The Pronk Pops Show 869, April 7, 2017, Story 1: Trump Imperial Presidency of The American Empire –Trump Just Another Progressive Global Interventionist Not An American First Nationalist –Another Undeclared War — 59 Tomhawk Cruise Missiles Attack al Shayrat Airbase Destroying 6 Aircraft and One Runway — Videos — Story 2: What is Next? United States Led Coalition of Egypt, Jordan, Kurds, Saudi Arabia, and Turkey to Destroy Islamic State, Jabhat Al Nustra Front ( al-Qaeda’s Syrian affiliate), Radical Islamic Terrorist Jihadists in Syria, Hezbollah, and Bashar al-Assad Syrian Regime –Videos — Story 3: Supreme Court Justice Neil Gorsuch Confirmed 54 Yes — 45 No — Videos

Posted on April 7, 2017. Filed under: American History, Blogroll, Breaking News, Chemical Explosion, Congress, Countries, Donald J. Trump, Donald Trump, Egypt, European History, European Union, Foreign Policy, France, Government, Government Dependency, Government Spending, Great Britain, History, House of Representatives, Illegal Immigration, Immigration, Independence, Iraq, Islamic Republic of Iran, Islamic State, Israel, Israel, Italy, Jordan, Language, Libya, Lying, Middle East, Natural Gas, News, Oil, Philosophy, Photos, President Barack Obama, President Trump, Qatar, Radio, Rand Paul, Raymond Thomas Pronk, Resources, Rule of Law, Russia, Senate, Spying, Surveillance and Spying On American People, Syria, Technology, Terror, Terrorism, Turkey, United Kingdom, United States of America, Videos, Violence, War, Wealth, Weapons, Wisdom | Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , |

Project_1

The Pronk Pops Show Podcasts

Pronk Pops Show 869: April 7, 2017

Pronk Pops Show 868: April 6, 2017

Pronk Pops Show 867: April 5, 2017

Pronk Pops Show 866: April 3, 2017

Pronk Pops Show 865: March 31, 2017

Pronk Pops Show 864: March 30, 2017

Pronk Pops Show 863: March 29, 2017

Pronk Pops Show 862: March 28, 2017

Pronk Pops Show 861: March 27, 2017

Pronk Pops Show 860: March 24, 2017

Pronk Pops Show 859: March 23, 2017

Pronk Pops Show 858: March 22, 2017

Pronk Pops Show 857: March 21, 2017

Pronk Pops Show 856: March 20, 2017

Pronk Pops Show 855: March 10, 2017

Pronk Pops Show 854: March 9, 2017

Pronk Pops Show 853: March 8, 2017

Pronk Pops Show 852: March 6, 2017

Pronk Pops Show 851: March 3, 2017

Pronk Pops Show 850: March 2, 2017

Pronk Pops Show 849: March 1, 2017

Pronk Pops Show 848: February 28, 2017

Pronk Pops Show 847: February 27, 2017

Pronk Pops Show 846: February 24, 2017

Pronk Pops Show 845: February 23, 2017

Pronk Pops Show 844: February 22, 2017

Pronk Pops Show 843: February 21, 2017

Pronk Pops Show 842: February 20, 2017

Pronk Pops Show 841: February 17, 2017

Pronk Pops Show 840: February 16, 2017

Pronk Pops Show 839: February 15, 2017

Pronk Pops Show 838: February 14, 2017

Pronk Pops Show 837: February 13, 2017

Pronk Pops Show 836: February 10, 2017

Pronk Pops Show 835: February 9, 2017

Pronk Pops Show 834: February 8, 2017

Pronk Pops Show 833: February 7, 2017

Pronk Pops Show 832: February 6, 2017

Pronk Pops Show 831: February 3, 2017

Pronk Pops Show 830: February 2, 2017

Pronk Pops Show 829: February 1, 2017

Pronk Pops Show 828: January 31, 2017

Pronk Pops Show 827: January 30, 2017

Pronk Pops Show 826: January 27, 2017

Pronk Pops Show 825: January 26, 2017

Pronk Pops Show 824: January 25, 2017

Pronk Pops Show 823: January 24, 2017

Pronk Pops Show 822: January 23, 2017

Pronk Pops Show 821: January 20, 2017

Pronk Pops Show 820: January 19, 2017

Pronk Pops Show 819: January 18, 2017

Pronk Pops Show 818: January 17, 2017

Pronk Pops Show 817: January 13, 2017

Pronk Pops Show 816: January 12, 2017

Pronk Pops Show 815: January 11, 2017

Pronk Pops Show 814: January 10, 2017

Pronk Pops Show 813: January 9, 2017

Image result for al-Shayrat air base

Image result for al-Shayrat air base

Image result for al-Shayrat air baseImage result for al-Shayrat air baseImage result for al sharat air field syria aerial viewImage result for al-Shayrat air baseImage result for al-Shayrat air baseImage result for number killed in syrian civil WARImage result for branco cartons trump war syriaImage result for branco cartons trump war syriaImage result for branco cartons trump war syria

Image result for branco cartons trump war syriaImage result for branco cartons trump war syriaImage result for al-Shayrat air baseImage result for al sharat air field syria aerial viewImage result for Syria Chemical AttackImage result for Syria Chemical Attack

Image result for Syria Chemical Attack

Image result for Syria Chemical AttackImage result for al-Nusra FrontImage result for al-Nusra Front chemical gas
Image result for al-Nusra Front

Image result for al-Nusra FrontImage result for al-Nusra FrontImage result for al-Nusra Front chemical gas

Image result for Syria Chemical Attack

Image result for Syria Chemical Attack

Image result for Syria Chemical AttackImage result for al-Nusra Front chemical gas

Image result for al-Nusra Front chemical gas

SYRIA FALSE FLAG LEADS TO WAR – Ron Paul

The world reacts to the strikes against Syria

Gen. Jack Keane reacts to US airstrikes in Syria

Mark Steyn: Trump hit a reset button for the world

President Trump’s Syria policy raises concerns

Sen. Paul: We didn’t have the debate, we simply went to war

A look at the intel that led to US strike on Syrian airbase

US Strikes Syria: Chemical attack not the first in Syrian civil war

Marco Rubio: President had legal, moral authority to attack

Israeli PM Netanyahu ‘fully supports’ US strike on Syria

President Trump Orders U.S. Airstrike on Syria

Trump turns on Assad: How will US strikes impact war in Syria? (part 1)

BREAKING! WE’RE AT WAR! TRUMP JUST LAUNCHED A MASSIVE STRIKE AGAINST SYRIA WW3 HAS BEGUN!!!

Issue Analysis: Trump, Assad, Syria, China, North Korea, UN Resolutions, Russia and What’s Next?

President Donald Trump Bombs Syria

Syria Chemical Attack: Push For Ousting Bashar al-Assad

Seymour Hersh: Obama “Cherry-Picked” Intelligence on Syrian Chemical Attack to Justify U.S. Strike

Global Empire – The World According to Seymour Hersh [Part Two]

Global Empire – The World According to Seymour Hersh [Part One]

Turkey’s interests in the Syrian civil war

Saudi Arabia’s role in the Syrian civil war

Why Do Saudi Arabia And Iran Hate Each Other?

TURKEY vs SYRIA Military Power Comparison | Turkish Army VS Syrian Arab Army | 2016

Image result for phosgene posters

Toxicity of Phosgene with Audio

FSA use poison gas on SAA and Syrian people supplied by Turkey

Phosgene Exposure

Gas warfare in the First World War

What is Sarin Gas?

Published on Sep 7, 2013

Hank discusses the chemistry of sarin, the nerve agent that killed more than 1400 people in a chemical weapons attack in Syria.

Like SciShow? Want to help support us, and also get things to put on your walls, cover your torso and hold your liquids? Check out our awesome products over at DFTBA Records: http://dftba.com/artist/52/SciShow

AMERICA’S TOP GENERAL JUST GAVE TRUMP SOMETHING THAT WILL SCARE NORTH KOREA TO DEATH!

Published on Apr 7, 2017

Sub for more: http://nnn.is/the_new_media | Danny Gold for Liberty Writers reports, Anyone who has been watching the news recently is sure to have heard all about North Korea and their nukes. They also know President Donald Trump is NOT happy about it and he and Mattis are ready to STRIKE BACK!

 

Why did Donald Trump strike al-Shayrat air base?

An aerial view of the al-Shayrat Airfield near Homs, Syria, 07 October 2016
An aerial view of the al-Shayrat Airfield near Homs, Syria, 07 October 2016 CREDIT: US DEPARTMENT OF DEFENCE HANDUT

The strike on al-Shayrat air base near the western Syrian city of Homs was both a symbolic and a tactical one.

The airfield is not just a valuable military target, it is also the one from which the Syrian government launched its chemical attack on Tuesday.

Donald Trump had intended the raid as a direct retaliation. 

Shayrat is one of the largest and most active Syrian Air Force bases, which has served as the nerve centre of its missions against rebels in Homs, as well as Palmyra, where government forces have been battling Islamic State of Iraq and the Levant (Isil).

Watch | Donald Trump: Syria strike in ‘vital’ US interest

However, it is believed that the US gave advance warning of the missile strike to Russia, which gave the Syrian military some time to move most of its assets to another base.

The Russians, who intervened militarily on behalf of the Bashar al-Assad regime in October 2015, have aircraft stationed at bases across Syria and the US could not risk accidentally hitting one.

Russia reportedly reinforced the base and built additional runways before beefing up its operations there.

Maj Gen. Igor Konashenkov, Russian defense ministry spokesman, reported on Friday that only 23 of the 59 Tomahawk cruise missiles reached the air base.

The raid damaged one of its two runways, according to pictures shared on social media which also showed severe fire damage to other parts of the base.

Rami Adbulrahman, director of UK-based Syrian Observatory for Human Rights monitor said he was told 90 per cent of the base was destroyed and senior airforce commander, Brigadier Khalil Issa Ibrahim, was among the seven reported killed.

Before 2013 the base was used to store chemical weapons but nothing was targeted that could have contained them now.

It was believed there may have been sarin gas stored in one warehouse but that was avoided.

Maj Konashenkov said they destroyed six MiG-23 fighter jets of the Syrian air force which were under repairs, but did not damage other warplanes.

A former pilot who was stationed at Shayrat before he defected said Shayrat could hold up to 45 aircraft and that had they all been hit it would have had a major impact on the Syrian military’s strike capacity.

The mayor of Homs criticised the strikes, saying they only aided terrorists as the base was the main operations centre for carrying out strikes against Isil.

Fares Shehabi, an MP for Aleppo, posted on Twitter: “Trump attacked an airport solely dedicated to fighting ISIS in central Syria and providing aid to besieged civilians in Deir Ezzor.”

http://www.telegraph.co.uk/news/2017/04/07/did-donald-trump-strike-al-shayrat-air-base/

Jumping to conclusions; something is not adding up in Idlib chemical weapons attack

70

BEIRUT, LEBANON (4:47 P.M.) – At least 58 people were killed in a horrific gas attack in the Idlib Governorate this morning. However, even before investigations could be conducted and for evidence to emerge, Federica Mogherini, the Italian politician High Representative of the European Union (EU) for Foreign Affairs and Security Policy, condemned the Syrian government stating that the “Assad regime bears responsibility for ‘awful’ Syria ‘chemical’ attack.”

The immediate accusation from a high ranking EU official serves a dangerous precedent where public outcry can be made even before the truth surrounding the tragedy can emerge

Israeli President, Benjamin Netanyahu, joined in on the condemnation, as did Amnesty International.

Merely hours after the alleged chemical weapons attack in Khan Sheikhun, supposedly by the Syrian government, holes are beginning to emerge from opposition sources, discrediting the Al-Qaeda affiliated White Helmets claims.

For one, seen in the above picture, the White Helmets are handling the corpses of people without sufficient safety gear, most particularly with the masks mostly used , as well as no gloves. Although this may seem insignificant, understanding the nature of sarin gas that the opposition claim was used, only opens questions.

Within seconds of exposure to sarin, the affects of the gas begins to target the muscle and nervous system. There is an almost immediate release of the bowels and the bladder, and vomiting is induced. When sarin is used in a concentrated area, it has the likelihood of killing thousands of people. Yet, such a dangerous gas, and the White Helmets are treating bodies with little concern to their exposed skin. This has to raise questions.

It also raises the question why a “doctor” in a hospital full of victims of sarin gas has the time to tweet and make video calls. This will probably be dismissed and forgotten however.

Terrorist Mohammed Alloush is not a gas expert, he is just one of the participants in the crime https://twitter.com/maytham956/status/849235559117619201 

@maytham956 Hmm…’Patients are flooding in’ YET this ‘doctor’ (seems the main source of ‘gas attack’) has time to film, tweet and videocalls… pic.twitter.com/SfLOfjE2pG

View image on Twitter

It is known that about 250 people from Majdal and Khattab were kidnapped by Al-Qaeda terrorists last week. Local sources have claimed that many of those dead from the chemical weapons were those from Majdal and Khattab.

ALSO READ  In Video | ISIS Hunters secure gas fields in east Palmyra

This would suggest that on the eve of upcoming peace negotiations, terrorist forces have once again created a false flag scenario. This bares resemblance to the Ghouta chemical weapons attack in 2013 where the Syrian Army was accused of using the weapons of mass destruction on the day that United Nations Weapon’s Inspectors arrived in Damascus.

Later, in a separate chemical weapon usage allegation, Carla del Ponte, a UN weapons inspector said that there was no evidence that the government had committed the atrocity. This had however not stopped the calls for intervention against the Syrian government, a hope that the militant forces wished to eventuate from their use of chemical weapons against civilians in Khan-al-Assal.

Therefore, it is completely unsurprising that Orient TV has already prepared a “media campaign” to cover the Russian and Syrian airstrikes in Hama countryside against terrorist forces, with the allegations that the airforces have been using chemical weapons. And most telling, there announcement of covering the use of chemical weapons by the Syrian government, hours before this allegation even emerged…….. Seems like someone forgot to tell him that it would not occur for a few more hours before his tweet.

Orient TV reporter :
“tomorrow we are launching a media campaign to cover the airstrikes on Hama country side including the usage of CW”

Meanwhile, pick up  trucks have been photographed around bodies of those killed. Again, it must be questioned why there are people around sarin gas without any protective gear, and not affected at all when it can begin attacking the body within seconds? Also, the pick up trucks remain consistent to what local sources have said that many of those dead were kidnapped by Al-Qaeda terrorists from pro-government towns in rural Hama.

ALSO READ  Update from Syrian airbase targeted by US missiles

Also, what is brought into question is where the location of the hose is coming from in the below picture, a dugout carved into the rock. This also suggests that the location is at a White Helmets base where there are dug out hiding spots carved into the mountainside and where they have easy access to equipment, as highlighted by Twitter user Ian Grant.

In response to the allegations, the Syrian Arab Army soldiers in northern Hama denied the use of chemicals weapons today. This is consistent with the Russian Ministry of Defense who denied any involvement in the attack.

The army “has not and does not use them, not in the past and not in the future, because it does not have them in the first place,” a military source said.

And this of course begs the question. With the Syrian Army and its allies in a comfortable position in Syria, making advances across the country, and recovering lost points in rural Hama, why would they now resort to using chemical weapons? It is a very simple question with no clear answer. It defies any logic that on the eve of a Syria conference in Brussels and a week before peace negotiations are to resume, that the Syrian government would blatantly use chemical weapons. All evidence suggests this is another false chemical attack allegation made against the government as seen in the Khan-al-Assal 2013 attack where the terrorist groups hoped that former President Obama’s “red-line” would be crossed leading to US-intervention in Syria against the government.

Most telling however, is that most recent report shows that the government does not deny striking Khan Sheikhun. Al-Masdar’s Yusha Yuseef was informed by the Syrian Army that the air force targeted a missile factory in Khan Sheikoun, using Russian-manufactured Su-22 fighter jet to carry out the attack. Most importantly, the Su-22’s bombs are unique and cannot be filled with any chemical substances, which is different than bombs dropped from attack helicopters. Yuseef was then told that the Syrian Air Force did not know there were any chemical substances inside the missile factory in Khan Sheikhoun. It remains to be known whether there actually were chemicals in the missile factory targeted by the airstrikes, or whether the terrorist forces used gas on the kidnapped civilians from the pro-government towns and brought them in the lorry trucks to the site of the airstrikes. Whether they were gassed by the militant forces, or the airstrikes caused a chemical weapon factory to explode, the gruesome deaths of children, seen foaming in the mouth because of the gas, lays in the hands of the terrorists.

ALSO READ  Autopsies confirm Assad behind chemical attack in southern Idlib: Turkish state media

Therefore, it becomes evident that the area targeted was definitely a terrorist location, where it is known that the White Helmets share operation rooms with terrorist forces like Al-Qaeda as seen after the liberation of eastern Aleppo. Civilians and fighting forces, including Kurdish militias, have all claimed that militant groups that operate in Idlib, Hama and Aleppo countrysides, have used chemical weapons in the past. Therefore, before the war cries begin and the denouncement of the government from high officials in power positions begin, time must be given so that all evidence can emerge. However, this is an important factor that has never existed in the Syrian War, and the terrorist forces continue to hope that Western-intervention against the government will occur, at the cost of the lives of innocent civilians.

https://www.almasdarnews.com/article/jumping-conclusions-something-not-adding-idlib-chemical-weapons-attack/

The Western media refutes their  own lies.

Not only do they confirm that the Pentagon has been training the terrorists in the use of chemical weapons, they also acknowledge the existence of a not so secret “US-backed plan to launch a chemical weapon attack on Syria and blame it on Assad’s regime” 

London’s Daily Mail in a 2013 article confirmed the existence of an Anglo-American project endorsed by the White House (with the assistance of Qatar) to wage a chemical weapons attack on Syria and place the blame of Bashar Al Assad.

The following Mail Online article was published and subsequently removed. Note the contradictory discourse: “Obama issued warning to Syrian president Bashar al Assad”, “White House gave green light to chemical weapons attack”.

This Mail Online report published in January 2013 was subsequently removed from Mail Online. For further details click here

The Pentagon’s Training of  “Rebels” (aka Al Qaeda Terrorists) in the Use of Chemical Weapons

CNN accuses Bashar Al Assad of killing his own people while also acknowledging that the “rebels” are not only in possession of chemical weapons, but that these “moderate terrorists” affiliated with Al Nusra are trained in the use of chemical weapons by specialists on contract to the Pentagon.

In a twisted logic, the Pentagon’s mandate was to ensure that the rebels aligned with Al Qaeda would not acquire or use WMD, by actually training them in the use of chemical weapons (sounds contradictory):

“The training [in chemical weapons], which is taking place in Jordan and Turkey, involves how to monitor and secure stockpiles and handle weapons sites and materials, according to the sources. Some of the contractors are on the ground in Syria working with the rebels to monitor some of the sites, according to one of the officials.

The nationality of the trainers was not disclosed, though the officials cautioned against assuming all are American. (CNN, December 09, 2012, emphasis added)

screenshot of the CNN article, the original link has been redirected to CNN blogs,

The above report by CNN’s award winning journalist Elise Labott (relegated to the status a CNN blog), refutes CNN’s numerous accusations directed against Bashar Al Assad.

Who is doing the training of terrorists in the use of chemical weapons?  From the horse’s mouth: CNN

Sources: U.S. helping underwrite Syrian rebel training on securing chemical weapons

And these are the same terrorists (trained by the Pentagon) who are the alleged target of  Washington’s counterterrorism bombing campaign initiated by Obama in August 2014:

“The Pentagon scheme established in 2012 consisted in equipping and training Al Qaeda rebels in the use of chemical weapons, with the support of military contractors hired by the Pentagon, and then holding the Syrian government responsible  for using the WMD against the Syrian people.

What is unfolding is a diabolical scenario –which is an integral part of military planning– namely a situation where opposition terrorists advised by Western defense contractors are actually in possession of chemical weapons.

This is not a rebel training exercise in non-proliferation. While president Obama states that “you will be held accountable” if “you” (meaning the Syrian government) use chemical weapons, what is contemplated as part of this covert operation is the possession of chemical weapons by the US-NATO sponsored terrorists, namely “by our” Al Qaeda affiliated operatives, including the Al Nusra Front which constitutes the most effective Western financed and trained fighting group, largely integrated by foreign mercenaries. In a bitter twist, Jabhat al-Nusra, a US sponsored “intelligence asset”, was recently put on the State Department’s list of terrorist organizations.

The West claims that it is coming to the rescue of the Syrian people, whose lives are allegedly threatened by Bashar Al Assad. The truth of the matter is that the Western military alliance is not only supporting the terrorists, including the Al Nusra Front, it is also making chemical weapons available to its proxy “opposition” rebel forces.

The next phase of this diabolical scenario is that the chemical weapons in the hands of Al Qaeda operatives will be used against civilians, which could potentially lead an entire nation into a humanitarian disaster.

The broader issue is: who is a threat to the Syrian people? The Syrian government of Bashar al Assad or the US-NATO-Israel military alliance which is recruiting “opposition” terrorist forces, which are now being trained in the use of chemical weapons.” (Michel Chossudovsky, May 8, 2013, minor edit)

http://www.blacklistednews.com/Pentagon_Trained_Syria%E2%80%99s_Al_Qaeda_%E2%80%9CRebels%E2%80%9D_in_the_Use_of_Chemical_Weapons/57792/0/38/38/Y/M.html

4 DEADLIEST CHEMICAL WEAPONS

During the World War I, a new, deadly type of weapon was used for the first time; toxic gas. Considered uncivilised prior to the war, the development and military usage of poisonous gas grenades was soon called for by the demands of both sides to find a new way to overcome the stalemate of unforeseen trench warfare.

First used at the Second Battle of Ypres on 22 April 1915, cylinders filled with toxic gas soon became one of the most devastating and effective weapons used in the entire Great War, killing more than 90,000 soldiers and injuring about 1.25 million. In this article, we are going to explore the 4 of most deadly chemical weapons ever conceived, their history, usage, and effects on the human beings.

4.Mustard Gas(Yperite)

While Germans were releasing the mustard gas in year 1917 near the Belgian city of Ypres for the first time, chemist Frederic Guthrie was most likely turning in his grave. In year 1860, this British professor discovered the mustard gas, and also experienced its toxic effects first-hand for the first time. 57 years later, after its first military usage at Ypres, it got its infamous nickname, Yperite.

In the beginning, Germans planned to use the mustard gas only as a paralyzing agent. However, they soon found out, that when in sufficient concentrations, this gas could be easily lethal to the majority of the enemy soldiers.

https://i2.wp.com/upload.wikimedia.org/wikipedia/commons/d/dc/British_55th_Division_gas_casualties_10_April_1918.jpg

Soldiers after the mustard gas attack

Due to its dangerous properties, mustard gas soon became a popular chemical weapon, used in WWII, during the North Yemen Civil War, and even by Saddam Husein in year 1988. Even 150 years after its discovery, antidote is still to be discovered.

Pure mustard gas is colourless, oily liquid at room temperature. When used in its impure form, as warfare agent, it is usually green-brown in color and has an specific odor resembling mustard or garlic, hence the name. Yperite fumes are more than 6 times heavier than air, staying near the ground for several hours, effectively filling and contaminating enemy’s trenches, and killing everyone without proper protection.

https://i1.wp.com/upload.wikimedia.org/wikipedia/commons/f/fd/155mmMustardGasShells.jpg

Mustard gas shells

Lethal dose for an adult man weighing 160 lbs is approximately 7,5 g of liquid mustard gas, when in contact with his skin for several minutes. However, when used in its gaseous form, lethality greatly depends on its concentration and on the length of exposure. Gas mask is usually not enough to be protected from this gas; it can easily penetrate the skin and kill the victim from inside. It easily passes through most of the clothes, shoes or other materials. For instance, standard rubber gloves could protect the skin for only about ten minutes.

4 or 6 hours after exposure, burning sensation appears in the affected areas, followed by reddening of the skin. After next 16 hours, large blisters appear on the affected skin, subsequently causing severe scarring and sometimes even necrosis. If the eyes were affected, temporary or permanent blindness typically occurs after few days.

https://i1.wp.com/upload.wikimedia.org/wikipedia/commons/6/68/Mustard_gas_burns.jpg

Soldier with mustard gas burns

When inhaled, first symptoms start to manifest themselves after several hours, starting with chest pain, bloody coughing and vomiting, followed by muscle spasms. Death usually occurs within 3 days, caused either by lung edema or heart failure.

3.Phosgene

In year 1812, 22-year old British amateur chemist John Davy syntetized the phosgene gas for the first time. However, it didn’t contain any phosphorus, its name was derived from greek words phos(light) and gennesis(birth). John Davy probably assumed that his invention would be used in a more sensible way, however, on 9.th of December, 88 tons of phosgene were released during the trench warfare in France, killing 69 men and seriously injuring more then 1,200.

https://i2.wp.com/upload.wikimedia.org/wikipedia/commons/9/9d/Phosgene_poster_ww2.jpg

U.S. Army phosgene identification poster(WWII)

Germans were satisfied by the results, so they soon started using grenades filled by phosgene in combat. It accounts for more than 60% of all deaths caused by the chemical warfare during the First World War, more than chlorine and mustard gas combined.

During the Second World War, most soldiers were well-prepared for the possible use of this deadly gas, so the casualties were nowhere that high. However, phosgene-filled grenades used during the 1942 Battle of Kerch by Nazi Germany allegedly injured at least 10,000 Soviet soldiers.

https://i0.wp.com/upload.wikimedia.org/wikipedia/commons/b/ba/Nach_Gasangriff_1917.jpg

British casualties after German phosgene attack

Which deadly properties does this gas possess? At low temperatures, it is a colourless liquid. However, when heated to more than 8 degrees celsius, it evaporates quickly. Its odor has been often described by the survivors as pleasant, similar to newly mown hay or wet grass. After release, it contaminates the area for about 10 minutes, double the time in the winter. When compared to chlorine, phosgene has a major advantage; first symptoms start to manifest themselves after much longer time period, usually after more than five minutes, allowing more phosgene to be inhaled.

After one inhales high concentrations of this lethal gas, his chances of survival are very mild. After few minutes, he is likely to die of suffocation, because phosgene aggresively disrupts the blood-air barrier in the lungs.

https://i1.wp.com/upload.wikimedia.org/wikipedia/commons/3/34/Australian_infantry_small_box_respirators_Ypres_1917.jpg

Australian soldiers wearing gas masks(WWI)

After inhaling less concentrated phosgene, you might be little bit better off. One hour after exposure, first symptoms include strong burning sensation in pharynx and trachea, severe headache and vomiting, followed by pulmonary edema(swelling and fluid buildup), which often leads to suffocation.

To this day, phosgene remains one of the most dangerous chemical weapons in the world. Although not as deadly as sarin or nerve gas, it is very easy to manufacture; no wonder it’s often used during terrorist attacks. Homemade phosgene grenade can be easily created by exposing a bottle of chloroform to UV-light source for a few days.

2.Sarin

If previous two chemicals weren’t dangerous enough, here comes the sarin, often known as the most powerful of all nerve agents.

Sarin was developed back in 1938 by a group of 4 German scientists, Scharder, Ambros, Rudiger and van der Linde, during their research of pesticides. During the WWII, this deadly gas was first used by the Nazi Germany in June 1942. At the end of the war, Germany allegedly possessed more than 10 tons of sarin.

https://i1.wp.com/blogs.reuters.com/great-debate/files/2013/04/japan-sarin1.jpg

Japanese firemen decontaminating the Tokyo subway after sarin attack

However, it is most famous for being used during the 1995 terrorist attack on the Tokio subway by a Japanese cult Aum Shinrikyo, killing 13 people and allegedly injuring more than 5,000. It was also used back in August 2013 by al-Assad’s forces in Ghouta, Syria, killing more than 1,700 people.

Sarin belongs to the group of nerve gasses, the deadliest of all toxic gasses used in chemical warfare. It is highly toxic; a single drop of sarin the size of the head of a pin is enough to kill an adult human. In addition, most of the victims usually die few minutes after contamination.

It usually enters the organism via respiration, but it can also penetrate the skin or be ingested. In home temperature, sarin is a colourless liquid without significant odor, similar to water. However, when exposed to higher temperatures, it starts to evaporate, being still odorless. After release, it often remains deadly for more than 24 hours.

https://i2.wp.com/asset0.cbsistatic.com/cnwk.1d/i/tim2/2013/08/30/762px-Demonstration_cluster_bomb_620x488.jpg

Missile filled with sarin containers

Immediately after exposure, first symptoms include strong headaches, increased salivation and lacrimation(secretion of tears), followed by gradual paralysis of the muscles. Death is caused by asphyxiation or heart failure.

According to some sources, Sarin is 500 times more deadly than kyanide, with its lethal dose being only about 800 micrograms. Only 5 tons of sarin, obiviously properly dosed, would be enough to wipe out entire humanity.

1.Agent Orange

This mixture of two herbicides, most famous for its usage in Vietnam War, is not a chemical weapon in the true sense of the word. It was discovered in year 1943 by American botanic Arthur Galston. In year 1951, further research started by the scientific team in the military base of Detrick, Maryland.

https://i0.wp.com/24.media.tumblr.com/270a4453b15492b15b6551f10388fef4/tumblr_mt92auzYjZ1s88ji3o1_1280.jpg

Barrel of ”Agent Orange”

During the War of Vietnam, it was widely used for deforestation of the large areas covered by thick jungle, to enable easier and more effective bombing of enemy bases and supply routes. Although designed as herbicide, the Agent Orange also contained large amounts of dioxin, a highly toxic compound, making it one of the most deadly chemical weapons ever deployed.

In years 1962-1971, military operation with codenames ”Ranch Hand” or ”Trail Dust” took place in Southern Vietnam. During this operation, jungles in the region were heavily showered by this herbicide, primarily in the areas of Mekong delta. Mixture was storaged in orange barrels, hence the name ”Agent Orange”. During the operation, more than 20 million gallons of this dangerous chemical were used, destroying large areas of jungle, contaminating air, water and food sources.

https://i2.wp.com/digitaljournalist.org/issue0401/images/griffiths/09.jpg

Vietnamese babies born with severe birth defects

In high concentrations, dioxin causes severe inflammation of skin, lungs and mucous tissues, sometimes resulting in chronic obstructive pulmonary disease, pulmonary edema, or even death, however, it also affects eyes, liver and kidneys. It is also highly effective carcinogen, known for causing laryngeal and lung cancer.

It is estimated, that the usage of Agent Orange during the Vietnam War led to more than 400,000 people being killed or maimed, and 500,000 children born with mild to severe birth defects as a result of contamination. Agent Orange alone killed 10 times more people than all other chemical weapons combined.

Tomahawk (missile)

From Wikipedia, the free encyclopedia
For the sounding rocket, see TE-416 Tomahawk.
Tomahawk
Tomahawk Block IV cruise missile -crop.jpg

A BGM-109 Tomahawk flying in November 2002
Type Long-range, all-weather, subsonic cruise missile
Place of origin United States
Service history
In service 1983–present
Used by United States Navy
Royal Navy
Production history
Manufacturer General Dynamics (initially)
Raytheon/McDonnell Douglas
Unit cost $250,000(FY2014)[1] (Block IV)
Specifications
Weight 2,900 lb (1,300 kg), 3,500 lb (1,600 kg) with booster
Length Without booster: 18 ft 3 in (5.56 m)

With booster: 20 ft 6 in (6.25 m)

Diameter 20.4 in (0.52 m)
Warhead Nuclear: W80 warhead (retired)[2]
Conventional: 1,000 pounds (450 kg) High explosive or Submunitions dispenser with BLU-97/B Combined Effects Bomb or PBXN
Detonation
mechanism
FMU-148 since TLAM Block III, others for special applications

Engine Williams International F107-WR-402turbofan
using TH-dimer fuel
and a solid-fuel rocket booster
Wingspan 8 ft 9 in (2.67 m)
Operational
range
Block II TLAM-A – 1,350 nmi (1,550 mi; 2,500 km) Block III TLAM-C, Block IV TLAM-E – 900 nmi (1,000 mi; 1,700 km)

Block III TLAM-D – 700 nmi (810 mi; 1,300 km)[3]

Speed Subsonic; about 550 mph (890 km/h)
Guidance
system
GPS, INS, TERCOM, DSMAC, active radar homing (RGM/UGM-109B)
Launch
platform
Vertical Launch System (VLS) and horizontal submarine torpedo tubes (known as TTL (torpedo tube launch))

The Tomahawk (US /ˈtɑːməhɔːk/ or UK /ˈtɒməhɔːk/) is a long-range, all-weather, subsonic cruise missile. Introduced by General Dynamics (now Boeing Defense, Space & Security)[4][5] in the 1970s, it was initially designed as a medium to long-range, low-altitude missile that could be launched from a surface platform. It has been improved several times, and after corporate divestitures and acquisitions, is now made by Raytheon. Some Tomahawks were also manufactured by McDonnell Douglas.

Description

The Tomahawk missile family consists of a number of subsonic, jet engine-powered missiles designed to attack a variety of surface targets. Although a number of launch platforms have been deployed or envisaged, only sea (both surface ship and submarine) launched variants are currently in service. Tomahawk has a modular design, allowing a wide variety of warhead, guidance, and range capabilities. The Tomahawk project was originally awarded to Applied Physics Laboratory in Laurel, Maryland by the US Navy. James H. Walker led a team of scientists to design and build this new long range missile. The original design, updated with advanced technology, is still used today.

The missile is named after the Tomahawk, a one-handed axe used as a tool and a weapon by pre-contact Native Americans in the United States.

Variants

There have been several variants of the BGM-109 Tomahawk employing various types of warheads.

  • BGM-109A Tomahawk Land Attack Nuclear (TLAM-N) – Not deployed.[6]
  • BGM-109A Tomahawk Land Attack Missile – Nuclear (TLAM-A) with a W80 thermonuclear weapon. Retired from service sometime between 2010 and 2013.[2]
  • RGM/UGM-109B Tomahawk Anti Ship Missile (TAS-M) – active radar homing anti-ship missile variant; withdrawn from service in the 1990s.
  • BGM-109C Tomahawk Land Attack Missile – Conventional (TLAM-C) with a unitary warhead. This was initially a modified Bullpup warhead.
  • BGM-109D Tomahawk Land Attack Missile – Dispenser (TLAM-D) with cluster munitions.
  • RGM/UGM-109E Tomahawk Land Attack Missile (TLAM Block IV) – improved version of the TLAM-C.
  • BGM-109G Ground Launched Cruise Missile (GLCM) – with a W84 nuclear warhead; withdrawn from service in 1991.
  • AGM-109H/L Medium Range Air to Surface Missile (MRASM) – a shorter range, turbojet powered ASM with cluster munitions ; never entered service, cost US$569,000 (1999).[7]

Ground-launched cruise missiles (GLCM) and their truck-like launch vehicles were employed at bases in Europe; they were withdrawn from service to comply with the 1987 Intermediate-Range Nuclear Forces Treaty. Many of the anti-ship versions were converted into TLAMs at the end of the Cold War. The Block III TLAMs that entered service in 1993 can fly farther and use Global Positioning System (GPS) receivers to strike more precisely. Block III TLAM-Cs retain the DSMAC II navigation system, allowing GPS only missions, which allow for rapid mission planning, with some reduced accuracy, DSMAC only missions, which take longer to plan but terminal accuracy is somewhat better, and GPS aided missions which combine both DSMAC II and GPS navigation which provides the greatest accuracy. Block IV TLAMs are completely redesigned with an improved turbofan engine. The F107-402 engine provided the new BLK III with a throttle control, allowing in-flight speed changes. This engine also provided better fuel economy. The Block IV TLAMs have enhanced deep-strike capabilities and are equipped with a real-time targeting system for striking fleeing targets. Additionally, the BLOCK IV missiles have the capabilities to be re-targeted inflight, and the ability to transmit, via satcom, an image immediately prior to impact to assist in determining if the missile was attacking the target and the likely damage from the attack.

Upgrades

UGM-109 Tomahawk missile detonates above a test target, 1986

A major improvement to the Tomahawk is network-centric warfare-capabilities, using data from multiple sensors (aircraft, UAVs, satellites, foot soldiers, tanks, ships) to find its target. It will also be able to send data from its sensors to these platforms. It will be a part of the networked force being implemented by the Pentagon.

Tomahawk Block III[7][6] introduced in 1993 added time-of-arrival control and navigation through Digital Scene Matching Area Correlator (DSMAC) and jam-resistant GPS, smaller, lighter WDU-36 warhead, engine improvements and extended missile’s range.

Tactical Tomahawk Weapons Control System (TTWCS)[8] takes advantage of a loitering feature in the missile’s flight path and allows commanders to redirect the missile to an alternative target, if required. It can be reprogrammed in-flight to attack predesignated targets with GPS coordinates stored in its memory or to any other GPS coordinates. Also, the missile can send data about its status back to the commander. It entered service with the US Navy in late 2004. The Tactical Tomahawk Weapons Control System (TTWCS) added the capability for limited mission planning on board the firing unit (FRU).

Tomahawk Block IV[9][10][11] introduced in 2006 adds the strike controller which can change the missile in flight to one of 15 preprogrammed alternate targets or redirect it to a new target. This targeting flexibility includes the capability to loiter over the battlefield awaiting a more critical target. The missile can also transmit battle damage indication imagery and missile health and status messages via the two-way satellite data link. Firing platforms now have the capability to plan and execute GPS-only missions. Block IV also has an improved anti-jam GPS receiver for enhanced mission performance. Block IV includes Tomahawk Weapons Control System (TTWCS), and Tomahawk Command and Control System (TC2S).

On 16 August 2010, the Navy completed the first live test of the Joint Multi-Effects Warhead System (JMEWS), a new warhead designed to give the Tomahawk the same blast-fragmentation capabilities while introducing enhanced penetration capabilities in a single warhead. In the static test, the warhead detonated and created a hole large enough for the follow-through element to completely penetrate the concrete target.[12] In February 2014, U.S. Central Command sponsored development and testing of the JMEWS, analyzing the ability of the programmable warhead to integrate onto the Block IV Tomahawk, giving the missile bunker buster effects to better penetrate hardened structures.[13]

In 2012, the USN studied applying Advanced Anti-Radiation Guided Missile (AARGM) technology into the Tactical Tomahawk.[14]

In 2014, Raytheon began testing Block IV improvements to attack sea and moving land targets.[15] The new passive radar seeker will pick up the electromagnetic radar signature of a target and follow it, and actively send out a signal to bounce off potential targets before impact to discriminate its legitimacy before impact.[13] Mounting the multi-mode sensor on the missile’s nose would remove fuel space, but company officials believe the Navy would be willing to give up space for the sensor’s new technologies.[16] The previous Tomahawk Anti-Ship Missile, retired over a decade earlier, was equipped with inertial guidance and the seeker of the Harpoon missile and there was concern with its ability to clearly discriminate between targets from a long distance, since at the time Navy sensors did not have as much range as the missile itself, which would be more reliable with the new seeker’s passive detection and active millimeter-wave radar.[17][18] Raytheon estimates adding the new seeker would cost $250,000 per missile.[19] Other upgrades include sea-skim mode[20] – low-altitude flight over water at high subsonic speeds. The first Block IV TLAMs modified with a maritime attack capability will enter service in 2018-2019.[21]

A supersonic version of the Tomahawk is under consideration for development with a ramjet to increase its speed to Mach 3. A limiting factor to this is the dimensions of shipboard launch tubes. Instead of modifying every ship able to carry cruise missiles, the ramjet-powered Tomahawk would still have to fit within a 21-inch diameter and 20-foot long tube.[16]

In October 2015, Raytheon announced the Tomahawk had demonstrated new capabilities in a test launch, using its onboard camera to take a reconnaissance photo and transmit it to fleet headquarters. It then entered a loitering pattern until given new targeting coordinates to strike.[22]

By January 2016, Los Alamos National Laboratory was working on a project to turn unburned fuel left over when a Tomahawk reaches its target into an additional explosive force. To do this, the missile’s JP-10 fuel is turned into a fuel air explosive to combine with oxygen in the air and burn rapidly. The thermobaric explosion of the burning fuel acts, in effect, as an additional warhead and can even be more powerful than the main warhead itself when there is sufficient fuel left in the case of a short range target.[11][23]

TACTOM(Tactical Tomahawk) is Tomahawk’s modernization program that will incorporate an all-weather-seeker[24] that will complement Tomahawk’s Synthetic Guidance Mode; which uses a high-throughput radio signal to update the missile in flight, giving it new target information as a maritime or land target moves.

Launch systems

Each missile is stored and launched from a pressurized canister[25] that protects it during transportation and storage, and also serves as a launch tube. These canisters were racked in armored box launchers (ABL), which were installed on the re-activated Iowa-class battleships USS Iowa, USS New Jersey, USS Missouri, and USS Wisconsin. The ABLs were also installed on eight Spruance-class destroyers, the four Virginia-class cruisers, and the USS Long Beach. These canisters are also in vertical launching systems (VLS) in other surface ships, capsule launch systems (CLS) in the later Los Angeles-class submarines, and in submarines’ torpedo tubes. All ABL equipped ships have been decommissioned.

For submarine-launched missiles (called UGM-109s), after being ejected by gas pressure (vertically via the VLS) or by water impulse (horizontally via the torpedo tube), the missile exits the water and a solid-fuel booster is ignited for the first few seconds of airborne flight until transition to cruise.

After achieving flight, the missile’s wings are unfolded for lift, the airscoop is exposed and the turbofan engine is employed for cruise flight. Over water, the Tomahawk uses inertial guidance or GPS to follow a preset course; once over land, the missile’s guidance system is aided by terrain contour matching (TERCOM). Terminal guidance is provided by the Digital Scene Matching Area Correlation (DSMAC) system or GPS, producing a claimed circular error probable of about 10 meters.

The Tomahawk Weapon System consists of the missile, Theater Mission Planning Center (TMPC)/Afloat Planning System, and either the Tomahawk Weapon Control System (on surface ships) or Combat Control System (for submarines).

Several versions of control systems have been used, including:

  • v2 TWCS – Tomahawk Weapon Control System (1983), also known as “green screens,” was based on an old tank computing system.
  • v3 ATWCS – Advanced Tomahawk Weapon Control System (1994), first Commercial Off the Shelf, uses HP-UX.
  • v4 TTWCS – Tactical Tomahawk Weapon Control System, (2003).
  • v5 TTWCS – Next Generation Tactical Tomahawk Weapon Control System. (2006)

Navigation and other details

The TLAM-D contains 166 sub-munitions in 24 canisters: 22 canisters of seven each, and two canisters of six each to conform to the dimensions of the airframe. The sub-munitions are the same type of Combined Effects Munition bomblet used in large quantities by the U.S. Air Force with the CBU-87 Combined Effects Munition. The sub-munitions canisters are dispensed two at a time, one per side. The missile can perform up to five separate target segments which enables it to attack multiple targets. However, in order to achieve a sufficient density of coverage typically all 24 canisters are dispensed sequentially from back to front.

TERCOM – Terrain Contour Matching. A digital representation of an area of terrain is mapped based on digital terrain elevation data or stereo imagery. This map is then inserted into a TLAM mission which is then loaded onto the missile. When the missile is in flight it compares the stored map data with radar altimeter data collected as the missile overflies the map. Based on comparison results the missile’s inertial navigation system is updated and the missile corrects its course. TERCOM was based on, and was a significant improvement on, “Fingerprint,” a technology developed in 1964 for the SLAM.[26]

On July 26, 2014 it was announced that 196 additional Block IV missiles had been purchased.[27]

DSMAC – Digital Scene Matching Area Correlation. A digitized image of an area is mapped and then inserted into a TLAM mission. During the flight the missile will verify that the images that it has stored correlates with the image it sees below itself. Based on comparison results the missile’s inertial navigation system is updated and the missile corrects its course.

  • Total program cost: $US 11,210,000,000[28]

Operational history

Remnants of a shot down Tomahawk from Operation Allied Force, showing the turbofan engine at the Museum of Aviation in Belgrade, Serbia

United States Navy

In the 1991 Gulf War, 288 Tomahawks were launched, 12 from submarines and 276 from surface ships.[29] The first salvo was fired by the Destroyer USS Paul F. Foster[30] on January 17, 1991. The attack submarines USS Pittsburgh and USS Louisville followed.

On 17 January 1993, 46 Tomahawks were fired at the Zafraniyah Nuclear Fabrication Facility outside Baghdad, in response to Iraq’s refusal to cooperate with UN disarmament inspectors. One missile crashed into the side of the Al Rasheed Hotel, killing two civilians.[31]

On 26 June 1993, 23 Tomahawks were fired at the Iraqi Intelligence Service’s command and control center.[32]

On 10 September 1995, the USS Normandy launched 13 Tomahawk missiles from the central Adriatic Sea against a key air defense radio relay tower in Bosnian Serb territory during Operation Deliberate Force.[33]

On 3 September 1996, 44 cruise missiles between UGM-109 and B-52 launched AGM-86s, were fired at air defence targets in Southern Iraq.[34][35]

On 20 August 1998, 79 Tomahawk missiles were fired simultaneously at two separate targets in Afghanistan and Sudan in retaliation for the bombings of American embassies by Al-Qaeda.[2]

On 16 December 1998, 415 Tomahawk missiles were fired at key Iraqi targets during Operation Desert Fox.[36]

In early 1999, 218 Tomahawk missiles were fired by US ships and a British submarine during Operation Allied Force against key targets in Serbia and Montenegro.[3]

In October 2001, approximately 50 Tomahawk missiles struck targets in Afghanistan in the opening hours of Operation Enduring Freedom.[4][37]

During the 2003 invasion of Iraq, more than 802 Tomahawk missiles were fired at key Iraqi targets.[38]

On 3 March 2008, two Tomahawk missiles were fired at a target in Somalia by a US vessel during the Dobley airstrike, reportedly in an attempt to kill Saleh Ali Saleh Nabhan, an al Qaeda militant.[39][40]

On 17 December 2009, two Tomahawk missiles were fired at targets in Yemen.[41] One of the targets was hit by a TLAM-D missile. The target was described as an ‘alleged Al-Qaeda training camp’ in al-Ma’jalah in al-Mahfad a region of the Abyan governorate of Yemen. Amnesty International reported that 55 people were killed in the attack, including 41 civilians (21 children, 14 women, and six men). The US and Yemen governments refused to confirm or deny involvement, but diplomatic cables released as part of United States diplomatic cables leak later confirmed the missile was fired by a US Navy ship.[42]

On 19 March 2011, 124 Tomahawk missiles[43] were fired by U.S. and British forces (112 US, 12 British)[44] against at least 20 Libyan targets around Tripoli and Misrata.[45] As of 22 March 2011, 159 UGM-109 were fired by US and UK ships against Libyan targets.[46]

On 23 September 2014, 47 Tomahawk missiles were fired by the United States from the USS Arleigh Burke and USS Philippine Sea, which were operating from international waters in the Red Sea and Persian Gulf, against ISIL targets in Syria in the vicinity of Raqqa, Deir ez-Zor, Al-Hasakah and Abu Kamal,[47] and against Khorasan group targets in Syria west of Aleppo.[48]

On 13 October 2016 five Tomahawk cruise missiles were launched by USS Nitze at three radar sites in Yemen held by Houthi rebels in response to anti-ship missiles fired at US Navy ships the day before.[49]

On 6 April 2017, 59 Tomahawk missiles were launched from the USS Ross (DDG-71) and USS Porter (DDG-78), targeting Shayrat, a military airfield near Homs, in Syria. The strike was in retaliation for the alleged use of chemical weapons by Syrian President Bashir Al-Assad. Initial reports indicate that the Syrian airbase was ‘almost completely destroyed’ after the US strike.[50]

As of 2015, the United States Navy has a stockpile of around 3,500 Tomahawk cruise missiles of all variants, with a combined worth of approximately US $2.6 billion.[51]

Royal Navy

In 1995 the US agreed to sell 65 Tomahawks to the UK for torpedo-launch from her nuclear attack submarines. The first missiles were acquired and test-fired in November 1998; all Royal Navy fleet submarines are now Tomahawk capable, including the new Astute-class.[52][53][54][55] The Kosovo War in 1999 saw the Swiftsure-class HMS Splendid become the first British submarine to fire the Tomahawk in combat. It has been reported that seventeen of the twenty Tomahawks fired by the British during that conflict hit their targets accurately;[citation needed] the UK subsequently bought 20 more Block III to replenish stocks.[56] The Royal Navy has since fired Tomahawks during the 2000s Afghanistan War, in Operation Telic as the British contribution to the 2003 Iraq War, and during Operation Ellamy in Libya in 2011.

In April 2004, the UK and US governments reached an agreement for the British to buy 64 of the new generation of Tomahawk missile—the Block IV or TacTom missile.[57] It entered service with the Royal Navy on 27 March 2008, three months ahead of schedule.[58] In July 2014 the US approved the sale to the UK of a further 65 submarine-launched Block IV’s at a cost of US$140m including spares and support;[59] as of 2011 the Block III missiles were on Britain’s books at £1.1m and the Block IV at £0.87m including VAT.[60]

The Sylver Vertical Launching System on the new Type 45 destroyer is claimed by its manufacturers to have the capability to fire the Tomahawk, although the A50 launcher carried by the Type 45 is too short for the weapon (the longer A70 silo would be required). Nevertheless, the Type 45 has been designed with weight and space margin for a strike-length Mk41 or Sylver A70 silo to be retrofitted, allowing Type 45 to use the TLAM Block IV if required. The new Type 26 frigates will have strike-length VLS tubes. SYLVER user France is developing MdCN, a version of the Storm Shadow/Scalp cruise missile that has a shorter range but a higher speed than Tomahawk and can be launched from the SYLVER system.

United States Air Force

The Air Force is a former operator of the nuclear-armed version of the Tomahawk, the BGM-109G Gryphon.

Other users

The Netherlands (2005) and Spain (2002 and 2005) were interested in acquiring the Tomahawk system, but the orders were later cancelled in 2007 and 2009 respectively.[61][62]

In 2009 the Congressional Commission on the Strategic Posture of the United States stated that Japan would be concerned if the TLAM-N were retired, but the government of Japan has denied that it had expressed any such view.[63]

It is believed that the SLCM version of the Popeye was developed by Israel after the US Clinton administration refused an Israeli request in 2000 to purchase Tomahawk SLCM’s because of international Missile Technology Control Regime proliferation rules.[64]

As of March 12, 2015 Poland has expressed interest in purchasing long-range Tomahawk missiles for its future submarines.[65]

Operators

Map with Tomahawk operators in blue

Current operators

See also

https://en.wikipedia.org/wiki/Tomahawk_(missile)

Story 2: What is Next?  United States Led Coalition of Egypt, Jordan, Kurds, Saudi Arabia, and Turkey to Destroy Islamic State, Jabhat Al Nustra Front ( al-Qaeda’s Syrian affiliate), Radical Islamic Terrorist Jihadists in Syria, Hezbollah, and Bashar al-Assad Syrian Regime –Videos — Military strike comes after Trump previously railed against Syria intervention

What comes next after Syria missile attack

Story 3: Supreme Court Justice Neil Gorsuch Confirmed 54 Yes — 45 Nos

Senate confirms Neil Gorsuch for Supreme Court (C-SPAN)

The Senate Goes “Nuclear”

Mike Pence Reads Final Vote Confirming Neil Gorsuch To Supreme Court | NBC News

Senate Democrats trigger “nuclear option” to curb filibusters

Harry Reid goes Nuclear Pushes Major Senate Filibuster Rules Change

 

Reid, Democrats trigger ‘nuclear’ option; eliminate most filibusters on nominees

The Senate goes nuclear

Embed Share

Play Video1:11
It’s more than just a rule change: The so-called “nuclear option” will fundamentally alter the way the Senate operates – for good.(Casey Capachi/(In Play))
November 21, 2013

Senate Democrats took the dramatic step Thursday of eliminating filibusters for most nominations by presidents, a power play they said was necessary to fix a broken system but one that Republicans said will only rupture it further.

Democrats used a rare parliamentary move to change the rules so that federal judicial nominees and executive-office appointments can advance to confirmation votes by a simple majority of senators, rather than the 60-vote supermajority that has been the standard for nearly four decades.

The immediate rationale for the move was to allow the confirmation of three picks by President Obama to the U.S. Court of Appeals for the District of Columbia Circuit — the most recent examples of what Democrats have long considered unreasonably partisan obstruction by Republicans.

In the long term, the rule change represents a substantial power shift in a chamber that for more than two centuries has prided itself on affording more rights to the minority party than any other legislative body in the world. Now, a president whose party holds the majority in the Senate is virtually assured of having his nominees approved, with far less opportunity for political obstruction.

The main combatants Thursday were the chamber’s two chiefs, Majority Leader Harry M. Reid (D-Nev.) and Minority Leader Mitch McConnell (R-Ky.), who have clashed for several years over Republican filibusters of Obama’s agenda and nominees.

Reid said the chamber “must evolve” beyond parliamentary roadblocks. “The American people believe the Senate is broken, and I believe the American people are right,” he said, adding: “It’s time to get the Senate working again.”

McConnell linked the rule change to the methods used to approve Obama’s health-care law solely with Democratic votes. The normally reserved GOP leader paced at his desk during his speech, often turning his back to Democrats to address only his fellow Republicans.

“It’s a sad day in the history of the Senate,” McConnell told reporters, calling the move a Democratic “power grab.”

The clash ended with a vote nearly as partisan as the times — 52 to 48, with all but three Democrats backing the move and every Republican opposing it.

The vote was the culmination of more than 25 years of feuding over nominations, beginning with President Ronald Reagan’s choices for the Supreme Court and including Obama’s picks for obscure federal regulatory agencies. Each side in Thursday’s debate cited its own statistics to state its case.

Democrats said the attempted filibusters of Chuck Hagel during his confirmation hearing to become defense secretary, a first for any nominee to lead the Pentagon — as well as a blockade of picks to head the National Labor Relations Board and the Consumer Financial Protection Bureau — exceeded anything Democrats did when they were in the minority. In addition, Democrats charged that Republicans didn’t even have substantive objections to the D.C. Circuit nominees they filibustered.

After the vote, Obama told reporters at the White House that Republicans had turned nomination fights into a “reckless and relentless tool” to grind the gears of government to a halt and noted that “neither party has been blameless for these tactics.” However, he said, “today’s pattern of obstruction . . . just isn’t normal; it’s not what our founders envisioned.”

Republicans countered that they had confirmed 99 percent of Obama’s judicial selections. McConnell accused Democrats of eyeing the D.C. Circuit in an effort to stack the court, which reviews many cases related to federal laws and regulations, to tilt its balance in a liberal direction.

What made the day so historic for senators, former senators and the small collection of parliamentary experts in Washington was the simple majority vote used to execute the changes — a tactic so extreme it is known as the “nuclear option.”

Previous majorities had threatened to upend filibuster rules in this manner, but relying on a simple majority vote had been used only for relatively minor procedural changes to how amendments were handled, never to eliminate the super­majority requirement altogether. Before Thursday, the standard precedent was that major rule changes needed a two-thirds majority. The change was so significant that Reid and his leadership team held a victory party with liberal activists afterward in a room just off the Senate floor.

Republicans said the way Democrats upended the rules will result in fallout for years. “It’s another raw exercise of political power to permit the majority to do anything it wants whenever it wants to do it,” Sen. Lamar Alexander (Tenn.), the GOP’s parliamentary expert, told reporters.

Republicans vowed to reciprocate if they reclaim the majority.

“Democrats won’t be in power in perpetuity,” said Sen. Richard C. Shelby (Ala.), a 27-year member. “This is a mistake — a big one for the long run. Maybe not for the short run. Short-term gains, but I think it changes the Senate tremendously in a bad way.”

After the vote, Reid told reporters that his views on the issue had evolved — from eight years ago, when Republicans held the majority and he led the fight to protect the filibuster. He acknowledged that he wouldn’t mind seeing the supermajority requirement abolished for everything but that there were not enough votes in his caucus to support such a move.

Reid first faced pressure on this issue from junior Democrats four years ago, particularly Sen. Jeff Merkley, a former speaker of the Oregon state House, who became the point person for growing the anti-filibuster movement. But Reid repeatedly rejected their effort as too radical.

Even if Republicans want to do away with the filibuster someday, Reid said, Thursday’s move was worth it because the current climate had become too hostile to get anything significant done. Reid said he faced a choice: “Continue like we are or have democracy?”

The rule change does not apply to Supreme Court nominations or to legislation.

Individual senators will still be able to seize the floor for marathon speeches opposing nominees, as Sen. Rand Paul (R-Ky.) did in a nearly 13-hour session in March against the nomination of John Brennan as CIA director. But once such speeches end, the majority will be able to confirm nominees without needing bipartisan support.

With the Senate majority very much up for grabs in midterm elections next year, Democrats placed a big bet on maintaining control of the chamber. GOP leaders have suggested that, if given the Senate majority back, they might further strip filibuster rules so they could dismantle Obama’s landmark domestic achievement, the Affordable Care Act, on a simple majority vote.

In his remarks, McConnell finally turned to Democrats and said that a majority of them had never served in the minority and then lectured the longtime members who knew what it was like to be on the other side.

“The solution to this problem is at the ballot box,” he said. “We look forward to having a great election in 2014.”

https://www.washingtonpost.com/politics/senate-poised-to-limit-filibusters-in-party-line-vote-that-would-alter-centuries-of-precedent/2013/11/21/d065cfe8-52b6-11e3-9fe0-fd2ca728e67c_story.html?utm_term=.5bf7f548abcf

The Pronk Pops Show Podcasts Portfolio

Listen To Pronk Pops Podcast or Download Shows 864-869

Listen To Pronk Pops Podcast or Download Shows 857-863

Listen To Pronk Pops Podcast or Download Shows 850-856

Listen To Pronk Pops Podcast or Download Shows 845-849

Listen To Pronk Pops Podcast or Download Shows 840-844

Listen To Pronk Pops Podcast or Download Shows 833-839

Listen To Pronk Pops Podcast or Download Shows 827-832

Listen To Pronk Pops Podcast or Download Shows 821-826

Listen To Pronk Pops Podcast or Download Shows 815-820

Listen To Pronk Pops Podcast or Download Shows 806-814

Listen To Pronk Pops Podcast or Download Shows 800-805

Listen To Pronk Pops Podcast or Download Shows 793-799

Listen To Pronk Pops Podcast or Download Shows 785-792

Listen To Pronk Pops Podcast or Download Shows 777-784

Listen To Pronk Pops Podcast or Download Shows 769-776

Listen To Pronk Pops Podcast or Download Shows 759-768

Listen To Pronk Pops Podcast or Download Shows 751-758

Listen To Pronk Pops Podcast or Download Shows 745-750

Listen To Pronk Pops Podcast or Download Shows 738-744

Listen To Pronk Pops Podcast or Download Shows 732-737

Listen To Pronk Pops Podcast or Download Shows 727-731

Listen To Pronk Pops Podcast or Download Shows 720-726

Listen To Pronk Pops Podcast or DownloadShows 713-719

Listen To Pronk Pops Podcast or DownloadShows 705-712

Listen To Pronk Pops Podcast or Download Shows 695-704

Listen To Pronk Pops Podcast or Download Shows 685-694

Listen To Pronk Pops Podcast or Download Shows 675-684

Listen To Pronk Pops Podcast or Download Shows 668-674

Listen To Pronk Pops Podcast or Download Shows 660-667

Listen To Pronk Pops Podcast or Download Shows 651-659

Listen To Pronk Pops Podcast or Download Shows 644-650

Listen To Pronk Pops Podcast or Download Shows 637-643

Listen To Pronk Pops Podcast or Download Shows 629-636

Listen To Pronk Pops Podcast or Download Shows 617-628

Listen To Pronk Pops Podcast or Download Shows 608-616

Listen To Pronk Pops Podcast or Download Shows 599-607

Listen To Pronk Pops Podcast or Download Shows 590-598

Listen To Pronk Pops Podcast or Download Shows 585- 589

Listen To Pronk Pops Podcast or Download Shows 575-584

Listen To Pronk Pops Podcast or Download Shows 565-574

Listen To Pronk Pops Podcast or Download Shows 556-564

Listen To Pronk Pops Podcast or Download Shows 546-555

Listen To Pronk Pops Podcast or Download Shows 538-545

Listen To Pronk Pops Podcast or Download Shows 532-537

Listen To Pronk Pops Podcast or Download Shows 526-531

Listen To Pronk Pops Podcast or Download Shows 519-525

Listen To Pronk Pops Podcast or Download Shows 510-518

Listen To Pronk Pops Podcast or Download Shows 500-509

Listen To Pronk Pops Podcast or Download Shows 490-499

Listen To Pronk Pops Podcast or Download Shows 480-489

Listen To Pronk Pops Podcast or Download Shows 473-479

Listen To Pronk Pops Podcast or Download Shows 464-472

Listen To Pronk Pops Podcast or Download Shows 455-463

Listen To Pronk Pops Podcast or Download Shows 447-454

Listen To Pronk Pops Podcast or Download Shows 439-446

Listen To Pronk Pops Podcast or Download Shows 431-438

Listen To Pronk Pops Podcast or Download Shows 422-430

Listen To Pronk Pops Podcast or Download Shows 414-421

Listen To Pronk Pops Podcast or Download Shows 408-413

Listen To Pronk Pops Podcast or Download Shows 400-407

Listen To Pronk Pops Podcast or Download Shows 391-399

Listen To Pronk Pops Podcast or Download Shows 383-390

Listen To Pronk Pops Podcast or Download Shows 376-382

Listen To Pronk Pops Podcast or Download Shows 369-375

Listen To Pronk Pops Podcast or Download Shows 360-368

Listen To Pronk Pops Podcast or Download Shows 354-359

Listen To Pronk Pops Podcast or Download Shows 346-353

Listen To Pronk Pops Podcast or Download Shows 338-345

Listen To Pronk Pops Podcast or Download Shows 328-337

Listen To Pronk Pops Podcast or Download Shows 319-327

Listen To Pronk Pops Podcast or Download Shows 307-318

Listen To Pronk Pops Podcast or Download Shows 296-306

Listen To Pronk Pops Podcast or Download Shows 287-295

Listen To Pronk Pops Podcast or Download Shows 277-286

Listen To Pronk Pops Podcast or Download Shows 264-276

Listen To Pronk Pops Podcast or Download Shows 250-263

Listen To Pronk Pops Podcast or Download Shows 236-249

Listen To Pronk Pops Podcast or Download Shows 222-235

Listen To Pronk Pops Podcast or Download Shows 211-221

Listen To Pronk Pops Podcast or Download Shows 202-210

Listen To Pronk Pops Podcast or Download Shows 194-201

Listen To Pronk Pops Podcast or Download Shows 184-193

Listen To Pronk Pops Podcast or Download Shows 174-183

Listen To Pronk Pops Podcast or Download Shows 165-173

Listen To Pronk Pops Podcast or Download Shows 158-164

Listen To Pronk Pops Podcast or Download Shows151-157

Listen To Pronk Pops Podcast or Download Shows 143-150

Listen To Pronk Pops Podcast or Download Shows 135-142

Listen To Pronk Pops Podcast or Download Shows 131-134

Listen To Pronk Pops Podcast or Download Shows 124-130

Listen To Pronk Pops Podcast or Download Shows 121-123

Listen To Pronk Pops Podcast or Download Shows 118-120

Listen To Pronk Pops Podcast or Download Shows 113 -117

Listen To Pronk Pops Podcast or Download Show 112

Listen To Pronk Pops Podcast or Download Shows 108-111

Listen To Pronk Pops Podcast or Download Shows 106-108

Listen To Pronk Pops Podcast or Download Shows 104-105

Listen To Pronk Pops Podcast or Download Shows 101-103

Listen To Pronk Pops Podcast or Download Shows 98-100

Listen To Pronk Pops Podcast or Download Shows 94-97

Listen To Pronk Pops Podcast or Download Show 93

Listen To Pronk Pops Podcast or Download Show 92

Listen To Pronk Pops Podcast or Download Show 91

Listen To Pronk Pops Podcast or Download Shows 88-90

Listen To Pronk Pops Podcast or Download Shows 84-87

Listen To Pronk Pops Podcast or Download Shows 79-83

Listen To Pronk Pops Podcast or Download Shows 74-78

Listen To Pronk Pops Podcast or Download Shows 71-73

Listen To Pronk Pops Podcast or Download Shows 68-70

Listen To Pronk Pops Podcast or Download Shows 65-67

Listen To Pronk Pops Podcast or Download Shows 62-64

Listen To Pronk Pops Podcast or Download Shows 58-61

Listen To Pronk Pops Podcast or Download Shows 55-57

Listen To Pronk Pops Podcast or Download Shows 52-54

Listen To Pronk Pops Podcast or Download Shows 49-51

Listen To Pronk Pops Podcast or Download Shows 45-48

Listen To Pronk Pops Podcast or Download Shows 41-44

Listen To Pronk Pops Podcast or Download Shows 38-40

Listen To Pronk Pops Podcast or Download Shows 34-37

Listen To Pronk Pops Podcast or Download Shows 30-33

Listen To Pronk Pops Podcast or Download Shows 27-29

Listen To Pronk Pops Podcast or Download Shows 17-26

Listen To Pronk Pops Podcast or Download Shows 16-22

Listen To Pronk Pops Podcast or Download Shows 10-15

Listen To Pronk Pops Podcast or Download Shows 1-9

Read Full Post | Make a Comment ( None so far )

The Pronk Pops Show 854, March 8, 2017, Story 1: FBI Search For Vault 7 Leaker Who Gave Wikileaks The CIA Collection of Hacking and Malware Software Tools — Sources and Methods — Treason By The Lying Lunatic Left — Videos — Story 2: -Soros’ and Obama’s Seditious and Subversive War On Trump With Organizing For Action Applying Saul Alinsky’s Rules for Radicals — Videos

Posted on March 9, 2017. Filed under: American History, Blogroll, Breaking News, Congress, Corruption, Countries, Crime, Culture, Donald J. Trump, Donald J. Trump, Donald Trump, Donald Trump, Education, Empires, Employment, Foreign Policy, Fourth Amendment, Freedom of Speech, Government, Health, High Crimes, History, House of Representatives, News, Obama, Philosophy, Photos, Politics, Polls, President Trump, Progressives, Raymond Thomas Pronk, Rule of Law, Scandals, Second Amendment, Senate, Taxation, Taxes, Terror, Terrorism, Unemployment, United States Constitution, United States of America, United States Supreme Court, Videos, Violence, War, Wealth, Weather, Wisdom | Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , |

Project_1

The Pronk Pops Show Podcasts

Pronk Pops Show 854: March 9, 2017

Pronk Pops Show 853: March 8, 2017

Pronk Pops Show 852: March 6, 2017

Pronk Pops Show 851: March 3, 2017

Pronk Pops Show 850: March 2, 2017

Pronk Pops Show 849: March 1, 2017

Pronk Pops Show 848: February 28, 2017

Pronk Pops Show 847: February 27, 2017

Pronk Pops Show 846: February 24, 2017

Pronk Pops Show 845: February 23, 2017

Pronk Pops Show 844: February 22, 2017

Pronk Pops Show 843: February 21, 2017

Pronk Pops Show 842: February 20, 2017

Pronk Pops Show 841: February 17, 2017

Pronk Pops Show 840: February 16, 2017

Pronk Pops Show 839: February 15, 2017

Pronk Pops Show 838: February 14, 2017

Pronk Pops Show 837: February 13, 2017

Pronk Pops Show 836: February 10, 2017

Pronk Pops Show 835: February 9, 2017

Pronk Pops Show 834: February 8, 2017

Pronk Pops Show 833: February 7, 2017

Pronk Pops Show 832: February 6, 2017

Pronk Pops Show 831: February 3, 2017

Pronk Pops Show 830: February 2, 2017

Pronk Pops Show 829: February 1, 2017

Pronk Pops Show 828: January 31, 2017

Pronk Pops Show 827: January 30, 2017

Pronk Pops Show 826: January 27, 2017

Pronk Pops Show 825: January 26, 2017

Pronk Pops Show 824: January 25, 2017

Pronk Pops Show 823: January 24, 2017

Pronk Pops Show 822: January 23, 2017

Pronk Pops Show 821: January 20, 2017

Pronk Pops Show 820: January 19, 2017

Pronk Pops Show 819: January 18, 2017

Pronk Pops Show 818: January 17, 2017

Pronk Pops Show 817: January 13, 2017

Pronk Pops Show 816: January 12, 2017

Pronk Pops Show 815: January 11, 2017

Pronk Pops Show 814: January 10, 2017

Pronk Pops Show 813: January 9, 2017

Pronk Pops Show 812: December 12, 2016

Pronk Pops Show 811: December 9, 2016

Pronk Pops Show 810: December 8, 2016

Pronk Pops Show 809: December 7, 2016

Pronk Pops Show 808: December 6, 2016

Pronk Pops Show 807: December 5, 2016

Pronk Pops Show 806: December 2, 2016

Pronk Pops Show 805: December 1, 2016

 Story 1: FBI Search For Vault 7 Leaker Who Gave Wikileaks The CIA Collection of Hacking and Malware Software Tools — Treason By The Lying Lunatic Left — Videos —

 

Image result for cia wikileaks hacker tools

Image result for cia wikileaks hacker tools

Image result for cartoons cia hacker tools

Image result for cartoons cia hacker tools

Image result for intelligence communityImage result for cia wikileaks hacker tools

TREASON OR BETRAYAL? FBI SET TO LAUNCH CRIMINAL INVESTIGATION INTO WIKILEAKS OVER CIA HACK

Hannity : Former intelligence officials on surveillance tactics and document leaks : 3/8/2017

Treason is in the air

Investigating national security leaks

UK: Assange holds presser on CIA hacking leaks

WATCH: WikiLeaks Julian Assange Press Conference On CIA Hacking (3/9/2017)

Julian Assange Press Conference On The CIA Vault 7 Release | March 9th, 2017

Julian Assange Wikileaks Press Conference, Q&A on CIA Vault 7, Year Zero [03/09/2017]

WikiLeaks publishes apparent CIA hacking tools

WikiLeaks Dump Shows CIA Using Cell Phones And Smart TVs To Listen And WATCH “Everyday Americans”

Can the CIA control your phone? WikiLeaks claims explained

What Pisses Me Off About Wikileaks Vault 7 Release

WikiLeaks Vault 7: What You Should Know and Fear, CIA vs. NSA Turf Battles, How Trump Was Right

VAULT 7: CIA Staged Fake Russian Hacking to Set Up Trump — Russian Cyber-Attack M.O. As False Flag

Lionel “Wikileaks Vault 7 Shows That Trump Is Not Crazy. The CIA Spy On Everybody.”

Wikileaks Claims CIA Is Hacking Americans’ Electronics – Tucker Carlson Tonight – Fox News – 3/7/17

Silent Coup: Obama, FISA, NSA, Deep State vs. President Donald Trump

TUCKER CARLSON reacts to latest CIA scandal and the big story ‘OBAMA CARE LITE’

Former CIA Director: Wikileaks Dump Could Be ‘Very Damaging’ | Andrea Mitchell | MSNBC

CIA lost control of its hacking tools – Wikileaks Vault7 report finding

Fall Out of Wikileak’s Vault 7 Year Zero Release Has Begun. Investigations Initiated.

WikiLeaks Fallout: CIA Revelations Rock The Political Establishment

Bombshell: WikiLeaks Releases Trove Of CIA Documents

Whistleblower: NSA Collecting Data On Every U.S. Citizen

NSA Whistleblower William Binney: The Future of FREEDOM

NSA Surveillance and What To Do About It

Our Almost Orwellian State & NSA Surveillance Forum

How the Government Tracks You: NSA Surveillance

US Surveillance: An Analysis of EO 12333 and Its Global Implications

E.O: 12333 VS Kyle from Secular Talk, debunked again.

Executive Order 12333 (The President’s Inherent Article II Power to Conduct Foreign Intelligence)

Executive Order 12333 (Greatest Hits)

The Silent Order NSA Sees Everything Hears Everything Documentary HD

Judge Rules NSA Surveillance “Almost Orwellian” — Obama Prepares to Leave Spying Program Intact

Glenn Greenwald: The NSA Can “Literally Watch Every Keystroke You Make”

NSA has collected bulk data on Americans since Reagan

NSA surveillance program “almost Orwellian,” federal judge rules

Judgement NSA Violates Unconstitutional Patriot Act

ALGORITHM: The Hacker Movie

FBI prepares for new hunt for WikiLeaks’ source

March 7 at 6:55 PM
The FBI has begun preparing for a major mole hunt to determine how anti-secrecy group WikiLeaks got an alleged arsenal of hacking tools the CIA has used to spy on espionage targets, according to people familiar with the matter.

The leak rattled government and technology industry officials, who spent Tuesday scrambling to determine the accuracy and scope of the thousands of documents released by the group. They were also trying to assess the damage the revelations may cause, and what damage may come from future releases promised by WikiLeaks, these people said.

It was all a familiar scenario for a government that has repeatedly seen sensitive information compromised in recent years.

But cracks keep appearing in the system. Last year, the FBI arrested Harold T. Martin III, an NSA contractor who took home documents detailing some of the agency’s most sensitive offensive cyberweapons. Some of those files later appeared online, although investigators are still trying to determine Martin’s role, if any, in that part of the case.

WikiLeaks says it has a trove on the CIA’s hacking secrets. Washington Post national security reporter Greg Miller explains what these documents reveal. (Dalton Bennett, Greg Miller/The Washington Post)

He has pleaded not guilty to charges that he violated the Espionage Act. Officials call the Martin case the largest theft of classified information in U.S. history.

Now, less than a year after the Martin case, U.S. intelligence agencies are rushing to determine whether they again have suffered an embarrassing compromise at the hands of one of their own.

“Anybody who thinks that the Manning and Snowden problems were one-offs is just dead wrong,’’ said Joel Brenner, former head of U.S. counterintelligence at the office of the Director of National Intelligence. “Ben Franklin said three people can keep a secret if two of them are dead. If secrets are shared on systems in which thousands of people have access to them, that may really not be a secret anymore. This problem is not going away, and it’s a condition of our existence.’’

In Silicon Valley, industry figures said they received no heads-up from the government or the hacking community that such a move by WikiLeaks was in the works. By midday Tuesday, industry officials said they still had not heard from the FBI.

It wasn’t immediately clear if the CIA had sent a crimes report to the Justice Department — a formal mechanism alerting law enforcement of a potentially damaging and illegal national security leak. Such a report would offer the FBI a road map for where to begin investigating, and whom to question.

The FBI and CIA both declined to comment.

Once investigators verify the accuracy of the WikiLeaks documents, a key question to answer is who had access to the information, according to veterans of past leak probes. The FBI has spent years investigating WikiLeaks, and authorities are eager to figure out whether it has recruited a new, well-placed source from the U.S. government.

Anti-secrecy group Wikileaks on Tuesday said it had obtained a top-secret trove of hacking tools used by the CIA to break into phones, communication apps and other electronic devices, and published confidential documents on those programs. (Reuters)

In releasing thousands of pages of documents, WikiLeaks indicated that its source was a former government employee or contractor.

“This extraordinary collection, which amounts to more than several hundred million lines of code, gives its possessor the entire hacking capacity of the CIA,’’ WikiLeaks said in announcing the first release of documents. “The archive appears to have been circulated among former U.S. government hackers and contractors in an unauthorized manner, one of whom has provided WikiLeaks with portions of the archive.’’

One former intelligence official said if that claim is accurate, “there’s going to be another major mole hunt . . . If this is all correct, it’s a big deal.’’

A key distinction for investigators will be whether WikiLeaks reveals the actual computer code — or enough details about such code — that others can develop and deploy some of the hacking tools, according to current and former officials.

The security failures highlighted by damaging leaks from Snowden and Manning have proven difficult to address.

Manning was arrested in Iraq in May 2010 after transmitting documents to WikiLeaks that came to be known as the Iraq and Afghanistan “War Logs.’’ She also leaked a video showing a U.S. Apache helicopter in Baghdad opening fire on a group of people that the crew thought were insurgents. Among the dead were two journalists who worked for Reuters. She also leaked documents pertaining to Guantanamo Bay prisoners, as well as 250,000 State Department cables.

In response to the Manning case, the Obama administration created the National Insider Threat Task Force, designed to teach and train government workers and contractors to spot potential leakers.

Manning, formerly known as Bradley Manning, came out as transgender after her 2013 conviction. In the waning days of his presidency, Barack Obama commuted her 35-year prison sentence, and she is due to be released in coming months.

The post-Manning efforts did not stop Snowden from taking reams of data about sensitive bulk intelligence collection in 2013 and giving the material to reporters. Those revelations, including a court document showing how the government gathered Americans’ phone records, sparked years of political debate about privacy and government surveillance in the digital age.

Snowden has remained out of reach of the U.S. government, living in Russia.

Brenner, the former counterintelligence official, said the net effect of the new leaks could be “very dangerous to us, because they “accelerate the leveling of the playing field between the United States and its adversaries in cyberspace.’’

The bigger lesson of the newest leak, Brenner argued, is that U.S. pursuit of dominance in cyberspace may actually be destabilizing over the long run. “That is a very unsettling debate for our military and our intelligence services, but I think it’s coming,’’ he said.

Snowden also weighed in regarding the alleged CIA documents, tweeting: “What @Wikileaks has here is genuinely a big deal. Looks authentic.’’

https://www.washingtonpost.com/world/national-security/fbi-prepares-for-new-hunt-for-wikileaks-source/2017/03/07/28dcb9e0-0356-11e7-ad5b-d22680e18d10_story.html?utm_term=.0d9871aa3c4c

U.S. aware of CIA security breach in 2016; contractors suspected in leak

By John Walcott and Andrea Shalal | WASHINGTON/BERLIN

U.S. intelligence and law enforcement officials said on Wednesday they have been aware since the end of last year of a security breach at the CIA and were focusing on contractors as the likeliest source of documents being passed on to anti-secrecy group WikiLeaks detailing the agency’s hacking tools.

The officials, who spoke on condition of anonymity, told Reuters that they believed documents published by WikiLeaks on Tuesday about CIA techniques used between 2013 and 2016 were authentic.

The documents showed that CIA hackers could get into Apple Inc (AAPL.O) iPhones, Google Inc (GOOGL.O) Android devices and other gadgets in order to capture text and voice messages before they were encrypted with sophisticated software.

The White House said on Wednesday that President Donald Trump was “extremely concerned” about a CIA security breach that led to the Wikileaks release, and the administration would be tough on leakers.

“Anybody who leaks classified information will be held to the highest degree of law,” spokesman Sean Spicer told reporters.

One official with knowledge of the investigation said companies that are contractors for the CIA have been checking to see which of their employees had access to the material that Wikileaks published, and then going over their computer logs, emails and other communications for any evidence of who might be responsible.

One reason the investigation is focused on a potential leak by contractors rather than for example a hack by Russian intelligence, another official said, is that so far there is no evidence that Russian intelligence agencies tried to exploit any of the leaked material before it was published.

One European official, speaking on condition of anonymity, said the Wikileaks material could in fact lead to closer cooperation between European intelligence agencies and U.S. counterparts, which share concerns about Russian intelligence operations.

U.S. intelligence agencies have accused Russia of seeking to tilt last year’s U.S. presidential election in Trump’s favor, including by hacking into Democratic Party emails. Moscow has denied the allegation.

The lobby of the CIA Headquarters Building in Langley, Virginia, U.S. on August 14, 2008. REUTERS/Larry Downing/File Photo

One major security problem was that the number of contractors with access to information with the highest secrecy classification has “exploded” because of federal budget constraints, the first U.S. official said.

U.S. intelligence agencies have been unable to hire additional permanent staff needed to keep pace with technological advances such as the “Internet of Things” that connects cars, home security and heating systems and other devices to computer networks, or to pay salaries competitive with the private sector, the official said.

Reuters could not immediately verify the contents of the published documents. On Tuesday, several contractors and private cyber security experts said the materials appeared to be legitimate.

A person familiar with Wikileaks’ activities said Wikileaks has had the CIA hacking material for months, and that the release of the material was in the works “for a long time.”

A Congressional official said that the U.S. House of Representatives Intelligence Committee has begun asking questions about the WikiLeaks disclosures.

GERMAN CONCERN

In Germany on Wednesday, the chief federal prosecutor’s office said that it would review the Wikileaks documents because some suggested that the CIA ran a hacking hub from the U.S. consulate in Frankfurt.

“We’re looking at it very carefully,” a spokesman for the federal prosecutor’s office told Reuters. “We will initiate an investigation if we see evidence of concrete criminal acts or specific perpetrators.”

Chancellor Angela Merkel is scheduled to visit Washington on March 14 for her first meeting with Trump, who has sharply criticized Berlin for everything from its trade policy to what he considers inadequate levels of military spending.

The Wikileaks documents may also complicate bilateral intelligence ties that have just begun to recover after a series of scandals, including news in 2013 that the U.S. National Security Agency had bugged Merkel’s cellphone. The Frankfurt consulate was investigated by German lawmakers after that incident.

Merkel told lawmakers last month she did not know how closely Germany’s spies cooperated with their U.S. counterparts until 2015 when former NSA contractor Edward Snowden revealed the BND spy agency had for years passed on information to the NSA about European companies and politicians.

Germany scaled back the level of cooperation with the NSA after those revelations.

U.S. officials have acknowledged that the consulate in Frankfurt is home to a CIA base. A facility adjacent to the city’s airport and the Rhein-Main Air Base has for many years been home to the CIA’s “Tefran” station, a U.S. center for collecting intelligence on Iranian activities in Europe, maintaining surveillance on Iranian officials and targeting potential defectors working in Iran’s nuclear weapons program.

Foreign ministry spokesman Sebastian Fischer told a regular government news conference that Germany took the issue seriously, but more work needed to be done to verify the authenticity of the documents. Berlin was in close touch with Washington about the case and such matters generally, he said.

Government spokesman Steffen Seibert said Germany’s domestic intelligence agency had the job of uncovering espionage activities in Germany, and carried out its work comprehensively.

Wikileaks reported that CIA employees had been given diplomatic passports and State Department identities to carry out their work in Frankfurt, focused on targets in Europe, the Middle East and Africa. The documents included advice for CIA experts about life in Germany, noting that shops are closed on Sundays, and to have “your cover-for-action story down pat” when they were asked by German authorities when entering the country.

(Reporting by John Walcott, Mark Hosenball, Yara Bayoumy in Washington and Matthias Sobolewski and Andrea Shalal in Berlin; Writing by Grant McCool; Editing by Peter Graff, Grant McCool and Frances Kerry)

http://www.reuters.com/article/us-cia-wikileaks-idUSKBN16F2AP?il=0

Wikileaks to hand over alleged CIA spying tools to tech companies

Assange
Assange said he would give tech companies the details of hacks affecting their products  CREDIT: WIKILEAKS

Wikileaks will hand Central Intelligence Agency hacking tools to technology companies in order for them to defend their customers against spying.

Julian Assange, founder of the website, said he had decided to provide the classified information to giants such as Microsoft, Samsung and Apple whose products were implicated in the alleged CIA leaks.

The announcement comes after Wikileaks on Tuesday released a raft of documents that it claims detail tools the CIA used to hack into peoples computers, televisions and smartphones, among other internet-connected devices.

Wikileaks didn’t disclose details of how the tools worked, but basic information that allegedly proves the cyber weapons arsenal exists.

Samsung F8000
The CIA could have hacked Samsung’s F8000 smart TVs to turn them into spying toolsCREDIT: SAMSUNG

In the wake of the release, Assange said tech companies had asked Wikileaks to pass them details of the hacks that affect their products in order for them to fix them.

“After considering what we think is the best way to proceed and hearing calls from some of the manufacturers we have decided to work with them, to give them exclusive access to some of the technical details we have,” said Assange.

With the information Assange said the companies can “effectively disarm” the alleged CIA hacking tools.

It is not clear how long it will take for all of the vulnerabilities to be fixed or if they can all be solved. Some could be blocked in a couple of days, said Assange, while other more critical one could take weeks.

Assange warned that other hacks, such as the one used to turn on a “fake off” spying mode on Samsung smart TVs, may have to be manually blocked. This could prove difficult as it would require people to know their device had been infected in order for it to be fixed.

https://cf-particle-html.eip.telegraph.co.uk/25f7b704-4ac6-4678-a1a0-b3beeb494718.html?ref=http://www.telegraph.co.uk/technology/2017/03/09/wikileaks-hand-alleged-cia-spying-tools-tech-companies/&title=Wikileaks%20to%20hand%20over%20alleged%20CIA%20spying%20tools%20to%20tech%20companies

Apple has responded directly to the alleged CIA hacking tools mentioned in the documents. It says the security vulnerabilities that could have been used to access iPhones were fixed as of its latest security update. Samsung and Google meanwhile have said they are investigating the claims but it is unclear what action they have taken.

The CIA has not commented on the authenticity of the leaks.

http://www.telegraph.co.uk/technology/2017/03/09/wikileaks-hand-alleged-cia-spying-tools-tech-companies/

Assange: WikiLeaks Will Work With Tech Companies

 WikiLeaks has offered to help the likes of Google and Apple identify the software holes used by purported CIA hacking tools – and that puts the tech industry in something of a bind.

While companies have both a responsibility and financial incentive to fix problems in their software, accepting help from WikiLeaks raises legal and ethical questions. And it’s not even clear at this point exactly what kind of assistance WikiLeaks can offer.

THE PROMISE

WikiLeaks founder Julian Assange said Thursday that the anti-secrecy site will help technology companies find and fix software vulnerabilities in everyday gadgets such as phones and TVs. In an online news conference, Assange said some companies had asked for more details about the purported CIA cyberespionage toolkit that he revealed in a massive disclosure on Tuesday.

“We have decided to work with them, to give them some exclusive access to the additional technical details we have, so that fixes can be developed and pushed out,” Assange said. The digital blueprints for what he described as “cyberweapons” would be published to the world “once this material is effectively disarmed by us.”

Any conditions WikiLeaks might set for its cooperation weren’t immediately known. Nor was it clear if WikiLeaks holds additional details on specific vulnerabilities, or merely the tools designed to exploit them.

Apple declined comment on the WikiLeaks offer, and Google didn’t respond to requests for comment. Microsoft said it hopes that anyone with knowledge of software vulnerabilities would report them through the company’s usual channels.

LEGAL QUESTIONS

Tech companies could run into legal difficulties in accepting the offer, especially if they have government contracts or employees with security clearances.

“The unauthorized release of classified documents does not mean it’s unclassified,” said Stewart Baker, a former official at the Department of Homeland Security and former legal counsel for the National Security Agency. “Doing business with WikiLeaks and reviewing classified documents poses a real risk for at least their government contracting arms and their cleared employees.”

Other lawyers, however, are convinced that much of the information in the documents is so widely known that they are now part of the public domain. That means tech companies would be unlikely to face any legal liability for digging deeper with WikiLeaks.

Alternatively, suppose tech companies don’t accept WikiLeaks’ offer to help fix any security flaws – and are subsequently hacked. At that point, they could face charges of negligence, particularly in Europe where privacy laws are much stricter than in the U.S., said Michael Zweiback, a former assistant U.S. attorney and cybercrime adviser now in private practice.

GETTING TOO CLOSE TO WIKILEAKS

Public perception might be a bigger problem. “They don’t want to be seen as endorsing or supporting an organization with a tainted reputation and an unclear agenda,” said Robert Cattanach, a former U.S. Department of Justice attorney.

During the 2016 election, WikiLeaks published thousands of emails, some embarrassing, from breached Democratic Party computers and the account of a top aide to Hillary Clinton. U.S. intelligence agencies concluded those emails were stolen by hackers connected to the Russian government in an attempt to help Donald Trump win the presidency.

The CIA did not respond directly to Assange’s offer, but it appeared to take a dim view of it.

“Julian Assange is not exactly a bastion of truth and integrity,” CIA spokeswoman Heather Fritz Horniak said.

But most tech companies already have digital hotlines to receive tips about security weaknesses, even if they come from unsavory characters. So it wouldn’t break new ground for them to consult with a shadowy organization such as WikiLeaks.

A BETTER PATH

Ideally, the CIA would have shared such vulnerabilities directly with companies, as other government agencies have long done. In that case, companies would not only be dealing with a known entity in an aboveboard fashion, they might also obtain a more nuanced understanding of the problems than their engineers could glean from documents or lines of computer code.

And if companies could learn details about how the CIA found these vulnerabilities, they might also find additional holes using the same technique, said Johannes Ullrich, director of the Internet Storm Center at the SANS Institute.

And there are risks obtaining actual hacking tools from WikiLeaks. Some might have unadvertised features that could, for instance, start extracting data as soon as they launch. Ullrich said the CIA also might have left some traps to attack people running its exploits. If these aren’t detailed in the documents, only the CIA would be able to help tech companies avoid setting them off.

If all goes well, WikiLeaks could emerge looking better than some parts of the U.S. government.

“I am not a fan of WikiLeaks, but I don’t think it is fair to throw rocks at everything they do,” said Cindy Cohn, executive director of the Electronic Frontier Foundation, a group specializing in online privacy and other digital rights. “What WikiLeaks is demonstrating is that the CIA does not have the best interests of these companies at heart.”

BETTER THAN NOTHING

There’s one more unknown, which is just how much help WikiLeaks can actually provide. Apple, Google and Microsoft say they’ve already rendered many of the alleged CIA cyberespionage tools obsolete with earlier updates that patched related software holes.

Still, the companies will probably want to check out what WikiLeaks has, assuming that the organization hasn’t set unreasonable conditions on its cooperation. Some privacy and security experts believe the CIA’s own refusal to contact the affected companies about the vulnerabilities gives them little choice.

“We all should have better security, and certainly at this point, not trying to fixing them makes no sense,” Cohn said.

Liedtke reported from San Ramon, Calif. Raphael Satter in Paris, Paisley Dodds in London and Deb Riechmann in Washington contributed to this report.

This story has been corrected to reflect that purported CIA tools are not aimed at “defeating encryption” but at hijacking computers.

http://hosted.ap.org/dynamic/stories/U/US_WIKILEAKS_CIA?SITE=AP&SECTION=HOME&TEMPLATE=DEFAULT&CTIME=2017-03-09-17-09-24

Why Is Obama Expanding Surveillance Powers Right Before He Leaves Office?

It could be to prevent Trump from extending them even more.

Obama waves at the end of his farewell address in Chicago
The Obama administration made it easier for the NSA to share information with other intelligence agencies, just weeks before the inauguration.Jonathan Ernst / Reuters
On Thursday, the Obama administration finalized new rules that allow the National Security Agency to share information it gleans from its vast international surveillance apparatus with the 16 other agencies that make up the U.S. intelligence community.With the new changes, which were long in the works, those agencies can apply for access to various feeds of raw, undoctored NSA intelligence. Analysts will then be able to sift through the contents of those feeds as they see fit, before implementing required privacy protections. Previously, the NSA applied those privacy protections itself, before forwarding select pieces of information to agencies that might need to see them.The updated procedures will multiply the number of intelligence analysts who have access to NSA surveillance, which is captured in large quantities and often isn’t subject to warrant requirements. The changes rankled privacy advocates, who oppose a broadening of surveillance powers—especially on the cusp of Donald Trump’s inauguration. Trump and Mike Pompeo, the president-elect’s nominee for CIA director, have made it clear that they think overzealous civil-liberties protections should be cleared away in favor of stronger surveillance laws.
But while the changes may subject more Americans to warrantless surveillance, the last-minute timing of the announcement actually might have been designed to cut future privacy losses. Susan Hennessey, a Brookings fellow and the managing editor of Lawfare, says firming up the changes before Trump takes office makes it harder for the incoming president to encroach even further on civil liberties.I spoke with Hennessey, who was previously an attorney in the NSA general counsel’s office, about the lasting effects of the new intelligence-sharing procedures. A transcript of our conversation follows, lightly edited for clarity and concision.


Kaveh Waddell: First off, what do these changes mean for the intelligence community? Has a lack of information-sharing among agencies been holding back investigations?

Susan Hennessey: The origin of these changes dates back, honestly, to just after 9/11. There was this identified issue of “stovepiping”: Intelligence wasn’t being shared frequently or fast enough. Some modifications have already been made throughout the years.

Under Executive Order 12333 as it previously existed, NSA analysts had to make an initial determination and apply a set of privacy rules before sharing raw signals-intelligence information with other parts of the intelligence community. After this change, it doesn’t necessarily have to be an NSA analyst that makes that determination—that information can be shared with other parts of the intelligence community.

So it doesn’t change the substantive rules, it doesn’t change the scope of collection, it doesn’t change the types of protection, it doesn’t change the possible uses; it essentially just broadens the group of people who can apply those protections to the raw intelligence.

Waddell: And by extension, it broadens the group of people who get to see raw intelligence, before those rules are applied?

Hennessey: Yes. This is something that has been at the forefront of privacy and civil-liberties advocates’ minds when they’ve expressed concern with this type of collection. But it’s not accurate to say the rule change means it’s a raw signals-intelligence free-for-all, that anybody can get signals intelligence.

Intelligence agencies other than the NSA will have to provide justification for why they need access to that data. It can only be for foreign intelligence, or other enumerated purposes. So it’s not that those agencies will just be able to see whatever they want—it’s that they will be able to request, with particular justifications, access to more raw signals intelligence than they had before. Then, they will need to apply those minimization procedures for themselves.

The civil-liberties concern often surrounds the use of incidentally collected information. Under the new rule, the FBI could not obtain access to or search raw intelligence information for ordinary criminals in an ordinary criminal investigation against a U.S. person. However, if the FBI incidentally seized evidence of a crime, they are allowed to use that information. So that tends to be where the tension is for people who are concerned with the potential impacts that this change could have on U.S. persons.

Waddell: The fact that more Americans could potentially be subject to warrantless searches, just by virtue of being caught up in the raw signals intelligence that’s shared—is that something that concerns you?

Hennessey: No. Look, I think it’s important to understand that these minimization procedures are taken very seriously, and all other agencies that are handling raw signals intelligence are essentially going to have to import these very complex oversight and compliance mechanisms that currently exist at the NSA.

Within the NSA, those are extremely strong and protective mechanisms. I think people should feel reassured that the rules cannot be violated—certainly not without it coming to the attention of oversight and compliance bodies. I am confident that all of the agencies in the U.S. intelligence community will discharge those very same obligations with the same level of diligence and rigor, adhering to both the spirit and the letter of the law.

That said, there are potentially broader reforms that might be undertaken. I don’t think that they necessarily need to be linked to the sharing of data. But it’s reasonable to at least engage in a conversation about whether or not it’s appropriate to have particular post-collection reforms, like for example imposing an obligation for law enforcement to obtain a warrant in particular circumstances.

That’s a long way of saying that nothing about this particular rule change exposing Americans to additional privacy risks. However, that doesn’t mean that there are not still reasonable and responsible reforms which might take place.

Waddell: I found it interesting that you said the change could, in one way, actually be viewed as a “huge source of comfort.” I think you were referring to the timing of the change. Why is that?

Hennessey: These changes have actually been in process for eight or nine years. One of the things that I think individuals who had insight into intelligence activities and were concerned about the election of Donald Trump—specifically, some of the statements he’s made about adherence to the rule of law—a lot of those people’s minds went very quickly to these procedures.

It’s important to understand the distinction between Executive Order 12333 and the Foreign Intelligence Surveillance Act: One very oversimplified way to think about it is that FISA is a statute that governs collection that takes place within the United States, but that is aimed at a foreign target; 12333 collection is aimed at a foreign target, and takes place outside the United States. That’s shorthand that glosses over some technical and legal nuance, but those are the broad buckets people should be thinking about.

FISA is a statute, so you’d need congressional action to change those rules, and you have a built-in check there. But 12333 is not constrained by statute; it’s constrained by executive order. In theory, a president could change an executive order—that’s within his constitutional power. It’s not as easy as just a pen stroke, but it’s theoretically possible.

Executive Order 12333 requires that this series of protective procedures exist and are adhered to. The procedures are kind of where the rubber meets the road on privacy. They’re the details, the nitty-gritty: What can you actually see? What can you share? What do you have to minimize? So they’re really, really important in terms of what the relationship between U.S. citizens and the intelligence community looks like.

When they were in rewrites, they were sort of vulnerable. There was the possibility that an incoming administration would say, “Hey! While you’re in the process of rewriting, let’s go ahead and adjust some of the domestic protections.” And I think a reasonable observer might assume that while the protections the Obama administration was interested in putting into place increased privacy protections—or at the very least did not reduce them—that the incoming administration has indicated that they are less inclined to be less protective of privacy and civil liberties. So I think it is a good sign that these procedures have been finalized, in part because it’s so hard to change procedures once they’re finalized.

Waddell: Is that why we just went through an eight- or nine-year process to get here?

Hennessey: Exactly. For questions both of genuine complexity and just government bureaucracy, the time horizon here is longer than a single term of the presidency.

So I don’t think that it’s necessarily true that the intelligence community or the Department of Justice was rushing to get these procedures passed; if anything, they’re a little bit late. But I think the bottom line is that it’s comforting to a large national-security community that these are procedures that are signed off by Director of National Intelligence James Clapper and Attorney General Loretta Lynch, and not by the DNI and attorney general that will ultimately be confirmed under the Trump Administration.

Waddell: Is there anything else we should be thinking about with these new changes?

Hennessey: People sometimes focus on the top-line stuff and end up missing the things that aren’t necessarily the symbolic expressions of privacy—the things that make us feel good—but are the functional elements of privacy and civil liberties. What rules do people apply day-to-day and how? There’s going to be a need moving forward to have disciplined conversations about the legal protections that really matter.

If there is a silver lining to some of the anxieties that the incoming administration has produced, I think it’s the potential to move the conversation into a much more productive place. But that opportunity will end up being lost if the responses are the same old same. That’s my last shred of optimism, and I’m hanging on to it.

https://www.theatlantic.com/technology/archive/2017/01/obama-expanding-nsa-powers/513041/

Executive Orders

Executive Order 12333–United States intelligence activities

Source: The provisions of Executive Order 12333 of Dec. 4, 1981, appear at 46 FR 59941, 3 CFR, 1981 Comp., p. 200, unless otherwise noted.

Table of Contents

Preamble

Part 1.Goals, Direction, Duties, and Responsibilities With Respect to the National Intelligence Effort
1.1 Goals
1.2 The National Security Council
1.3 National Foreign Intelligence Advisory Groups
1.4 The Intelligence Community
1.5 Director of Central Intelligence
1.6 Duties and Responsibilities of the Heads of Executive Branch Departments and Agencies
1.7 Senior Officials of the Intelligence Community
1.8 The Central Intelligence Agency
1.9 The Department of State
1.10 The Department of the Treasury
1.11 The Department of Defense
1.12 Intelligence Components Utilized by the Secretary of Defense
1.13 The Department of Energy
1.14 The Federal Bureau of Investigation
Part 2.Conduct of Intelligence Activities
2.1 Need
2.2 Purpose
2.3 Collection of Information
2.4 Collection Techniques
2.5 Attorney General Approval
2.6 Assistance to Law Enforcement Authorities
2.7 Contracting
2.8 Consistency With Other Laws
2.9 Undisclosed Participation in Organizations Within the United States
2.10 Human Experimentation
2.11 Prohibition on Assassination
2.12 Indirect Participation
Part 3.General Provisions
3.1 Congressional Oversight
3.2 Implementation
3.3 Procedures
3.4 Definitions
3.5 Purpose and Effect
3.6 Revocation

Timely and accurate information about the activities, capabilities, plans, and intentions of foreign powers, organizations, and persons and their agents, is essential to the national security of the United States. All reasonable and lawful means must be used to ensure that the United States will receive the best intelligence available. For that purpose, by virtue of the authority vested in me by the Constitution and statutes of the United States of America, including the National Security Act of 1947, as amended, and as President of the United States of America, in order to provide for the effective conduct of United States intelligence activities and the protection of constitutional rights, it is hereby ordered as follows:

Part 1

Goals, Direction, Duties and Responsibilities With Respect to the National Intelligence Effort

1.1Goals. The United States intelligence effort shall provide the President and the National Security Council with the necessary information on which to base decisions concerning the conduct and development of foreign, defense and economic policy, and the protection of United States national interests from foreign security threats. All departments and agencies shall cooperate fully to fulfill this goal.
(a) Maximum emphasis should be given to fostering analytical competition among appropriate elements of the Intelligence Community.
(b) All means, consistent with applicable United States law and this Order, and with full consideration of the rights of United States persons, shall be used to develop intelligence information for the President and the National Security Council. A balanced approach between technical collection efforts and other means should be maintained and encouraged.
(c) Special emphasis should be given to detecting and countering espionage and other threats and activities directed by foreign intelligence services against the United States Government, or United States corporations, establishments, or persons.
(d) To the greatest extent possible consistent with applicable United States law and this Order, and with full consideration of the rights of United States persons, all agencies and departments should seek to ensure full and free exchange of information in order to derive maximum benefit from the United States intelligence effort.

1.2The National Security Council.
(a) Purpose. The National Security Council (NSC) was established by the National Security Act of 1947 to advise the President with respect to the integration of domestic, foreign and military policies relating to the national security. The NSC shall act as the highest Executive Branch entity that provides review of, guidance for and direction to the conduct of all national foreign intelligence, counterintelligence, and special activities, and attendant policies and programs.
(b) Committees. The NSC shall establish such committees as may be necessary to carry out its functions and responsibilities under this Order. The NSC, or a committee established by it, shall consider and submit to the President a policy recommendation, including all dissents, on each special activity and shall review proposals for other sensitive intelligence operations.

1.3National Foreign Intelligence Advisory Groups.
(a) Establishment and Duties. The Director of Central Intelligence shall establish such boards, councils, or groups as required for the purpose of obtaining advice from within the Intelligence Community concerning:
(1) Production, review and coordination of national foreign intelligence;
(2) Priorities for the National Foreign Intelligence Program budget;
(3) Interagency exchanges of foreign intelligence information;
(4) Arrangements with foreign governments on intelligence matters;
(5) Protection of intelligence sources and methods;
(6) Activities of common concern; and
(7) Such other matters as may be referred by the Director of Central Intelligence.
(b) Membership. Advisory groups established pursuant to this section shall be chaired by the Director of Central Intelligence or his designated representative and shall consist of senior representatives from organizations within the Intelligence Community and from departments or agencies containing such organizations, as designated by the Director of Central Intelligence. Groups for consideration of substantive intelligence matters will include representatives of organizations involved in the collection, processing and analysis of intelligence. A senior representative of the Secretary of Commerce, the Attorney General, the Assistant to the President for National Security Affairs, and the Office of the Secretary of Defense shall be invited to participate in any group which deals with other than substantive intelligence matters.

1.4The Intelligence Community. The agencies within the Intelligence Community shall, in accordance with applicable United States law and with the other provisions of this Order, conduct intelligence activities necessary for the conduct of foreign relations and the protection of the national security of the United States, including:
(a) Collection of information needed by the President, the National Security Council, the Secretaries of State and Defense, and other Executive Branch officials for the performance of their duties and responsibilities;
(b) Production and dissemination of intelligence;
(c) Collection of information concerning, and the conduct of activities to protect against, intelligence activities directed against the United States, international terrorist and international narcotics activities, and other hostile activities directed against the United States by foreign powers, organizations, persons, and their agents;
(d) Special activities;
(e) Administrative and support activities within the United States and abroad necessary for the performance of authorized activities; and
(f) Such other intelligence activities as the President may direct from time to time.

1.5Director of Central Intelligence. In order to discharge the duties and responsibilities prescribed by law, the Director of Central Intelligence shall be responsible directly to the President and the NSC and shall:
(a) Act as the primary adviser to the President and the NSC on national foreign intelligence and provide the President and other officials in the Executive Branch with national foreign intelligence;
(b) Develop such objectives and guidance for the Intelligence Community as will enhance capabilities for responding to expected future needs for national foreign intelligence;
(c) Promote the development and maintenance of services of common concern by designated intelligence organizations on behalf of the Intelligence Community;
(d) Ensure implementation of special activities;
(e) Formulate policies concerning foreign intelligence and counterintelligence arrangements with foreign governments, coordinate foreign intelligence and counterintelligence relationships between agencies of the Intelligence Community and the intelligence or internal security services of foreign governments, and establish procedures governing the conduct of liaison by any department or agency with such services on narcotics activities;
(f) Participate in the development of procedures approved by the Attorney General governing criminal narcotics intelligence activities abroad to ensure that these activities are consistent with foreign intelligence programs;
(g) Ensure the establishment by the Intelligence Community of common security and access standards for managing and handling foreign intelligence systems, information, and products;
(h) Ensure that programs are developed which protect intelligence sources, methods, and analytical procedures;
(i) Establish uniform criteria for the determination of relative priorities for the transmission of critical national foreign intelligence, and advise the Secretary of Defense concerning the communications requirements of the Intelligence Community for the transmission of such intelligence;
(j) Establish appropriate staffs, committees, or other advisory groups to assist in the execution of the Director’s responsibilities;
(k) Have full responsibility for production and dissemination of national foreign intelligence, and authority to levy analytic tasks on departmental intelligence production organizations, in consultation with those organizations, ensuring that appropriate mechanisms for competitive analysis are developed so that diverse points of view are considered fully and differences of judgment within the Intelligence Community are brought to the attention of national policymakers;
(l) Ensure the timely exploitation and dissemination of data gathered by national foreign intelligence collection means, and ensure that the resulting intelligence is disseminated immediately to appropriate government entities and military commands;
(m) Establish mechanisms which translate national foreign intelligence objectives and priorities approved by the NSC into specific guidance for the Intelligence Community, resolve conflicts in tasking priority, provide to departments and agencies having information collection capabilities that are not part of the National Foreign Intelligence Program advisory tasking concerning collection of national foreign intelligence, and provide for the development of plans and arrangements for transfer of required collection tasking authority to the Secretary of Defense when directed by the President;
(n) Develop, with the advice of the program managers and departments and agencies concerned, the consolidated National Foreign Intelligence Program budget, and present it to the President and the Congress;
(o) Review and approve all requests for reprogramming National Foreign Intelligence Program funds, in accordance with guidelines established by the Office of Management and Budget;
(p) Monitor National Foreign Intelligence Program implementation, and, as necessary, conduct program and performance audits and evaluations;
(q) Together with the Secretary of Defense, ensure that there is no unnecessary overlap between national foreign intelligence programs and Department of Defense intelligence programs consistent with the requirement to develop competitive analysis, and provide to and obtain from the Secretary of Defense all information necessary for this purpose;
(r) In accordance with law and relevant procedures approved by the Attorney General under this Order, give the heads of the departments and agencies access to all intelligence, developed by the CIA or the staff elements of the Director of Central Intelligence, relevant to the national intelligence needs of the departments and agencies; and
(s) Facilitate the use of national foreign intelligence products by Congress in a secure manner.

1.6Duties and Responsibilities of the Heads of Executive Branch Departments and Agencies.
(a) The heads of all Executive Branch departments and agencies shall, in accordance with law and relevant procedures approved by the Attorney General under this Order, give the Director of Central Intelligence access to all information relevant to the national intelligence needs of the United States, and shall give due consideration to the requests from the Director of Central Intelligence for appropriate support for Intelligence Community activities.
(b) The heads of departments and agencies involved in the National Foreign Intelligence Program shall ensure timely development and submission to the Director of Central Intelligence by the program managers and heads of component activities of proposed national programs and budgets in the format designated by the Director of Central Intelligence, and shall also ensure that the Director of Central Intelligence is provided, in a timely and responsive manner, all information necessary to perform the Director’s program and budget responsibilities.
(c) The heads of departments and agencies involved in the National Foreign Intelligence Program may appeal to the President decisions by the Director of Central Intelligence on budget or reprogramming matters of the National Foreign Intelligence Program.

1.7Senior Officials of the Intelligence Community. The heads of departments and agencies with organizations in the Intelligence Community or the heads of such organizations, as appropriate, shall:
(a) Report to the Attorney General possible violations of federal criminal laws by employees and of specified federal criminal laws by any other person as provided in procedures agreed upon by the Attorney General and the head of the department or agency concerned, in a manner consistent with the protection of intelligence sources and methods, as specified in those procedures;
(b) In any case involving serious or continuing breaches of security, recommend to the Attorney General that the case be referred to the FBI for further investigation;
(c) Furnish the Director of Central Intelligence and the NSC, in accordance with applicable law and procedures approved by the Attorney General under this Order, the information required for the performance of their respective duties;
(d) Report to the Intelligence Oversight Board, and keep the Director of Central Intelligence appropriately informed, concerning any intelligence activities of their organizations that they have reason to believe may be unlawful or contrary to Executive order or Presidential directive;
(e) Protect intelligence and intelligence sources and methods from unauthorized disclosure consistent with guidance from the Director of Central Intelligence;
(f) Disseminate intelligence to cooperating foreign governments under arrangements established or agreed to by the Director of Central Intelligence;
(g) Participate in the development of procedures approved by the Attorney General governing production and dissemination of intelligence resulting from criminal narcotics intelligence activities abroad if their departments, agencies, or organizations have intelligence responsibilities for foreign or domestic narcotics production and trafficking;
(h) Instruct their employees to cooperate fully with the Intelligence Oversight Board; and
(i) Ensure that the Inspectors General and General Counsels for their organizations have access to any information necessary to perform their duties assigned by this Order.

1.8The Central Intelligence Agency. All duties and responsibilities of the CIA shall be related to the intelligence functions set out below. As authorized by this Order; the National Security Act of 1947, as amended; the CIA Act of 1949, as amended; appropriate directives or other applicable law, the CIA shall:
(a) Collect, produce and disseminate foreign intelligence and counterintelligence, including information not otherwise obtainable. The collection of foreign intelligence or counterintelligence within the United States shall be coordinated with the FBI as required by procedures agreed upon by the Director of Central Intelligence and the Attorney General;
(b) Collect, produce and disseminate intelligence on foreign aspects of narcotics production and trafficking;
(c) Conduct counterintelligence activities outside the United States and, without assuming or performing any internal security functions, conduct counterintelligence activities within the United States in coordination with the FBI as required by procedures agreed upon by the Director of Central Intelligence and the Attorney General;
(d) Coordinate counterintelligence activities and the collection of information not otherwise obtainable when conducted outside the United States by other departments and agencies;
(e) Conduct special activities approved by the President. No agency except the CIA (or the Armed Forces of the United States in time of war declared by Congress or during any period covered by a report from the President to the Congress under the War Powers Resolution (87 Stat. 855)1) may conduct any special activity unless the President determines that another agency is more likely to achieve a particular objective;
(f) Conduct services of common concern for the Intelligence Community as directed by the NSC;
(g) Carry out or contract for research, development and procurement of technical systems and devices relating to authorized functions;
(h) Protect the security of its installations, activities, information, property, and employees by appropriate means, including such investigations of applicants, employees, contractors, and other persons with similar associations with the CIA as are necessary; and
(i) Conduct such administrative and technical support activities within and outside the United States as are necessary to perform the functions described in sections (a) through (h) above, including procurement and essential cover and proprietary arrangements.

1.9The Department of State. The Secretary of State shall:
(a) Overtly collect information relevant to United States foreign policy concerns;
(b) Produce and disseminate foreign intelligence relating to United States foreign policy as required for the execution of the Secretary’s responsibilities;
(c) Disseminate, as appropriate, reports received from United States diplomatic and consular posts;
(d) Transmit reporting requirements of the Intelligence Community to the Chiefs of United States Missions abroad; and
(e) Support Chiefs of Missions in discharging their statutory responsibilities for direction and coordination of mission activities.

1.10The Department of the Treasury. The Secretary of the Treasury shall:
(a) Overtly collect foreign financial and monetary information;
(b) Participate with the Department of State in the overt collection of general foreign economic information;
(c) Produce and disseminate foreign intelligence relating to United States economic policy as required for the execution of the Secretary’s responsibilities; and
(d) Conduct, through the United States Secret Service, activities to determine the existence and capability of surveillance equipment being used against the President of the United States, the Executive Office of the President, and, as authorized by the Secretary of the Treasury or the President, other Secret Service protectees and United States officials. No information shall be acquired intentionally through such activities except to protect against such surveillance, and those activities shall be conducted pursuant to procedures agreed upon by the Secretary of the Treasury and the Attorney General.

1.11The Department of Defense. The Secretary of Defense shall:
(a) Collect national foreign intelligence and be responsive to collection tasking by the Director of Central Intelligence;
(b) Collect, produce and disseminate military and military-related foreign intelligence and counterintelligence as required for execution of the Secretary’s responsibilities;
(c) Conduct programs and missions necessary to fulfill national, departmental and tactical foreign intelligence requirements;
(d) Conduct counterintelligence activities in support of Department of Defense components outside the United States in coordination with the CIA, and within the United States in coordination with the FBI pursuant to procedures agreed upon by the Secretary of Defense and the Attorney General;
(e) Conduct, as the executive agent of the United States Government, signals intelligence and communications security activities, except as otherwise directed by the NSC;
(f) Provide for the timely transmission of critical intelligence, as defined by the Director of Central Intelligence, within the United States Government;
(g) Carry out or contract for research, development and procurement of technical systems and devices relating to authorized intelligence functions;
(h) Protect the security of Department of Defense installations, activities, property, information, and employees by appropriate means, including such investigations of applicants, employees, contractors, and other persons with similar associations with the Department of Defense as are necessary;
(i) Establish and maintain military intelligence relationships and military intelligence exchange programs with selected cooperative foreign defense establishments and international organizations, and ensure that such relationships and programs are in accordance with policies formulated by the Director of Central Intelligence;
(j) Direct, operate, control and provide fiscal management for the National Security Agency and for defense and military intelligence and national reconnaissance entities; and
(k) Conduct such administrative and technical support activities within and outside the United States as are necessary to perform the functions described in sections (a) through (j) above.

1.12Intelligence Components Utilized by the Secretary of Defense. In carrying out the responsibilities assigned in section 1.11, the Secretary of Defense is authorized to utilize the following:
(a) Defense Intelligence Agency, whose responsibilities shall include;
(1) Collection, production, or, through tasking and coordination, provision of military and military-related intelligence for the Secretary of Defense, the Joint Chiefs of Staff, other Defense components, and, as appropriate, non-Defense agencies;
(2) Collection and provision of military intelligence for national foreign intelligence and counterintelligence products;
(3) Coordination of all Department of Defense intelligence collection requirements;
(4) Management of the Defense Attache system; and
(5) Provision of foreign intelligence and counterintelligence staff support as directed by the Joint Chiefs of Staff.
(b) National Security Agency, whose responsibilities shall include:
(1) Establishment and operation of an effective unified organization for signals intelligence activities, except for the delegation of operational control over certain operations that are conducted through other elements of the Intelligence Community. No other department or agency may engage in signals intelligence activities except pursuant to a delegation by the Secretary of Defense;
(2) Control of signals intelligence collection and processing activities, including assignment of resources to an appropriate agent for such periods and tasks as required for the direct support of military commanders;
(3) Collection of signals intelligence information for national foreign intelligence purposes in accordance with guidance from the Director of Central Intelligence;
(4) Processing of signals intelligence data for national foreign intelligence purposes in accordance with guidance from the Director of Central Intelligence;
(5) Dissemination of signals intelligence information for national foreign intelligence purposes to authorized elements of the Government, including the military services, in accordance with guidance from the Director of Central Intelligence;
(6) Collection, processing and dissemination of signals intelligence information for counterintelligence purposes;
(7) Provision of signals intelligence support for the conduct of military operations in accordance with tasking, priorities, and standards of timeliness assigned by the Secretary of Defense. If provision of such support requires use of national collection systems, these systems will be tasked within existing guidance from the Director of Central Intelligence;
(8) Executing the responsibilities of the Secretary of Defense as executive agent for the communications security of the United States Government;
(9) Conduct of research and development to meet the needs of the United States for signals intelligence and communications security;
(10) Protection of the security of its installations, activities, property, information, and employees by appropriate means, including such investigations of applicants, employees, contractors, and other persons with similar associations with the NSA as are necessary;
(11) Prescribing, within its field of authorized operations, security regulations covering operating practices, including the transmission, handling and distribution of signals intelligence and communications security material within and among the elements under control of the Director of the NSA, and exercising the necessary supervisory control to ensure compliance with the regulations;
(12) Conduct of foreign cryptologic liaison relationships, with liaison for intelligence purposes conducted in accordance with policies formulated by the Director of Central Intelligence; and
(13) Conduct of such administrative and technical support activities within and outside the United States as are necessary to perform the functions described in sections (1) through (12) above, including procurement.
(c) Offices for the collection of specialized intelligence through reconnaissance programs, whose responsibilities shall include:
(1) Carrying out consolidated reconnaissance programs for specialized intelligence;
(2) Responding to tasking in accordance with procedures established by the Director of Central Intelligence; and
(3) Delegating authority to the various departments and agencies for research, development, procurement, and operation of designated means of collection.

(d)

The foreign intelligence and counterintelligence elements of the Army, Navy, Air Force, and Marine Corps,

whose responsibilities shall include:

(1) Collection, production and dissemination of military and military-related foreign intelligence and counterintelligence, and information on the foreign aspects of narcotics production and trafficking. When collection is conducted in response to national foreign intelligence requirements, it will be conducted in accordance with guidance from the Director of Central Intelligence. Collection of national foreign intelligence, not otherwise obtainable, outside the United States shall be coordinated with the CIA, and such collection within the United States shall be coordinated with the FBI;
(2) Conduct of counterintelligence activities outside the United States in coordination with the CIA, and within the United States in coordination with the FBI; and
(3) Monitoring of the development, procurement and management of tactical intelligence systems and equipment and conducting related research, development, and test and evaluation activities.
(e) Other offices within the Department of Defense appropriate for conduct of the intelligence missions and responsibilities assigned to the Secretary of Defense. If such other offices are used for intelligence purposes, the provisions of Part 2 of this Order shall apply to those offices when used for those purposes.

1.13The Department of Energy. The Secretary of Energy shall:
(a) Participate with the Department of State in overtly collecting information with respect to foreign energy matters;
(b) Produce and disseminate foreign intelligence necessary for the Secretary’s responsibilities;
(c) Participate in formulating intelligence collection and analysis requirements where the special expert capability of the Department can contribute; and
(d) Provide expert technical, analytical and research capability to other agencies within the Intelligence Community.

1.14The Federal Bureau of Investigation. Under the supervision of the Attorney General and pursuant to such regulations as the Attorney General may establish, the Director of the FBI shall:
(a) Within the United States conduct counterintelligence and coordinate counterintelligence activities of other agencies within the Intelligence Community. When a counterintelligence activity of the FBI involves military or civilian personnel of the Department of Defense, the FBI shall coordinate with the Department of Defense;
(b) Conduct counterintelligence activities outside the United States in coordination with the CIA as required by procedures agreed upon by the Director of Central Intelligence and the Attorney General;
(c) Conduct within the United States, when requested by officials of the Intelligence Community designated by the President, activities undertaken to collect foreign intelligence or support foreign intelligence collection requirements of other agencies within the Intelligence Community, or, when requested by the Director of the National Security Agency, to support the communications security activities of the United States Government;
(d) Produce and disseminate foreign intelligence and counterintelligence; and
(e) Carry out or contract for research, development and procurement of technical systems and devices relating to the functions authorized above.

Part 2

Conduct of Intelligence Activities

2.1Need. Accurate and timely information about the capabilities, intentions and activities of foreign powers, organizations, or persons and their agents is essential to informed decisionmaking in the areas of national defense and foreign relations. Collection of such information is a priority objective and will be pursued in a vigorous, innovative and responsible manner that is consistent with the Constitution and applicable law and respectful of the principles upon which the United States was founded.

2.2Purpose. This Order is intended to enhance human and technical collection techniques, especially those undertaken abroad, and the acquisition of significant foreign intelligence, as well as the detection and countering of international terrorist activities and espionage conducted by foreign powers. Set forth below are certain general principles that, in addition to and consistent with applicable laws, are intended to achieve the proper balance between the acquisition of essential information and protection of individual interests. Nothing in this Order shall be construed to apply to or interfere with any authorized civil or criminal law enforcement responsibility of any department or agency.

2.3Collection of Information. Agencies within the Intelligence Community are authorized to collect, retain or disseminate information concerning United States persons only in accordance with procedures established by the head of the agency concerned and approved by the Attorney General, consistent with the authorities provided by Part 1 of this Order. Those procedures shall permit collection, retention and dissemination of the following types of information:
(a) Information that is publicly available or collected with the consent of the person concerned;
(b) Information constituting foreign intelligence or counterintelligence, including such information concerning corporations or other commercial organizations. Collection within the United States of foreign intelligence not otherwise obtainable shall be undertaken by the FBI or, when significant foreign intelligence is sought, by other authorized agencies of the Intelligence Community, provided that no foreign intelligence collection by such agencies may be undertaken for the purpose of acquiring information concerning the domestic activities of United States persons;
(c) Information obtained in the course of a lawful foreign intelligence, counterintelligence, international narcotics or international terrorism investigation;
(d) Information needed to protect the safety of any persons or organizations, including those who are targets, victims or hostages of international terrorist organizations;
(e) Information needed to protect foreign intelligence or counterintelligence sources or methods from unauthorized disclosure. Collection within the United States shall be undertaken by the FBI exceptthat other agencies of the Intelligence Community may also collect such information concerning present or former employees, present or former intelligence agency contractors or their present or former employees, or applicants for any such employment or contracting;
(f) Information concerning persons who are reasonably believed to be potential sources or contacts for the purpose of determining their suitability or credibility;
(g) Information arising out of a lawful personnel, physical or communications security investigation;
(h) Information acquired by overhead reconnaissance not directed at specific United States persons;
(i) Incidentally obtained information that may indicate involvement in activities that may violate federal, state, local or foreign laws; and
(j) Information necessary for administrative purposes.
In addition, agencies within the Intelligence Community may disseminate information, other than information derived from signals intelligence, to each appropriate agency within the Intelligence Community for purposes of allowing the recipient agency to determine whether the information is relevant to its responsibilities and can be retained by it.

2.4Collection Techniques. Agencies within the Intelligence Community shall use the least intrusive collection techniques feasible within the United States or directed against United States persons abroad. Agencies are not authorized to use such techniques as electronic surveillance, unconsented physical search, mail surveillance, physical surveillance, or monitoring devices unless they are in accordance with procedures established by the head of the agency concerned and approved by the Attorney General. Such procedures shall protect constitutional and other legal rights and limit use of such information to lawful governmental purposes. These procedures shall not authorize:
(a) The CIA to engage in electronic surveillance within the United States except for the purpose of training, testing, or conducting countermeasures to hostile electronic surveillance;
(b) Unconsented physical searches in the United States by agencies other than the FBI, except for:
(1) Searches by counterintelligence elements of the military services directed against military personnel within the United States or abroad for intelligence purposes, when authorized by a military commander empowered to approve physical searches for law enforcement purposes, based upon a finding of probable cause to believe that such persons are acting as agents of foreign powers; and
(2) Searches by CIA of personal property of non-United States persons lawfully in its possession.
(c) Physical surveillance of a United States person in the United States by agencies other than the FBI, except for:
(1) Physical surveillance of present or former employees, present or former intelligence agency contractors or their present of former employees, or applicants for any such employment or contracting; and
(2) Physical surveillance of a military person employed by a nonintelligence element of a military service.
(d) Physical surveillance of a United States person abroad to collect foreign intelligence, except to obtain significant information that cannot reasonably be acquired by other means.

2.5Attorney General Approval. The Attorney General hereby is delegated the power to approve the use for intelligence purposes, within the United States or against a United States person abroad, of any technique for which a warrant would be required if undertaken for law enforcement purposes, provided that such techniques shall not be undertaken unless the Attorney General has determined in each case that there is probable cause to believe that the technique is directed against a foreign power or an agent of a foreign power. Electronic surveillance, as defined in the Foreign Intelligence Surveillance Act of 1978, shall be conducted in accordance with that Act, as well as this Order.

2.6Assistance to Law Enforcement Authorities. Agencies within the Intelligence Community are authorized to:
(a) Cooperate with appropriate law enforcement agencies for the purpose of protecting the employees, information, property and facilities of any agency within the Intelligence Community;
(b) Unless otherwise precluded by law or this Order, participate in law enforcement activities to investigate or prevent clandestine intelligence activities by foreign powers, or international terrorist or narcotics activities;
(c) Provide specialized equipment, technical knowledge, or assistance of expert personnel for use by any department or agency, or, when lives are endangered, to support local law enforcement agencies. Provision of assistance by expert personnel shall be approved in each case by the General Counsel of the providing agency; and
(d) Render any other assistance and cooperation to law enforcement authorities not precluded by applicable law.

2.7Contracting. Agencies within the Intelligence Community are authorized to enter into contracts or arrangements for the provision of goods or services with private companies or institutions in the United States and need not reveal the sponsorship of such contracts or arrangements for authorized intelligence purposes. Contracts or arrangements with academic institutions may be undertaken only with the consent of appropriate officials of the institution.

2.8Consistency With Other Laws. Nothing in this Order shall be construed to authorize any activity in violation of the Constitution or statutes of the United States.

2.9Undisclosed Participation in Organizations Within the United States. No one acting on behalf of agencies within the Intelligence Community may join or otherwise participate in any organization in the United States on behalf of any agency within the Intelligence Community without disclosing his intelligence affiliation to appropriate officials of the organization, except in accordance with procedures established by the head of the agency concerned and approved by the Attorney General. Such participation shall be authorized only if it is essential to achieving lawful purposes as determined by the agency head or designee. No such participation may be undertaken for the purpose of influencing the activity of the organization or its members except in cases where:
(a) The participation is undertaken on behalf of the FBI in the course of a lawful investigation; or
(b) The organization concerned is composed primarily of individuals who are not United States persons and is reasonably believed to be acting on behalf of a foreign power.

2.10Human Experimentation. No agency within the Intelligence Community shall sponsor, contract for or conduct research on human subjects except in accordance with guidelines issued by the Department of Health and Human Services. The subject’s informed consent shall be documented as required by those guidelines.

2.11Prohibition on Assassination. No person employed by or acting on behalf of the United States Government shall engage in, or conspire to engage in, assassination.

2.12Indirect Participation. No agency of the Intelligence Community shall participate in or request any person to undertake activities forbidden by this Order.

Part 3

General Provisions

3.1Congressional Oversight. The duties and responsibilities of the Director of Central Intelligence and the heads of other departments, agencies, and entities engaged in intelligence activities to cooperate with the Congress in the conduct of its responsibilities for oversight of intelligence activities shall be as provided in title 50, United States Code, section 413. The requirements of section 662 of the Foreign Assistance Act of 1961, as amended (22 U.S.C. 2422), and section 501 of the National Security Act of 1947, as amended (50 U.S.C. 413), shall apply to all special activities as defined in this Order.

3.2Implementation. The NSC, the Secretary of Defense, the Attorney General, and the Director of Central Intelligence shall issue such appropriate directives and procedures as are necessary to implement this Order. Heads of agencies within the Intelligence Community shall issue appropriate supplementary directives and procedures consistent with this Order. The Attorney General shall provide a statement of reasons for not approving any procedures established by the head of an agency in the Intelligence Community other than the FBI. The National Security Council may establish procedures in instances where the agency head and the Attorney General are unable to reach agreement on other than constitutional or other legal grounds.

3.3Procedures. Until the procedures required by this Order have been established, the activities herein authorized which require procedures shall be conducted in accordance with existing procedures or requirements established under Executive Order No. 12036. Procedures required by this Order shall be established as expeditiously as possible. All procedures promulgated pursuant to this Order shall be made available to the congressional intelligence committees.

3.4Definitions. For the purposes of this Order, the following terms shall have these meanings:
(a) Counterintelligence means information gathered and activities conducted to protect against espionage, other intelligence activities, sabotage, or assassinations conducted for or on behalf of foreign powers, organizations or persons, or international terrorist activities, but not including personnel, physical, document or communications security programs.
(b) Electronic surveillance means acquisition of a nonpublic communication by electronic means without the consent of a person who is a party to an electronic communication or, in the case of a nonelectronic communication, without the consent of a person who is visibly present at the place of communication, but not including the use of radio direction-finding equipment solely to determine the location of a transmitter.
(c) Employee means a person employed by, assigned to or acting for an agency within the Intelligence Community.
(d) Foreign intelligence means information relating to the capabilities, intentions and activities of foreign powers, organizations or persons, but not including counterintelligence except for information on international terrorist activities.
(e) Intelligence activities means all activities that agencies within the Intelligence Community are authorized to conduct pursuant to this Order.
(f) Intelligence Community and agencies within the Intelligence Community refer to the following agencies or organizations:
(1) The Central Intelligence Agency (CIA);
(2) The National Security Agency (NSA);
(3) The Defense Intelligence Agency (DIA);
(4) The offices within the Department of Defense for the collection of specialized national foreign intelligence through reconnaissance programs;
(5) The Bureau of Intelligence and Research of the Department of State;
(6) The intelligence elements of the Army, Navy, Air Force, and Marine Corps, the Federal Bureau of Investigation (FBI), the Department of the Treasury, and the Department of Energy; and
(7) The staff elements of the Director of Central Intelligence.
(g) The National Foreign Intelligence Program includes the programs listed below, but its composition shall be subject to review by the National Security Council and modification by the President:
(1) The programs of the CIA;
(2) The Consolidated Cryptologic Program, the General Defense Intelligence Program, and the programs of the offices within the Department of Defense for the collection of specialized national foreign intelligence through reconnaissance, except such elements as the Director of Central Intelligence and the Secretary of Defense agree should be excluded;
(3) Other programs of agencies within the Intelligence Community designated jointly by the Director of Central Intelligence and the head of the department or by the President as national foreign intelligence or counterintelligence activities;
(4) Activities of the staff elements of the Director of Central Intelligence;
(5) Activities to acquire the intelligence required for the planning and conduct of tactical operations by the United States military forces are not included in the National Foreign Intelligence Program.
(h) Special activities means activities conducted in support of national foreign policy objectives abroad which are planned and executed so that the role of the United States Government is not apparent or acknowledged publicly, and functions in support of such activities, but which are not intended to influence United States political processes, public opinion, policies, or media and do not include diplomatic activities or the collection and production of intelligence or related support functions.
(i) United States person means a United States citizen, an alien known by the intelligence agency concerned to be a permanent resident alien, an unincorporated association substantially composed of United States citizens or permanent resident aliens, or a corporation incorporated in the United States, except for a corporation directed and controlled by a foreign government or governments.

3.5Purpose and Effect. This Order is intended to control and provide direction and guidance to the Intelligence Community. Nothing contained herein or in any procedures promulgated hereunder is intended to confer any substantive or procedural right or privilege on any person or organization.

3.6Revocation. Executive Order No. 12036 of January 24, 1978, as amended, entitled “United States Intelligence Activities,” is revoked.


1Editorial note: The correct citation is (87 Stat. 555).

https://www.archives.gov/federal-register/codification/executive-order/12333.html

 

Story 2: -Soros’ and Obama’s  Seditious and Subversive War On Trump With  Organizing For Action Applying Saul Alinsky’s Rules for Radicals — Videos

Judge Nap: If Obama Wiretapped Trump, It Would ‘Destroy Whatever Legacy’ He Has

SARA CARTER VS SEAN HANNITY (3/8/2017)

Laura Ingraham: New WikiLeaks Release Could Be ‘Really Damning’ For CIA

IS THIS THE END OF BARACK OBAMA? More proofs of illegal acts during Barack Obama’s administration

Gingrich talks ‘deep state’ bureaucrats’ attacks on Trump

On the Russia Lunacy & Wikileaks BOMBSHELL Leak of CIA Hacking Force

‘Everyday, a new piece falls into place’׃ Maddow spells out the Trump Russia connection 2

Former DOJ Lawyer: Lynch, Comey Could Have ‘Intimate Knowledge’ of Alleged Wiretapping

REAKING NEWS 03⁄08⁄2017 TRUMP: OBAMA “WEAK”

BREAKING NEWS March 8, 2017 WAR IN WHITE HOUSE, TRUMP vs OBAMA

ORGANIZING FOR ACTION OBAMA TEAM OF 80,000 PROTESTERS NATIONWIDE

Organizing for Action fights President Trump’s policies

Political Group “Organizing for Action” Relaunches For Trump Era

How Obama is Scheming to Sabotage Trump’s Presidency

Lou Dobbs: Obama Looking Very Close To Sedition

Monica Crowley: What happened to me was a political hit job

Tomi Lahren, Jessica Tarlov on attacks against the Trumps

Tomi Lahren – So you want me fired – Final Thoughts With Tomi Lahren

Tomi Lahren – Tantrums Against Trump (Final Thoughts)

Not My President’s Day Protests – Tomi Lahren Final Thoughts – The Blaze

Hannity With 3 Special Guest Uncover Obama’s Sedition Against The Republic For Which WE STAND!

HANNITY 3/7/17 – Ingraham – Crowley, ‘Deep State Plan to Imprison Trump.’

EXPOSED: Trump National Security Pick Monica Crowley Plagiarizes Book, Rewarded Title By President

Trump pick Monica Crowley has a plagiarism problem Viral news US

Lou Dobbs : Paul Sperry – Obama’s ‘shadow government’ is organizing to sabotage Trump : 2/15/2017

BREAKING Obama’s Plan to SABOTAGE Trump’s Presidency EXPOSED No Former President Has Ever Done This

Billionaire Soros linked to anti-Trump protests – WikiLeaks

Personal attacks on President Trump

Obama Moves to Bunker & Prepares To ‘Fight Trump’—30,000 Man Activist Army READY At His COMMAND

What is Organizing for Action?

Obama’s Organizing for Action Partners with Soros-Linked ‘Indivisible’ to Disrupt Trump’s Agenda

Organizing for Action, the activist group that morphed from Barack Obama’s first presidential campaign, has partnered with the newly-formed Indivisible Project for “online trainings” on how to protest President Donald Trump’s agenda.

Last week, Breitbart News extensively reported that Indivisible leaders are openly associated with groups financed by billionaire George Soros.

Politico earlier this month profiled Indivisible in an article titled, “Inside the protest movement that has Republicans reeling.”  The news agency not only left out the Soros links, but failed to note that the organizations cited in its article as helping to amplify Indivisible’s message are either financed directly by Soros or have close ties to groups funded by the billionaire, as Breitbart News documented.

Organizing for Action (OFA) is a so-called community organizing project that sprung from Obama’s 2012 campaign organization, Organizing for America, becoming a nonprofit described by the Washington Post as “advocate[ing] for the president’s policies.”

In a recent Facebook post titled, “Take a deep breath. Then take action,” OFA called on constituents to lobby particularly hard between now and February 26, when lawmakers will be in their home districts.

The post included a link to a guide released by Indivisible on how to organize against Trump. “Stay tuned for online trainings and invitations to calls with coalition partners like Indivisible Guide,” the OFA post states.

Paul Sperry, writing at the New York Post, relates:

The manual, published with OFA partner “Indivisible,” advises protesters to go into halls quietly so as not to raise alarms, and “grab seats at the front of the room but do not all sit together.” Rather, spread out in pairs to make it seem like the whole room opposes the Republican host’s positions. “This will help reinforce the impression of broad consensus.” It also urges them to ask “hostile” questions — while keeping “a firm hold on the mic” — and loudly boo the the GOP politician if he isn’t “giving you real answers.”

“Express your concern [to the event’s hosts] they are giving a platform to pro-Trump authoritarianism, racism, and corruption,” it says.

…“Even the safest [Republican] will be deeply alarmed by signs of organized opposition,” the document states, “because these actions create the impression that they’re not connected to their district and not listening to their constituents.”

Sperry reported OFA “plans to stage 400 rallies across 42 states this year to attack Trump and Republicans over ObamaCare’s repeal.”

Earlier this month, NBC News reported on OFA’s new actions and its partnership with Indivisible:

OFA has hired 14 field organizers in states home to key senators as part of its campaign to defend Obama’s signature healthcare law. To run that campaign, the group hired Saumya Narechania — the former national field director at Enroll America, which worked to sign people up for Obamacare — and a deputy campaign manager.

…OFA says more than 1,800 people have applied to its Spring Community Engagement Fellowship, a six-week training program, two-thirds of whom have not previously been involved with OFA.

And the group has teamed up with Indivisible, a buzzy newcomer to the progressive movement, to offer organizing training that began Thursday night with a video conference. A combined 25,000 people have registered to participate in those trainings, OFA said.

Indivisible’s DC branch was implicated in a scuffle last week that reportedly injured a 71-year-old staffer for Rep. Dana Rohrabacher (R-CA) as well as reportedly knocking a 2-year-old to the ground.  Protesters claimed they were only delivering Valentine’s Day cards.

Indivisible is a part of a coalition of activist groups slated to hold a massive anti-Trump Tax March in Washington and at least 60 other locations on April 15.

Unreported by the news media is that most of the listed partners and support organizers of the march are openly financed by Soros or have close links to Soros financing, as Breitbart News documented last week.

Meanwhile, earlier this month, Politico profiled Indivisible and reported that “conservatives” are “spreading unfounded rumors” that the group is “being driven by wealthy donors like George Soros.”

Politico, however, seemingly failed to do even the most minimal research on the Indivisible leaders cited in the news outlet’s own profile.  Some of those personalities are openly associated with groups financed by Soros.

Politico further failed to note that the organizations cited in its article as helping to amplify Indivisible’s message are either financed directly by Soros or have close ties to groups funded by the billionaire.

Citing Angel Padilla, a co-founder of the group, Politico reported:

Dubbed “Indivisible,” the group launched as a way for Padilla and a handful of fellow ex-Democratic aides to channel their post-election heartbreak into a manual for quashing President Donald Trump’s agenda. They drafted a 26-page protest guide for activists, full of pointers on how to bird dog their members of Congress in the language of Capitol insiders.

The manual has since been downloaded over one million times. Indivisible says on its website that over 4,500 local groups across the nation have “signed up to resist the Trump agenda in nearly every congressional district in the country.”

The manual has been utilized to form the basis of a protest movement. The group’s website states: “What’s more, you all are putting the guide into action—showing up en masse to congressional district offices and events, and flooding the congressional phone lines. You’re resisting—and it’s working.”

Politico reported on “unfounded” rumors being spread about Soros’s involvement with Indivisible (emphasis added by this reporter):

Its handful of senior leaders count about 100 contributors to their national organizing work but insist that all are working on a volunteer basis. They know conservatives are spreading unfounded rumors that their success is being driven by wealthy donors like George Soros, which they flatly deny.

That paragraph was followed by the following quote from co-founder Padilla (emphasis again added by this reporter):

“It doesn’t matter who we take money from — we’re always going to get blamed as a Soros group, even if we don’t take money from Soros,” said Padilla, now an analyst with the National Immigration Law Center. “That’s one of the attacks and that’s fine.”

While “Indivisible” has yet to disclose its donors, Politico failed to inform readers that the National Immigration Law Center where the news outlet reported Padilla serves as an analyst is financed by Soros’s Open Society Foundations. The Center has received numerous Open Society grants earmarked for general support.

Also unmentioned by Politico is that Padilla previously served as an immigration policy consultant at the radical National Council of La Raza. Soros is a major La Raza donor.

Politico went on to detail how Indivisible has been aided by MoveOn.org and the ACLU.  The news website failed to tell readers that MoveOn.org and the ACLU are both financed by Soros, a relevant tidbit given Politico’s claim about “unfounded rumors” that Indivisibles’ success was being driven by Soros . 

The news website reported:

In addition, MoveOn.org and the Working Families Party joined with Indivisible for its first nationwide call on Jan. 22. Nearly 60,000 people phoned in that day, according to Levin and MoveOn organizing director Victoria Kaplan. Indivisible estimates that its second national call, on the impact of Trump’s immigration order with assistance from the ACLU and Padilla’s group, drew 35,000 people.

Politico also missed that, according to its Twitter account, another organizer of the conference call with MoveOn.org was the International Refugee Assistance Project, a project of the Urban Justice Center, another recipient of an Open Society grant.

Taryn Higashi, executive director of the Center’s International Refugee Assistance Project, currently serves on the Advisory Board of the International Migration Initiative of Soros’s Open Society Foundations.

Politico further reported on Indivisible’s ties to the organizers of last month’s anti-Trump Women’s March while failing to mention that Soros reportedly has ties to more than 50 “partners” of that march. Also, this journalist first reported on the march leaders’ own close associations with Soros.

Regarding Indivisible and the Women’s March, Politico reported:

Indivisible is also embracing collaboration with other major anti-Trump protest outlets. Leaders of the group were in communication with Women’s March organizers before their main event on Jan. 21, and that partnership will become official when the March unveils the third in its series of 10 direct actions that attendees have been asked to pursue in their communities.

Another Indivisible leader mentioned in the Politico article is Jeremy Haile. Not reported by Politico is that is Haile served as federal advocacy counsel for the Sentencing Project.  The Sentencing Project is reportedly financed by Soros’s Open Society Foundations, which has also hosted the Project to promote its cause.

Aaron Klein is Breitbart’s Jerusalem bureau chief and senior investigative reporter. He is a New York Times bestselling author and hosts the popular weekend talk radio program, “Aaron Klein Investigative Radio.” Follow him on Twitter @AaronKleinShow. Follow him on Facebook.

http://www.breitbart.com/big-government/2017/02/19/obamas-organizing-action-partners-soros-linked-indivisible-disrupt-trumps-agenda/

Obama-linked activists have a ‘training manual’ for protesting Trump

An Obama-tied activist group training tens of thousands of agitators to protest President Trump’s policies plans to hit Republican lawmakers supporting those policies even harder this week, when they return home for the congressional recess and hold town hall meetings and other functions.

Organizing for Action, a group founded by former President Barack Obama and featured prominently on his new post-presidency website, is distributing a training manual to anti-Trump activists that advises them to bully GOP lawmakers into backing off support for repealing ObamaCare, curbing immigration from high-risk Islamic nations and building a border wall.

In a new Facebook post, OFA calls on activists to mobilize against Republicans from now until Feb. 26, when “representatives are going to be in their home districts.”

The protesters disrupted town halls earlier this month, including one held in Utah by House Oversight Committee Chairman Jason Chaffetz, who was confronted by hundreds of angry demonstrators claiming to be his constituents.

The manual, published with OFA partner “Indivisible,” advises protesters to go into halls quietly so as not to raise alarms, and “grab seats at the front of the room but do not all sit together.” Rather, spread out in pairs to make it seem like the whole room opposes the Republican host’s positions. “This will help reinforce the impression of broad consensus.” It also urges them to ask “hostile” questions — while keeping “a firm hold on the mic” — and loudly boo the GOP politician if he isn’t “giving you real answers.”

“Express your concern [to the event’s hosts] they are giving a platform to pro-Trump authoritarianism, racism, and corruption,” it says.

The goal is to make Republicans, even from safe districts, second-guess their support for the Trump agenda, and to prime “the ground for the 2018 midterms when Democrats retake power.”

The goal is to make Republicans, even from safe districts, second-guess their support for the Trump agenda.

“Even the safest [Republican] will be deeply alarmed by signs of organized opposition,” the document states, “because these actions create the impression that they’re not connected to their district and not listening to their constituents.”

After the event, protesters are advised to feed video footage to local and national media.

“Unfavorable exchanges caught on video can be devastating” for Republican lawmakers, it says, when “shared through social media and picked up by local and national media.” After protesters gave MSNBC, CNN and the networks footage of their dust-up with Chaffetz, for example, the outlets ran them continuously, forcing Chaffetz to issue statements defending himself.

The manual also advises protesters to flood “Trump-friendly” lawmakers’ Hill offices with angry phone calls and emails demanding the resignation of top White House adviser Steve Bannon.

A script advises callers to complain: “I’m honestly scared that a known racist and anti-Semite will be working just feet from the Oval Office … It is everyone’s business if a man who promoted white supremacy is serving as an adviser to the president.”

The document provides no evidence to support such accusations.

Protesters, who may or may not be affiliated with OFA, are also storming district offices. Last week, GOP Rep. Dana Rohrabacher blamed a “mob” of anti-Trump activists for knocking unconscious a 71-year-old female staffer at his Southern California office. A video of the incident, showing a small crowd around an opening door, was less conclusive.

Separately, OFA, which is run by ex-Obama officials and staffers, plans to stage 400 rallies across 42 states this year to attack Trump and Republicans over ObamaCare’s repeal.

“This is a fight we can win,” OFA recently told its foot soldiers. “They’re starting to waver.”

On Thursday, Trump insisted he’s moving ahead with plans to repeal and replace the Affordable Care Act, which has ballooned health insurance premiums and deductibles. “ObamaCare is a disaster, folks,” he said, adding that activists protesting its repeal are hijacking GOP town halls and other events.

“They fill up our rallies with people that you wonder how they get there,” the president said. “But they’re not the Republican people that our representatives are representing.”

As The Post reported, OFA boasts more than 250 offices nationwide and more than 32,000 organizers, with another 25,000 actively under training. Since November, it’s beefed up staff and fundraising, though as a “social welfare” nonprofit, it does not have to reveal its donors.

These aren’t typical Black Lives Matter or Occupy Wall Street marchers, but rather professionally trained organizers who go through a six-week training program similar to the training — steeped in Alinsky agitation tactics — Obama received in Chicago when he was a community organizer.

Chicago socialist Saul Alinsky, known by the left as “the father of community organizing,” taught radicals to “rub raw the sores of discontent” and create the conditions for a “revolution.” He dedicated his book, “Rules for Radicals,” to “Lucifer.” Michelle Obama quoted from the book when she helped launch OFA in 2013.

Obama appears to be behind the anti-Trump protests. He praised recent demonstrations against Trump’s travel ban. And last year, after Trump’s upset victory, he personally rallied OFA troops to “protect” his legacy in a conference call. “Now is the time for some organizing,” he said. “So don’t mope” over the election results.

He promised OFA activists he would soon join them in the fray.

“Understand that I’m going to be constrained in what I do with all of you until I am again a private citizen, but that’s not so far off,” he said. “You’re going to see me early next year, and we’re going to be in a position where we can start cooking up all kinds of great stuff.”

Added the ex-president: “I promise you that next year Michelle and I are going to be right there with you, and the clouds are going to start parting, and we’re going to be busy. I’ve got all kinds of thoughts and ideas about it, but this isn’t the best time to share them.

“Point is, I’m still fired up and ready to go, and I hope that all of you are, as well.”

http://nypost.com/2017/02/18/obama-linked-activists-have-a-training-manual-for-protesting-trump/

Obama’s Shadow Government Is Organizing To Undermine Trump

The leaks that led to Michael Flynn’s resignation are just the beginning. Obama and his loyalists in and outside government are working to undermine Trump.

By John Daniel Davidson

Once out of office, ex-presidents usually fade into private life and stay out of politics. They write memoirs, serve on corporate boards, and start charitable foundations. George W. Bush retired to his ranch in Texas and, most recently, painted portraits of veterans wounded in Iraq and Afghanistan. Bill Clinton was briefly thrust back into politics during Hillary’s two failed presidential campaigns, but most of his post-White House career consisted of flying around the world raising boatloads of money for his family’s now-defunct charity.

There are exceptions, of course. Jimmy Carter threw himself into international diplomacy, mediating an agreement in 1994 to return exiled President Jean-Bertrand Aristide to power in Haiti, and generally agitating for a Palestinian state.

Then there is Obama. Less than a month out of office, the broad contours of Obama’s post-presidency career are already taking shape. Obama and his loyalists, it seems, will remain in the center of the political fray, officially and unofficially, in an organized effort to undermine the Trump administration.

The bizarre scandal now unfolding over the resignation of national security advisor Michael Flynn is a case in point. Flynn’s resignation was prompted by a series of coordinated and anonymous leaks from current and former Obama administration officials in our domestic intelligence agencies.

Regardless of any valid criticism of Flynn, the leaks are part of a larger, loosely organized effort now underway to preserve Obama’s legacy. This effort involves Obama-era officials still inside the federal government, former Obama staffers working in the private sector, and Obama himself.

This isn’t some conspiracy theory. After the election, Obama indicated he intends to stay involved in the political fray. In an email to his supporters on his last day in office, Obama encouraged them to stay engaged, promising “I’ll be right there with you every step of the way.” Less than two weeks later, he issued a statement saying he was “heartened” by anti-Trump protests over the executive order on immigration.

Obama Is Jumping Back Into The Political Fray

But there’s more to all this than Obama issuing solidarity statements to Trump protestors. For one thing, the former president isn’t moving back to Chicago. The Obama family will remain in Washington DC, within a couple miles of the White House, for the next two years as Obama’s youngest daughter finishes high school.

From there, Obama will help direct his new foundation, which he has said will be a “startup for citizenship.” That could mean a lot things, but in light of his other plans it suggests the Obama Foundation will be a political grassroots organization designed to mobilize progressive activists.

Obama has also announced he’ll be working with former Attorney General Eric Holder on a political action group called the National Democratic Redistricting Committee. Its goal is to get Democrats elected at the state and local level ahead of the next redrawing of congressional districts. Last month, Obama reportedly met with Senate Minority Leader Chuck Schumer, House Minority Leader Nancy Pelosi, and Virginia Gov. Terry McAuliffe to strategize about redistricting.

In addition to these pursuits, the former president will likely play a prominent role in a network of progressive nonprofits, most notably Organizing for Action, the political group that grew out of Obama’s first campaign. OFA has kept a low profile in recent years, and if Clinton had won it likely would have shut down.

But last week, OFA officials told NBC News the organization was ramping up operations nationwide in an effort to preserve Obama’s signature achievements like the Affordable Care Act. As part of that effort, the group recently hired 14 field organizers in key states, adding to a growing infrastructure that boasts more than 250 offices nationwide and more than 32,000 volunteers.

Former Obama Staffers Are Speaking Out

Obama of course isn’t alone in all this. Trump’s victory has mobilized his top aides and staffers to take action, too. Former Obama staffer Tommy Vietor told the Daily Beast that, had Clinton won, “I would have been inclined to feel comfortable that Obama’s legacy and the things we worked on were safe.”

Instead, Vietor, along with former Obama administration staffers Jon Favreau and Jon Lovett, are launching a new podcast, Pod Save America, under their new joint media venture, Crooked Media.

The purpose of the company should be fairly obvious. “In the battle between Donald Trump and the media, we are firmly on the side of the media,” Favreau told the Daily Beast, adding that he’s not interested in “the veneer of objectivity.” “We’re always going to be Obama guys, we’re very open and honest about that.”

Favreau has also been helping create Obama’s new foundation, whose mission, he says, “is to get people involved in civic life and get people engaged in politics.” Of Crooked Media, Favreau says, “I think we would very much like to be the media company version of that. So it’s certainly inspired by a lot of what Obama has talked about in terms of the media over the last several months.”

A host of other former Obama staffers have simply taken to social media to voice their opposition to Trump. One former senior administration official told Yahoo News, “There are more than a few of us who believe deeply in holding this administration’s feet to the fire—especially when they offer falsehoods to the American people and distort our record. We have an email chain going where we share impressions, etc.”

As the leaks keep flowing from our intelligence agencies and the tweets keep flying from former Obama officials, keep in mind that although we haven’t heard much from Obama himself yet, the Trump administration is going to keep feeling the disruptions of what amounts to a shadow government.

Obama had eight years in the White House to secure his legacy. Any efforts on his part to undermine his successor aren’t just an affront to the principles of our democracy, they’re an admission that he and his acolytes never put much stock in democracy to begin with.

http://thefederalist.com/2017/02/16/obamas-shadow-government-organizing-undermine-trump/

The Pronk Pops Show Podcasts Portfolio

Listen To Pronk Pops Podcast or Download Shows 850-854

Listen To Pronk Pops Podcast or Download Shows 845-849

Listen To Pronk Pops Podcast or Download Shows 840-844

Listen To Pronk Pops Podcast or Download Shows 833-839

Listen To Pronk Pops Podcast or Download Shows 827-832

Listen To Pronk Pops Podcast or Download Shows 821-826

Listen To Pronk Pops Podcast or Download Shows 815-820

Listen To Pronk Pops Podcast or Download Shows 806-814

Listen To Pronk Pops Podcast or Download Shows 800-805

Listen To Pronk Pops Podcast or Download Shows 793-799

Listen To Pronk Pops Podcast or Download Shows 785-792

Listen To Pronk Pops Podcast or Download Shows 777-784

Listen To Pronk Pops Podcast or Download Shows 769-776

Listen To Pronk Pops Podcast or Download Shows 759-768

Listen To Pronk Pops Podcast or Download Shows 751-758

Listen To Pronk Pops Podcast or Download Shows 745-750

Listen To Pronk Pops Podcast or Download Shows 738-744

Listen To Pronk Pops Podcast or Download Shows 732-737

Listen To Pronk Pops Podcast or Download Shows 727-731

Listen To Pronk Pops Podcast or Download Shows 720-726

Listen To Pronk Pops Podcast or DownloadShows 713-719

Listen To Pronk Pops Podcast or DownloadShows 705-712

Listen To Pronk Pops Podcast or Download Shows 695-704

Listen To Pronk Pops Podcast or Download Shows 685-694

Listen To Pronk Pops Podcast or Download Shows 675-684

Listen To Pronk Pops Podcast or Download Shows 668-674

Listen To Pronk Pops Podcast or Download Shows 660-667

Listen To Pronk Pops Podcast or Download Shows 651-659

Listen To Pronk Pops Podcast or Download Shows 644-650

Listen To Pronk Pops Podcast or Download Shows 637-643

Listen To Pronk Pops Podcast or Download Shows 629-636

Listen To Pronk Pops Podcast or Download Shows 617-628

Listen To Pronk Pops Podcast or Download Shows 608-616

Listen To Pronk Pops Podcast or Download Shows 599-607

Listen To Pronk Pops Podcast or Download Shows 590-598

Listen To Pronk Pops Podcast or Download Shows 585- 589

Listen To Pronk Pops Podcast or Download Shows 575-584

Listen To Pronk Pops Podcast or Download Shows 565-574

Listen To Pronk Pops Podcast or Download Shows 556-564

Listen To Pronk Pops Podcast or Download Shows 546-555

Listen To Pronk Pops Podcast or Download Shows 538-545

Listen To Pronk Pops Podcast or Download Shows 532-537

Listen To Pronk Pops Podcast or Download Shows 526-531

Listen To Pronk Pops Podcast or Download Shows 519-525

Listen To Pronk Pops Podcast or Download Shows 510-518

Listen To Pronk Pops Podcast or Download Shows 500-509

Listen To Pronk Pops Podcast or Download Shows 490-499

Listen To Pronk Pops Podcast or Download Shows 480-489

Listen To Pronk Pops Podcast or Download Shows 473-479

Listen To Pronk Pops Podcast or Download Shows 464-472

Listen To Pronk Pops Podcast or Download Shows 455-463

Listen To Pronk Pops Podcast or Download Shows 447-454

Listen To Pronk Pops Podcast or Download Shows 439-446

Listen To Pronk Pops Podcast or Download Shows 431-438

Listen To Pronk Pops Podcast or Download Shows 422-430

Listen To Pronk Pops Podcast or Download Shows 414-421

Listen To Pronk Pops Podcast or Download Shows 408-413

Listen To Pronk Pops Podcast or Download Shows 400-407

Listen To Pronk Pops Podcast or Download Shows 391-399

Listen To Pronk Pops Podcast or Download Shows 383-390

Listen To Pronk Pops Podcast or Download Shows 376-382

Listen To Pronk Pops Podcast or Download Shows 369-375

Listen To Pronk Pops Podcast or Download Shows 360-368

Listen To Pronk Pops Podcast or Download Shows 354-359

Listen To Pronk Pops Podcast or Download Shows 346-353

Listen To Pronk Pops Podcast or Download Shows 338-345

Listen To Pronk Pops Podcast or Download Shows 328-337

Listen To Pronk Pops Podcast or Download Shows 319-327

Listen To Pronk Pops Podcast or Download Shows 307-318

Listen To Pronk Pops Podcast or Download Shows 296-306

Listen To Pronk Pops Podcast or Download Shows 287-295

Listen To Pronk Pops Podcast or Download Shows 277-286

Listen To Pronk Pops Podcast or Download Shows 264-276

Listen To Pronk Pops Podcast or Download Shows 250-263

Listen To Pronk Pops Podcast or Download Shows 236-249

Listen To Pronk Pops Podcast or Download Shows 222-235

Listen To Pronk Pops Podcast or Download Shows 211-221

Listen To Pronk Pops Podcast or Download Shows 202-210

Listen To Pronk Pops Podcast or Download Shows 194-201

Listen To Pronk Pops Podcast or Download Shows 184-193

Listen To Pronk Pops Podcast or Download Shows 174-183

Listen To Pronk Pops Podcast or Download Shows 165-173

Listen To Pronk Pops Podcast or Download Shows 158-164

Listen To Pronk Pops Podcast or Download Shows151-157

Listen To Pronk Pops Podcast or Download Shows 143-150

Listen To Pronk Pops Podcast or Download Shows 135-142

Listen To Pronk Pops Podcast or Download Shows 131-134

Listen To Pronk Pops Podcast or Download Shows 124-130

Listen To Pronk Pops Podcast or Download Shows 121-123

Listen To Pronk Pops Podcast or Download Shows 118-120

Listen To Pronk Pops Podcast or Download Shows 113 -117

Listen To Pronk Pops Podcast or Download Show 112

Listen To Pronk Pops Podcast or Download Shows 108-111

Listen To Pronk Pops Podcast or Download Shows 106-108

Listen To Pronk Pops Podcast or Download Shows 104-105

Listen To Pronk Pops Podcast or Download Shows 101-103

Listen To Pronk Pops Podcast or Download Shows 98-100

Listen To Pronk Pops Podcast or Download Shows 94-97

Listen To Pronk Pops Podcast or Download Show 93

Listen To Pronk Pops Podcast or Download Show 92

Listen To Pronk Pops Podcast or Download Show 91

Listen To Pronk Pops Podcast or Download Shows 88-90

Listen To Pronk Pops Podcast or Download Shows 84-87

Listen To Pronk Pops Podcast or Download Shows 79-83

Listen To Pronk Pops Podcast or Download Shows 74-78

Listen To Pronk Pops Podcast or Download Shows 71-73

Listen To Pronk Pops Podcast or Download Shows 68-70

Listen To Pronk Pops Podcast or Download Shows 65-67

Listen To Pronk Pops Podcast or Download Shows 62-64

Listen To Pronk Pops Podcast or Download Shows 58-61

Listen To Pronk Pops Podcast or Download Shows 55-57

Listen To Pronk Pops Podcast or Download Shows 52-54

Listen To Pronk Pops Podcast or Download Shows 49-51

Listen To Pronk Pops Podcast or Download Shows 45-48

Listen To Pronk Pops Podcast or Download Shows 41-44

Listen To Pronk Pops Podcast or Download Shows 38-40

Listen To Pronk Pops Podcast or Download Shows 34-37

Listen To Pronk Pops Podcast or Download Shows 30-33

Listen To Pronk Pops Podcast or Download Shows 27-29

Listen To Pronk Pops Podcast or Download Shows 17-26

Listen To Pronk Pops Podcast or Download Shows 16-22

Listen To Pronk Pops Podcast or Download Shows 10-15

Listen To Pronk Pops Podcast or Download Shows 1-9

Read Full Post | Make a Comment ( None so far )

The Pronk Pops Show 839, February 15, 2017, Story 1: Time To Stop Leaking by Government Employees By Setting A Example That Nobody Is Above The Law — Appoint A Special Prosecutor For The Many National Security and Public Corruption Crimes of Hillary Clinton and Staff — Trump Supporters Waiting For President Trump To Keep His Promise — Videos — Story 2: Eli Lake on The Political Assassination of NSA Mike Flynn and FBI Questioned Former National Security Advisory Mike Flynn — Videos — Story 3: President Trump Likes Whatever Israel and Palestine Want Regarding a Two State Solution

Posted on February 15, 2017. Filed under: American History, Benghazi, Blogroll, Breaking News, Bribery, Budgetary Policy, Coal, Coal, Communications, Congress, Constitutional Law, Corruption, Countries, Crime, Culture, Disasters, Donald J. Trump, Donald J. Trump, Donald Trump, Donald Trump, Economics, Empires, Energy, Fiscal Policy, Foreign Policy, Fourth Amendment, Free Trade, Freedom of Speech, Government, Government Spending, High Crimes, Hillary Clinton, Hillary Clinton, History, Homicide, House of Representatives, Human, Human Behavior, Impeachment, Islamic Republic of Iran, Islamic State, Israel, Labor Economics, Language, Law, Life, Lying, Media, Monetary Policy, National Security Agency, Natural Gas, Natural Gas, News, Nuclear, Nuclear Weapons, Obama, Oil, Oil, Philosophy, Photos, Politics, Polls, President Barack Obama, President Trump, Presidential Appointments, Prime Minister, Progressives, Radio, Raymond Thomas Pronk, Regulation, Resources, Rule of Law, Scandals, Security, Senate, Senator Jeff Sessions, Tax Policy, Taxation, Taxes, Terror, Terrorism, Trade Policy, United States Constitution, United States of America, Videos, Violence, War, Wealth, Weapons, Welfare Spending, Wisdom | Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , |

Project_1

The Pronk Pops Show Podcasts

Pronk Pops Show 839: February 15, 2017

Pronk Pops Show 838: February 14, 2017

Pronk Pops Show 837: February 13, 2017

Pronk Pops Show 836: February 10, 2017

Pronk Pops Show 835: February 9, 2017

Pronk Pops Show 834: February 8, 2017

Pronk Pops Show 833: February 7, 2017

Pronk Pops Show 832: February 6, 2017

Pronk Pops Show 831: February 3, 2017

Pronk Pops Show 830: February 2, 2017

Pronk Pops Show 829: February 1, 2017

Pronk Pops Show 828: January 31, 2017

Pronk Pops Show 827: January 30, 2017

Pronk Pops Show 826: January 27, 2017 

Pronk Pops Show 825: January 26, 2017

Pronk Pops Show 824: January 25, 2017 

Pronk Pops Show 823: January 24, 2017

Pronk Pops Show 822: January 23, 2017

Pronk Pops Show 821: January 20, 2017

Pronk Pops Show 820: January 19, 2017

Pronk Pops Show 819: January 18, 2017

Pronk Pops Show 818: January 17, 2017

Pronk Pops Show 817: January 13, 2017

Pronk Pops Show 816: January 12, 2017

Pronk Pops Show 815: January 11, 2017

Pronk Pops Show 814: January 10,  2017

Pronk Pops Show 813: January 9, 2017

Pronk Pops Show 812: December 12, 2016

Pronk Pops Show 811: December 9, 2016

Pronk Pops Show 810: December 8, 2016

Pronk Pops Show 809: December 7, 2016

Pronk Pops Show 808: December 6, 2016

Pronk Pops Show 807: December 5, 2016

Pronk Pops Show 806: December 2, 2016

Pronk Pops Show 805: December 1, 2016

Pronk Pops Show 804: November 30, 2016

Pronk Pops Show 803: November 29, 2016

Pronk Pops Show 802: November 28, 2016

Pronk Pops Show 801: November 22, 2016

Pronk Pops Show 800: November 21, 2016

Pronk Pops Show 799: November 18, 2016

Pronk Pops Show 798: November 17, 2016

Pronk Pops Show 797: November 16, 2016

Pronk Pops Show 796: November 15, 2016

Pronk Pops Show 795: November 14, 2016

Pronk Pops Show 794: November 10, 2016

Pronk Pops Show 793: November 9, 2016

Pronk Pops Show 792: November 8, 2016

Pronk Pops Show 791: November 7, 2016

Pronk Pops Show 790: November 4, 2016

Pronk Pops Show 789: November 3, 2016

Pronk Pops Show 788: November 2, 2016

 

Story 1: Time To Stop Leaking by Government Employees By Setting An Example That Nobody Is Above The Law — Appoint A Special Prosecutor For The Many National Security and Public Corruption Crimes of Hillary Clinton and Other Government Employees — Videos —

Trump vows to get special prosecutor to investigate Clinton

Donald Trump “You have a Point” to Crowd Chanting Hillary Clinton “Lock Her Up” (8-13-16)

Trump Decides He Won’t Pursue Criminal E-mail Investigation Case Against Clinton

Clinton’s Pay to Play State Department Not a Partisan Issue – It is a Criminal One

Donald Trump: Hillary Clinton has a lot to hide (CNN interview with Anderson Cooper)

Anonymous – Bill & Hillary Clinton: The Untold Story “Clinton Cash” Full Documentary

Anonymous – Hillary Clinton: The Hillary Files Full Documentary

 

Story 2:  Eli Lake on The Political Assassination of NSA Mike Flynn and FBI Questioned Former National Security Advisory Mike Flynn — Videos —

Trump Blasts Leaks, ‘Unfair’ Treatment of Flynn 

Was Michael Flynn Politically Assassinated?

Columnist: Flynn’s ouster will embolden Trump’s opponents

Hannity: The DC swamp is rising to take down Trump | Breaking News Today

The Political Assassination of Michael Flynn

FEB 14, 2017 10:09 AM EST

By Eli Lake

If we are to believe the Trump White House, National Security Adviser Michael Flynn just resigned because he lied about his conversations with Russia’s ambassador to the vice president. As White House senior counselor Kellyanne Conway told NBC’s “Today Show” on Tuesday: “Misleading the vice president really was the key here.”

That sounds about as credible as when the president told CIA employees that the media had invented the story about his enmity toward the spy agency, not even two weeks after he had taken to Twitter to compare the CIA to Nazis. It’s about as credible as President Donald Trump’s insistence that it didn’t rain during his inauguration. Or that millions of people had voted illegally in the election he just won.

The point here is that for a White House that has such a casual and opportunistic relationship with the truth, it’s strange that Flynn’s “lie” to Pence would get him fired. It doesn’t add up.

It’s not even clear that Flynn lied. He says in his resignation letter that he did not deliberately leave out elements of his conversations with Ambassador Sergey Kislyak when he recounted them to Vice President Mike Pence. The New York Times and Washington Post reported that the transcript of the phone call reviewed over the weekend by the White House could be read different ways. One White House official with knowledge of the conversations told me that the Russian ambassador raised the sanctions to Flynn and that Flynn responded that the Trump team would be taking office in a few weeks and would review Russia policy and sanctions. That’s neither illegal nor improper.

What’s more, the Washington Post reported Monday night that last month Sally Yates, then the acting attorney general, had informed the White House that Flynn discussed sanctions with Kislyak and that he could be susceptible to blackmail because he misled Pence about it. If it was the lie to Pence that sunk Flynn, why was he not fired at the end of January?

A better explanation here is that Flynn was just thrown under the bus. His tenure as national security adviser, the briefest in U.S. history, was rocky from the start. When Flynn was attacked in the media for his ties to Russia, he was not allowed by the White House to defend himself. Over the weekend, he was instructed not to speak to the press when he was in the fight for his political life. His staff was not even allowed to review the transcripts of his call to the Russian ambassador.

There is another component to this story as well — as Trump himself just tweeted. It’s very rare that reporters are ever told about government-monitored communications of U.S. citizens, let alone senior U.S. officials. The last story like this to hit Washington was in 2009 when Jeff Stein, then of CQ, reported on intercepted phone calls between a senior Aipac lobbyist and Jane Harman, who at the time was a Democratic member of Congress.

Normally intercepts of U.S. officials and citizens are some of the most tightly held government secrets. This is for good reason. Selectively disclosing details of private conversations monitored by the FBI or NSA gives the permanent state the power to destroy reputations from the cloak of anonymity. This is what police states do.

In the past it was considered scandalous for senior U.S. officials to even request the identities of U.S. officials incidentally monitored by the government (normally they are redacted from intelligence reports). John Bolton’s nomination to be U.S. ambassador to the United Nations was derailed in 2006 after the NSA confirmed he had made 10 such requests when he was Undersecretary of State for Arms Control in George W. Bush’s first term. The fact that the intercepts of Flynn’s conversations with Kislyak appear to have been widely distributed inside the government is a red flag.

Representative Devin Nunes, the Republican chairman of the House Permanent Select Committee on Intelligence, told me Monday that he saw the leaks about Flynn’s conversations with Kislyak as part of a pattern. “There does appear to be a well orchestrated effort to attack Flynn and others in the administration,” he said. “From the leaking of phone calls between the president and foreign leaders to what appears to be high-level FISA Court information, to the leaking of American citizens being denied security clearances, it looks like a pattern.”

Nunes said he was going to bring this up with the FBI, and ask the agency to investigate the leak and find out whether Flynn himself is a target of a law enforcement investigation. The Washington Post reported last month that Flynn was not the target of an FBI probe.

The background here is important. Three people once affiliated with Trump’s presidential campaign — Carter Page, Paul Manafort and Roger Stone — are being investigated by the FBI and the intelligence community for their contacts with the Russian government. This is part of a wider inquiry into Russia’s role in hacking and distributing emails of leading Democrats before the election.

Flynn himself traveled in 2015 to Russia to attend a conference put on by the country’s propaganda network, RT. He has acknowledged he was paid through his speaker’s bureau for his appearance. That doesn’t look good, but it’s also not illegal in and of itself. All of this is to say there are many unanswered questions about Trump’s and his administration’s ties to Russia.

But that’s all these allegations are at this point: unanswered questions. It’s possible that Flynn has more ties to Russia that he had kept from the public and his colleagues. It’s also possible that a group of national security bureaucrats and former Obama officials are selectively leaking highly sensitive law enforcement information to undermine the elected government.

Flynn was a fat target for the national security state. He has cultivated a reputation as a reformer and a fierce critic of the intelligence community leaders he once served with when he was the director the Defense Intelligence Agency under President Barack Obama. Flynn was working to reform the intelligence-industrial complex, something that threatened the bureaucratic prerogatives of his rivals.

He was also a fat target for Democrats. Remember Flynn’s breakout national moment last summer was when he joined the crowd at the Republican National Convention from the dais calling for Hillary Clinton to be jailed.

In normal times, the idea that U.S. officials entrusted with our most sensitive secrets would selectively disclose them to undermine the White House would alarm those worried about creeping authoritarianism. Imagine if intercepts of a call between Obama’s incoming national security adviser and Iran’s foreign minister leaked to the press before the nuclear negotiations began? The howls of indignation would be deafening.

In the end, it was Trump’s decision to cut Flynn loose. In doing this he caved in to his political and bureaucratic opposition. Nunes told me Monday night that this will not end well. “First it’s Flynn, next it will be Kellyanne Conway, then it will be Steve Bannon, then it will be Reince Priebus,” he said. Put another way, Flynn is only the appetizer. Trump is the entree.

https://www.bloomberg.com/view/articles/2017-02-14/the-political-assassination-of-michael-flynn

Former Obama Officials, Loyalists Waged Secret Campaign to Oust Flynn

Sources: Former Obama officials, loyalists planted series of stories to discredit Flynn, bolster Iran deal

Michael Flynn

Michael Flynn / AP

BY: Adam Kredo
February 14, 2017 3:26 pm

The abrupt resignation Monday evening of White House national security adviser Michael Flynn is the culmination of a secret, months-long campaign by former Obama administration confidantes to handicap President Donald Trump’s national security apparatus and preserve the nuclear deal with Iran, according to multiple sources in and out of the White House who described to the Washington Free Beacon a behind-the-scenes effort by these officials to plant a series of damaging stories about Flynn in the national media.

The effort, said to include former Obama administration adviser Ben Rhodes—the architect of a separate White House effort to create what he described as a pro-Iran echo chamber—included a small task force of Obama loyalists who deluged media outlets with stories aimed at eroding Flynn’s credibility, multiple sources revealed.

The operation primarily focused on discrediting Flynn, an opponent of the Iran nuclear deal, in order to handicap the Trump administration’s efforts to disclose secret details of the nuclear deal with Iran that had been long hidden by the Obama administration.

Insiders familiar with the anti-Flynn campaign told the Free Beacon that these Obama loyalists plotted in the months before Trump’s inauguration to establish a set of roadblocks before Trump’s national security team, which includes several prominent opponents of diplomacy with Iran. The Free Beacon first reported on this effort in January.

Sources who spoke to the Free Beacon requested anonymity in order to speak freely about the situation and avoid interfering with the White House’s official narrative about Flynn, which centers on his failure to adequately inform the president about a series of phone calls with Russian officials.

Flynn took credit for his missteps regarding these phone calls in a brief statement released late Monday evening. Trump administration officials subsequently stated that Flynn’s efforts to mislead the president and vice president about his contacts with Russia could not be tolerated.

However, multiple sources closely involved in the situation pointed to a larger, more secretive campaign aimed at discrediting Flynn and undermining the Trump White House.

“It’s undeniable that the campaign to discredit Flynn was well underway before Inauguration Day, with a very troublesome and politicized series of leaks designed to undermine him,” said one veteran national security adviser with close ties to the White House team. “This pattern reminds me of the lead up to the Iran deal, and probably features the same cast of characters.”

The Free Beacon first reported in January that, until its final days in office, the Obama administration hosted several pro-Iran voices who were critical in helping to mislead the American public about the terms of the nuclear agreement. This included a former Iranian government official and the head of the National Iranian American Council, or NIAC, which has been accused of serving as Iran’s mouthpiece in Washington, D.C.

Since then, top members of the Obama administration’s national security team have launched a communications infrastructure after they left the White House, and have told reporters they are using that infrastructure to undermine Trump’s foreign policy.

“It’s actually Ben Rhodes, NIAC, and the Iranian mullahs who are celebrating today,” said one veteran foreign policy insider who is close to Flynn and the White House. “They know that the number one target is Iran … [and] they all knew their little sacred agreement with Iran was going to go off the books. So they got rid of Flynn before any of the [secret] agreements even surfaced.”

Flynn had been preparing to publicize many of the details about the nuclear deal that had been intentionally hidden by the Obama administration as part of its effort to garner support for the deal, these sources said.

Flynn is now “gone before anybody can see what happened” with these secret agreements, said the second insider close to Flynn and the White House.

Sources in and out of the White House are concerned that the campaign against Flynn will be extended to other prominent figures in the Trump administration.

One senior White House official told the Free Beacon that leaks targeting the former official were “not the result of a series of random events.”

“The drumbeat of leaks of sensitive material related to General Flynn has been building since he was named to his position,” said the official, who is a member of the White House’s National Security Council. “Last night was not the result of a series of random events. The president has lost a valuable adviser and we need to make sure this sort of thing does not happen again.”

Other sources expressed concern that public trust in the intelligence community would be eroded by the actions of employees with anti-Trump agendas.

“The larger issue that should trouble the American people is the far-reaching power of unknown, unelected apparatchiks in the Intelligence Community deciding for themselves both who serves in government and what is an acceptable policy they will allow the elected representatives of the people to pursue,” said the national security adviser quoted above.

“Put aside the issue of Flynn himself; that nameless, faceless bureaucrats were able to take out a president’s national security adviser based on a campaign of innuendo without evidence should worry every American,” the source explained.

Eli Lake, a Bloomberg View columnist and veteran national security reporter well sourced in the White House, told the Free Beacon that Flynn earned a reputation in the Obama administration as one of its top detractors.

“Michael Flynn was one of the Obama administration’s fiercest critics after he was forced out of the Defense Intelligence Agency,” said Lake, who described “the political assassination of Michael Flynn” in his column published early Tuesday.

“[Flynn] was a withering critic of Obama’s biggest foreign policy initiative, the Iran deal,” Lake said. “He also publicly accused the administration of keeping classified documents found in the Osama bin Laden raid that showed Iran’s close relationship with al Qaeda. He was a thorn in their side.”

Lake noted in his column that he does not buy fully the White House’s official spin on Flynn’s resignation.

“For a White House that has such a casual and opportunistic relationship with the truth, it’s strange that Flynn’s ‘lie’ to Pence would get him fired,” Lake wrote. “It doesn’t add up.”

White House Press Secretary Sean Spicer stated in his daily briefing that “the evolving and eroding level of trust as a result of this situation and a series of other questionable incidents is what led the president to ask General Flynn for his resignation.”

A third source who serves as a congressional adviser and was involved in the 2015 fight over the Iran deal told the Free Beacon that the Obama administration feared that Flynn would expose the secret agreements with Iran.

“The Obama administration knew that Flynn was going to release the secret documents around the Iran deal, which would blow up their myth that it was a good deal that rolled back Iran,” the source said. “So in December the Obama NSC started going to work with their favorite reporters, selectively leaking damaging and incomplete information about Flynn.”

“After Trump was inaugurated some of those people stayed in and some began working from the outside, and they cooperated to keep undermining Trump,” the source said, detailing a series of leaks from within the White House in the past weeks targeting Flynn. “Last night’s resignation was their first major win, but unless the Trump people get serious about cleaning house, it won’t be the last.”

http://freebeacon.com/national-security/former-obama-officials-loyalists-waged-campaign-oust-flynn/

Michael T. Flynn stepped down as national security adviser amid a scandal surrounding his contacts with Russia before President Trump took office.

 

WASHINGTON — Just days into his new position as President Trump’s national security adviser, Michael T. Flynn found himself in a meeting that any White House official would dread. Face to face with F.B.I. agents, he was grilled about a phone call he had had with Russia’s ambassador.

What exactly Mr. Flynn said has not been disclosed, but current and former government officials said on Tuesday that investigators had come away believing that he was not entirely forthcoming. Soon after, the acting attorney general decided to notify the White House, setting in motion a chain of events that cost Mr. Flynn his job and thrust Mr. Trump’s fledgling administration into a fresh crisis.

Mr. Flynn’s rise and fall followed familiar patterns in Washington, where ambitious figures secure positions of great authority only to lose them in a blizzard of contradictions, recriminations and scandal. But rarely has an official at such a high level risen and fallen in such a dizzyingly short time, in this case just 24 days after Mr. Flynn arrived in the West Wing to take his corner office.

Given his short stay at the top, Mr. Flynn’s case might be quickly forgotten as an isolated episode if it did not raise other questions, particularly about what the president knew and when. Even more broadly, it underscores lingering uncertainty about the relationship between the Trump administration and Vladimir V. Putin’s Russia, a subject of great interest given American intelligence reports of Moscow’s intervention in last year’s elections in the United States.

C

As leaders of both parties said on Tuesday that they expected the Senate to investigate and probably even summon Mr. Flynn to testify, more details emerged about a drama that played out largely in secret inside a White House riven by competing power centers. Sean Spicer, the White House press secretary, revealed that Mr. Trump had known about concerns that Mr. Flynn lied for more than two weeks before demanding his resignation on Monday night. But Vice President Mike Pence was kept in the dark and did not learn that Mr. Flynn had misled him about his Russia contacts until reading news accounts late last week.

Photo

Michael T. Flynn, right, stepped down as national security adviser on Monday night after President Trump demanded his resignation. He held the job for 24 days. CreditKevin Hagen for The New York Times

Mr. Spicer described a deliberative process in which a new president took his time deciding what to do with Mr. Flynn, a retired three-star general who played a major role in his campaign. The issue, Mr. Spicer said, was not about legality but credibility.

“The evolving and eroding level of trust as a result of this situation and a series of other questionable instances is what led the president to ask for General Flynn’s resignation,” he said.

But other aides privately said that Mr. Trump, while annoyed at Mr. Flynn, might not have pushed him out had the situation not attracted such attention from the news media. Instead, according to three people close to Mr. Trump, the president made the decision to cast aside Mr. Flynn in a flash, the catalyst being a news alert of a coming article about the matter.

“Yeah, it’s time,” Mr. Trump told one of his advisers.

Until around that point, Mr. Flynn seemed to think he was going to keep his job. He told The Daily Caller, a conservative news site, on Monday that he had not violated the law. “If I did, believe me, the F.B.I. would be down my throat, my clearances would be pulled,” he said. “There were no lines crossed.”

But by that evening, he was writing a resignation letter, admitting no deception, only that he had “inadvertently” passed along “incomplete information.”

The issue traced back to a call last December between Mr. Flynn, then on tap to become Mr. Trump’s national security adviser, and Sergey I. Kislyak, the Russian ambassador to the United States. President Barack Obama was imposing new sanctions on Russia and expelling 35 diplomats after the election meddling.

The day after the sanctions were announced, Mr. Putin said Russia would not retaliate in kind, as has been the custom in the long, tortured history of Russian-American relations, instead waiting for a new administration that he assumed would be friendlier.

Inside the Obama administration, officials were stunned. Mr. Trump publicly welcomed the decision. “Great move on delay (by V. Putin),” he wrote on Twitter. “I always knew he was very smart!”

Around the same time, Obama advisers heard separately from the F.B.I. about Mr. Flynn’s conversation with Mr. Kislyak, whose calls were routinely monitored by American intelligence agencies that track Russian diplomats. The Obama advisers grew suspicious that perhaps there had been a secret deal between the incoming team and Moscow, which could violate the rarely enforced, two-century-old Logan Act barring private citizens from negotiating with foreign powers in disputes with the United States.

The Obama officials asked the F.B.I. if a quid pro quo had been discussed on the call, and the answer came back no, according to one of the officials, who like others asked not to be named discussing delicate communications. The topic of sanctions came up, they were told, but there was no deal.

 

The events that led to Michael T. Flynn’s abrupt resignation as national security adviser stretch back to before President Trump’s inauguration.

On Jan. 12, David Ignatius, a columnist for The Washington Post, reported that Mr. Flynn had called Mr. Kislyak, setting off news media interest in what was said. Mr. Spicer, then the spokesman for Mr. Trump’s transition team, went to Mr. Flynn, who he said told him that sanctions had not come up during the call. Briefing reporters the next day, Mr. Spicer repeated the misinformation, saying that the conversation had “never touched on the sanctions.”

Mr. Flynn told the same thing to Mr. Pence and Reince Priebus, the incoming White House chief of staff, who were scheduled to go on the Sunday talk shows and expected that they would be asked about the matter, according to the two men. On Jan. 15, Mr. Pence went on “Face the Nation” on CBS and on “Fox News Sunday” and repeated that sanctions had not been discussed, while Mr. Priebus said much the same on “Meet the Press” on NBC.

The topic came up again after Mr. Trump and his team moved into the White House. At his first full briefing on Jan. 23, Mr. Spicer said that Mr. Flynn’s conversation had touched on only four subjects, none of them sanctions. That caught the attention of the F.B.I. and the Justice Department.

Sally Q. Yates, an Obama appointee held over as acting attorney general until Mr. Trump’s choice was confirmed, concluded that the disparity between what was said on the call and what Mr. Flynn had evidently told the vice president and others about it might make the new national security adviser vulnerable to blackmail. When foreign governments hold information that could prove embarrassing, it is considered a potential leverage point.

Soon after the Jan. 23 briefing, James B. Comey, the F.B.I. director, sent agents to interview Mr. Flynn. If he told the agents what he said publicly for more than a week after that interview — that his conversations with the ambassador had been innocuous and did not involve sanctions — then he could face legal trouble. If the authorities concluded that he knowingly lied to the F.B.I., it could expose him to a felony charge.

Document: Michael Flynn’s Resignation Letter

It was not clear whether Mr. Flynn had a lawyer for his interview or whether anyone at the White House knew the interview was happening. But they knew afterward because Ms. Yates, with the support of Mr. Comey, reached out to Donald F. McGahn II, the new White House counsel, on Jan. 26 to give him what Mr. Spicer called a “heads up” about the discrepancy.

Mr. Trump was told “immediately,” Mr. Spicer said, and directed Mr. McGahn to look into the matter. After an “extensive review” that lasted several days, Mr. McGahn concluded that nothing in the conversation had violated federal law, Mr. Spicer said.

But the president then set out to determine whether he could still trust Mr. Flynn. Mr. Spicer said Mr. Flynn stuck to his original account, making matters worse.

“We got to a point not based on a legal issue, but based on a trust issue, with the level of trust between the president and General Flynn had eroded to the point where he felt he had to make a change,” Mr. Spicer said. “The president was very concerned that General Flynn had misled the vice president and others.”

Asked if Mr. Trump had instructed Mr. Flynn to talk about sanctions with Mr. Kislyak, Mr. Spicer said, “No, absolutely not.” Asked if Mr. Trump knew that the issue had come up before the Justice Department told the White House, Mr. Spicer said, “No, he was not aware.”

Vice President Mike Pence, left, learned that Mr. Flynn had misled him about a call to the Russian ambassador after reading news media reports last week. CreditGabriella Demczuk for The New York Times

Mr. Spicer emphasized that there was “nothing wrong” with Mr. Flynn’s talking with representatives of other countries to prepare for the new president taking office, and that, in fact, Mr. Trump wanted him to.

By that point, Mr. Trump’s relationship with Mr. Flynn had grown more awkward. One person close to the president, who asked to remain anonymous to describe private discussions, said Mr. Trump had been “uncomfortable” with Mr. Flynn for weeks. Jared Kushner, the president’s son-in-law and senior adviser, had expressed concern about Mr. Flynn’s appointment even before the inauguration, according to another person briefed on the discussions.

Mr. Trump’s views were coming around to the same point. “What he knew was that Flynn was too much about Flynn, versus Mattis,” the person close to the president said. Defense Secretary Jim Mattis was seen as deferential to the chain of command. “He loves Mattis because Mattis is respectful and self-confident.”

Another key figure with growing concerns about Mr. Flynn was Stephen K. Bannon, the president’s chief strategist whom Mr. Flynn perceived as a rival for control over national security. Mr. Trump began asking Mr. Mattis about two weeks ago for suggestions of possible replacements for Mr. Flynn. The defense secretary recommended retired Vice Adm. Robert S. Harward. Mr. Bannon reached out to Mr. Harward last week, two senior officials said.

The situation escalated late Thursday when word reached the White House that The Washington Post was reporting that the transcript of Mr. Flynn’s call showed that he had discussed sanctions, contrary to his assurances to Mr. Pence and others.

White House officials confronted Mr. Flynn, who only then said that it was possible they had come up, but that he did not remember. “His story remained the same until that night,” Mr. Spicer said. “That’s when his response changed.”

That was also when Mr. Pence first learned that the Justice Department had proof that Mr. Flynn had not told the truth and had warned the White House two weeks earlier, according to Marc Lotter, his spokesman. “He did an inquiry based on those media accounts,” Mr. Lotter added, without elaborating.

Another person who speaks frequently with him said Mr. Pence went “ballistic,” or at least what qualifies as ballistic for the coolheaded vice president.

Mr. Pence, Mr. Priebus and Mr. Bannon urged Mr. Trump to fire the national security adviser, according to officials, but the president could not bring himself to do it, in part for fear of losing face. When a reporter on Air Force One heading to Florida on Friday asked him about The Post’s report, Mr. Trump said he had not read it. “I don’t know about that,” he said. “I haven’t seen it.”

As late as Monday, he was sticking by Mr. Flynn. He sent his counselor, Kellyanne Conway, to tell a television interviewer that he had “full confidence” in Mr. Flynn. And Mr. Flynn phoned a reporter for The Daily Caller on Monday to say the president had “expressed confidence” in him and urged him to “go out and talk more.”

In that interview, posted on Tuesday, Mr. Flynn said he had discussed the Russian diplomats’ expulsion with Mr. Kislyak. “It wasn’t about sanctions,” he said. “It was about the 35 guys who were thrown out.” Mr. Flynn added: “It was basically, ‘Look, I know this happened. We’ll review everything.’ I never said anything such as, ‘We’re going to review sanctions,’ or anything like that.”

Either way, it was too late. When the matter came to overshadow the president’s glitch-free meeting with Prime Minister Justin Trudeau of Canada and word arrived of another Post article on Ms. Yates’s warning to the White House, Mr. Trump ordered an end to the situation. “He made a determination late in the day,” Mr. Spicer said, “and he executed on it.”

 

Story 3: President Trump Likes Whatever Israel and Palestine Want Regarding a Two State Solution — Videos

Trump Says Separate States Not Needed in Mideast Deal

Trump Netanyahu joint press conference full event

The Pronk Pops Show Podcasts Portfolio

Listen To Pronk Pops Podcast or Download Shows 833-839

Listen To Pronk Pops Podcast or Download Shows 827-832

Listen To Pronk Pops Podcast or Download Shows 821-826

Listen To Pronk Pops Podcast or Download Shows 815-820

Listen To Pronk Pops Podcast or Download Shows 806-814

Listen To Pronk Pops Podcast or Download Shows 800-805

Listen To Pronk Pops Podcast or Download Shows 793-799

Listen To Pronk Pops Podcast or Download Shows 785-792

Listen To Pronk Pops Podcast or Download Shows 777-784

Listen To Pronk Pops Podcast or Download Shows 769-776

Listen To Pronk Pops Podcast or Download Shows 759-768

Listen To Pronk Pops Podcast or Download Shows 751-758

Listen To Pronk Pops Podcast or Download Shows 745-750

Listen To Pronk Pops Podcast or Download Shows 738-744

Listen To Pronk Pops Podcast or Download Shows 732-737

Listen To Pronk Pops Podcast or Download Shows 727-731

Listen To Pronk Pops Podcast or Download Shows 720-726

Listen To Pronk Pops Podcast or DownloadShows 713-719

Listen To Pronk Pops Podcast or DownloadShows 705-712

Listen To Pronk Pops Podcast or Download Shows 695-704

Listen To Pronk Pops Podcast or Download Shows 685-694

Listen To Pronk Pops Podcast or Download Shows 675-684

Listen To Pronk Pops Podcast or Download Shows 668-674

Listen To Pronk Pops Podcast or Download Shows 660-667

Listen To Pronk Pops Podcast or Download Shows 651-659

Listen To Pronk Pops Podcast or Download Shows 644-650

Listen To Pronk Pops Podcast or Download Shows 637-643

Listen To Pronk Pops Podcast or Download Shows 629-636

Listen To Pronk Pops Podcast or Download Shows 617-628

Listen To Pronk Pops Podcast or Download Shows 608-616

Listen To Pronk Pops Podcast or Download Shows 599-607

Listen To Pronk Pops Podcast or Download Shows 590-598

Listen To Pronk Pops Podcast or Download Shows 585- 589

Listen To Pronk Pops Podcast or Download Shows 575-584

Listen To Pronk Pops Podcast or Download Shows 565-574

Listen To Pronk Pops Podcast or Download Shows 556-564

Listen To Pronk Pops Podcast or Download Shows 546-555

Listen To Pronk Pops Podcast or Download Shows 538-545

Listen To Pronk Pops Podcast or Download Shows 532-537

Listen To Pronk Pops Podcast or Download Shows 526-531

Listen To Pronk Pops Podcast or Download Shows 519-525

Listen To Pronk Pops Podcast or Download Shows 510-518

Listen To Pronk Pops Podcast or Download Shows 500-509

Listen To Pronk Pops Podcast or Download Shows 490-499

Listen To Pronk Pops Podcast or Download Shows 480-489

Listen To Pronk Pops Podcast or Download Shows 473-479

Listen To Pronk Pops Podcast or Download Shows 464-472

Listen To Pronk Pops Podcast or Download Shows 455-463

Listen To Pronk Pops Podcast or Download Shows 447-454

Listen To Pronk Pops Podcast or Download Shows 439-446

Listen To Pronk Pops Podcast or Download Shows 431-438

Listen To Pronk Pops Podcast or Download Shows 422-430

Listen To Pronk Pops Podcast or Download Shows 414-421

Listen To Pronk Pops Podcast or Download Shows 408-413

Listen To Pronk Pops Podcast or Download Shows 400-407

Listen To Pronk Pops Podcast or Download Shows 391-399

Listen To Pronk Pops Podcast or Download Shows 383-390

Listen To Pronk Pops Podcast or Download Shows 376-382

Listen To Pronk Pops Podcast or Download Shows 369-375

Listen To Pronk Pops Podcast or Download Shows 360-368

Listen To Pronk Pops Podcast or Download Shows 354-359

Listen To Pronk Pops Podcast or Download Shows 346-353

Listen To Pronk Pops Podcast or Download Shows 338-345

Listen To Pronk Pops Podcast or Download Shows 328-337

Listen To Pronk Pops Podcast or Download Shows 319-327

Listen To Pronk Pops Podcast or Download Shows 307-318

Listen To Pronk Pops Podcast or Download Shows 296-306

Listen To Pronk Pops Podcast or Download Shows 287-295

Listen To Pronk Pops Podcast or Download Shows 277-286

Listen To Pronk Pops Podcast or Download Shows 264-276

Listen To Pronk Pops Podcast or Download Shows 250-263

Listen To Pronk Pops Podcast or Download Shows 236-249

Listen To Pronk Pops Podcast or Download Shows 222-235

Listen To Pronk Pops Podcast or Download Shows 211-221

Listen To Pronk Pops Podcast or Download Shows 202-210

Listen To Pronk Pops Podcast or Download Shows 194-201

Listen To Pronk Pops Podcast or Download Shows 184-193

Listen To Pronk Pops Podcast or Download Shows 174-183

Listen To Pronk Pops Podcast or Download Shows 165-173

Listen To Pronk Pops Podcast or Download Shows 158-164

Listen To Pronk Pops Podcast or Download Shows151-157

Listen To Pronk Pops Podcast or Download Shows 143-150

Listen To Pronk Pops Podcast or Download Shows 135-142

Listen To Pronk Pops Podcast or Download Shows 131-134

Listen To Pronk Pops Podcast or Download Shows 124-130

Listen To Pronk Pops Podcast or Download Shows 121-123

Listen To Pronk Pops Podcast or Download Shows 118-120

Listen To Pronk Pops Podcast or Download Shows 113 -117

Listen To Pronk Pops Podcast or Download Show 112

Listen To Pronk Pops Podcast or Download Shows 108-111

Listen To Pronk Pops Podcast or Download Shows 106-108

Listen To Pronk Pops Podcast or Download Shows 104-105

Listen To Pronk Pops Podcast or Download Shows 101-103

Listen To Pronk Pops Podcast or Download Shows 98-100

Listen To Pronk Pops Podcast or Download Shows 94-97

Listen To Pronk Pops Podcast or Download Show 93

Listen To Pronk Pops Podcast or Download Show 92

Listen To Pronk Pops Podcast or Download Show 91

Listen To Pronk Pops Podcast or Download Shows 88-90

Listen To Pronk Pops Podcast or Download Shows 84-87

Listen To Pronk Pops Podcast or Download Shows 79-83

Listen To Pronk Pops Podcast or Download Shows 74-78

Listen To Pronk Pops Podcast or Download Shows 71-73

Listen To Pronk Pops Podcast or Download Shows 68-70

Listen To Pronk Pops Podcast or Download Shows 65-67

Listen To Pronk Pops Podcast or Download Shows 62-64

Listen To Pronk Pops Podcast or Download Shows 58-61

Listen To Pronk Pops Podcast or Download Shows 55-57

Listen To Pronk Pops Podcast or Download Shows 52-54

Listen To Pronk Pops Podcast or Download Shows 49-51

Listen To Pronk Pops Podcast or Download Shows 45-48

Listen To Pronk Pops Podcast or Download Shows 41-44

Listen To Pronk Pops Podcast or Download Shows 38-40

Listen To Pronk Pops Podcast or Download Shows 34-37

Listen To Pronk Pops Podcast or Download Shows 30-33

Listen To Pronk Pops Podcast or Download Shows 27-29

Listen To Pronk Pops Podcast or Download Shows 17-26

Listen To Pronk Pops Podcast or Download Shows 16-22

Listen To Pronk Pops Podcast or Download Shows 10-15

Listen To Pronk Pops Podcast or Download Shows 1-9

Read Full Post | Make a Comment ( None so far )

Liked it here?
Why not try sites on the blogroll...