard that contained built-in vulnerabilities in 2006 to the United States National Institute of Standards and Technology (NIST), and the International Organization for Standardization (aka ISO).[208][209] This memo appears to give credence to previous speculation by cryptographers at Microsoft Research.[210]Edward Snowden claims that the NSA often bypasses encryption altogether by lifting information before it is encrypted or after it is decrypted.[209]

XKeyscore rules (as specified in a file xkeyscorerules100.txt, sourced by German TV stations NDR and WDR, who claim to have excerpts from its source code) reveal that the NSA tracks users of privacy-enhancing software tools, including Tor; an anonymous email service provided by the MIT Computer Science and Artificial Intelligence Laboratory (CSAIL) in Cambridge, Massachusetts; and readers of the Linux Journal.[211][212]

Domestic activity

NSA’s mission, as set forth in Executive Order 12333 in 1981, is to collect information that constitutes “foreign intelligence or counterintelligence” while not “acquiring information concerning the domestic activities of United States persons“. NSA has declared that it relies on the FBI to collect information on foreign intelligence activities within the borders of the United States, while confining its own activities within the United States to the embassies and missions of foreign nations.[213] The appearance of a ‘Domestic Surveillance Directorate’ of the NSA was soon exposed as a hoax in 2013.[214][215]

NSA’s domestic surveillance activities are limited by the requirements imposed by the Fourth Amendment to the U.S. Constitution. The Foreign Intelligence Surveillance Court for example held in October 2011, citing multiple Supreme Court precedents, that the Fourth Amendment prohibitions against unreasonable searches and seizures applies to the contents of all communications, whatever the means, because “a person’s private communications are akin to personal papers.”[216] However, these protections do not apply to non-U.S. persons located outside of U.S. borders, so the NSA’s foreign surveillance efforts are subject to far fewer limitations under U.S. law.[217] The specific requirements for domestic surveillance operations are contained in the Foreign Intelligence Surveillance Act of 1978 (FISA), which does not extend protection to non-U.S. citizens located outside of U.S. territory.[217]

George W. Bush administration

George W. Bush, president during the 9/11 terrorist attacks, approved the Patriot Act shortly after the attacks to take anti-terrorist security measures. Title 1, 2, and 9 specifically authorized measures that would be taken by the NSA. These titles granted enhanced domestic security against terrorism, surveillance procedures, and improved intelligence, respectively. On March 10, 2004, there was a debate between President Bush and White House Counsel Alberto Gonzales, Attorney General John Ashcroft, and Acting Attorney General James Comey. The Attorney Generals were unsure if the NSA’s programs could be considered constitutional. They threatened to resign over the matter, but ultimately the NSA’s programs continued.[218] On March 11, 2004, President Bush signed a new authorization for mass surveillance of Internet records, in addition to the surveillance of phone records.This allowed the president to be able to override laws such as the Foreign Intelligence Surveillance Act, which protected civilians from mass surveillance. In addition to this, President Bush also signed that the measures of mass surveillance were also retroactively in place.[219]

Warrantless wiretaps

On December 16, 2005, The New York Times reported that, under White House pressure and with an executive order from President George W. Bush, the National Security Agency, in an attempt to thwart terrorism, had been tapping phone calls made to persons outside the country, without obtaining warrants from the United States Foreign Intelligence Surveillance Court, a secret court created for that purpose under the Foreign Intelligence Surveillance Act (FISA).[220]

One such surveillance program, authorized by the U.S. Signals Intelligence Directive 18 of President George Bush, was the Highlander Project undertaken for the National Security Agency by the U.S. Army 513th Military Intelligence Brigade. NSA relayed telephone (including cell phone) conversations obtained from ground, airborne, and satellite monitoring stations to various U.S. Army Signal Intelligence Officers, including the 201st Military Intelligence Battalion. Conversations of citizens of the U.S. were intercepted, along with those of other nations.[221]

Proponents of the surveillance program claim that the President has executive authority to order such action, arguing that laws such as FISA are overridden by the President’s Constitutional powers. In addition, some argued that FISA was implicitly overridden by a subsequent statute, the Authorization for Use of Military Force, although the Supreme Court’s ruling in Hamdan v. Rumsfeld deprecates this view. In the August 2006 case ACLU v. NSA, U.S. District Court Judge Anna Diggs Taylor concluded that NSA’s warrantless surveillance program was both illegal and unconstitutional. On July 6, 2007 the 6th Circuit Court of Appeals vacated the decision on the grounds that the ACLU lacked standing to bring the suit.[222]

On January 17, 2006, the Center for Constitutional Rights filed a lawsuit, CCR v. Bush, against the George W. Bush Presidency. The lawsuit challenged the National Security Agency’s (NSA’s) surveillance of people within the U.S., including the interception of CCR emails without securing a warrant first.[223][224]

In September 2008, the Electronic Frontier Foundation (EFF) filed a class action lawsuit against the NSA and several high-ranking officials of the Bush administration,[225] charging an “illegal and unconstitutional program of dragnet communications surveillance,”[226] based on documentation provided by former AT&T technician Mark Klein.[227]

As a result of the USA Freedom Act passed by Congress in June 2015, the NSA had to shut down its bulk phone surveillance program on November 29 of the same year. The USA Freedom Act forbids the NSA to collect metadata and content of phone calls unless it has a warrant for terrorism investigation. In that case the agency has to ask the telecom companies for the record, which will only be kept for six months.

AT&T Internet monitoring

In May 2006, Mark Klein, a former AT&T employee, alleged that his company had cooperated with NSA in installing Narus hardware to replace the FBI Carnivore program, to monitor network communications including traffic between American citizens.[228]

Data mining

NSA was reported in 2008 to use its computing capability to analyze “transactional” data that it regularly acquires from other government agencies, which gather it under their own jurisdictional authorities. As part of this effort, NSA now monitors huge volumes of records of domestic email data, web addresses from Internet searches, bank transfers, credit-card transactions, travel records, and telephone data, according to current and former intelligence officials interviewed by The Wall Street Journal. The sender, recipient, and subject line of emails can be included, but the content of the messages or of phone calls are not.[229]

A 2013 advisory group for the Obama administration, seeking to reform NSA spying programs following the revelations of documents released by Edward J. Snowden.[230] mentioned in ‘Recommendation 30’ on page 37, “…that the National Security Council staff should manage an interagency process to review on a regular basis the activities of the US Government regarding attacks that exploit a previously unknown vulnerability in a computer application.” Retired cyber security expert Richard A. Clarke was a group member and stated on April 11 that NSA had no advance knowledge of Heartbleed.[231]

Illegally obtained evidence

In August 2013 it was revealed that a 2005 IRS training document showed that NSA intelligence intercepts and wiretaps, both foreign and domestic, were being supplied to the Drug Enforcement Administration (DEA) and Internal Revenue Service (IRS) and were illegally used to launch criminal investigations of US citizens. Law enforcement agents were directed to conceal how the investigations began and recreate an apparently legal investigative trail by re-obtaining the same evidence by other means.[232][233]

Barack Obama administration

In the months leading to April 2009, the NSA intercepted the communications of American citizens, including a Congressman, although the Justice Department believed that the interception was unintentional. The Justice Department then took action to correct the issues and bring the program into compliance with existing laws.[234] United States Attorney General Eric Holder resumed the program according to his understanding of the Foreign Intelligence Surveillance Act amendment of 2008, without explaining what had occurred.[235]

Polls conducted in June 2013 found divided results among Americans regarding NSA’s secret data collection.[236] Rasmussen Reports found that 59% of Americans disapprove,[237] Gallup found that 53% disapprove,[238] and Pew found that 56% are in favor of NSA data collection.[239]

Section 215 metadata collection

On April 25, 2013, the NSA obtained a court order requiring Verizon‘s Business Network Services to provide metadata on all calls in its system to the NSA “on an ongoing daily basis” for a three-month period, as reported by The Guardian on June 6, 2013. This information includes “the numbers of both parties on a call … location data, call duration, unique identifiers, and the time and duration of all calls” but not “[t]he contents of the conversation itself”. The order relies on the so-called “business records” provision of the Patriot Act.[240][241]

In August 2013, following the Snowden leaks, new details about the NSA’s data mining activity were revealed. Reportedly, the majority of emails into or out of the United States are captured at “selected communications links” and automatically analyzed for keywords or other “selectors”. Emails that do not match are deleted.[242]

The utility of such a massive metadata collection in preventing terrorist attacks is disputed. Many studies reveal the dragnet like system to be ineffective. One such report, released by the New America Foundation concluded that after an analysis of 225 terrorism cases, the NSA “had no discernible impact on preventing acts of terrorism.”[243]

Defenders of the program say that while metadata alone can’t provide all the information necessary to prevent an attack, it assures the ability to “connect the dots”[244] between suspect foreign numbers and domestic numbers with a speed only the NSA’s software is capable of. One benefit of this is quickly being able to determine the difference between suspicious activity and real threats.[citation needed] As an example, NSA director General Keith Alexander mentioned at the annual Cybersecurity Summit in 2013, that metadata analysis of domestic phone call records after the Boston Marathon bombing helped determine that[clarification needed] another attack in New York was baseless.[244]

In addition to doubts about its effectiveness, many people argue that the collection of metadata is an unconstitutional invasion of privacy. As of 2015, the collection process remains legal and grounded in the ruling from Smith v. Maryland (1979). A prominent opponent of the data collection and its legality is U.S. District Judge Richard J. Leon, who issued a report in 2013[245] in which he stated: “I cannot imagine a more ‘indiscriminate’ and ‘arbitrary invasion’ than this systematic and high tech collection and retention of personal data on virtually every single citizen for purposes of querying and analyzing it without prior judicial approval…Surely, such a program infringes on ‘that degree of privacy’ that the founders enshrined in the Fourth Amendment”.

The PRISM program[edit]

PRISM: a clandestine surveillance program under which the NSA collects user data from companies like Microsoft and Facebook.

Under the PRISM program, which started in 2007,[246][247] NSA gathers Internet communications from foreign targets from nine major U.S. Internet-based communication service providers: Microsoft,[248] Yahoo, Google, Facebook, PalTalk, AOL, Skype, YouTube and Apple. Data gathered include email, video and voice chat, videos, photos, VoIP chats such as Skype, and file transfers.

June 2015 – WikiLeaks: Industrial espionage

In June 2015, Wikileaks published documents, which showed that NSA spied on French companies.[249]

July 2015 – WikiLeaks: Espionage against German federal ministries

In July 2015, WikiLeaks published documents, which showed that NSA spied on federal German ministries since 1990s.[250][251] Even Germany’s Chancellor Angela Merkel‘s cellphones and phone of her predecessors had been intercepted.[252]

Claims of prevented terrorist attacks

Former NSA director General Keith Alexander claimed that in September 2009 the NSA prevented Najibullah Zazi and his friends from carrying out a terrorist attack.[253] However, this claim has been debunked and no evidence has been presented demonstrating that the NSA has ever been instrumental in preventing a terrorist attack.[254][255][256][257]

Hacking operations

Besides the more traditional ways of eavesdropping in order to collect signals intelligence, NSA is also engaged in hacking computers, smartphones and their networks. These operations are conducted by the Tailored Access Operations (TAO) division.

NSA’s China hacking group

According to the Foreign Policy magazine, “… the Office of Tailored Access Operations, or TAO, has successfully penetrated Chinese computer and telecommunications systems for almost 15 years, generating some of the best and most reliable intelligence information about what is going on inside the People’s Republic of China.”[258][259]

Syrian internet blackout

In an interview with Wired magazine, Edward Snowden said the Tailored Access Operations division accidentally caused Syria‘s internet blackout in 2012.[260]

Suspected responsibility for hacking operations by the Equation Group

The espionage group named the Equation Group, described by discoverers Kaspersky Labs as one of the most advanced (if not the most advanced) in the world as of 2015,[261]:31 and connected to over 500 malware infections in at least 42 countries over many years, is suspected of being a part of NSA.[262][263] The group’s known espionage methods have been documented to include interdiction (interception of legitimate CDs sent by a scientific conference organizer by mail),[261]:15 and the “unprecedented” ability to infect and be transmitted through the hard drive firmware of several of the major hard drive manufacturers, and create and use hidden disk areas and virtual disk systems for its purposes, a feat demanding access to the manufacturer’s source code of each to achieve.[261]:16–18 The methods used to deploy the tools demonstrated “surgical precision”, going so far as to exclude specific countries by IP and allow targeting of specific usernames on discussion forums.[261]:23–26 The techniques and knowledge used by the Equation Group are considered in summary to be “out of the reach of most advanced threat groups in the world except [this group].[261]:31

Software backdoors

Linux kernel

Linus Torvalds, the founder of Linux kernel, joked during a LinuxCon keynote on September 18, 2013 that the NSA, who are the founder of SELinux, wanted a backdoor in the kernel.[264] However, later, Linus’ father, a Member of the European Parliament (MEP), revealed that the NSA actually did this.[265]

When my oldest son was asked the same question: “Has he been approached by the NSA about backdoors?” he said “No”, but at the same time he nodded. Then he was sort of in the legal free. He had given the right answer, everybody understood that the NSA had approached him.

— Nils Torvalds, LIBE Committee Inquiry on Electronic Mass Surveillance of EU Citizens – 11th Hearing, 11 November 2013[266]
Microsoft Windows

_NSAKEY was a variable name discovered in Microsoft‘s Windows NT 4 Service Pack 5 (which had been released unstripped of its symbolic debugging data) in August 1999 by Andrew D. Fernandes of Cryptonym Corporation. That variable contained a 1024-bit public key.

IBM Notes

IBM Notes was the first widely adopted software product to use public key cryptography for client–server and server–server authentication and for encryption of data. Until US laws regulating encryption were changed in 2000, IBM and Lotus were prohibited from exporting versions of Notes that supported symmetric encryption keys that were longer than 40 bits. In 1997, Lotus negotiated an agreement with the NSA that allowed export of a version that supported stronger keys with 64 bits, but 24 of the bits were encrypted with a special key and included in the message to provide a “workload reduction factor” for the NSA. This strengthened the protection for users of Notes outside the US against private-sector industrial espionage, but not against spying by the US government.[267][268]

Boomerang routing

While it is assumed that foreign transmissions terminating in the U.S. (such as a non-U.S. citizen accessing a U.S. website) subject non-U.S. citizens to NSA surveillance, recent research into boomerang routing has raised new concerns about the NSA’s ability to surveil the domestic Internet traffic of foreign countries.[18] Boomerang routing occurs when an Internet transmission that originates and terminates in a single country transits another. Research at the University of Toronto has suggested that approximately 25% of Canadian domestic traffic may be subject to NSA surveillance activities as a result of the boomerang routing of Canadian Internet service providers.[18]

Hardware implanting

Intercepted packages are opened carefully by NSA employees
A “load station” implanting a beacon

A document included in NSA files released with Glenn Greenwald‘s book No Place to Hide details how the agency’s Tailored Access Operations (TAO) and other NSA units gain access to hardware. They intercept routers, servers and other network hardware being shipped to organizations targeted for surveillance and install covert implant firmware onto them before they are delivered. This was described by an NSA manager as “some of the most productive operations in TAO because they preposition access points into hard target networks around the world.”[269]

Computers seized by the NSA due to interdiction are often modified with a physical device known as Cottonmouth.[270] Cottonmouth is a device that can be inserted in the USB port of a computer in order to establish remote access to the targeted machine. According to NSA’s Tailored Access Operations (TAO) group implant catalog, after implanting Cottonmouth, the NSA can establish Bridging (networking) “that allows the NSA to load exploit software onto modified computers as well as allowing the NSA to relay commands and data between hardware and software implants.”[271]

Role in scientific research and development

NSA has been involved in debates about public policy, both indirectly as a behind-the-scenes adviser to other departments, and directly during and after Vice Admiral Bobby Ray Inman‘s directorship. NSA was a major player in the debates of the 1990s regarding the export of cryptography in the United States. Restrictions on export were reduced but not eliminated in 1996.

Its secure government communications work has involved the NSA in numerous technology areas, including the design of specialized communications hardware and software, production of dedicated semiconductors (at the Ft. Meade chip fabrication plant), and advanced cryptography research. For 50 years, NSA designed and built most of its computer equipment in-house, but from the 1990s until about 2003 (when the U.S. Congress curtailed the practice), the agency contracted with the private sector in the fields of research and equipment.[272]

Data Encryption Standard

FROSTBURG was the NSA’s first supercomputer, used from 1991 to 1997

NSA was embroiled in some minor controversy concerning its involvement in the creation of the Data Encryption Standard (DES), a standard and public block cipher algorithm used by the U.S. government and banking community. During the development of DES by IBM in the 1970s, NSA recommended changes to some details of the design. There was suspicion that these changes had weakened the algorithm sufficiently to enable the agency to eavesdrop if required, including speculation that a critical component—the so-called S-boxes—had been altered to insert a “backdoor” and that the reduction in key length might have made it feasible for NSA to discover DES keys using massive computing power. It has since been observed that the S-boxes in DES are particularly resilient against differential cryptanalysis, a technique which was not publicly discovered until the late 1980s, but which was known to the IBM DES team.

The United States Senate Select Committee on Intelligence reviewed NSA’s involvement, and concluded that while the agency had provided some assistance, it had not tampered with the design.[273][274] In late 2009 NSA declassified information stating that “NSA worked closely with IBM to strengthen the algorithm against all except brute force attacks and to strengthen substitution tables, called S-boxes. Conversely, NSA tried to convince IBM to reduce the length of the key from 64 to 48 bits. Ultimately they compromised on a 56-bit key.”[275][276]

Advanced Encryption Standard

The involvement of NSA in the selection of a successor to Data Encryption Standard (DES), the Advanced Encryption Standard (AES), was limited to hardware performance testing (see AES competition).[277] NSA has subsequently certified AES for protection of classified information (for at most two levels, e.g. SECRET information in an unclassified environment[clarification needed]) when used in NSA-approved systems.[278]

NSA encryption systems

STU-III secure telephones on display at the National Cryptologic Museum

The NSA is responsible for the encryption-related components in these legacy systems:

  • FNBDT Future Narrow Band Digital Terminal[279]
  • KL-7 ADONIS off-line rotor encryption machine (post-WWII – 1980s)[280][281]
  • KW-26 ROMULUS electronic in-line teletypewriter encryptor (1960s–1980s)[282]
  • KW-37 JASON fleet broadcast encryptor (1960s–1990s)[281]
  • KY-57 VINSON tactical radio voice encryptor[282]
  • KG-84 Dedicated Data Encryption/Decryption[282]
  • STU-III secure telephone unit,[282] phased out by the STE[283]

The NSA oversees encryption in following systems which are in use today:

The NSA has specified Suite A and Suite B cryptographic algorithm suites to be used in U.S. government systems; the Suite B algorithms are a subset of those previously specified by NIST and are expected to serve for most information protection purposes, while the Suite A algorithms are secret and are intended for especially high levels of protection.[278]

SHA

The widely used SHA-1 and SHA-2 hash functions were designed by NSA. SHA-1 is a slight modification of the weaker SHA-0 algorithm, also designed by NSA in 1993. This small modification was suggested by NSA two years later, with no justification other than the fact that it provides additional security. An attack for SHA-0 that does not apply to the revised algorithm was indeed found between 1998 and 2005 by academic cryptographers. Because of weaknesses and key length restrictions in SHA-1, NIST deprecates its use for digital signatures, and approves only the newer SHA-2 algorithms for such applications from 2013 on.[288]

A new hash standard, SHA-3, has recently been selected through the competition concluded October 2, 2012 with the selection of Keccak as the algorithm. The process to select SHA-3 was similar to the one held in choosing the AES, but some doubts have been cast over it,[289][290] since fundamental modifications have been made to Keccak in order to turn it into a standard.[291] These changes potentially undermine the cryptanalysis performed during the competition and reduce the security levels of the algorithm.[289]

Dual_EC_DRBG random number generator cryptotrojan

NSA promoted the inclusion of a random number generator called Dual_EC_DRBG in the U.S. National Institute of Standards and Technology‘s 2007 guidelines. This led to speculation of a backdoor which would allow NSA access to data encrypted by systems using that pseudo random number generator.[292]

This is now deemed to be plausible based on the fact that the output of the next iterations of the PRNG can provably be determined if the relation between two internal elliptic curve points is known.[293][294] Both NIST and RSA are now officially recommending against the use of this PRNG.[295][296]

Clipper chip

Because of concerns that widespread use of strong cryptography would hamper government use of wiretaps, NSA proposed the concept of key escrow in 1993 and introduced the Clipper chip that would offer stronger protection than DES but would allow access to encrypted data by authorized law enforcement officials.[297] The proposal was strongly opposed and key escrow requirements ultimately went nowhere.[298] However, NSA’s Fortezza hardware-based encryption cards, created for the Clipper project, are still used within government, and NSA ultimately declassified and published the design of the Skipjack cipher used on the cards.[299][300]

Perfect Citizen

Perfect Citizen is a program to perform vulnerability assessment by the NSA on U.S. critical infrastructure.[301][302] It was originally reported to be a program to develop a system of sensors to detect cyber attacks on critical infrastructure computer networks in both the private and public sector through a network monitoring system named Einstein.[303][304] It is funded by the Comprehensive National Cybersecurity Initiative and thus far Raytheon has received a contract for up to $100 million for the initial stage.

Academic research

NSA has invested many millions of dollars in academic research under grant code prefix MDA904, resulting in over 3,000 papers (as of 2007-10-11). NSA/CSS has, at times, attempted to restrict the publication of academic research into cryptography; for example, the Khufu and Khafre block ciphers were voluntarily withheld in response to an NSA request to do so. In response to a FOIA lawsuit, in 2013 the NSA released the 643-page research paper titled, “Untangling the Web: A Guide to Internet Research,[305] ” written and compiled by NSA employees to assist other NSA workers in searching for information of interest to the agency on the public Internet.[306]

Patents

NSA has the ability to file for a patent from the U.S. Patent and Trademark Office under gag order. Unlike normal patents, these are not revealed to the public and do not expire. However, if the Patent Office receives an application for an identical patent from a third party, they will reveal NSA’s patent and officially grant it to NSA for the full term on that date.[307]

One of NSA’s published patents describes a method of geographically locating an individual computer site in an Internet-like network, based on the latency of multiple network connections.[308] Although no public patent exists, NSA is reported to have used a similar locating technology called trilateralization that allows real-time tracking of an individual’s location, including altitude from ground level, using data obtained from cellphone towers.[309]

Controversy

File:Ron Wyden and James Clapper - 12 March 2013.webm

Excerpt from when James Clapper lied to Congress on NSA surveillance programs

In the United States, at least since 2001,[310] there has been legal controversy over what signal intelligence can be used for and how much freedom the National Security Agency has to use signal intelligence.[311] The government has made, in 2015, slight changes in how it uses and collects certain types of data,[312] specifically phone records. President Barack Obama has asked lawyers and his national security team to look at the tactics that are being used by the NSA. President Obama made a speech on January 17, 2014 where he defended the national security measures, including the NSA, and their intentions for keeping the country safe through surveillance. He said that it is difficult to determine where the line should be drawn between what is too much surveillance and how much is needed for national security because technology is ever changing and evolving. Therefore, the laws cannot keep up with the rapid advancements.

President Obama did make some changes to national security regulations and how much data can be collected and surveyed.[citation needed] The first thing he added, was more presidential directive and oversight so that privacy and basic rights are not violated. The president would look over requests on behalf of American citizens to make sure that their personal privacy is not violated by the data that is being requested. Secondly, surveillance tactics and procedures are becoming more public, including over 40 rulings of the FISC that have been declassified.[citation needed] Thirdly, further protections are being placed on activities that are justified under Section 702, such as the ability to retain, search and use data collected in investigations, which allows the NSA to monitor and intercept interaction of targets overseas. Finally, national security letters, which are secret requests for information that the FBI uses in their investigations, are becoming less secretive. The secrecy of the information requested will not be indefinite and will terminate after a set time if future secrecy is not required.[citation needed] Concerning the bulk surveillance of American’s phone records, President Obama also ordered a transition from bulk surveillance under Section 215 to a new policy that will eliminate unnecessary bulk collection of metadata.

As of May 7, 2015, the U.S. Court of Appeals for the Second Circuit ruled that the interpretation of Section 215 of the Patriot Act was wrong and that the NSA program that has been collecting Americans’ phone records in bulk is illegal.[313] It stated that Section 215 cannot be clearly interpreted to allow government to collect national phone data and, as a result, expired on June 1, 2015. This ruling “is the first time a higher-level court in the regular judicial system has reviewed the N.S.A. phone records program.” [314] The new bill getting passed later in May taking its place is known as the U.S.A. Freedom Act, which will enable the NSA to continue hunting for terrorists by analyzing telephone links between callers but “keep the bulk phone records in the hands of phone companies.”[314] This would give phone companies the freedom to dispose the records in an 18-month period. The White House argued that this new ruling validated President Obama’s support of the government being extracted from bulk data collection and giving power to the telecommunications companies.

Previously, the NSA paid billions of dollars to telecommunications companies in order to collect data from them.[315] While companies such as Google and Yahoo! claim that they do not provide “direct access” from their servers to the NSA unless under a court order,[316] the NSA had access to emails, phone calls and cellular data users.[317] With this new ruling, telecommunications companies would not provide the NSA with bulk information. The companies would allow the disposal of data in every 18 months,[314] which is arguably putting the telecommunications companies at a higher advantage.

This ruling made the collecting of phone records illegal, but it did not rule on Section 215’s constitutionality. Senate Majority Leader Mitch McConnell has already put forth a new bill to re-authorize the Patriot Act.[318] Defenders of this surveillance program are claiming that judges who sit on the Foreign Intelligence Surveillance Court (FISC) had ruled 37 times that this kind of collection of data is, in fact, lawful.[318] The FISC is the court specifically mandated to grant surveillance orders in the name of foreign intelligence. The new ruling made by the Second District Court of Appeals now retroactively dismisses the findings of the FISC on this program.

See also

Notes

 Story 2: Big Lie Media Crazy Credibility Crisis — Fake News is Media McCarthyism — No Tanks In Streets of D.C. Big Lie Coup Fake News — Videos

Image result for tanks in washington d.c.

Image result for cartoons obama surveillance of trump

Image result for cartoons obama surveillance of trump

Image result for cartoons obama surveillance of trump

Image result for cartoons obama surveillance of trump

Krauthammer: Comey incident has sent press over the edge

Conway: Democrats trashed Comey then made him a martyr

Ari Fleischer: Hypocrisy from Democratic Party is appalling

Michelle Malkin: Hypocrisy over Comey firing is overwhelming

Gingrich: Liberals will move on to Martian conspiracies next

Could a probe of Hillary’s email server be reopened?

Tucker to Dem: Are you saying Trump has corrupted FBI?

Rush Limbaugh rejects media’s ‘coup’ claims

Hume: Calling Comey firing a ‘coup’ is hysterical

Lionel on the Alex Jones Show: Fake News, Media Bias, McCarthyism, Redbaiting & Blatant Russophobia

The Truth About McCarthyism: Modern Parallels

Napolitano: Many FBI agents felt demeaned by Comey’s actions

Coup d’état

From Wikipedia, the free encyclopedia

A coup d’état (/ˌk dˈtɑː/ About this sound listen ; French: [ku.de.ta]), also known simply as a coup (/k/), a putsch (/pʊ/), or an overthrow, is the illegal and overt seizure of a state by the military or other elites within the state apparatus.[1]

Contents

 [show

Terminology

Etymology

The phrase coup d’état (French pronunciation:  [ku deta]) is French, literally meaning a “stroke of state” or “blow against the state.” In French the word “État” (French: [e.ta]), denoting a sovereign political entity, is capitalized.[2]

Although the concept of a coup d’état has been featured in politics since antiquity, the phrase is of relatively recent coinage;[3] the Oxford English Dictionary identifies it as a French expression meaning a “stroke of state.” The phrase did not appear within an English text before the 19th century except when used in translation of a French source, there being no simple phrase in English to convey the contextualized idea of a “knockout blow to the existing administration within a state.”

One early use within text translated from French was in 1785 in a printed translation of a letter from a French merchant, commenting on an arbitrary decree or “arrêt” issued by the French king restricting the import of British wool.[4] What may be its first published use within a text composed in English is an editor’s note in the London Morning Chronicle, 7 January 1802, reporting the arrest by Napoleon in France, of Moreau, Berthier, Masséna, and Bernadotte:

There was a report in circulation yesterday of a sort of coup d’état having taken place in France, in consequence of some formidable conspiracy against the existing government.

In post-Revolutionary France, the phrase came to be used to describe the various murders by Napoleon‘s hated secret police, the Gens d’Armes d’Elite, who murdered the Duke of Enghien:

…the actors in torture, the distributors of the poisoning draughts, and the secret executioners of those unfortunate individuals or families, whom Bonaparte’s measures of safety require to remove. In what revolutionary tyrants call grand[s] coups d’état, as butchering, or poisoning, or drowning, en masse, they are exclusively employed.[5]

Usage of the phrase

Clayton Thyne and Jonathan Powell’s dataset of coups defines attempted coups as “illegal and overt attempts by the military or other elites within the state apparatus to unseat the sitting executive.”[1] They arrive at this definition by combining common definitions in the existing literature and removing specificities and ambiguities that exist in many definitions.[1]

In looser usage, as in “intelligence coup” or “boardroom coup”, the term simply refers to gaining a sudden advantage on a rival.

Putsch

Since an unsuccessful coup d’état in 1920 (the Kapp Putsch), the Swiss-German word Putsch (pronounced [pʊtʃ], coined for the Züriputsch of September 6, 1839, in Zurich), also denotes the politico-military actions of an unsuccessful minority reactionary coup.[6][7][8]

Other recent and notable unsuccessful minority reactionary coups that are often referred to as Putsches are the 1923 Beer Hall Putsch and Küstrin Putsch, 1961 Algiers Putsch and the 1991 August Putsch. Putsch was used as disinformation by Hitler and his Nazi supporters to falsely claim that he had to suppress a reactionary coup during the Night of the Long Knives. Germans still use the term Röhm-Putsch to describe the murders, the term given to it by the Nazi regime, despite its unproven implication that the murders were necessary to prevent a coup. German authors often use quotation marks or write about the sogenannter Röhm-Putsch (“so-called Röhm Putsch”) for emphasis.[9]

Pronunciamiento

Pronunciamiento (“pronouncement”) is a term of Spanish and Latin-American origin for a special type of coup d’état. The coup d’état (called golpe de Estado in Spanish) was more common in Spain and South America, while the pronunciamiento was more common in Central America. The pronunciamiento is the formal explanation for deposing the regnant government, justifying the installation of the new government that was effected with the golpe de Estado.

In a coup, it is the military, paramilitary, or opposing political faction that deposes the current government and assumes power; whereas, in the pronunciamiento, the military deposes the existing government and installs an (ostensibly) civilian government.[10]

History

According to Clayton Thyne and Jonathan Powell’s coup dataset, there were 457 coup attempts from 1950 to 2010, of which 227 (49.7%) were successful and 230 (50.3%) were unsuccessful.[1] They find that coups have “been most common in Africa and the Americas (36.5% and 31.9%, respectively). Asia and the Middle East have experienced 13.1% and 15.8% of total global coups, respectively. Europe has experienced by far the fewest number of coup attempts: 2.6%.”[1] Most coup attempts occurred in the mid-1960s, but there were also large numbers of coup attempts in the mid-1970s and the early 1990s.[1] Successful coups have decreased over time.[1] Coups that occur in the post-Cold War period are more likely to result in democratic systems.[11][12][13] Coups that occur during civil wars shorten the war’s duration.[14] Research suggests that protests spur coups, as they help elites within the state apparatus to coordinate coups.[15]

Types

A 2016 study categorizes coups into four possible outcomes:[12]

  • Failed coup.
  • No regime change. Such as when a leader is illegally shuffled out of power without changing the identity of the group in power or the rules for governing.
  • Replacement of incumbent dictatorship with another.
  • Ouster of the dictatorship followed by democratization.

The 2016 study found that about half of all coups — both during and after the Cold War — install new autocratic regimes.[12] New dictatorships launched by coups engage in higher levels of repression in the year that follows the coup than existed in the year leading to the coup.[12] One third of coups during the Cold War and 10 percent of post-Cold War coups reshuffled the regime leadership.[12] Democracies were installed in the wake of 12 percent of Cold War coups and 40 percent of the post-Cold War coups.[12]

Samuel Huntington’s three types

Writing in 1968, political scientist Samuel P. Huntington identified three types of coup d’état, which correspond to the role the military plays in three different types of praetorian society.[16] As society changes, so does the role of the military. In the world of oligarchy, the soldier is a radical; in the middle class he is a participant and arbiter; as the “mass society looms on the horizon he becomes the conservative guardian of the existing order”.

Breakthrough coups

In breakthrough coups, the soldier plays the role of “reformer”, moving the society from “Oligarchical to Radical Praetorianism”. “In oligarchical praetorianism the dominant social forces are landowners, the leading clergy, and the wielders of the sword”. In “radical” society, the middle-class is an important social and political class. The shift toward “radical” society take the form of slow evolution, or a “breakthrough” to middle-class political participation may be led by civilian intelligentsia. A breakthrough to radical praetorianism (in which the military plays an important role among the middle class who govern) may occur when middle-class officers dislodge the civilian intelligentsia who led the breakthrough, or the military may take power directly from the absolute monarchy or the oligarchs in a military coup.

Arbiter coups

In this type of coup, society is in the stage of “radical praetorianism,” meaning that the praetorian society is in the “middle stages in the expansion of political participation,” when the middle-class (including the military) are actively involved in politics, but the masses are not regularly politically mobilized. This type of society often follows the breakthrough coup, which “clears the way for the entry of other middle-class elements into politics”. In radical praetorian society, various middle-class groups may act against one another in riots or demonstrations, and the military will step in with a military coup to re-establish order and “halt the rabid mobilization of social forces into politics and into the streets…to defuse the explosive political situation”.

Veto coup d’état

Veto coups d’état occur when the army vetoes the people’s mass participation and social mobilisation in governing themselves. “Military interventions of this “veto” variety thus directly reflect increasing lower-class political participation in politics”. In “veto coups” the soldier plays the role of “guardian of the existing order.” In such a case, the army confronts and suppresses large-scale, broad-based civil opposition.

Predictors

A 2003 review of the academic literature found that the following factors were associated with coups:

  • officers’ personal grievances
  • military organizational grievances
  • military popularity
  • military attitudinal cohesiveness
  • economic decline
  • domestic political crisis
  • contagion from other regional coups
  • external threat
  • participation in war
  • foreign veto power[clarify] and military’s national security doctrine
  • officers’ political culture
  • noninclusive institutions
  • colonial legacy
  • economic development
  • undiversified exports
  • officers’ class composition
  • military size
  • strength of civil society
  • regime legitimacy and past coups.[17]

The literature review in a 2016 study includes mentions of ethnic factionalism, supportive foreign governments, leader inexperience, slow growth, commodity price shocks, and poverty.[18]

The cumulative number of coups is a strong predictor of future coups.[17][19][20] Hybrid regimes are more vulnerable to coups than very authoritarian states or democratic states.[21] A 2015 study finds that terrorism is strongly associated with re-shuffling coups.[22] A 2016 study finds that there is an ethnic component to coups: “When leaders attempt to build ethnic armies, or dismantle those created by their predecessors, they provoke violent resistance from military officers.”[23] Another 2016 study shows that protests increase the risk of coups, presumably because they ease coordination obstacles among coup plotters and make international actors less likely to punish coup leaders.[24] A third 2016 study finds that coups become more likely in the wake of elections in autocracies when the results reveal electoral weakness for the incumbent autocrat.[25] A fourth 2016 study finds that inequality between social classes increase the likelihood of coups.[26] A 2016 study rejects the notion that participation in war makes coups more likely; to the contrary, coup risk declines in the presence of enduring interstate conflict.[27] One study found that coups are more likely to occur in states with small populations, as there are smaller coordination problems for coup-plotters.[28]

Coup-proofing

In what is referred to as “coup-proofing”, regimes create structures that make it hard for any small group to seize power. These coup-proofing strategies may include the strategic placing of family, ethnic, and religious groups in the military; creation of an armed force parallel to the regular military, and development of multiple internal security agencies with overlapping jurisdiction that constantly monitor one another.[29] Research shows that some coup-proofing strategies reduce the risk of coups occurring.[30][31] However, coup-proofing reduces military effectiveness,[32][33][34] and limits the rents that an incumbent can extract.[35]

A 2016 study shows that the implementation of succession rules reduce coup attempts.[36] Succession rules are believed to hamper coordination efforts among coup plotters by assuaging the elites who have more to gain with patience than with plotting.[36]

According to political scientists Curtis Bell and Jonathan Powell, coup attempts in neighbouring countries lead to greater coup-proofing and coup-related repression in a region.[37]

Democratization

Research suggests that coups promote democratization in staunchly authoritarian regimes, have become less likely to end democracy over time, and that the positive influence has strengthened since the end of the Cold War.[11][12][38][39][40]

A 2014 study found that “coups promote democratization, particularly among states that are least likely to democratize otherwise”.[38] The authors argue that coup attempts can have this consequence because leaders of successful coups have incentives to democratize quickly in order to establish political legitimacy and economic growth while leaders who stay in power after failed coup attempts see it as a sign that they must enact meaningful reforms to remain in power.[38] A 2014 study found that 40% of post-Cold War coups were successful. The authors argue that this may be due to the incentives created by international pressure.[11] A 2016 study found that democracies were installed in 12 percent of Cold War coups and 40 percent of the post-Cold War coups.[12]

Repression after failed coups, and counter-coups

According to Naunihal Singh, author of Seizing Power: The Strategic Logic of Military Coups (2014), it is “fairly rare” for the prevailing existing government to violently purge the army after a coup has been foiled. If it starts mass killing elements of the army, including officers who were not involved in the coup, this may trigger a “counter-coup” by soldiers who are afraid they will be next. To prevent such a desperate counter-coup that may be more successful than the initial attempt, governments usually resort to firing prominent officers and replacing them with loyalists instead.[41]

Some research suggests that increased repression and violence typically follow coup attempts (whether they’re successes or failures).[42] However, some tentative analysis by political scientist Jay Ulfelder finds no clear pattern of deterioration in human-rights practices in wake of failed coups in post-Cold War era.[43]

Notable counter-coups include the Ottoman countercoup of 1909, the 1960 Laotian counter-coup, the 1966 Nigerian counter-coup, the 1967 Greek counter-coup, and the 1971 Sudanese counter-coup.

A 2017 study finds that the use of state broadcasting by the putschist regime after Mali’s 2012 coup did not elevate explicit approval for the regime.[44]

International responses

The international community tends to react adversely to coups by reducing aid and imposing sanctions. A 2015 study finds that “coups against democracies, coups after the Cold War, and coups in states heavily integrated into the international community are all more likely to elicit global reaction.”[45] Another 2015 study shows that coups are the strongest predictor for the imposition of democratic sanctions.[46] A third 2015 study finds that Western states react strongest against coups of possible democratic and human rights abuses.[46] A 2016 study shows that the international donor community in the post-Cold War period penalizes coups by reducing foreign aid.[47] The US has been inconsistent in applying aid sanctions against coups both during the Cold War and post-Cold War periods, a likely consequence of its geopolitical interests.[47]

Organizations such as the African Union and Organization of American States have adopted anti-coup frameworks. Through the threat of sanctions, the organizations actively try to curb coups. A 2016 study finds that the African Union has played a meaningful role in reducing African coups.[48]

A forthcoming study in the Journal of Conflict Resolution finds that negative international responses to regimes created in coups have a significant influence on the sustainability of those regimes.[49] The study finds that “state reactions have the strongest effect during the Cold War, while international organizations matter the most afterward.”[49] Negative international responses from strong actors matter the most.[49]

Current leaders who assumed power via coups d’état

Position Name Assumed power as of Replaced Country Coup d’état
Sultan Qaboos bin Said al Said[50]1 23 July 1970 Said bin Taimur  Oman 1970 Omani coup d’état
President Teodoro Obiang Nguema Mbasogo 3 August 1979 Francisco Macías Nguema  Equatorial Guinea 1979 Equatoguinean coup d’état
President Yoweri Museveni 29 January 1986 Tito Okello  Uganda Ugandan Bush War
President Omar al-Bashir 30 June 1989 Sadiq al-Mahdi  Sudan 1989 Sudanese coup d’état
President Idriss Déby 2 December 1990 Hissène Habré  Chad 1990 Chadian revolution
President Isaias Afwerki 27 April 19912 Mengistu Haile Mariam
(Ethiopia)
 Eritrea Eritrean War of Independence
Prime Minister Hun Sen August 1997 Norodom Ranariddh  Cambodia 1997 Cambodian coup d’état
President Denis Sassou Nguesso 25 October 1997 Pascal Lissouba  Republic of the Congo Republic of the Congo Civil War
Prime Minister Frank Bainimarama 5 December 2006 Laisenia Qarase  Fiji 2006 Fijian coup d’état
President Mohamed Ould Abdel Aziz3 6 August 2008 Sidi Ould Cheikh Abdallahi  Mauritania 2008 Mauritanian coup d’état
President Abdel Fattah el-Sisi[51] 3 July 2013 Mohamed Morsi  Egypt 2013 Egyptian coup d’état
Prime Minister Prayuth Chan-ocha 22 May 2014 Niwatthamrong Boonsongpaisan4  Thailand 2014 Thai coup d’état
President of the Revolutionary Committee Mohammed Ali al-Houthi 6 February 2015 Abd Rabbuh Mansur Hadi5  Yemen 2014–15 Yemeni coup d’état

1Monarch who overthrew his father in a bloodless palace coup.
2As head of Provisional Government of Eritrea, which declared independence 24 May 1993.
3Subsequently, confirmed by a narrow margin in the 2009 Mauritanian presidential election, which was deemed “satisfactory” by international observers.
4Acting Prime Minister at that time.
5Hadi resigned on 22 January 2015.

See also

Story 3: President Trump Voter Fraud Commission — Videos

Image result for cartoons obama surveillance of trump

Trump Launches Commission To Investigate Voter Fraud

News Wrap: Trump signs executive orders on cybersecurity, voter fraud

Gov. Greg Abbott: Voter fraud is real, it must be stopped

Does the U.S. have a voter fraud problem?

John Fund References James O’Keefe’s Videos as Evidence of Voter Fraud

Veritas Voter Fraud Compilation – #VoterFraudIsReal

#CNNLeaks: James O’Keefe of Project Veritas Releases CNN Leaks and Offers Bounty for Its Destruction

The Pronk Pops Show Podcasts Portfolio

Listen To Pronk Pops Podcast or Download Shows 889-892

Listen To Pronk Pops Podcast or Download Shows 884-888

Listen To Pronk Pops Podcast or Download Shows 878-883

Listen To Pronk Pops Podcast or Download Shows 870-877

Listen To Pronk Pops Podcast or Download Shows 864-869

Listen To Pronk Pops Podcast or Download Shows 857-863

Listen To Pronk Pops Podcast or Download Shows 850-856

Listen To Pronk Pops Podcast or Download Shows 845-849

Listen To Pronk Pops Podcast or Download Shows 840-844

Listen To Pronk Pops Podcast or Download Shows 833-839

Listen To Pronk Pops Podcast or Download Shows 827-832

Listen To Pronk Pops Podcast or Download Shows 821-826

Listen To Pronk Pops Podcast or Download Shows 815-820

Listen To Pronk Pops Podcast or Download Shows 806-814

Listen To Pronk Pops Podcast or Download Shows 800-805

Listen To Pronk Pops Podcast or Download Shows 793-799

Listen To Pronk Pops Podcast or Download Shows 785-792

Listen To Pronk Pops Podcast or Download Shows 777-784

Listen To Pronk Pops Podcast or Download Shows 769-776

Listen To Pronk Pops Podcast or Download Shows 759-768

Listen To Pronk Pops Podcast or Download Shows 751-758

Listen To Pronk Pops Podcast or Download Shows 745-750

Listen To Pronk Pops Podcast or Download Shows 738-744

Listen To Pronk Pops Podcast or Download Shows 732-737

Listen To Pronk Pops Podcast or Download Shows 727-731

Listen To Pronk Pops Podcast or Download Shows 720-726

Listen To Pronk Pops Podcast or DownloadShows 713-719

Listen To Pronk Pops Podcast or DownloadShows 705-712

Listen To Pronk Pops Podcast or Download Shows 695-704

Listen To Pronk Pops Podcast or Download Shows 685-694

Listen To Pronk Pops Podcast or Download Shows 675-684

Listen To Pronk Pops Podcast or Download Shows 668-674

Listen To Pronk Pops Podcast or Download Shows 660-667

Listen To Pronk Pops Podcast or Download Shows 651-659

Listen To Pronk Pops Podcast or Download Shows 644-650

Listen To Pronk Pops Podcast or Download Shows 637-643

Listen To Pronk Pops Podcast or Download Shows 629-636

Listen To Pronk Pops Podcast or Download Shows 617-628

Listen To Pronk Pops Podcast or Download Shows 608-616

Listen To Pronk Pops Podcast or Download Shows 599-607

Listen To Pronk Pops Podcast or Download Shows 590-598

Listen To Pronk Pops Podcast or Download Shows 585- 589

Listen To Pronk Pops Podcast or Download Shows 575-584

Listen To Pronk Pops Podcast or Download Shows 565-574

Listen To Pronk Pops Podcast or Download Shows 556-564

Listen To Pronk Pops Podcast or Download Shows 546-555

Listen To Pronk Pops Podcast or Download Shows 538-545

Listen To Pronk Pops Podcast or Download Shows 532-537

Listen To Pronk Pops Podcast or Download Shows 526-531

Listen To Pronk Pops Podcast or Download Shows 519-525

Listen To Pronk Pops Podcast or Download Shows 510-518

Listen To Pronk Pops Podcast or Download Shows 500-509

Listen To Pronk Pops Podcast or Download Shows 490-499

Listen To Pronk Pops Podcast or Download Shows 480-489

Listen To Pronk Pops Podcast or Download Shows 473-479

Listen To Pronk Pops Podcast or Download Shows 464-472

Listen To Pronk Pops Podcast or Download Shows 455-463

Listen To Pronk Pops Podcast or Download Shows 447-454

Listen To Pronk Pops Podcast or Download Shows 439-446

Listen To Pronk Pops Podcast or Download Shows 431-438

Listen To Pronk Pops Podcast or Download Shows 422-430

Listen To Pronk Pops Podcast or Download Shows 414-421

Listen To Pronk Pops Podcast or Download Shows 408-413

Listen To Pronk Pops Podcast or Download Shows 400-407

Listen To Pronk Pops Podcast or Download Shows 391-399

Listen To Pronk Pops Podcast or Download Shows 383-390

Listen To Pronk Pops Podcast or Download Shows 376-382

Listen To Pronk Pops Podcast or Download Shows 369-375

Listen To Pronk Pops Podcast or Download Shows 360-368

Listen To Pronk Pops Podcast or Download Shows 354-359

Listen To Pronk Pops Podcast or Download Shows 346-353

Listen To Pronk Pops Podcast or Download Shows 338-345

Listen To Pronk Pops Podcast or Download Shows 328-337

Listen To Pronk Pops Podcast or Download Shows 319-327

Listen To Pronk Pops Podcast or Download Shows 307-318

Listen To Pronk Pops Podcast or Download Shows 296-306

Listen To Pronk Pops Podcast or Download Shows 287-295

Listen To Pronk Pops Podcast or Download Shows 277-286

Listen To Pronk Pops Podcast or Download Shows 264-276

Listen To Pronk Pops Podcast or Download Shows 250-263

Listen To Pronk Pops Podcast or Download Shows 236-249

Listen To Pronk Pops Podcast or Download Shows 222-235

Listen To Pronk Pops Podcast or Download Shows 211-221

Listen To Pronk Pops Podcast or Download Shows 202-210

Listen To Pronk Pops Podcast or Download Shows 194-201

Listen To Pronk Pops Podcast or Download Shows 184-193

Listen To Pronk Pops Podcast or Download Shows 174-183

Listen To Pronk Pops Podcast or Download Shows 165-173

Listen To Pronk Pops Podcast or Download Shows 158-164

Listen To Pronk Pops Podcast or Download Shows151-157

Listen To Pronk Pops Podcast or Download Shows 143-150

Listen To Pronk Pops Podcast or Download Shows 135-142

Listen To Pronk Pops Podcast or Download Shows 131-134

Listen To Pronk Pops Podcast or Download Shows 124-130

Listen To Pronk Pops Podcast or Download Shows 121-123

Listen To Pronk Pops Podcast or Download Shows 118-120

Listen To Pronk Pops Podcast or Download Shows 113 -117

Listen To Pronk Pops Podcast or Download Show 112

Listen To Pronk Pops Podcast or Download Shows 108-111

Listen To Pronk Pops Podcast or Download Shows 106-108

Listen To Pronk Pops Podcast or Download Shows 104-105

Listen To Pronk Pops Podcast or Download Shows 101-103

Listen To Pronk Pops Podcast or Download Shows 98-100

Listen To Pronk Pops Podcast or Download Shows 94-97

Listen To Pronk Pops Podcast or Download Show 93

Listen To Pronk Pops Podcast or Download Show 92

Listen To Pronk Pops Podcast or Download Show 91

Listen To Pronk Pops Podcast or Download Shows 88-90

Listen To Pronk Pops Podcast or Download Shows 84-87

Listen To Pronk Pops Podcast or Download Shows 79-83

Listen To Pronk Pops Podcast or Download Shows 74-78

Listen To Pronk Pops Podcast or Download Shows 71-73

Listen To Pronk Pops Podcast or Download Shows 68-70

Listen To Pronk Pops Podcast or Download Shows 65-67

Listen To Pronk Pops Podcast or Download Shows 62-64

Listen To Pronk Pops Podcast or Download Shows 58-61

Listen To Pronk Pops Podcast or Download Shows 55-57

Listen To Pronk Pops Podcast or Download Shows 52-54

Listen To Pronk Pops Podcast or Download Shows 49-51

Listen To Pronk Pops Podcast or Download Shows 45-48

Listen To Pronk Pops Podcast or Download Shows 41-44

Listen To Pronk Pops Podcast or Download Shows 38-40

Listen To Pronk Pops Podcast or Download Shows 34-37

Listen To Pronk Pops Podcast or Download Shows 30-33

Listen To Pronk Pops Podcast or Download Shows 27-29

Listen To Pronk Pops Podcast or Download Shows 17-26

Listen To Pronk Pops Podcast or Download Shows 16-22

Listen To Pronk Pops Podcast or Download Shows 10-15

Listen To Pronk Pops Podcast or Download Shows 1-9

Read Full Post | Make a Comment ( None so far )

The Pronk Pops Show 867, April 4, 2017, Story 1: Russia Radical Islamic Terrorist Attack on Subway — Videos — Story 2: North Korea Ballistic Missile Launch — Videos–Story 3: Syria Chemical Nerve Gas Weapons Air Attack in Idlib Provence — Videos Story 4: Valid Use of National Security Agency (NSA) Intelligence or Abuse of Power of NSA Intelligence For Political Purposes — Big Lie Media Blackout Obamagate Surveillance/Spying Scandal with Susan Rice Unmasking American Identities For Foreign Intelligence Purpose (Legal and Legitimate) or Political Partisan Purpose (Illegal and Illegitimate) — Videos

Posted on April 5, 2017. Filed under: American History, Blogroll, Breaking News, Communications, Congress, Constitutional Law, Corruption, Defense Spending, Donald J. Trump, Donald J. Trump, Donald Trump, Donald Trump, Education, Elections, Federal Bureau of Investigation (FBI), Federal Government, Freedom of Speech, Government, Government Spending, Hillary Clinton, History, House of Representatives, Iraq, Law, Life, Media, National Security Agency, Nerve Gas, News, Nuclear Weapons, Obama, Philosophy, Photos, Politics, Polls, President Barack Obama, President Trump, Progressives, Raymond Thomas Pronk, Rule of Law, Russia, Scandals, Senate, Surveillance/Spying, Syria, United Kingdom, United States of America | Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , |

Project_1

The Pronk Pops Show Podcasts

Pronk Pops Show 867: April 5, 2017

Pronk Pops Show 866: April 3, 2017

Pronk Pops Show 865: March 31, 2017

Pronk Pops Show 864: March 30, 2017

Pronk Pops Show 863: March 29, 2017

Pronk Pops Show 862: March 28, 2017

Pronk Pops Show 861: March 27, 2017

Pronk Pops Show 860: March 24, 2017

Pronk Pops Show 859: March 23, 2017

Pronk Pops Show 858: March 22, 2017

Pronk Pops Show 857: March 21, 2017

Pronk Pops Show 856: March 20, 2017

Pronk Pops Show 855: March 10, 2017

Pronk Pops Show 854: March 9, 2017

Pronk Pops Show 853: March 8, 2017

Pronk Pops Show 852: March 6, 2017

Pronk Pops Show 851: March 3, 2017

Pronk Pops Show 850: March 2, 2017

Pronk Pops Show 849: March 1, 2017

Pronk Pops Show 848: February 28, 2017

Pronk Pops Show 847: February 27, 2017

Pronk Pops Show 846: February 24, 2017

Pronk Pops Show 845: February 23, 2017

Pronk Pops Show 844: February 22, 2017

Pronk Pops Show 843: February 21, 2017

Pronk Pops Show 842: February 20, 2017

Pronk Pops Show 841: February 17, 2017

Pronk Pops Show 840: February 16, 2017

Pronk Pops Show 839: February 15, 2017

Pronk Pops Show 838: February 14, 2017

Pronk Pops Show 837: February 13, 2017

Pronk Pops Show 836: February 10, 2017

Pronk Pops Show 835: February 9, 2017

Pronk Pops Show 834: February 8, 2017

Pronk Pops Show 833: February 7, 2017

Pronk Pops Show 832: February 6, 2017

Pronk Pops Show 831: February 3, 2017

Pronk Pops Show 830: February 2, 2017

Pronk Pops Show 829: February 1, 2017

Pronk Pops Show 828: January 31, 2017

Pronk Pops Show 827: January 30, 2017

Pronk Pops Show 826: January 27, 2017

Pronk Pops Show 825: January 26, 2017

Pronk Pops Show 824: January 25, 2017

Pronk Pops Show 823: January 24, 2017

Pronk Pops Show 822: January 23, 2017

Pronk Pops Show 821: January 20, 2017

Pronk Pops Show 820: January 19, 2017

Pronk Pops Show 819: January 18, 2017

Pronk Pops Show 818: January 17, 2017

Pronk Pops Show 817: January 13, 2017

Pronk Pops Show 816: January 12, 2017

Pronk Pops Show 815: January 11, 2017

Pronk Pops Show 814: January 10, 2017

Pronk Pops Show 813: January 9, 2017

Image result for russia subway attack
Image result for syrian gas attack april 5, 2017 map

Image result for susan rice unmasking

Image result for susan rice unmasking

 Story 1: Russia Radical Islamic Terrorist Attack on Subway — Videos

Image result for russia subway attack Image result for russia subway attackImage result for russia subway attackImage result for russia subway attackImage result for russia subway attackImage result for russia subway attackImage result for russia subway attackImage result for russia subway attackImage result for russia subway attackImage result for russia subway attackImage result for russia subway attackImage result for russia subway attackRussia confirms identity of St Petersburg suicide bomber

St. Petersburg Metro bomber identified as Kyrgyz-born Russian citizen

Kyrgyzstan native identified as bomber of Russian metro

Any Conspiracy Theory About the St. Petersburg Metro Blast Is OK So Long As It’s About Russia

Russian Metro Bomb Suspect a Muslim Born in Central Asia: Investigators

By | April 4, 2017 | Last Updated: April 4, 2017 3:56 pm

Emergency services direct pedestrians outside Sennaya Ploshchad metro station, following explosions in two train carriages at metro stations in St. Petersburg, Russia on April 3, 2017. (REUTERS/Anton Vaganov)OSH, Kyrgyzstan/ST. PETERSBURG, Russia—A Russian suicide bomber originally from mainly Muslim Kyrgyzstan detonated the explosives in a St Petersburg train carriage that killed 14 people and wounded 50, authorities said on Tuesday.

Suspect Akbarzhon Jalilov. (5th Channel Russia/via Reuters)

The suspect had radical Islamist links, Russian media cited law enforcement officials as saying, raising the possibility Monday’s attack could have been inspired by the ISIS terrorist group, which has not struck a major city in Russia before. So far, no-one has claimed responsibility for the blast.

Kyrgyz officials identified the suspect as Akbarzhon Jalilov, born in the city of Osh in 1995, and Russian officials confirmed his identity, saying he had also left a bomb found at another metro station before it went off.

Biographical details pieced together from social media and Russian officials suggested Jalilov was an fairly typical young St Petersburg resident with an interest in Islam as well as pop music and martial arts but no obvious links to militants.

His uncle, Eminzhon Jalilov, told Reuters by telephone that his nephew was a mosque-attending Muslim, but that he was “not a fanatic”.

The explosion in the middle of Monday afternoon occurred when the train was in a tunnel deep underground, amplifying the force of the blast. The carriage door was blown off, and witnesses described seeing injured passengers with bloodied and blackened bodies.

State investigative authorities said fragments of the body of the suspect had been found among the dead, indicating that he was a suicide bomber.

Blast victims lie near a subway train hit by a explosion at the Tekhnologichesky Institut subway station in St.Petersburg, Russia April 3, 2017. (AP Photo/www.vk.com/spb_today via AP)

“From the genetic evidence and the surveillance cameras there is reason to believe that the person behind the terrorist act in the train carriage was the same one who left a bag with an explosive device at the Ploshchad Vosstaniya station,” they said in a statement.

Russia has been on alert against attacks in reprisal for its military intervention in Syria, where Moscow’s forces have been supporting troops loyal to President Bashar al-Assad against Western-backed armed groups as well as ISIS, which grew out of the conflict.

ISIS, now under attack by all sides in Syria’s multi-faceted war, has repeatedly threatened revenge and been linked to recent bombings elsewhere in Europe.

If it is confirmed that the metro bomber was linked to radical Islamists, it could provoke anger among some Russians at Moscow’s decision to intervene in Syria, a year before an election which President Vladimir Putin is expected to win.

Previous Bombing

Officials said they were treating the blast as an act of terrorism, but there was no official confirmation of any link to Islamist radicals.

Russian Foreign Minister Sergei Lavrov said it was cynical to say the bombing in St Petersburg was revenge for Russia’s role in Syria. He said the attack showed that Moscow needed to press on with its fight against global terrorism.

A page on social media site VKontakte, the Russian equivalent of Facebook, belonging to someone with the same name and year of birth as Jalilov, included photos of him relaxing with friends in a bar, smoking from a hookah pipe. He was dressed in jackets and a baseball cap.

A Reuters reporter visited a house in Osh, southern Kyrgyzstan, which neighbors said was the family home of Jalilov. The home, a modest but well-maintained one-storey brick building, was empty.

A man leaves flowers during a memorial service for victims of a blast in St.Petersburg metro, outside Sennaya Ploshchad metro station in St. Petersburg, Russia on April 3, 2017. (REUTERS/Igor Russak)

Neighbors said Jalilov was from a family of ethnic Uzbeks, and that while they knew his parents they had not seen the young man for years. They said his father worked as a panel-beater in a car repair shop.

“They are a very good family. Always friendly, never argue. And they have good kids,” one of the neighbors, Mirkomil Akhmadaliyev, told Reuters.

Later on Tuesday, Jalilov’s mother appeared but refused to speak to reporters, saying she needed to retrieve something and hurry back to a security service office.

Russian Metro Bomb Suspect a Muslim Born in Central Asia: Investigators

Osh is part of the Fergana Valley, a fertile strip of land that straddles Kyrgyzstan, Uzbekistan and Tajikistan which is mainly populated by ethnic Uzbeks. It has a tradition of Islamist radicalism and hundreds of people have set out from the area to join ISIS in Syria and Iraq.

A blast at a nightclub in Istanbul on New Year’s Eve that killed 39 people involved a suspect from the same part of central Asia. The bomber in that attack said he had been acting under the direction of ISIS militants in Syria.

A still image of suspect Akbarzhon Jalilov walking at St Petersburg's metro station. (5th Channel Russia/via Reuters)

Jalilov’s uncle said his nephew moved to Russia in 2012. He is registered at an upscale apartment in the north of St Petersburg, according to a source in the Russian authorities, and he has a Daewoo Nexia car registered in his name.

A man who said he was a representative of the apartment’s owner told Reuters that Jalilov had never actually lived there, but had given the address as his residence in official documents.

His VKontakte page included links to a site featuring sayings from Muhammad ibn Abd al-Wahhab, an eighteenth century preacher on whose teaching Wahhabism, a conservative and hardline branch of Islam, is based. But there were no links to Islamist terrorists.

Putin Visit ‘Noteworthy’

Russia’s health minister Veronika Skvortsova said on Tuesday that the death toll from the blast, which hit at 2:40 p.m. (1140 GMT), had risen to 14, with 50 wounded.

St Petersburg television showed footage of the corpse of a man they said was the perpetrator. The man, with a close-cropped beard, resembled footage of a young man wearing a blue beanie hat and a jacket with a fur-lined hood captured on closed circuit television identified by Russian media as a suspect.

An injured person is helped by emergency services outside Sennaya Ploshchad metro station, following explosions in two train carriages at metro stations in St. Petersburg. (REUTERS/Anton Vaganov)

“It has been ascertained that an explosive device could have been detonated by a man, fragments of whose body were found in the third carriage of the train,” Russia’s state investigative committee said in a statement.

“The man has been identified but his identity will not be disclosed for now in the interests of the investigation,” the statement added.

President Putin, who was visiting St Petersburg at the time of the blast, went to the site late on Monday.

The Kremlin said it was “noteworthy” that Putin had been in the city. It did not elaborate, but said such attacks on Russia were a challenge for every citizen, including the president.

Russian president Vladimir Putin puts flowers down outside Tekhnologicheskiy Institut metro station in St. Petersburg, Russia on April 3, 2017. (REUTERS/Grigory Duko)

Two years ago, ISIS said it had brought down a plane carrying Russian tourists home from a Red Sea resort. All 224 people on board the flight were killed.

Monday’s blast raised security fears beyond Russian frontiers. France, which has itself suffered a series of attacks, announced additional security measures in Paris.

http://www.theepochtimes.com/n3/2239155-st-petersburg-metro-blast-suspect-likely-born-in-central-asia/print/

Story 2: North Korea Ballistic Missile Launch — Videos–

Image result for north korea launchers missile april 2017Image result for north korea launchers missile april 2017

US officials: North Korean missile launch likely a failure

Breaking News – North Korea Fired Ballistic Missile Into Japan Sea

Published on Apr 4, 2017

Breaking News – North Korea Fired Ballistic Missile Into Japan Sea

April 5th, 2017 – North Korea fired a ballistic missile into the Sea of Japan on Wednesday morning, US and South Korean officials said. The US official believes the projectile was likely a ballistic missile. North Korea’s missile test comes just a day before Chinese President Xi Jinping visits US President Donald Trump for a summit in Florida.

The projectile used in Wednesday’s test was launched at 6:42 a.m. Seoul time, from a site in the vicinity of Sinpo, South Hamgyong province, a South Korean Defense Ministry official said. It flew a distance of around 60 kilometers (37 miles), South Korean officials said.

North Korean missile fired ahead of US-China summit | April 5, 2017

North Korean missile fired ahead of US-China summit | April 5, 2017

Donald Trump: ‘We have a big problem’ in North Korea

Japan issues ‘strong protest’ over N.Korea missile launch

Official: North Korea fires projectile

Trump calls on China to get tough on North Korea

Can the Trump administration get North Korea under control?

Ash Carter: US Will DESTROY North Korea

US Military sends MOST DEADLY MESSAGE to North Korean Military

Published on Mar 26, 2017

A great video of the US Military sending it’s most deadly message to the leadership of the North Korean Military in Military exercise.
WATERS SURROUNDING THE KOREAN PENINSULA, Republic of Korea
(March. 19, 2017)- U.S. Navy ships assigned to Commander, Task Force (CTF) 30 and CTF 70 are scheduled to begin a series of exercises with the Republic of Korea (ROK) Navy March 21, 2017 to strengthen maritime interoperability and tactics, techniques and procedures.

The U.S. routinely conducts CSG operations in the waters around the Republic of Korea to exercise maritime maneuvers, strengthen the U.S.-ROK alliance, and improve regional security.

“This exercise is yet another example of the strength and resolve of the combined U.S. and the ROK naval force,” said Rear Adm. James Kilby, commander, Carl Vinson Carrier Strike Group. “The U.S. and the Republic of Korea share one of the strongest alliances in the world and we grow stronger as an alliance because of our routine exercises here in South Korea and the close relationship and ties that we forge from operating at sea together.”

The exercises will consist of a routine bilateral training, subject matter expert exchanges, anti-submarine and anti-surface warfare drills, communication drills, air defense exercises, counter-mine planning and distinguished visitor embarkations.

“This defensive exercise focuses on enhancing the interoperability between the ROK and US navies and helps both navies maintain a combined defense posture to protect the ROK from future North Korean unprovoked acts of aggression,” said Rear Adm, Choi, Sung-Mok, the chief of staff for the Republic of Korea Fleet.

Additional surface, subsurface, and air assets joining the bilateral exercise include Carrier Air Wing 2, Arleigh Burke-class guided-missile destroyers USS Barry (DDG 52), USS Wayne E Meyer (DDG 108), USS McCampbell (DDG 85), USS Stethem (DDG 63), Los Angeles-class nuclear fast attack submarine USS Columbus (SSN 762), and P-3/P-8 Maritime Patrol and Reconnaissance Aircraft from Commander, Task Force 72.

Vinson deployed to the region under U.S. 3rd Fleet command and control, including beyond the international dateline, which previously divided operational areas of responsibility for 3rd and 7th Fleets. Third Fleet operating forward offers additional options to the Pacific Fleet commander by leveraging the capabilities of 3rd and 7th Fleets. This operational concept allows both numbered fleets to complement one another and provide the foundation of stability in the Indo-Asia-Pacific region.

The U.S. Navy maintains a presence in the Indo-Asia-Pacific to help preserve peace and security and further our partnerships with friends and allies. Our forward presence contributes to freedom of navigation and lawful use of the sea, as well as furthers operational training and enables an exchange of culture, skills, and tactical knowledge.

For a list of participating Republic of Korea assets, please contact the Republic of Korea Navy Headquarters Public Affairs.

Video Description Credit: Lt. Joshua Kelsey

Video Credit: US Military

Thumbnail Credit: US Navy

US says it has ‘spoken enough about North Korea’ after new missile launch

Rex Tillerson’s enigmatic statement comes after Trump warned US would act alone on Pyongyang provocation if China did not intervene

Kim Jong-un at a North Korean army competition in Pyongyang
Kim Jong-un at a North Korean army competition in Pyongyang on 1 April. The ballistic missile launch from the east coast follows another two weeks ago. Photograph: KCNA/Reuters 

Japan and South Korea have condemned North Korea after it launched another ballistic missile – but the US refused to be drawn in, with secretary of state Rex Tillerson saying the country “has spoken enough about North Korea”.

Japan lodged a strong protest over the “extremely problematic launch”, which landed in waters off the Korean peninsula on the eve of a summit between US and Chinese leaders that is expected to focus on Pyongyang’s nuclear weapons programme.

The South Korean foreign ministry said it “threatens the peace and safety of the international community as well as the Korean peninsula”.

But Tillerson responded to the test with an aenigmatic statement saying only: “The United States has spoken enough about North Korea. We have no further comment.”

A few hours earlier, before news of the new missile launch broke, a senior Trump administration official suggested time was running out for a diplomatic solution.

“We would have loved to see North Korea join the community of nations,” the official said. “They have been given that opportunity over the course in different dialogues and offers over the course of four administrations with some of best diplomats and statesmen doing the best they could to bring about a resolution.

“The clock has now run out and all options are on the table for us.”

The missile was launched on Wednesday from Sinpo, a port city on North Korea’s east coast, and flew about 60km (37 miles), South Korea’s office of the joint chiefs of staff said in a short statement. Sinpo is the site of a North Korean submarine base.