The Pronk Pops Show 936, Story 1:Obama Spy Scandal: Obama Administration Officials Including National Security Adviser Rice, CIA Director Brennan and United Nations Ambassador Power Spied On American People and Trump Campaign By Massive Unmasking Using Intelligence Community For Political Purposes — An Abuse of Power and Felonies Under U.S. Law — Videos

Posted on July 28, 2017. Filed under: Applications, Barack H. Obama, Blogroll, Breaking News, China, Communications, Computers, Congress, Constitutional Law, Corruption, Countries, Crime, Deep State, Donald J. Trump, Donald J. Trump, Donald J. Trump, Donald Trump, Donald Trump, Elections, Empires, Federal Bureau of Investigation (FBI), Federal Government, Foreign Policy, Former President Barack Obama, Fourth Amendment, Government, Government Dependency, Government Spending, Hardware, High Crimes, Hillary Clinton, Hillary Clinton, House of Representatives, Human, Impeachment, Islamic State, Law, Libya, Life, National Interest, National Security Agency, News, Obama, People, Philosophy, Photos, Politics, Polls, President Barack Obama, President Trump, Pro Life, Progressives, Radio, Raymond Thomas Pronk, Robert S. Mueller III, Scandals, Senate, Servers, Software, Taxation, Taxes, Terror, Terrorism, United States Constitution, United States of America, Videos, Violence, Wall Street Journal, War, Wealth, Weapons, Wisdom | Tags: , , , , , , , , , , , , , |

Project_1

The Pronk Pops Show Podcasts

Pronk Pops Show 936,  July 27, 2017

Pronk Pops Show 935,  July 26, 2017

Pronk Pops Show 934,  July 25, 2017

Pronk Pops Show 934,  July 25, 2017

Pronk Pops Show 933,  July 24, 2017

Pronk Pops Show 932,  July 20, 2017

Pronk Pops Show 931,  July 19, 2017

Pronk Pops Show 930,  July 18, 2017

Pronk Pops Show 929,  July 17, 2017

Pronk Pops Show 928,  July 13, 2017

Pronk Pops Show 927,  July 12, 2017

Pronk Pops Show 926,  July 11, 2017

Pronk Pops Show 925,  July 10, 2017

Pronk Pops Show 924,  July 6, 2017

Pronk Pops Show 923,  July 5, 2017

Pronk Pops Show 922,  July 3, 2017 

Pronk Pops Show 921,  June 29, 2017

Pronk Pops Show 920,  June 28, 2017

Pronk Pops Show 919,  June 27, 2017

Pronk Pops Show 918,  June 26, 2017 

Pronk Pops Show 917,  June 22, 2017

Pronk Pops Show 916,  June 21, 2017

Pronk Pops Show 915,  June 20, 2017

Pronk Pops Show 914,  June 19, 2017

Pronk Pops Show 913,  June 16, 2017

Pronk Pops Show 912,  June 15, 2017

Pronk Pops Show 911,  June 14, 2017

Pronk Pops Show 910,  June 13, 2017

Pronk Pops Show 909,  June 12, 2017

Pronk Pops Show 908,  June 9, 2017

Pronk Pops Show 907,  June 8, 2017

Pronk Pops Show 906,  June 7, 2017

Pronk Pops Show 905,  June 6, 2017

Pronk Pops Show 904,  June 5, 2017

Pronk Pops Show 903,  June 1, 2017

Pronk Pops Show 902,  May 31, 2017

Pronk Pops Show 901,  May 30, 2017

Pronk Pops Show 900,  May 25, 2017

Pronk Pops Show 899,  May 24, 2017

Pronk Pops Show 898,  May 23, 2017

Pronk Pops Show 897,  May 22, 2017

Pronk Pops Show 896,  May 18, 2017

Pronk Pops Show 895,  May 17, 2017

Pronk Pops Show 894,  May 16, 2017

Pronk Pops Show 893,  May 15, 2017

Pronk Pops Show 892,  May 12, 2017

Pronk Pops Show 891,  May 11, 2017

Pronk Pops Show 890,  May 10, 2017

Pronk Pops Show 889,  May 9, 2017

Pronk Pops Show 888,  May 8, 2017

Pronk Pops Show 887,  May 5, 2017

Pronk Pops Show 886,  May 4, 2017

Pronk Pops Show 885,  May 3, 2017

Pronk Pops Show 884,  May 1, 2017

Pronk Pops Show 883 April 28, 2017

Pronk Pops Show 882: April 27, 2017

Pronk Pops Show 881: April 26, 2017

Pronk Pops Show 880: April 25, 2017

Pronk Pops Show 879: April 24, 2017

Pronk Pops Show 878: April 21, 2017

Pronk Pops Show 877: April 20, 2017

Pronk Pops Show 876: April 19, 2017

Pronk Pops Show 875: April 18, 2017

Pronk Pops Show 874: April 17, 2017

Pronk Pops Show 873: April 13, 2017

Pronk Pops Show 872: April 12, 2017

Pronk Pops Show 871: April 11, 2017

Pronk Pops Show 870: April 10, 2017

Pronk Pops Show 869: April 7, 2017

Pronk Pops Show 868: April 6, 2017

Pronk Pops Show 867: April 5, 2017

Pronk Pops Show 866: April 3, 2017

Image result for cartoons obama, rice, brennan spied on trump and american peopleImage result for rice, power, brennan unmasking of americans

Image result for cartoons obama spied on american people using NSAImage result for rice, power, brennan unmasking of americansImage result for rice, power, brennan unmasking of americans

Story 1:Obama Spy Scandal: Obama Administration Officials Including National Security Adviser Rice, CIA Director Brennan and United Nations Ambassador Power Spied On American People and Trump Campaign By Massive Unmasking Using Intelligence Community For Political Purposes — An Abuse of Power and Felonies Under U.S. Law — Videos

Nunes updates the DNI on the status of the unmasking probe

Obama in HELL! NSA Privacy Violation Reveals Obama Admin| Hannity splitting Fire

Obama In Hiding After Newly Declassified Docs Reveal His SICKENING Illegal Activities As Presideny

House Judiciary Committee Approves Investigation of Comey, Lynch, Hillary, Bill, and Obama!

Declassified memos reveal Obama admin NSA privacy violations

ObamaGate Returns Obama Took One Look At These Newly Declassified Documents And Fainted

More Obama Admin Officials Will Reportedly Be Scrutinized in ‘Unmasking’ Probe

SARA CARTER FULL ONE-ON-ONE EXPLOSIVE INTERVIEW WITH SEAN HANNITY 5_30_2017 (old news)

TRUMP WAS RIGHT; Latest Deep State Leak Proves Obama Was Spying on Trump Campaign Early On

Rand Paul on Obama Illegally Spying on Americans | NSA Wiretapping

FBI, CIA and NSA served with subpoenas in unmasking probe

Comey Covered Up Massive Obama Admin Spying Activities on US Public – Including Citizen Trump

BREAKING: Obama Caught Spending $36.2 MILLION To Cover This Up. He’s a Criminal

OBAMA SPY SCANDAL: Nunes Just Said The FIVE Words That Will Wreck Obama

Obama’s CIA Head Just LIED To Trey Gowdy, Instantly Regrets It

Hannity : Circa News reports Obama’s FBI illegally shared spy data about Americans : 5/25/2017

Trey Gowdy SNAPS On Susan Rice About Leaks And Lies

President Obama went to British intelligence to spy on Trump for him! – Judge Napolitano

Lewandowski Accuses Obama of Spying on Sessions ‘While He Was in His U.S. Senate Office’

SkyWatchTV News 4/4/17: Unmasking Obama’s Spying on Trump

NSA Surveillance and What To Do About It

How the Government Tracks You: NSA Surveillance

America’s Surveillance State (Full, Pt. 1-6)

Obama Nailed! Bigtime! by Mark Levin. Watch This!

Here’s Gowdy, Mukasey, and Clapper on Wiretapping!

“Obama’s statement is PATHETIC”, FUMES Mark Levin over TRUMP victimized by WIRETAPPING

NSA Whistleblower Bill Binney on Tucker Carlson 03.24.2017

NSA Whistleblower: Everyone in US under virtual surveillance, all info stored, no matter the post

NSA Whistleblower William Binney: The Future of FREEDOM

Thomas Drake 60 Minutes Documentary

United States Secrets | Award Winning Frontline Documentary | Snowden Leaks | The Program | 1 of 2

United States Secrets | NSA Prism | Award Winning Frontline Documentary | Part 2 of 2

NSA Whistleblower – Jesselyn Radack & Thomas Drake | London Real

Susan Rice TURNS On Obama, Makes Stunning Confession About Wiretapping Trump

Trey Gowdy to MSNBC reporter “Susan Rice will go to Jail”

BIGGER THAN WATERGATE! WHAT SUSAN RICE JUST DID WILL HAVE HILLARY AND OBAMA SCREAMING

Donald Trump’s Administration Has Already Been Spied On | Rand Paul on Wiretap and Obamacare

RUSH: ‘Very Clear’ Obama Admin Spied On Trump And Rice Is Lying Because Those Things Happened Before

Is it time to admit Obama admin spied on the Trump team?

Trump, His Family, Alex Jones and Sheriff Spied On By Obama Administration

‘State of Surveillance’ with Edward Snowden and Shane Smith (VICE on HBO: Season 4, Episode 13)

Obama Expands NSA Spying On His Way Out The Door

NSA has expanded warrantless web spying: Report

Limitless Surveillance and the Death of Privacy: Inside the FISA/Echelon Spy Grid – Annie Machon

Must watch video !!! This video received over 44,000,000 views over night. Wake up America.

Obama’s Presidency Flawlessly Dismantled By Thomas Sowell

Thomas Sowell – Worst President Ever

Enemy Of The State 1998 Will Smith Movies

The Negotiator (10/10) Movie CLIP – Do You Like Westerns? (1998) HD

 

Newly declassified memos detail extent of improper Obama-era NSA spying

The National Security Agency and FBI violated specific civil liberty protections during the Obama administration by improperly searching and disseminating raw intelligence on Americans or failing to promptly delete unauthorized intercepts, according to newly declassified memos that provide some of the richest detail to date on the spy agencies’ ability to obey their own rules.

The memos reviewed by The Hill were publicly released on July 11 through Freedom of Information Act litigation by the American Civil Liberties Union.

They detail specific violations that the NSA or FBI disclosed to the Foreign Intelligence Surveillance Court or the Justice Department’s national security division during President Obama’s tenure between 2009 and 2016. The intelligence community isn’t due to report on compliance issues for 2017, the first year under the Trump administration, until next spring.

The NSA says that the missteps amount to a small number — less than 1 percent — when compared to the hundreds of thousands of specific phone numbers and email addresses the agencies intercepted through the so-called Section 702 warrantless spying program created by Congress in late 2008.

“Quite simply, a compliance program that never finds an incident is not a robust compliance program,” said Michael Halbig, the NSA’s chief spokesman. “The National Security Agency has in place a strong compliance program that identifies incidents, reports them to external overseers, and then develops appropriate solutions to remedy any incidents.”

But critics say the memos undercut the intelligence community’s claim that it has robust protections for Americans incidentally intercepted under the program.

“Americans should be alarmed that the NSA is vacuuming up their emails and phone calls without a warrant,” said Patrick Toomey, an ACLU staff attorney in New York who helped pursue the FOIA litigation. “The NSA claims it has rules to protect our privacy, but it turns out those rules are weak, full of loopholes, and violated again and again.”

Section 702 empowers the NSA to spy on foreign powers and to retain and use certain intercepted data that was incidentally collected on Americans under strict privacy protections. Wrongly collected information is supposed to be immediately destroyed.

The Hill reviewed the new ACLU documents as well as compliance memos released by the NSA inspector general and identified more than 90 incidents where violations specifically cited an impact on Americans. Many incidents involved multiple persons, multiple violations or extended periods of time.

For instance, the government admitted improperly searching the NSA’s foreign intercept data on multiple occasions, including one instance in which an analyst ran the same search query about an American “every work day” for a period between 2013 and 2014.

There also were several instances in which Americans’ unmasked names were improperly shared inside the intelligence community without being redacted, a violation of the so-called minimization procedures that Obama loosened in 2011 that are supposed to protect Americans’ identity from disclosure when they are intercepted without a warrant. Numerous times improperly unmasked information about Americans had to be recalled and purged after the fact, the memos stated.

“CIA and FBI received unminimized data from many Section 702-tasked facilities and at times are thus required to conduct similar purges,” one report noted.

“NSA issued a report which included the name of a United States person whose identity was not foreign intelligence,” said one typical incident report from 2015, which said the NSA eventually discovered the error and “recalled” the information.

Likewise, the FBI disclosed three instances between December 2013 and February 2014 of “improper disseminations of U.S. persons identities.”

The NSA also admitted it was slow in some cases to notify fellow intelligence agencies when it wrongly disseminated information about Americans. The law requires a notification within five days, but some took as long as 131 business days and the average was 19 days, the memos show.

U.S. intelligence officials directly familiar with the violations told The Hill that the memos confirm that the intelligence agencies have routinely policed, fixed and self-disclosed to the nation’s intelligence court thousands of minor procedural and more serious privacy infractions that have impacted both Americans and foreigners alike since the warrantless spying program was created by Congress in late 2008.

Alexander Joel, who leads the Office of Civil Liberties, Privacy and Transparency under the director of national intelligence, said the documents chronicle episodes that have been reported to Congress and the Foreign Intelligence Surveillance Court for years in real time and are a tribute to the multiple layers of oversight inside the intelligence community.

“We take every compliance incident very seriously and continually strive to improve compliance through our oversight regime and as evidence by our reporting requirements to the FISC and Congress,” he told The Hill. “That said, we believe that, particularly when compared with the overall level of activity, the compliance incident rate is very low.”
The FBI said it believes it has adequate oversight to protect Americans’ privacy, while signaling it will be pushing Congress hard this fall to renew the Section 702 law before it expires.

“The FBI’s mission is to protect the American people and uphold the Constitution of the United States,” the bureau said in a statement to The Hill. “When Congress enacted Section 702, it built in comprehensive oversight and compliance procedures that involve all three branches of government. These procedures are robust and effective in identifying compliance incidents. The documents released on July 11, 2017 clearly show the FBI’s extensive efforts to follow the law, and to identify, report, and remedy compliance matters.

“Section 702 is vital to the safety and security of the American people. It is one of the most valuable tools the Intelligence Community has, and therefore, is used with the utmost care by the men and women of the FBI so as to not jeopardize future utility. As such, we continually evaluate our internal policies and procedures to further reduce the number of these compliance matters.”

The new documents show that the NSA has, on occasion, exempted itself from its legal obligation to destroy all domestic communications that were improperly intercepted.

Under the law, the NSA is supposed to destroy any intercept if it determines the data was domestically gathered, meaning someone was intercepted on U.S. soil without a warrant when the agency thought they were still overseas. The NSA, however, has said previously it created “destruction waivers” to keep such intercepts in certain cases.

The new documents confirm the NSA has in fact issued such waivers and that it uncovered in 2012 a significant violation in which the waivers were improperly used and the infraction was slow to be reported to the court.

“In light of related filings being presented to the Court at the same time this incident was discovered and the significance of the incident, DOJ should have reported this incident under the our immediate notification process,” then-Assistant Attorney General Lisa Monaco wrote the FISA court in Aug. 28, 2012, about the episode, according to one memo released through FOIA.

The NSA declined to say how often destruction waivers are given. But Joel, of the Office of the Director of National Intelligence, said the Foreign Intelligence Surveillance Court has supervised such waivers and affirmed they are “consistent with the Fourth Amendment of the Constitution and the statutory requirements of Section 702.”

Other violations cited in the memos:

  • Numerous “overcollection incidents” in which the NSA gathered information about foreigners or Americans it wasn’t entitled to intercept
  • “Isolated instances in which NSA may not have complied with the documentation requests” justifying intercepts or searches of intercepted data.
  • The misuse of “overly broad” queries or specific U.S. person terms to search through NSA data.
  • Failures to timely purge NSA databases of improperly collected intelligence, such as a 2014 incident in which “NSA reported a gap in its purge discovery processes.”

In annual and quarterly compliance reports that have been released in recent years, U.S. intelligence agencies have estimated the number of Section 702 violations has averaged between 0.3 percent and 0.6 percent of the total number of “taskings.” A tasking is an intelligence term that reflects a request to intercept a specific phone number or email address.

The NSA now targets more than 100,000 individuals a year under Section 702 for foreign spying, and some individual targets get multiple taskings, officials said.

“The actual number of compliance incidents remains classified but from the publicly available data it is irrefutable that the number is in the thousands since Section 702 was fully implemented by 2009,” said a senior U.S. official with direct knowledge, who spoke only on condition of anonymity.

The increasing transparency on Section 702 violations is having an impact on both critics and supporters of a law that is up for renewal in Congress at the end of this year. Of concern are the instances in which Americans’ data is incidentally collected and then misused.

Retired House Intelligence Committee Chairman Pete Hoekstra, a Republican who strongly supported the NSA warrantless spying program when it started under President George W. Bush, said he now fears it has now become too big and intrusive.

“If I were still in Congress today, I might vote with the people today to shut the program down or curtail it,” Hoekstra, who has been tapped by Trump to be ambassador to the Netherlands, said in an interview.

“One percent or less sounds great, but the truth is 1 percent of my credit card charges don’t come back wrong every month. And in my mind one percent is pretty sloppy when it can impact Americans’ privacy.”

http://thehill.com/policy/national-security/343785-newly-declassified-memos-detail-extent-of-improper-obama-era-nsa

 

Newly declassified memos detail extent of improper Obama-era NSA spying

The Obama administration’s illegal spying may have been worse than Watergate.

In 1972, some employees of President Nixon’s re-election committee were caught when they broke into the Democratic National Committee headquarters to plant a bug. This led to Nixon’s resignation and probably would have led to his felony prosecution had he not been pardoned by his successor, Gerald Ford.

But if a single bugging of the political opposition is enough to bring down a presidency — and maybe lead to an unprecedented criminal prosecution of a former president — then what are we to make of the recently unveiled Obama administration program of massively spying on political opponents in violation of clearly established law?

Because that’s what was unveiled last week.

When the FBI wants to wiretap a domestic suspect, it goes to court for a warrant. But when listening in on foreigners, the National Security Agency hoovers up a vast amount of stuff in bulk: Conversations between foreigners, conversations between Americans and foreigners, conversations between Americans who mention foreigners, and sometimes just plain old conversations between Americans.

There are supposed to be strict safeguards on who can access the information, on how it can be used and on protecting American citizens’ privacy — because the NSA is forbidden by law from engaging in domestic spying. These safeguards were ignored wholesale under the Obama administration, and to many Republicans, it is no coincidence that intelligence leaks damaged Democrats’ political opponents in the 2016 election.

A report from journalists John Solomon and Sara Carter last week, based on recently declassified documents, exposed what went on. As Solomon and Carter write:

More than 5%, or one out of every 20, searches seeking upstream Internet data on Americans inside the NSA’s so-called Section 702 database violated the safeguards President Obama and his intelligence chiefs vowed to follow in 2011, according to one classified internal report reviewed by Circa. …

The normally supportive court censured administration officials, saying that the failure to disclose the extent of the violations earlier amounted to an “institutional lack of candor,” and that the improper searches constituted a “very serious Fourth Amendment issue,” according to a recently unsealed court document dated April 26.

The admitted violations undercut one of the primary defenses that the intelligence community and Obama officials have used in recent weeks to justify their snooping into incidental NSA intercepts about Americans. …  The American Civil Liberties Union said the newly disclosed violations are some of the most serious to ever be documented and strongly call into question the U.S. intelligence community’s ability to police itself and safeguard Americans’ privacy as guaranteed by the Constitution’s Fourth Amendment protections against unlawful search and seizure.

As former anti-terrorism prosecutor and national security expert Andrew McCarthy writes in National Review, this is a very serious abuse. And potentially a crime. If such material were leaked to the press for political advantage, that’s another crime.

McCarthy observes: “Enabling of domestic spying, contemptuous disregard of court-ordered minimization procedures (procedures the Obama administration itself proposed, then violated), and unlawful disclosure of classified intelligence to feed a media campaign against political adversaries. Quite the Obama legacy.”

 Will the Justice Department investigate and prosecute former Obama officials? It seems hard to imagine. But then, so did Nixon’s resignation, when the Watergate burglary was first discovered.

This debacle also raises serious questions about the viability of our existing “intelligence community.” In the post-World War II era, we gave massive power to the national security apparatus. In part, that power was granted in the belief that professionalism and patriotism would lead people in those agencies to refuse to let their work be used for partisan political purposes.

It now seems apparent that we overestimated the patriotism and professionalism of the people in these agencies, who allowed them to be politically weaponized by the Obama administration. That being true, if we value democracy, can we permit them to exist in their current form?

That’s a decision that President Trump and Congress will have to face. Ironically, they may be afraid to — for fear that intelligence agencies will engage in further targeted political leaks.

Glenn Harlan Reynolds, a University of Tennessee law professor and the author of The New School: How the Information Age Will Save American Education from Itself, is a member of USA TODAY’s Board of Contributors.

https://www.usatoday.com/story/opinion/2017/05/30/obama-admin-illegal-spying-worse-than-watergate-glenn-reynolds-column/102284058/

 

 

Declassified Memos Show Obama’s NSA Spied On Americans Way More Than You Thought

Back in May the Foreign Intelligence Surveillance Court (FISA) found that the National Security Agency (NSA), under former President Obama, routinely violated American privacy protections while scouring through overseas intercepts and failed to disclose the extent of the problems until the final days before Donald Trump was elected president last fall.   

“The October 26, 2016 Notice disclosed that an NSA Inspector General (IG) review…indicated that, with greater frequency than previously disclosed to the Court, NSA analysts had used U.S.-person identifiers to query the result of Internet “upstream” collection, even though NSA’s section 702 minimization procedures prohibited such queriesthis disclosure gave the Court substantial concern.”

FISA

The court order went on to reveal that NSA analysts had been conducting illegal queries targeting American citizens “with much greater frequency than had previously been disclosed to the Court”…an issue which the court described as a “very serious Fourth Amendment issue.”

“Since 2011, NSA’s minimization procedures have prohibited use of U.S.-person identifiers to query the results of upstream Internet collection under Section 702.  The October 26, 2016 Notice informed the Court that NSA analysts had been conducting such queries in violation of that prohibition, with much greater frequency than had previously been disclosed to the Court.”

“At the October 26, 2016 hearing, the Court ascribed the government’s failure to disclose those IG and OCO reviews at the October 4, 2016 hearing to an institutional ‘lack of candor’ on NSA’s part and emphasized that ‘this is a very serious Fourth Amendment issue.'”

FISA

For instance, the government admitted improperly searching NSA’s foreign intercept data on multiple occasions, including one instance in which an analyst ran the same search query about an American “every work day” for a period between 2013 and 2014.

There also were several instances in which Americans’ unmasked names were improperly shared inside the intelligence community without being redacted, a violation of the so-called minimization procedures that President Obama loosened in 2011 that are supposed to protect an Americans’ identity from disclosure when they are intercepted without a warrant. Numerous times improperly unmasked information about Americans had to be recalled and purged after the fact, the memos stated.

“CIA and FBI received unminimized data from many Section 702-tasked facilities and at times are thus required to conduct similar purges,” one report noted.

“NSA issued a report which included the name of a United States person whose identity was not foreign intelligence,”said one typical incident report from 2015, which said the NSA eventually discovered the error and “recalled” the information.

Likewise, the FBI disclosed three instances between December 2013 and February 2014 of “improper disseminations of U.S. persons identities.”

Samples of other violations included:

  • Numerous “overcollection incidents” where the NSA gathered information about foreigners or Americans it wasn’t entitled to intercept
  • “Isolated instances in which NSA may not have complied with the documentation requests” justifying intercepts or searches of intercepted data.
  • The misuse of “overly broad” queries or specific U.S. person terms to search through NSA data.
  • Failures to timely purge NSA databases of improperly collected intelligence, such as a 2014 incident in which “NSA reported a gap in its purge discovery processes.”

Americans should be alarmed that the NSA is vacuuming up their emails and phone calls without a warrant,” said Patrick Toomey, an ACLU staff attorney in New York who helped pursue the FOIA litigation. “The NSA claims it has rules to protect our privacy, but it turns out those rules are weak, full of loopholes, and violated again and again.”

“If I were still in Congress today, I might vote with the people today to shut the program down or curtail it,” Hoekstrak, who has been tapped by Trump to be ambassador to the Netherlands, said in an interview.

Of course, the NSA would like for you to take solace in the fact that they spy on you so much that the 1,000’s of reported violations only amount to ~1% of the estimated “taskings.”

In annual and quarterly compliance reports that have been released in recent years, U.S. intelligence agencies have estimated the number of Section 702 violations has averaged between 0.3 percent and 0.6 percent of the total number of “taskings.” A tasking is an intelligence term that reflects a request to intercept a specific phone number or email address.

“Quite simply, a compliance program that never finds an incident is not a robust compliance program,” said Michael T. Halbig, the NSA’s chief spokesman. “…The National Security Agency has in place a strong compliance program that identifies incidents, reports them to external overseers, and then develops appropriate solutions to remedy any incidents.”

Though we do wonder whether our government would be as dismissive if American citizens just decided to keep 1% of the taxes they owe each year…somehow we suspect the IRS wouldn’t be so forgiving of such a ‘small’ error-rate.

http://www.zerohedge.com/news/2017-07-26/declassified-memos-show-obamas-nsa-spied-americans-way-more-you-thought

 

CIA Sought FBI Probe Into Russian Targeting of Trump Campaign

Brennan says Trump campaign contacts with Russians coincided with Moscow’s election hacking

Former Director of the CIA John Brennan

Former director of the CIA John Brennan / Getty Images

BY: 
May 23, 2017 3:59 pm

Former CIA Director John Brennan told a House hearing on Tuesday the CIA first asked the FBI last summer to investigate contacts between Russian intelligence officials and Americans in the Trump campaign.

Skirting concerns involving classified information, John Brennan, President Obama’s CIA chief, provided few details on the intelligence related to Russian recruitment attempts against Trump aides, who he described as “U.S. persons.”

Asked if there was collusion between the Trump campaign and Russia, Brennan said he did not know. But he said Russian intelligence was actively seeking to suborn Americans and that a number of contacts had taken place with campaign officials.

“I encountered and am aware of information and intelligence that revealed contacts and interactions between Russian officials and U.S. persons involved in the Trump campaign that I was concerned about because of known Russian efforts to suborn such individuals, and it raised questions in my mind whether or not the Russians were able gain the cooperation of those individuals, ” Brennan told the House Permanent Select Committee on Intelligence.

“I don’t know whether or not such ‘collusion’ existed. I don’t know,” he added. “But there was a sufficient basis of information and intelligence that required further investigation to determine whether U.S. persons were actively conspiring, colluding with Russian officials.”

Brennan testified that he knew the names of the Americans but declined to provide the names in the public hearing. He also did not describe the nature of the intelligence on the Americans.

Brennan, a career CIA analyst, was considered among the CIA’s more liberal directors. As a student he voted for a Communist Party USA candidate for president, Gus Hall, during the height of the Cold War. He voiced worries the vote for a communist president would disqualify him from a job in the CIA when he joined in 1980.

As CIA director, Brennan initiated a number of reforms that critics say have weakened the agency, including weakening the CIA operations directorate, its spying branch, by mixing in analysts with espionage and covert action specialists.

Brennan said in July he set up a task force that included FBI agents and National Security Agency officials to look into Russian election meddling. Sometime last summer, he then formally referred intelligence reports on the Russia-Trump campaign contacts to the FBI for further investigation.

The testimony is part of the House committee’s investigation into whether Russian intelligence was able to penetrate the Trump presidential election campaign. It is also investigating how electronic intelligence related to the U.S. investigations of the matter was leaked to the press.

Brennan, in declining to specify the CIA intelligence on the Russian contacts, said documents related to the matter have been provided to the committee by the agency.

FBI Director James Comey announced to Congress in March that the FBI was conducting a counterintelligence probe into “any links between individuals associated with the Trump campaign and the Russian government, and whether there was any coordination between the campaign and Russia’s efforts.”

President Trump has dismissed the Russian collusion allegations as a hoax. He fired Comey earlier this month in part over concerns that the FBI was pursuing an unwarranted probe into the Russia ties.

A Justice Department special counsel, former FBI Director Robert Mueller, was appointed earlier this month to investigate the Russian effort to penetrate the Trump campaign.

Brennan was asked several times during the hearing whether he could confirm collusion between the Trump campaign and the Russians and said he could not. However, the context of the contacts—Russian intelligence had hacked and disseminated Democratic Party-related documents—raised concerns that he said needed to be investigated.

Brennan said, “I felt as though the FBI investigation was certainly well-founded and needed to look into those issues.”

Brennan said on August 4 that he spoke to Alexander Bortnikov, director of Russia’s Federal Security Service, the main intelligence agency, as part of an intelligence-sharing arrangement related to Syria.

The former CIA chief then complained about Russian mistreatment of U.S. diplomats in Moscow before shifting to the topic of Russian election meddling.

“I next raised the published media reports of Russian attempts to interfere in our upcoming presidential election,” he said. “I told Mr. Bortnikov that if Russia had such a campaign underway, it would be certain to backfire. I said that all Americans regardless of political affiliation or whom they might support in the election cherish their ability to elect their own leaders without outside interference or disruption. I said American voters would be outraged by any Russian attempt to interfere in election.”

The FBI counterspy probe had begun about two months earlier. Brennan was not asked during the hearing whether he raised Russian attempts to try and recruit Trump campaign officials during the conversation with Bortnikov.

Bortnikov, in the conversation, denied Moscow was engaged in an influence operation against the election, Brennan said.

Brennan also disclosed under questioning that the FBI sought to pursue information contained in a private intelligence dossier done by former British intelligence officer Christopher Steele.

The CIA did not rely on the dossier for its intelligence reporting on Russian activities related to the campaign. “It wasn’t part of the corpus of intelligence” on Russian influence activities and was not made part of the final report, Brennan said.

The FBI, however, tried to confirm elements of the report, Brennan noted.

The dossier, produced by a private company linked to the Democratic Party, asserted that Russia has been “cultivating, supporting and assisting” Trump for five years. The document has been widely discredited as containing false information, however.

Rep. Chris Stewart (R., Utah) said he has reviewed raw CIA intelligence related to the intelligence community assessment of Russian election meddling and said he does not agree with its conclusion that Moscow sought to boost Trump’s chances of winning.

“I don’t agree with the conclusion [of the intelligence community assessment] particularly that it’s such a high level of confidence,” Stewart said.

“I just think there should have been allowances made for some of the ambiguity in that, and especially for those who didn’t share in the conclusion that there is a high degree of confidence.”

Allegations of Russian collusion with the Trump campaign remain unconfirmed but have set off a bitter political battle.

Democrats in Congress have charged the Russians secretly worked with Trump campaign associates to skew the election against the Democratic candidate, Hillary Clinton.

Since the election that brought Trump to power, many Democrats have alleged the win was the result of a conspiracy between Russian intelligence and the Trump campaign to defeat Clinton.

Republicans have questioned whether there is any solid evidence linking Moscow to the Trump campaign.

Congressional Republicans also are investigating whether highly classified intelligence gathered against foreign officials in the United States was misused to gather political intelligence against Trump and his transition team.

Rep. Devin Nunes (R., Calif.), the House intelligence committee chairman, has charged that documents he has reviewed indicate that Americans were improperly spied on during an Obama administration foreign intelligence monitoring operation between November and January—the period when the Trump transition team was functioning.

Nunes, who was sidelined from the Russian investigation by an ethics probe related to the intelligence disclosures, also has said there are indications intelligence agencies may have improperly “unmasked” the identities of Americans that are normally blacked out in foreign intelligence reports to protect privacy rights.

The New York Times reported in March that during this period, the Obama administration was frantically seeking to uncover and preserve intelligence on Russia-Trump campaign ties, fearing the new president would destroy it once in power.

Three Trump aides have been the focus of the Democrats’ allegations. They include former White House National Security Adviser Michael Flynn, former Trump campaign manager Paul Manafort, and unofficial campaign adviser Carter Page.

“Every day the American public is bombarded with news about the Russian interference in our elections,” said the committee’s acting chairman, Rep. Mike Conaway (R., Texas).

“Many of [these] reports are false and/or misleading,” he said. “Today is an opportunity to focus on the truth and the truth can be only found through a full and fair investigation of all the facts.”

Committee Vice Chairman, Rep. Adam Schiff (D., Calif.) called the Russian influence operation during the 2016 campaign “an unprecedented attack on our democratic institutions.”

Schiff during earlier hearings had asked several questions of intelligence and law enforcement witnesses based on the discredited dossier.

http://freebeacon.com/politics/cia-sought-fbi-probe-russian-targeting-trump-campaign/

Trump’s Tweets Don’t Excuse Media Ignoring Obama Surveillance Story

The media need to separate anger over Trump’s unfounded wiretap tweets from legitimate questions about Obama administration surveillance.

By Mollie Hemingway

In an interview released earlier this week, John Dickerson of CBS News asked President Donald Trump 10 times about his claims of surveillance by the Obama administration. Dickerson began by asking if Obama had given Trump any helpful advice. Trump said Obama had been nice but that words were less important to him than deeds, and referenced “surveillance.”

Trump said the surveillance was inappropriate and Dickerson asked him what that meant. They went back and forth a bit, with Dickerson asking if Trump stood by his claims regarding Obama being “sick and bad” — a reference to his March tweets claiming Trump Tower had been wiretapped.

Let’s revisit those tweets from March 4. They said:

  • Terrible! Just found out that Obama had my “wires tapped” in Trump Tower just before the victory. Nothing found. This is McCarthyism!
  • Is it legal for a sitting President to be “wire tapping” a race for president prior to an election? Turned down by court earlier. A NEW LOW!
  • I’d bet a good lawyer could make a great case out of the fact that President Obama was tapping my phones in October, just prior to Election!
  • How low has President Obama gone to tapp my phones during the very sacred election process. This is Nixon/Watergate. Bad (or sick) guy!

Now, by the time Trump tweeted this in early March, it had been reported for months that Trump Tower had been wiretapped in October, but the reporting was mostly done by conspiracy theorist Louise Mensch, so it was not taken very seriously. She had also reported that an initial request for a FISA warrant against Trump and associates had been turned down.

The media responded to these tweets from the president by, reasonably, asking him for proof of President Obama literally wiretapping Trump Tower. No evidence of wiretaps being laid down in Trump Tower has been provided by the president or anyone else. Congressional committees investigating both Russian meddling and illegal leaks by U.S. officials have said they have no evidence of literal wiretaps, much less ones placed personally by President Obama. And intelligence agency chiefs have said they have no evidence of literal wiretaps of Trump Tower.

Because President Trump made incendiary and unsubstantiated claims about wiretapping that he’s been unable to prove, the media have interpreted this, for some reason, as an excuse to pretend that there is nothing at all whatsoever to claims that the Obama administration spied on members of the Trump campaign and the incoming administration. That question — of surveillance of Trump and associates by intelligence agencies — is a separate question from whether President Obama snuck into Trump Tower one night on hands and knees to personally lay down some taps on Trump’s phone lines.

When I’ve raised this point with journalists, most if not all of them have been unable to separate these issues. Some have accused me of wanting to talk about Obama administration surveillance against Trump in order to defend Trump’s erroneous tweets. One claimed I was “twisting theories to try to make a Trump falsehood true.” Wrong. I’ve repeatedly acknowledged that Trump has provided no evidence for his surveillance tweets. With full credit to the literal-serious divide on the president’s rhetoric, he should be more precise with his language if he wanted to talk about general surveillance instead of the comparatively specific claims he made in his tweets.

In any case, I’m beginning to wonder if journalists’ refusal to discuss, much less really dig into, the information collection and dissemination on Trump associates is itself a desire to not give any credence to Trump’s more outlandish claims in his tweets. It reminds me a bit of an ex-boyfriend who accused me of cheating on him. I wasn’t, but he was not faithful.

Journalists need to know that they can and should separate Trump’s irresponsible tweets from the general questions about Obama officials and others in intelligence agencies surveilling a political campaign and presidential transition.

A ‘Shockingly High Percentage’

Last week, ABC News and the Washington Post put out a poll that “alarmed” CNN’s Jake Tapper. He focused on it for an end-of-show lecture on fake news. “A shockingly high percentage of Americans believe President Obama intentionally spied on Donald Trump and members of his campaign,” Tapper reported.

He mentioned Trump’s tweets and showed clips of Speaker of the House Paul Ryan and FBI Director James Comey saying there was no evidence of wiretaps. He could have mentioned the many other knowledgeable people denying the presence of a Trump Tower wiretap. He went on:

So that would have seemingly been that, except that the president and his team kept pushing ways to try to make this evidence-free claim somewhere sort of possibly in the neighborhood of almost not entirely false. Now they failed, but they muddied the waters quite a bit. And now here are the shocking numbers from today.

32 percent of the public thinks President Obama intentionally spied on Donald Trump and members of his campaign and 52 percent of Republicans believe this charge. A charge that there is literally no evidence to support. It is the definition of fake news.

There are several problems with this complaint. The poll question was fairly broad, if awkwardly worded. The wording is slightly different than characterized above. It was: “Do you think the Obama administration intentionally spied on Trump and members of his campaign during the 2016 election campaign, or not?” What is “intentional” spying referring to, exactly? And would respondents have an agreement about what that means? Who is considered a part of the Obama administration, exactly? Is the timing of the question meant to exclude the leaks that occurred after Trump won the election? After the Electoral College voted? Until inauguration?

Still, the only shocking thing about the number is that it isn’t higher. What Tapper doesn’t mention is that CNN itself reported the previous week that the FBI began spying on a Trump campaign advisor last summer. Here’s how their story began:

The FBI last year used a dossier of allegations of Russian ties to Donald Trump’s campaign as part of the justification to win approval to secretly monitor a Trump associate, according to US officials briefed on the investigation.

That story, which probably arose out of a desire to cushion the blow from questions Sen. Chuck Grassley began asking about the FBI’s use of a shady and discredited dossier, explained that the FBI was spying on a member of the Trump campaign named Carter Page. I repeat, the FBI had secured a FISA warrant to spy on a member of the Trump campaign, according to CNN. I know that the media have serious credibility problems, but you can’t get mad at people for believing what you report.

The FBI is in the executive branch’s Justice Department, although its intelligence activities are overseen by the director of national intelligence. Obama’s DNI was James Clapper, who has repeatedly denied the frequent speculation of his involvement with leaks against Trump.

Another complicating factor is what we know about unmasking of Trump associates. In an era where nearly all the stories regarding intelligence officials leaking information on Trump come from anonymous sources, we have Rep. Devin Nunes, who chairs the House Intelligence Committee, saying on the record that he’d seen documents that show:

1) Information was collected on the Trump team by Obama administration agencies.
2) This information, which was politically valuable, had little to no reason to be shared in intelligence reports to Obama officials, but was disseminated widely.
3) Obama officials may have flouted legally required attempts to minimize and mask personal identifying information.
4) The unmasking had nothing to do with Russia.

It was later reported that Susan Rice, President Obama’s national security advisor, was one of the Obama officials who had requested the unmasking. While some anonymous sources, some of whom have been included in news reports despite not having seen the documents in question, claim there are non-nefarious reasons for such unmasking and dissemination of politically sensitive information on political opponents, it doesn’t change the claim that unmasking and dissemination of politically valuable information with no intelligence value was committed by the Obama administration.

Would it be reasonable to answer a question on the Obama administration spying on Trump and associates in the affirmative with the knowledge of this claim of unmasking and dissemination of politically sensitive information with little to no intelligence value?

Our media have been little other than anonymous leak receptacles for months. Whether it was leaks about Trump campaign associates supposedly having nefarious ties to Russia, the criminal leak of Mike Flynn’s name, the criminal leak of information about a FISA warrant being secured against Carter Page, the orchestrated release of information about the presentation of a shoddy dossier to President-elect Trump and President Obama, or any of the dozens of leaks used to orchestrate a Russia scare narrative, it doesn’t take a tremendous amount of smarts to figure out that when transcripts or snippets of information are shipped to reporters, the information must first be collected via surveillance and other means. Many of these leaks were sourced to senior intelligence officials during the last days of the Obama administration, after which many of these leaks were sourced to former senior intelligence officials.

There’s also the issue that the same ABC News/Washington Post poll mentioned above showed that 72 percent of Clinton voters think not only that Russia tried to influence the election, but that the Trump campaign intentionally tried to assist such an effort. A few months ago, the last time I saw the question asked, a majority of voters believed that Russians had actually hacked the vote tallies in the election. Needless to say, there is as much evidence to support these claims as there is to support Trump’s wiretap tweets, which is to say none at all.

Is it more alarming that 52 percent of Republicans believe the Obama administration spied on the Trump campaign or that 72 percent of Clinton voters think that the Trump campaign coordinated with Russia in their hacking and release of Democratic emails? Is it embarrassing to mention the Clinton voter figure on account of how much media outlets have perpetuated this unfounded story?

In his segment, Tapper intoned:

We learned in the campaign that Donald Trump can be cavalier about facts and truth. We learned in his first 100 days that that’s not going to change. Indeed, that some in the government and some of his friends and conservative media will even work to tried and make his falsehoods seem true.

Again, while all of that may be true, it’s also true that we have a media establishment that works to downplay, denigrate, and dismiss legitimate stories if they fear that those stories in any way help a president they oppose.

That reflexive refusal to fairly cover — or just cover, period — stories that might help the president is not how readers or viewers are served. Journalists should go where the stories lead, even if they threaten to harm their best Obama intelligence sources and leakers from the last few months or help a president they worked very hard to defeat. If they need to mention their frustration with his tweets 18 times before they cover FISA warrants, unmasking, or other intelligence actions, that’s fine. But they can’t let that frustration keep them from covering a big story in the public interest.

https://www.usatoday.com/story/opinion/2017/05/30/obama-admin-illegal-spying-worse-than-watergate-glenn-reynolds-column/102284058/

The Pronk Pops Show Podcasts Portfolio

Listen To Pronk Pops Podcast or Download Shows 926-936

Listen To Pronk Pops Podcast or Download Shows 916-925

Listen To Pronk Pops Podcast or Download Shows 906-915

Listen To Pronk Pops Podcast or Download Shows 889-896

Listen To Pronk Pops Podcast or Download Shows 884-888

Listen To Pronk Pops Podcast or Download Shows 878-883

Listen To Pronk Pops Podcast or Download Shows 870-877

Listen To Pronk Pops Podcast or Download Shows 864-869

Listen To Pronk Pops Podcast or Download Shows 857-863

Listen To Pronk Pops Podcast or Download Shows 850-856

Listen To Pronk Pops Podcast or Download Shows 845-849

Listen To Pronk Pops Podcast or Download Shows 840-844

Listen To Pronk Pops Podcast or Download Shows 833-839

Listen To Pronk Pops Podcast or Download Shows 827-832

Listen To Pronk Pops Podcast or Download Shows 821-826

Listen To Pronk Pops Podcast or Download Shows 815-820

Listen To Pronk Pops Podcast or Download Shows 806-814

Listen To Pronk Pops Podcast or Download Shows 800-805

Listen To Pronk Pops Podcast or Download Shows 793-799

Listen To Pronk Pops Podcast or Download Shows 785-792

Listen To Pronk Pops Podcast or Download Shows 777-784

Listen To Pronk Pops Podcast or Download Shows 769-776

Listen To Pronk Pops Podcast or Download Shows 759-768

Listen To Pronk Pops Podcast or Download Shows 751-758

Listen To Pronk Pops Podcast or Download Shows 745-750

Listen To Pronk Pops Podcast or Download Shows 738-744

Listen To Pronk Pops Podcast or Download Shows 732-737

Listen To Pronk Pops Podcast or Download Shows 727-731

Listen To Pronk Pops Podcast or Download Shows 720-726

Listen To Pronk Pops Podcast or DownloadShows 713-719

Listen To Pronk Pops Podcast or DownloadShows 705-712

Listen To Pronk Pops Podcast or Download Shows 695-704

Listen To Pronk Pops Podcast or Download Shows 685-694

Listen To Pronk Pops Podcast or Download Shows 675-684

Listen To Pronk Pops Podcast or Download Shows 668-674

Listen To Pronk Pops Podcast or Download Shows 660-667

Listen To Pronk Pops Podcast or Download Shows 651-659

Listen To Pronk Pops Podcast or Download Shows 644-650

Listen To Pronk Pops Podcast or Download Shows 637-643

Listen To Pronk Pops Podcast or Download Shows 629-636

Listen To Pronk Pops Podcast or Download Shows 617-628

Listen To Pronk Pops Podcast or Download Shows 608-616

Listen To Pronk Pops Podcast or Download Shows 599-607

Listen To Pronk Pops Podcast or Download Shows 590-598

Listen To Pronk Pops Podcast or Download Shows 585- 589

Listen To Pronk Pops Podcast or Download Shows 575-584

Listen To Pronk Pops Podcast or Download Shows 565-574

Listen To Pronk Pops Podcast or Download Shows 556-564

Listen To Pronk Pops Podcast or Download Shows 546-555

Listen To Pronk Pops Podcast or Download Shows 538-545

Listen To Pronk Pops Podcast or Download Shows 532-537

Listen To Pronk Pops Podcast or Download Shows 526-531

Listen To Pronk Pops Podcast or Download Shows 519-525

Listen To Pronk Pops Podcast or Download Shows 510-518

Listen To Pronk Pops Podcast or Download Shows 500-509

Listen To Pronk Pops Podcast or Download Shows 490-499

Listen To Pronk Pops Podcast or Download Shows 480-489

Listen To Pronk Pops Podcast or Download Shows 473-479

Listen To Pronk Pops Podcast or Download Shows 464-472

Listen To Pronk Pops Podcast or Download Shows 455-463

Listen To Pronk Pops Podcast or Download Shows 447-454

Listen To Pronk Pops Podcast or Download Shows 439-446

Listen To Pronk Pops Podcast or Download Shows 431-438

Listen To Pronk Pops Podcast or Download Shows 422-430

Listen To Pronk Pops Podcast or Download Shows 414-421

Listen To Pronk Pops Podcast or Download Shows 408-413

Listen To Pronk Pops Podcast or Download Shows 400-407

Listen To Pronk Pops Podcast or Download Shows 391-399

Listen To Pronk Pops Podcast or Download Shows 383-390

Listen To Pronk Pops Podcast or Download Shows 376-382

Listen To Pronk Pops Podcast or Download Shows 369-375

Listen To Pronk Pops Podcast or Download Shows 360-368

Listen To Pronk Pops Podcast or Download Shows 354-359

Listen To Pronk Pops Podcast or Download Shows 346-353

Listen To Pronk Pops Podcast or Download Shows 338-345

Listen To Pronk Pops Podcast or Download Shows 328-337

Listen To Pronk Pops Podcast or Download Shows 319-327

Listen To Pronk Pops Podcast or Download Shows 307-318

Listen To Pronk Pops Podcast or Download Shows 296-306

Listen To Pronk Pops Podcast or Download Shows 287-295

Listen To Pronk Pops Podcast or Download Shows 277-286

Listen To Pronk Pops Podcast or Download Shows 264-276

Listen To Pronk Pops Podcast or Download Shows 250-263

Listen To Pronk Pops Podcast or Download Shows 236-249

Listen To Pronk Pops Podcast or Download Shows 222-235

Listen To Pronk Pops Podcast or Download Shows 211-221

Listen To Pronk Pops Podcast or Download Shows 202-210

Listen To Pronk Pops Podcast or Download Shows 194-201

Listen To Pronk Pops Podcast or Download Shows 184-193

Listen To Pronk Pops Podcast or Download Shows 174-183

Listen To Pronk Pops Podcast or Download Shows 165-173

Listen To Pronk Pops Podcast or Download Shows 158-164

Listen To Pronk Pops Podcast or Download Shows 151-157

Listen To Pronk Pops Podcast or Download Shows 143-150

Listen To Pronk Pops Podcast or Download Shows 135-142

Listen To Pronk Pops Podcast or Download Shows 131-134

Listen To Pronk Pops Podcast or Download Shows 124-130

Listen To Pronk Pops Podcast or Download Shows 121-123

Listen To Pronk Pops Podcast or Download Shows 118-120

Listen To Pronk Pops Podcast or Download Shows 113 -117

Listen To Pronk Pops Podcast or Download Show 112

Listen To Pronk Pops Podcast or Download Shows 108-111

Listen To Pronk Pops Podcast or Download Shows 106-108

Listen To Pronk Pops Podcast or Download Shows 104-105

Listen To Pronk Pops Podcast or Download Shows 101-103

Listen To Pronk Pops Podcast or Download Shows 98-100

Listen To Pronk Pops Podcast or Download Shows 94-97

Listen To Pronk Pops Podcast or Download Show 93

Listen To Pronk Pops Podcast or Download Show 92

Listen To Pronk Pops Podcast or Download Show 91

Listen To Pronk Pops Podcast or Download Shows 88-90

Listen To Pronk Pops Podcast or Download Shows 84-87

Listen To Pronk Pops Podcast or Download Shows 79-83

Listen To Pronk Pops Podcast or Download Shows 74-78

Listen To Pronk Pops Podcast or Download Shows 71-73

Listen To Pronk Pops Podcast or Download Shows 68-70

Listen To Pronk Pops Podcast or Download Shows 65-67

Listen To Pronk Pops Podcast or Download Shows 62-64

Listen To Pronk Pops Podcast or Download Shows 58-61

Listen To Pronk Pops Podcast or Download Shows 55-57

Listen To Pronk Pops Podcast or Download Shows 52-54

Listen To Pronk Pops Podcast or Download Shows 49-51

Listen To Pronk Pops Podcast or Download Shows 45-48

Listen To Pronk Pops Podcast or Download Shows 41-44

Listen To Pronk Pops Podcast or Download Shows 38-40

Listen To Pronk Pops Podcast or Download Shows 34-37

Listen To Pronk Pops Podcast or Download Shows 30-33

Listen To Pronk Pops Podcast or Download Shows 27-29

Listen To Pronk Pops Podcast or Download Shows 17-26

Listen To Pronk Pops Podcast or Download Shows 16-22

Listen To Pronk Pops Podcast or Download Shows 10-15

Listen To Pronk Pops Podcast or Download Shows 1-9

Read Full Post | Make a Comment ( None so far )

The Pronk Pops Show 927, July 12, 2017: Story 1: Putin’s Sting — How Russian Intelligence Service (FSB) Played The Washington Political Elitist Establishment (Democrats and Republicans) And Big Lie Media And How They Fell Hook, Line and Sinker for Russian Intelligence Disinformation Campaign — Russian Trump Dossier — The Dangers of Opposition Research, Confirmation Bias, True Believers, Useful Idiots, Blind Ambition and Two Party Tyranny — The Sting Redux — Videos –Story 2: Republican Sellout The Republican Voter Base By Not Repealing Obamacare Completely — Leaves Many Obamacare Regulations, Subsidies, and Taxes In Place –Republican Replacement of Obamacare  Is A Big Bailout Bill of Insurance Industry — The Stupid Republican Party About To Commit Political Suicide — Rest In Peace — Videos

Posted on July 13, 2017. Filed under: American History, Barack H. Obama, Bill Clinton, Breaking News, Budgetary Policy, Communications, Congress, Corruption, Countries, Crime, Deep State, Defense Spending, Donald J. Trump, Donald Trump, Donald Trump, Economics, Education, Elections, Empires, Employment, Federal Bureau of Investigation (FBI), Federal Government, Fiscal Policy, Foreign Policy, Freedom of Speech, Government, Government Dependency, Government Spending, Hillary Clinton, Hillary Clinton, Hillary Clinton, History, House of Representatives, Human, James Comey, Labor Economics, Language, Law, Life, Media, Monetary Policy, National Interest, News, Obama, People, Philosophy, Photos, Politics, Polls, President Barack Obama, President Trump, Progressives, Raymond Thomas Pronk, Robert S. Mueller III, Rule of Law, Russia, Scandals, Security, Senate, Spying, Success, Tax Policy, Trade Policy, United Kingdom, United States of America, Videos, War, Wealth, Wisdom | Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , |

Project_1

The Pronk Pops Show Podcasts

Pronk Pops Show 927,  July 12, 2017

Pronk Pops Show 926,  July 11, 2017

Pronk Pops Show 925,  July 10, 2017

Pronk Pops Show 924,  July 6, 2017

Pronk Pops Show 923,  July 5, 2017

Pronk Pops Show 922,  July 3, 2017 

Pronk Pops Show 921,  June 29, 2017

Pronk Pops Show 920,  June 28, 2017

Pronk Pops Show 919,  June 27, 2017

Pronk Pops Show 918,  June 26, 2017 

Pronk Pops Show 917,  June 22, 2017

Pronk Pops Show 916,  June 21, 2017

Pronk Pops Show 915,  June 20, 2017

Pronk Pops Show 914,  June 19, 2017

Pronk Pops Show 913,  June 16, 2017

Pronk Pops Show 912,  June 15, 2017

Pronk Pops Show 911,  June 14, 2017

Pronk Pops Show 910,  June 13, 2017

Pronk Pops Show 909,  June 12, 2017

Pronk Pops Show 908,  June 9, 2017

Pronk Pops Show 907,  June 8, 2017

Pronk Pops Show 906,  June 7, 2017

Pronk Pops Show 905,  June 6, 2017

Pronk Pops Show 904,  June 5, 2017

Pronk Pops Show 903,  June 1, 2017

Pronk Pops Show 902,  May 31, 2017

Pronk Pops Show 901,  May 30, 2017

Pronk Pops Show 900,  May 25, 2017

Pronk Pops Show 899,  May 24, 2017

Pronk Pops Show 898,  May 23, 2017

Pronk Pops Show 897,  May 22, 2017

Pronk Pops Show 896,  May 18, 2017

Pronk Pops Show 895,  May 17, 2017

Pronk Pops Show 894,  May 16, 2017

Pronk Pops Show 893,  May 15, 2017

Pronk Pops Show 892,  May 12, 2017

Pronk Pops Show 891,  May 11, 2017

Pronk Pops Show 890,  May 10, 2017

Pronk Pops Show 889,  May 9, 2017

Pronk Pops Show 888,  May 8, 2017

Pronk Pops Show 887,  May 5, 2017

Pronk Pops Show 886,  May 4, 2017

Pronk Pops Show 885,  May 3, 2017

Pronk Pops Show 884,  May 1, 2017

Pronk Pops Show 883 April 28, 2017

Pronk Pops Show 882: April 27, 2017

Pronk Pops Show 881: April 26, 2017

Pronk Pops Show 880: April 25, 2017

Pronk Pops Show 879: April 24, 2017

Pronk Pops Show 878: April 21, 2017

Pronk Pops Show 877: April 20, 2017

Pronk Pops Show 876: April 19, 2017

Pronk Pops Show 875: April 18, 2017

Pronk Pops Show 874: April 17, 2017

Pronk Pops Show 873: April 13, 2017

Pronk Pops Show 872: April 12, 2017

Pronk Pops Show 871: April 11, 2017

Pronk Pops Show 870: April 10, 2017

Pronk Pops Show 869: April 7, 2017

Pronk Pops Show 868: April 6, 2017

Pronk Pops Show 867: April 5, 2017

Pronk Pops Show 866: April 3, 2017

Image result for cartoons russian trump dossierImage result for cartoons russian trump dossier

Image result for cartoons branco russian trump dossier

Image result for cartoons russian trump dossier

Image result for cartoons branco russian trump dossier

Image result for cartoons russian trump dossier

 

 

Story 1: Putin’s Sting — How Russian Intelligence Service (FSB) Played The Washington Political Elitist Establishment (Democrats and Republicans) And Big Lie Media And How They Fell Hook, Line and Sinker for Russian Intelligence Disinformation Campaign — Russian Trump Dossier — The Dangers of Opposition Research, Confirmation Bias, True Believers, Useful Idiots, Blind Ambition and Two Party Tyranny — The Sting Redux — Videos —

“You can fool all the people some of the time,

and some of the people all the time,

but you cannot fool all the people all the time.”

~ Abraham Lincoln

“Perception is reality.”

~Lee Atwater

“People readily believe what they want to believe.”

~Julius Caesar

“Never give a sucker an even break.”

~W. C. Fields

Spoiler Alerts

Image result for The Sting poster

[Figuring out which con to pull on Lonnegan]

J.J. Singleton: I dunno know what to do with this guy, Henry. He’s an Irishman who doesn’t drink, doesn’t smoke, and doesn’t chase dames. He’s a grand knight in the Knights of Columbus, and he only goes out to play faro. Sometimes plays 15 or 20 hours at a time, just him against the house.

Henry Gondorff: Roulette? Craps?

J.J. Singleton: He won’t touch ’em. The croupier at Gilman’s says he never plays anything he can’t win.

Henry Gondorff: Sports?

J.J. Singleton: Likes to be seen with fighters sometimes, but he doesn’t go to the fights or bet on ’em.

Henry Gondorff: Jesus. Does he do anything where he’s not alone?

J.J. Singleton: Just poker. And he cheats. Pretty good at it, too.

 

First con of The Sting

The Sting – Poker Game

The Sting (8/10) Movie CLIP – A Real Professional (1973) HD

The Sting (10/10) Movie CLIP – It’s Close (1973) HD

President Donald Trump: Meeting With Russian Lawyer Was ‘Opposition Research’ | CNBC

Donald Trump JR is being SETUP by Fusion GPS (FAKE DOSSIER)

Report: Senate to Investigate Democratic Ties to Trump Russian Dossier

Democrats intentionally used disinformation from Russia to attack Trump and his campaign aides.

 

How credible are reports that Russia has compromising information about Trump?

Circa News: Ex-intelligence contractor sues Comey

Circa News: FBI illegally shared data about Americans

Why Russia Helps Trump, Not Clinton?? CIA Director John Brennan GRILLED by Tom Rooney

Former CIA Director: Obama Administration “Did Nothing” to Stop Russian Interference

Trump vows to get special prosecutor to investigate Clinton

Trump Loses It After Clinton Calls Him Putin’s Puppet

The Low Down Dirt On Trump

Paul Joseph Watson: DNC Worked With Ukraine To Dig Up Opposition Research On Trump And Manafort

CNN is Falling Apart | Dick Morris

TRUMP RUSSIA SCANDAL BACKFIRES AGAINST DEMS | Dick Morris

The Conspiracy Files: Putin, The FBI and Donald Trump – the fifth estate

Vladimir Putin’s Rise To Power – Full Documentary [HD]

Putin Documentary – The Real Story of the President Putin

EXCLUSIVE: Fantastic Russian Primetime 2 HR Putin Documentary ‘President’

Putin Tells Everyone Exactly Who Created ISIS

Putin crushes CNN smartass Fareed Zakaria on Donald Trump and US elections

Putin Speaks English for CNN

Disinformation: The Secret Strategy to Destroy the West – Part 1

Disinformation: The Secret Strategy to Destroy the West – Part 2

Secrets of the Cold War: Disinformation | Soviet Active Measures | 1984 | Documentary

KGB defector Yuri Bezmenov’s warning to America

Yuri Bezmenov: Sleepers Emerge and Messiah Appears

How To Brainwash A Nation

Yuri Bezmenov Full Interview & Lecture – HQ

Sen Grassley:’Democratic Opposition Research firm Fusion GPS Behind Trump Dossier Was Funded Russia?

BREAKING Dems Intentionally Used FAKE Russian Disinformation to Attack Trump

WOW Government Official Admits to FBI Coup Attempt on Trump

Propaganda, Disinformation, and Dirty Tricks: The Resurgence of Russian Political Warfare

Peter Pomerantsev: From Information to Disinformation Age – Russia and the Future of Propaganda Wars

Inside Russia’s propaganda machine

Russian propaganda war against West heats up | Moscow’s Version

The Propaganda of Propaganda

Inside the Democrats’ opposition research shop

12 Cognitive Biases Explained – How to Think Better and More Logically Removing Bias

Confirmation Bias

Confirmation Bias

Confirmation Bias (explained in a minute) – Behavioural Finance

Scott Adams talks about the Comey fog of confirmation bias

Scott Adams talks about Putin and President Trump

Trump’s “Tools of Persuasion” according to Dilbert creator Scott Adams

Scott Adams says stop obstructing my witch hunt \ 2017.06.23

Scott Adams predicts what happens after the public realizes President Trump is effective

Democrats intentionally used disinformation from Russia to attack Trump, campaign aides

 – The Washington Times – Tuesday, July 11, 2017

While the mainstream news media hunts for evidence of TrumpRussia collusion, the public record shows that Democrats have willfully used Moscow disinformation to influence the presidential election against Donald Trumpand attack his administration.

The disinformation came in the form of a Russian-fed dossier written by former British intelligence agent Christopher Steele. It contains a series of unverified criminal charges against Mr. Trump’s campaign aides, such as coordinating Moscow’s hacking of Democratic Party computers.

Some Democrats have widely circulated the discredited information. Mr. Steele was paid by the Democrat-funded opposition research firm Fusion GPS with money from a Hillary Clinton backer. Fusion GPS distributed the dossier among Democrats and journalists. The information fell into the hands of the FBI, which used it in part to investigate Mr. Trump’s campaign aides.

Mr. Steele makes clear that his unproven charges came almost exclusively from sources linked to the Kremlin and Russian President Vladimir Putin. He identified his sources as “a senior Russian Foreign Ministry figure,” a former “top level Russian intelligence officer active inside the Kremlin,” a “senior Kremlin official” and a “senior Russian government official.”

The same Democrats who have condemned Russia’s election interference via plying fake news and hacking email servers have quoted freely from the Steele anti-Trump memos derived from creatures of the Kremlin.

In other words, there is public evidence of significant, indirect collusion between Democrats and Russian disinformation, a Trump supporter said.

“If anyone colluded with the Russians, it was the Democrats,” said a former Trump campaign adviser who asked not to be identified because of the pending investigations. “After all, they’ve routinely shopped around false claims from the debunked Steele dossier, which listed sources including senior Kremlin officials. If anyone should be investigated in Washington, it ought to be Adam Schiff, Eric Swalwell, Mark Warner and their staffers.”

That is a reference to Rep. Adam B. Schiff of California, the top Democrat on the House Permanent Select Committee on Intelligence; Sen. Mark R. Warner, Virginia Democrat and vice chairman of the Senate Select Committee on Intelligence; and Rep. Eric Swalwell, a California, Democrat on the House intelligence panel.

By his own admission, Mr. Steele’s work has proved unreliable.

As first reported by The Washington Times on April 25, Mr. Steele filed a document in a sealed court case in Londonacknowledging that a major dossier charge about hacking Democrats’ computers was unverified. The entire dossier never should have been made public and Fusion GPS should not have passed it around, Mr. Steele said in a filing defending himself against a libel charge.

About Carter Page

Other dossier targets vehemently deny the dirt thrown by the Kremlin sources.

Mr. Steele’s Russian sources accused Mr. Trump’s attorney, Michael Cohen, of attending a meeting with Russian agents in Prague to cover up their role in Moscow’s hacking. Mr. Cohen has said he has never been to Prague and was in California at the time.

One of the main targets of Mr. Steele’s Russian sources is Carter Page, who lived and worked in Moscow as a Merrill Lynch investor. He had loose ties to the Trump campaign as a foreign policy adviser and surrogate.

Mr. Steele’s Russian sources accused Mr. Page of a series of crimes: teaming up with former Trump campaign manager Paul Manafort to help Russia hack Democratic computers, meeting in Moscow with two Putin cronies to plot against Mrs. Clinton and working out a shady brokerage deal with a Russian oligarch.

Mr. Page told The Washington Times that he has never met Mr. Manafort, knew nothing about Russian hacking when it was happening, never met the two Russians named by Mr. Steele and never completed the supposed investment deal.

The dossier accusations against Mr. Page surfaced during the campaign in a Yahoo News story, citing not Mr. Steelebut intelligence sources. It then went out on the U.S. government’s Voice of America.

In the meantime, the Clinton campaign used the Yahoo story to attack Mr. Trump: “Hillary for America Statement on Bombshell Report About Trump Aide’s Chilling Ties to Kremlin,” blared the Clinton campaign’s Sept. 23 press release.

Since the dossier was circulated widely among Democrats, Mr. Page said, he believes the Clinton team possessed it and relied on it based on what some of Mrs. Clinton’s surrogates said publicly.

“After the report by Yahoo News, the Clinton campaign put out an equally false press release just minutes after the article was released that afternoon,” said Mr. Page, who has tracked what he believes is a series of inaccurate stories and accusations against him.

“Of course, the [Clinton campaign representatives] were lying about it with the media nonstop for many months, and they’ve continued until this day,” Mr. Page said. “Both indirectly as they planted articles in the press and directly with many TV appearances.”

Democrats cite Russia’s dirt

Even before the Yahoo story, then-Senate Minority Leader Harry Reid, Nevada Democrat, was using the Russian-sourced dossier.

On Aug. 27, with the campaign in high gear and knowledge that Russian hackers had penetrated Clinton campaign computers in the public domain, Mr. Reid released a letter to then-FBI Director James B. Comey.

Mr. Reid called for an investigation into Mr. Page’s trip to Moscow, where he supposedly “met with high-ranking sanctioned individuals. Any such meetings should be investigated and made part of the public record.”

Mr. Reid’s evidence surely came from the dossier and its Russian sources.

In the dossier, Mr. Steele clearly states that his anti-Trump accusations are from the Kremlin, which means some Democrats have been willingly repeating Moscow propaganda for public consumption in Washington.

No Democrats have embraced the Russian-sourced dossier more than members of the House intelligence committee, which is investigating Moscow’s interference in the election.

Mr. Schiff read from the dossier extensively at a March hearing featuring Mr. Comey and Navy Adm. Michael Rogers, who leads the National Security Agency.

As Mr. Schiff and other Democrats were bemoaning Kremlin activities against Mrs. Clinton, they were more than willing to quote Kremlin sources attacking Mr. Trump during the election campaign.

Mr. Schiff lauded Mr. Steele for disclosing that Rosneft, a Russian-owned gas and oil company, planned to sell a 19.5 percent share to an investor and that Mr. Page was offered a brokerage fee.

Trouble is, the 19.5 percent share was announced publicly by Moscow before Mr. Steele wrote that memo. Mr. Page said he was never involved in any talk about a commission.

Mr. Schiff was more than willing to quote Kremlin sources.

“According to Steele’s Russian sources, the campaign has offered documents damaging to Hillary Clinton, which the Russians would publish through an outlet that gives them deniability like WikiLeaks,” he said.

Mr. Schiff also said: “According to Christopher Steele, a former British intelligence officer, who is reportedly held in high regard by U.S. intelligence, Russian sources tell him that Page has also had a secret meeting with Igor Sechin, CEO of the Russian gas giant, Rosneft. Sechin is reported to be a former KGB agent and close friend of Putin’s.”

Mr. Page has said repeatedly that he does not know Mr. Sechin and did not meet with him in Moscow.

Meanwhile, Rep. Joaquin Castro of Texas, another Democrat on the House committee, lauded Mr. Steele’s Kremlin sourcing.

“I want to take a moment to turn to the Christopher Steele dossier, which was first mentioned in the media just before the election and published in full by media outlets in January,” Mr. Castro said. “My focus today is to explore how many claims within Steele’s dossier are looking more and more likely, as though they are accurate.

“This is not someone who doesn’t know how to run a source and not someone without contacts. The allegations it raises about President Trump’s campaign aides’ connections to Russians, when overlaid with known established facts and timelines from the 2016 campaign, are very revealing,” he said.

Rep. Andre Carson, Indiana Democrat, said: “There’s a lot in the dossier that is yet to be proven, but increasingly as we’ll hear throughout the day, allegations are checking out.”

On MSNBC in March, Rep. Maxine Waters, California Democrat, said she believed the dossier section on Mr. Trumpand supposed sex acts with prostitutes in Moscow were true.

“Oh, I think it should be taken a look at,” she said. “I think they should really read it, understand it, analyze it and determine what’s fact, what may not be fact. We already know that the part about the coverage that they have on him with sex actions is supposed to be true. They have said that that’s absolutely true. Some other things they kind of allude to. Yes, I think he should go into that dossier and see what’s there.”

Fusion GPS widely circulated the dossier during the presidential race. The public got its first glance when the news site BuzzFeed posted it online in January, with its editor saying he doubted it was true.

One person who says he knows it is a fabrication is Russian entrepreneur Aleksej Gubarev.

The dossier quotes Russian sources as saying Mr. Gubarev’s technology company, XBT, used botnets to flood Democratic computers with porn and spying devices.

Mr. Gubarev is suing Mr. Steele for libel in London and is suing BuzzFeed in Florida.

It is in the London case that Mr. Steele acknowledged that his memo on Mr. Gubarev was unverified.

http://www.washingtontimes.com/news/2017/jul/11/democrats-spread-false-russian-information-on-trum/

The Trump Dossier Is Fake — And Here Are The Reasons Why

Researchers say they’ve uncovered a disinformation campaign with apparent Russian link

 May 25

 Researchers have discovered an extensive international hacking campaign that steals documents from its targets, carefully modifies them and repackages them as disinformation aimed at undermining civil society and democratic institutions, according to a study released Thursday.The investigators say the campaign shows clear signs of a Russian link.Although the study by the Citizen Lab at the Munk School of Global Affairs at the University of Toronto does not demonstrate a direct tie to the Kremlin, it suggests that the attackers are aiming to discredit the Kremlin’s opponents. The report also demonstrates overlap with cyberattacks used in the U.S. and French presidential elections, which American and European intelligence agencies and cybersecurity companies have attributed to hacking groups affiliated with the Russian government.
The campaign has targeted more than 200 government officials, military leaders and diplomats from 39 countries, as well as journalists, activists, a former Russian prime minister and a prominent critic of President Vladi­mir Putin, according to the report. The attackers seek to hack into email accounts using phishing techniques, steal documents and slightly alter them while retaining the appearance of authenticity. These forgeries, which the researchers have dubbed “tainted leaks,” are then released along with unaltered documents and publicized as legitimate leaks.

“Tainted leaks plant fakes in a forest of facts in an attempt to make them credible by association with genuine, stolen documents,” said John Scott-Railton, a senior researcher at the Citizen Lab. “Tainted leaks are a clever and concerning tool for spreading falsehoods. We expect to see many more of them in the future.”

The study details the hack in October of the email log-in details of David Satter, a renowned Kremlin critic who in 2016 published a book that links Putin’s rise to power with a series of deadly apartment bombings in Russia in 1999.

Hackers were able to access Satter’s emails when he clicked on what appeared to be a legitimate link, an attack that the study found to be technically similar to the 2016 breach of the email account of John Podesta, Hillary Clinton’s campaign chairman.

U.S. intelligence agencies concluded that Russian intelligence agencies carried out hacks against the Democratic Party on Putin’s orders, which the Kremlin has repeatedly denied.

In studying Satter’s case, the Citizen Lab investigators developed a technique to identify the other phishing links that were being sent as part of the same operation.

The study describes how the pro-Russian hacking group ­CyberBerkut posted Satter’s emails, some of them carefully altered to create a false narrative of a U.S. government plot to plant negative articles about Putin’s regime in the Russian media. These forgeries were then reported by Russia’s state news agency as evidence of a CIA plot to support a “color revolution” in Russia.

The narrative supports a consistent theme of pro-Putin media: that Russia suffers not because of its leadership’s refusal to loosen its grip on power, but because of constant meddling in Russian affairs by the United States and its European proxies.

“The motivations behind Russian cyberespionage are as much about securing Putin’s kleptocracy as they are geopolitical competition,” said Ronald Deibert, professor of political science and director of the Citizen Lab. “This means journalists, activists and opposition figures — both domestically and abroad — bear a disproportionate burden of their targeting.”

Mark Galeotti, who studies Russia’s power structures as a senior research fellow at the Institute of International Relations Prague, called the use of tainted leaks “a step forward in Russia’s use of hacking as a weapon of political subversion.”

“In the case of the [Democratic National Committee] hacks, they leaked secret but real messages,” Galeotti said.

Galeotti said that “tainted leaks” are more likely to be used for domestic consumption, where the Kremlin is starting to feel the pressure from scattered, grass-roots protests, epitomized by the anti-corruption campaign of Alexei Navalny.

“While we’re not talking about the kind of critical mass likely to pose a challenge to Putin’s carefully orchestrated reelection in 2018, there is clearly a growing, generalized dissatisfaction across the country,” Galeotti said. “The attempts to paint Navalny and other critics as pawns of Western subversion suggest a degree of worry, even desperation.”

https://www.washingtonpost.com/world/europe/researchers-say-theyve-discovereda-global-disinformation-campaign-with-a-russian-link/2017/05/25/9a9637f6-414e-11e7-b29f-f40ffced2ddb_story.html?utm_term=.42c3d4956d15

 

Unidentified soldiers overran Crimea in March 2014. Russia reclaimed the territory from Ukraine, and President Vladimir V. Putin later admitted that the troops were Russian special forces.CreditSergey Ponomarev for The New York Times

STOCKHOLM — With a vigorous national debate underway on whether Sweden should enter a military partnership with NATO, officials in Stockholm suddenly encountered an unsettling problem: a flood of distorted and outright false information on social media, confusing public perceptions of the issue.

The claims were alarming: If Sweden, a non-NATO member, signed the deal, the alliance would stockpile secret nuclear weapons on Swedish soil; NATO could attack Russia from Sweden without government approval; NATO soldiers, immune from prosecution, could rape Swedish women without fear of criminal charges.

They were all false, but the disinformation had begun spilling into the traditional news media, and as the defense minister, Peter Hultqvist, traveled the country to promote the pact in speeches and town hall meetings, he was repeatedly grilled about the bogus stories.

“People were not used to it, and they got scared, asking what can be believed, what should be believed?” said Marinette Nyh Radebo, Mr. Hultqvist’s spokeswoman.

As often happens in such cases, Swedish officials were never able to pin down the source of the false reports. But they, numerous analysts and experts in American and European intelligence point to Russia as the prime suspect, noting that preventing NATO expansion is a centerpiece of the foreign policy of President Vladimir V. Putin, who invaded Georgia in 2008 largely to forestall that possibility.

In Crimea, eastern Ukraine and now Syria, Mr. Putin has flaunted a modernized and more muscular military. But he lacks the economic strength and overall might to openly confront NATO, the European Union or the United States. Instead, he has invested heavily in a program of “weaponized” information, using a variety of means to sow doubt and division. The goal is to weaken cohesion among member states, stir discord in their domestic politics and blunt opposition to Russia.

“Moscow views world affairs as a system of special operations, and very sincerely believes that it itself is an object of Western special operations,” said Gleb Pavlovsky, who helped establish the Kremlin’s information machine before 2008. “I am sure that there are a lot of centers, some linked to the state, that are involved in inventing these kinds of fake stories.”

The planting of false stories is nothing new; the Soviet Union devoted considerable resources to that during the ideological battles of the Cold War. Now, though, disinformation is regarded as an important aspect of Russian military doctrine, and it is being directed at political debates in target countries with far greater sophistication and volume than in the past.

The flow of misleading and inaccurate stories is so strong that both NATO and the European Union have established special offices to identify and refute disinformation, particularly claims emanating from Russia.

The Kremlin’s clandestine methods have surfaced in the United States, too, American officials say, identifying Russian intelligence as the likely source of leaked Democratic National Committee emails that embarrassed Hillary Clinton’s presidential campaign.

The Kremlin uses both conventional media — Sputnik, a news agency, and RT, a television outlet — and covert channels, as in Sweden, that are almost always untraceable.

Russia exploits both approaches in a comprehensive assault, Wilhelm Unge, a spokesman for the Swedish Security Service, said this year when presenting the agency’s annual report. “We mean everything from internet trolls to propaganda and misinformation spread by media companies like RT and Sputnik,” he said.

The fundamental purpose of dezinformatsiya, or Russian disinformation, experts said, is to undermine the official version of events — even the very idea that there is a true version of events — and foster a kind of policy paralysis.

Disinformation most famously succeeded in early 2014 with the initial obfuscation about deploying Russian forces to seize Crimea. That summer, Russia pumped out a dizzying array of theories about the destruction of Malaysia Airlines Flight 17 over Ukraine, blaming the C.I.A. and, most outlandishly, Ukrainian fighter pilots who had mistaken the airliner for the Russian presidential aircraft.

The cloud of stories helped veil the simple truth that poorly trained insurgents had accidentally downed the plane with a missile supplied by Russia.

Moscow adamantly denies using disinformation to influence Western public opinion and tends to label accusations of either overt or covert threats as “Russophobia.”

“There is an impression that, like in a good orchestra, many Western countries every day accuse Russia of threatening someone,” Maria Zakharova, the Russian Foreign Ministry spokeswoman, said at a recent ministry briefing.

Tracing individual strands of disinformation is difficult, but in Sweden and elsewhere, experts have detected a characteristic pattern that they tie to Kremlin-generated disinformation campaigns.

“The dynamic is always the same: It originates somewhere in Russia, on Russia state media sites, or different websites or somewhere in that kind of context,” said Anders Lindberg, a Swedish journalist and lawyer.

“Then the fake document becomes the source of a news story distributed on far-left or far-right-wing websites,” he said. “Those who rely on those sites for news link to the story, and it spreads. Nobody can say where they come from, but they end up as key issues in a security policy decision.”

Although the topics may vary, the goal is the same, Mr. Lindberg and others suggested. “What the Russians are doing is building narratives; they are not building facts,” he said. “The underlying narrative is, ‘Don’t trust anyone.’”

The weaponization of information is not some project devised by a Kremlin policy expert but is an integral part of Russian military doctrine — what some senior military figures call a “decisive” battlefront.

“The role of nonmilitary means of achieving political and strategic goals has grown, and, in many cases, they have exceeded the power of force of weapons in their effectiveness,” Gen. Valery V. Gerasimov, the chief of the general staff of the Russian Armed Forces, wrote in 2013.

A prime Kremlin target is Europe, where the rise of the populist right and declining support for the European Union create an ever more receptive audience for Russia’s conservative, nationalistic and authoritarian approach under Mr. Putin. Last year, the European Parliament accused Russia of “financing radical and extremist parties” in its member states, and in 2014 the Kremlin extended an $11.7 million loan to the National Front, the extreme-right party in France.

“The Russians are very good at courting everyone who has a grudge with liberal democracy, and that goes from extreme right to extreme left,” said Patrik Oksanen, an editorial writer for the Swedish newspaper group MittMedia. The central idea, he said, is that “liberal democracy is corrupt, inefficient, chaotic and, ultimately, not democratic.”

Another message, largely unstated, is that European governments lack the competence to deal with the crises they face, particularly immigration and terrorism, and that their officials are all American puppets.

In Germany, concerns over immigrant violence grew after a 13-year-old Russian-German girl said she had been raped by migrants. A report on Russian state television furthered the story. Even after the police debunked the claim, Russia’s foreign minister, Sergey V. Lavrov, continued to chastise Germany.

In Britain, analysts said, the Kremlin’s English-language news outlets heavily favored the campaign for the country to leave the European Union, despite their claims of objectivity.

In the Czech Republic, alarming, sensational stories portraying the United States, the European Union and immigrants as villains appear daily across a cluster of about 40 pro-Russia websites.

During NATO military exercises in early June, articles on the websites suggested that Washington controlled Europe through the alliance, with Germany as its local sheriff. Echoing the disinformation that appeared in Sweden, the reports said NATO planned to store nuclear weapons in Eastern Europe and would attack Russia from there without seeking approval from local capitals.

poll this summer by European Values, a think tank in Prague, found that 51 percent of Czechs viewed the United States’ role in Europe negatively, that only 32 percent viewed the European Union positively and that at least a quarter believed some elements of the disinformation.

“The data show how public opinion is changing thanks to the disinformation on those outlets,” said Jakub Janda, the think tank’s deputy director for public and political affairs. “They try to look like a regular media outlet even if they have a hidden agenda.”

Not all Russian disinformation efforts succeed. Sputnik news websites in various Scandinavian languages failed to attract enough readers and were closed after less than a year.

Both RT and Sputnik portray themselves as independent, alternative voices. Sputnik claims that it “tells the untold,” even if its daily report relies heavily on articles abridged from other sources. RT trumpets the slogan “Question More.”

Both depict the West as grim, divided, brutal, decadent, overrun with violent immigrants and unstable. “They want to give a picture of Europe as some sort of continent that is collapsing,” Mr. Hultqvist, the Swedish defense minister, said in an interview.

RT often seems obsessed with the United States, portraying life there as hellish. On the day President Obama spoke at the Democratic National Convention, for example, it emphasized scattered demonstrations rather than the speeches. It defends the Republican presidential nominee, Donald J. Trump, as an underdog maligned by the established news media.

Margarita Simonyan, RT’s editor in chief, said the channel was being singled out as a threat because it offered a different narrative from “the Anglo-American media-political establishment.” RT, she said, wants to provide “a perspective otherwise missing from the mainstream media echo chamber.”

Moscow’s targeting of the West with disinformation dates to a Cold War program the Soviets called “active measures.” The effort involved leaking or even writing stories for sympathetic newspapers in India and hoping that they would be picked up in the West, said Professor Mark N. Kramer, a Cold War expert at Harvard.

The story that AIDS was a C.I.A. project run amok spread that way, and it poisons the discussion of the disease decades later. At the time, before the Soviet Union’s 1991 collapse, the Kremlin was selling communism as an ideological alternative. Now, experts said, the ideological component has evaporated, but the goal of weakening adversaries remains.

In Sweden recently, that has meant a series of bizarre forged letters and news articles about NATO and linked to Russia.

One forgery, on Defense Ministry letterhead over Mr. Hultqvist’s signature, encouraged a major Swedish firm to sell artillery to Ukraine, a move that would be illegal in Sweden. Ms. Nyh Radebo, his spokeswoman, put an end to that story in Sweden, but at international conferences, Mr. Hultqvist still faced questions about the nonexistent sales.

Russia also made at least one overt attempt to influence the debate. During a seminar in the spring, Vladimir Kozin, a senior adviser to the Russian Institute for Strategic Studies, a think tank linked to the Kremlin and Russian foreign intelligence, argued against any change in Sweden’s neutral status.

“Do they really need to lose their neutral status?” he said of the Swedes. “To permit fielding new U.S. military bases on their territory and to send their national troops to take part in dubious regional conflicts?”

Whatever the method or message, Russia clearly wants to win any information war, as Dmitry Kiselyev, Russia’s most famous television anchor and the director of the organization that runs Sputnik, made clear recently.

Speaking this summer on the 75th anniversary of the Soviet Information Bureau, Mr. Kiselyev said the age of neutral journalism was over. “If we do propaganda, then you do propaganda, too,” he said, directing his message to Western journalists.

“Today, it is much more costly to kill one enemy soldier than during World War II, World War I or in the Middle Ages,” he said in an interview on the state-run Rossiya 24 network. While the business of “persuasion” is more expensive now, too, he said, “if you can persuade a person, you don’t need to kill him.”

https://www.nytimes.com/2016/08/29/world/europe/russia-sweden-disinformation.html

UK was given details of alleged contacts between Trump campaign and Moscow

In December the UK government was given reports by former MI6 officer Christopher Steele on possible collusion between Trump camp and the Kremlin

Reports of possible collusion between the Trump administration and the Kremlin have led to a political storm in the US.
 Reports of possible collusion between the Trump administration and the Kremlin have led to a political storm in the US. Photograph: Elaine Thompson/AP

The UK government was given details last December of allegedly extensive contacts between the Trump campaign and Moscow, according to court papers.

Reports by Christopher Steele, a former MI6 officer, on possible collusion between the the Trump camp and the Kremlin are at the centre of a political storm in the US over Moscow’s role in getting Donald Trump elected.

UK was given details of alleged contacts between Trump campaign and Moscow

In December the UK government was given reports by former MI6 officer Christopher Steele on possible collusion between Trump camp and the Kremlin

Reports of possible collusion between the Trump administration and the Kremlin have led to a political storm in the US.
 Reports of possible collusion between the Trump administration and the Kremlin have led to a political storm in the US. Photograph: Elaine Thompson/AP

The UK government was given details last December of allegedly extensive contacts between the Trump campaign and Moscow, according to court papers.

Reports by Christopher Steele, a former MI6 officer, on possible collusion between the the Trump camp and the Kremlin are at the centre of a political storm in the US over Moscow’s role in getting Donald Trump elected.

It was not previously known that the UK intelligence services had also received the dossier but Steele confirmed in a court filing earlier this month that he handed a memorandum compiled in December to a “senior UK government national security official acting in his official capacity, on a confidential basis in hard copy form”.

The December memo alleged that four Trump representatives travelled to Prague in August or September in 2016 for “secret discussions with Kremlin representatives and associated operators/hackers”, about how to pay hackers secretly for penetrating Democratic party computer systems and “contingency plans for covering up operations”.

Between March and September, the December memo alleges, the hackers used botnets and porn traffic to transmit viruses, plant bugs and steal data online from Democratic party leadership. Two of the hackers had been “recruited under duress by the FSB” the memo said. The hackers were paid by the Trump organisation, but were under the control of Vladimir Putin’s presidential administration.

Trump has rejected the allegations of collusion as a smear campaign. His lawyer, Michael Cohen, one of Trump representatives named in the memo, has described the claims in the memo as “totally fake, totally inaccurate”, and has said he had never been to Prague.

Since the memo became public in January, Steele had not spoken about his role in compiling it but he and his company, Orbis Business Intelligence Limited, have filed a defence in the high court of justice in London, in a defamation case brought by Aleksej Gubarev, a Russian venture capitalist and owner of a global computer technology company, XBT, and a Dallas-based subsidiary Webzilla.

Advertisement

Gubarev, who was named along with his company in the December memo as being involved in hacking operation, has denied any such involvement and is also suing Buzzfeed in the US courts for publishing the December memo alongside Steele’s earlier reports on election hacking.

A statement by Steele’s defence lawyers, endorsed by the former MI6 agent, said Orbis was hired between June and November last year by Fusion GPS, a Washington-based research consultancy to look into Trump’s links with Russia.

In that period, Steele produced 16 memoranda citing mostly Russian sources as describing a web of alleged contacts and collusion between Trump aides and Russian intelligence or other Kremlin representatives.

The document said that he passed the memos to Fusion on the understanding that Fusion would not disclose the material to any third parties without the approval of Steele and Orbis. They did agree to Fusion providing a copy to Senator John McCain after the veteran Republican had been told about the existence of Steele’s research by Sir Andrew Wood, a former UK ambassador to Moscow and an Orbis associate, at a conference in Canada on 8 November.

Senator McCain handed a copy of the Steele memos to James Comey, the FBI director, on 9 December.

After delivering these reports, the court papers say Steele and Orbis continued to receive “unsolicited intelligence” on Trump-Russia links, and Steele decided that to draw up another memo with this new information which was dated 13 December.

He handed one copy over to the senior British national security official and sent an encrypted version to Fusion with instructions to deliver a hard copy to Senator McCain.

The defence argues that Steele and Orbis were under a duty to pass on the information “so that it was known to the United Kingdom and United States governments at a high level by persons with responsibility for national security”.

Steele and Orbis say they never gave any copies to news organisations although Steele said he gave off-the-record briefings about the dossier to a small number of journalists in late summer and early autumn 2016. The defence brief argues that neither Steele nor Orbis is liable for Buzzfeed’s decision to print the document.

The Steele dossier was referred to in an intelligence briefing provided by the FBI and US intelligence agencies to Obama and Trump in January. Comey has confirmed that counter-intelligence investigations are under way into possible links between Trump associates and Moscow, and CNN has reported that the FBI used the dossier to bolster its investigations.

https://www.theguardian.com/us-news/2017/apr/28/trump-russia-intelligence-uk-government-m16-kremlin

 

Donald Trump Jr.’s Emails Sound Like the Steele Dossier

The president’s son offers evidence Trump’s team colluded with Putin’s regime.

Donald Trump Jr.Saul Loeb/AP, Pool

Smoke, meet gun.

On Tuesday morning, there was a stunning development in the Trump-Russia scandal: Donald Trump Jr. confessed. In yet another bombshell story, the New York Times reported on emails showing that the president’s oldest son had eagerly accepted an offer of help during the 2016 campaign from what he understood to be the Russian government. Trump Jr., the Times disclosed, had set up a meeting with a Russian attorney in the hopes of receiving derogatory information on Hillary Clinton straight from Putin’s regime. As the Times was publishing this story, Trump Jr. tweeted out those same emails.

The emails reveal that top Trump campaign advisers Paul Manafort and Jared Kushner attended the meeting and suggest that all three Trump advisers colluded in what seemed to be a Russian government-backed attempt to hurt Clinton in order to help Trump win the presidency. This new development contradicts the long series of denials from Trump defenders who have claimed that there was no collusion, that there was no evidence Russian leader Vladimir Putin wanted Trump to win, and that the Trump-Russia affair is merely a hoax perpetuated by loser Democrats and fake news outlets.

The Trump Jr. emails also provide partial support for some information within the Steele dossier.

The Steele memos, which Mother Jones first reported on a week before Election Day, were compiled during the campaign by a former British intelligence officer named Christopher David Steele, who was hired by a Washington, DC, research firm retained to unearth information on Trump. The documents contained troubling allegations about Trump and his connections to Russia and relayed unverified salacious information about the candidate. The first memo, dated June 20 and based on the former intelligence officer’s conversations with Russian sources, stated, “Russian regime has been cultivating, supporting and assisting TRUMP for at least 5 years. Aim, endorsed by PUTIN, has been to encourage splits and divisions in western alliance.” It asserted that Russian intelligence had “compromised” Trump during his visits to Moscow and could “blackmail him.”

Steele made the memos available to the FBI during the campaign, and the bureau investigated some of the information they contained.

The memos made headlines after the election, when CNN reported that Trump, as president-elect, and President Barack Obama had been told about their contents during briefings on the intelligence community’s assessment that Putin had mounted a covert operation during the campaign to hack Democratic targets and disseminate stolen emails in order to benefit Trump.

Trump and his supporters have denounced the Steele memos as unsubstantiated trash, with some Trump backers concocting various conspiracy theories about them. Indeed, key pieces of the information within the memos have been challenged. But the memos were meant to be working documents produced by Steele—full of investigative leads and tips to follow—not finished reports, vetted and confirmed.

One interesting element of the Donald Trump Jr. emails now in the news is that they track with parts of the Steele memos.

In that first memo, dated June 20, Steele wrote that Trump “and his inner circle have accepted a regular flow of intelligence from the Kremlin, including on his Democratic and other political rivals.” The Trump Jr. email chain began on June 3, 2016. This was shortly after Trump had secured the Republican presidential nomination. It was that day that Rob Goldstone, a talent manager for a middling pop-star named Emin Agaralov, contacted Trump Jr. and said Emin’s father, Aras Agalarov, a Putin-friendly billionaire developer, had met with the “crown prosecutor of Russia,” who offered to provide the Trump campaign with negative information on Clinton. The Agalarovs and Goldstone had a close relationship to the Trumps, because they all had worked together in 2013 to bring the Miss Universe pageant, which Trump owned at the time, to Moscow. (Part of the deal was that Emin would get to perform two songs.) Following that event, both Trumps worked with both Agalarovs to develop a major project in Moscow. (It never happened.)

This email from Goldstone to Trump Jr. led to a meeting six days later, where a Kremlin-connected Russian attorney spoke to Trump Jr., Kushner, and Manafort about negative information on Clinton. In a statement, Trump Jr. says that what she offered was vague and meaningless, suggesting there was nothing to it. (But Trump Jr. has dissembled repeatedly about this meeting.)

Let’s turn to Steele’s June 20 memo. It stated:

Source A confided that the Kremlin had been feeding TRUMP and his team valuable intelligence on his opponents, including Democratic presidential candidate Hillary CLINTON, for several years…This was confirmed by Source D, a close associate of TRUMP who had organized and managed his recent trips to Moscow, and who reported, also in June 2016, that this Russian intelligence had been “very helpful”.

The memo also reported that there was anti-Clinton information that Putin was sitting on:

A dossier of compromising material on Hillary CLINTON has been collated by the Russian intelligence services over many years and mainly comprises bugged conversations she had on various visits to Russia and intercepted phone calls rather than any embarrassing conduct. The dossier is controlled by Kremlin spokesman, PESKOV, directly on PUTIN’s orders. However it has not as yet been distributed abroad, including to TRUMP. Russian intentions for its deployment still unclear.

There has been no confirmation that Putin steadily fed information to Trump’s camp or that a Kremlin-controlled anti-Clinton dossier existed. But one of Steele’s overarching points in this memo was that Putin’s regime was funneling derogatory Clinton material to Trump. The Trump Jr. emails suggest that the Russian government was aiming to do that and that the Trump campaign was willing and eager to receive assistance from Putin. So Donald Trump Jr. has done what Steele could not: produce evidence that the Trump campaign was—or wanted to be—in cahoots with a foreign adversary to win the White House.

Donald Trump–Russia dossier

From Wikipedia, the free encyclopedia

Policy positions


International trips


2016 presidential election


Russia controversies





Donald Trump's signature

President of the United States

 

The Donald Trump–Russia dossier is a private intelligence dossier that was written by Christopher Steele, a former British MI6 intelligence officer. It contains unverified allegations of misconduct and collusion between Donald Trump and his campaign and the Russian government during the 2016 U.S. presidential election and the period preceding the election. The contents of the dossier were publicly reported on January 10, 2017.[1]

The dossier primarily discusses possible Russian interference in the 2016 presidential election. The media and the intelligence community have stressed that accusations in the dossier have not been verified. Most experts have treated the dossier with caution, but in February, it was reported that some details related to conversations between foreign nationals had been independently corroborated, giving U.S. intelligence and law enforcement greater confidence in some aspects of the dossier as investigations continued. Trump himself has denounced the report, calling it “fake news” and “phony.”

The dossier was produced as part of opposition research during the 2016 U.S. presidential election. The research was initially funded by Republicans who did not want Trump to be the Republican Party nominee for president. After Trump won the primaries, a Democratic client took over the funding; and, following Trump’s election, Steele continued working on the report pro bono and passed on the information to British and American intelligence services.

Contents

The 35-page dossier claims that Russia is in possession of damaging or embarrassing information about Trump which could be used for purposes of blackmail to get Trump to cooperate with the Russian government.[2] The material includes allegations about Trump’s sexual and financial dealings in Russia.[3] The dossier further alleges that Trump has been cultivated and supported by Russia for at least five years, with Putin’s endorsement, with the overall aim of creating divisions between Western alliances; that Trump has extensive ties to Russia; and that there had been multiple contacts between Russian officials and people working for Trump during the campaign.[2][4]

History

Creation of the dossier

According to reports, the dossier was created as part of opposition research on Trump. The investigation into Trump was initially funded by “Never Trump” Republicans and later by Democrats.[5][6][7] In September 2015, a wealthy Republican donor who opposed Trump’s candidacy in the Republican primary hired Fusion GPS, an American research firm, to do opposition research on Trump. For months, Fusion GPS gathered information about Trump, focusing on his business and entertainment activities. When Trump became the presumptive nominee in May 2016, the Republican donor withdrew and the investigation contract was taken over by an unidentified Democratic client.[7][8]

In June 2016 it was revealed that the Democratic National Committee website had been hacked by Russian sources, so Fusion GPS hired Orbis Business Intelligence, a private British intelligence firm, to look into any Russian connections.[7] The investigation was undertaken by Orbis co-founder Christopher Steele, a retired British MI6 officer with expertise in Russian matters. Steele delivered his report as a series of two- or three-page memos, starting in June 2016 and continuing through December. He continued his investigation even after the Democratic client stopped paying for it following Trump’s election.[7]

On his own initiative, Steele decided to also pass the information to British and American intelligence services because he believed the findings were a matter of national security for both countries.[9] However, he became frustrated with the FBI, which he believed was failing to investigate his reports, choosing instead to focus on the Hillary Clinton’s email investigation. According to The Independent, Steele came to believe that there was a “cabal” inside the FBI, particularly its New York field office linked to Trump advisor Rudy Giuliani, which blocked any attempts to investigate the links between Trump and Russia.[9] In October 2016, Steele passed on what he discovered so far to a reporter from Mother Jones magazine.

Shortly after the presidential election, Senator John McCain, who had been informed about the alleged links between Kremlin and Trump, met with former British ambassador to Moscow Sir Andrew Wood. Wood confirmed the existence of the dossier and vouched for Steele.[9] McCain obtained the dossier from David J. Kramer and took it directly to FBI director James Comey on December 9, 2016.[7][6]

In a court filing in April 2017, Steele revealed previously unreported information that in December 2016 he gave one more report to “the senior British national security official and sent an encrypted version to Fusion with instructions to deliver a hard copy to Senator McCain.” This memo, dated December 13, detailed possible collusion between the Kremlin and the Trump campaign. It described secret discussions between four named Trump representatives, Kremlin representatives, and associated operators/hackers about how to secretly pay the hackers who penetrated the DNC computer system and also how to cover up the operation. Although paid by the Trump organisation, the hackers were controlled by Putin’s administration. “Comey has confirmed that counter-intelligence investigations are under way into possible links between Trump associates and Moscow, and CNN has reported that the FBI used the dossier to bolster its investigations.”[10]

Early indications of the dossier’s existence

By Fall 2016, many news organizations knew about the existence of the dossier, which had been described as an “open secret” among journalists. However, they chose not to publish information that could not be confirmed.[7] Finally on October 31, 2016, a week before the election, Mother Jones reported that a former intelligence officer, whom they did not name, had produced a report based on Russian sources and turned it over to the FBI.[11] The report alleged that the Russian government had cultivated Trump for years:

The “Russian regime has been cultivating, supporting and assisting TRUMP for at least 5 years. Aim, endorsed by PUTIN, has been to encourage splits and divisions in western alliance.” It maintained that Trump “and his inner circle have accepted a regular flow of intelligence from the Kremlin, including on his Democratic and other political rivals.” It claimed that Russian intelligence had “compromised” Trump during his visits to Moscow and could “blackmail him.”[11]

The report further alleged that there were multiple in-person meetings between Russian government officials and individuals established as working for Trump.[12][13] The former intelligence officer continued to share information with the FBI, and said in October 2016 that “there was or is a pretty substantial inquiry going on.”[11]

In October 2016 the FBI reached an agreement with Steele to pay him to continue his work, according to involved sources reported by The Washington Post. “Steele was known for the quality of his past work and for the knowledge he had developed over nearly 20 years working on Russia-related issues for British intelligence.” The FBI found Steele credible and his unproved information worthy enough that it considered paying Steele to continue collecting information, but the release of the document to the public stopped discussions between Steele and the FBI.[14]

Trump and Barack Obama were briefed on the existence of the dossier by the chiefs of several U.S. intelligence agencies in early January 2017. Vice President Joe Biden has confirmed that he and the president had received briefings on the dossier, and the allegations within.[15][8][16][17]

Public release

On January 10, 2017, CNN reported that classified documents presented to Obama and Trump the previous week included allegations that Russian operatives possess “compromising personal and financial information” about Trump. CNN stated that it would not publish specific details on the memos because it had not “independently corroborated the specific allegations.”[18][19] Following the CNN report,[20] BuzzFeed published a 35-page dossier that it said was the basis of the briefing, including unverified claims that Russian operatives had collected “embarrassing material” involving Trump that could be used to blackmail him.[21][22][19][23] NBC reported that a senior U.S. intelligence official said that Trump had not been previously briefed on the contents of the memos,[24] although a CNN report said that a statement released by James Clapper in early January confirmed that the synopsis existed and had been compiled for Trump.[25]

Many news organizations knew about the document in the fall of 2016, before the presidential election, but refused to publish it because they could not independently verify the information.[26] BuzzFeed was harshly criticized for publishing what Washington Post columnist Margaret Sullivan called “scurrilous allegations dressed up as an intelligence report meant to damage Donald Trump”[27] while The New York Times noted that the publication sparked a debate centering on the use of unsubstantiated information from anonymous sources.[28] BuzzFeed’s executive staff said the materials were newsworthy because they were “in wide circulation at the highest levels of American government and media” and argued that this justified public release.[29]

Authorship

When CNN reported the existence of the dossier on January 10, 2017,[30] it did not name the author of the dossier, but revealed that he was British. Steele concluded that his anonymity had been “fatally compromised” and realized it was “only a matter of time until his name became public knowledge,” and, accompanied by his family, he fled into hiding in fear of “a prompt and potentially dangerous backlash against him from Moscow.”[31][32][5] The Wall Street Journal revealed Steele’s name the next day, on January 11.[33] Christopher Burrows, director of Orbis Business Intelligence Ltd, for whom Steele worked at the time the dossier was authored, and Orbis would not “confirm or deny” that Orbis had produced the dossier.[30][7]

Called by the media a “highly regarded Kremlin expert” and “one of MI6’s greatest ‘Russia specialists”, Steele formerly worked for the British intelligence agency MI6 and is currently working for Orbis Business Intelligence Ltd, a private intelligence company Steele had co-founded in London.[34][33][35] Steele entered the MI6 in 1987, directly after his graduation from college.[36]

Former British ambassador to Moscow Sir Andrew Wood has vouched for Steele’s reputation.[9] He views Steele as a “very competent professional operator… I take the report seriously. I don’t think it’s totally implausible.” He also stated that “the report’s key allegation – that Trump and Russia’s leadership were communicating via secret back channels during the presidential campaign – was eminently plausible.”[37]

On December 26, 2016, Oleg Erovinkin, a former KGB/FSB general, was found dead in his car in Moscow. Erovinkin was a key liaison between Igor Sechin, head of Rosneft, and President Putin. Steele claimed much of the information came from a source close to Sechin. According to Christo Grozev, a journalist at Risk Management Lab, a think-tank based in Bulgaria, the circumstances of Erovinkin’s death were “mysterious”. Grozev suspected Erovinkin helped Steele compile the dossier on Trump and suggests the hypothesis that the death may have been part of a cover-up by the Russian government.[38][39] Mark Galeotti, senior research fellow at the Institute of International Relations Prague, who specializes in Russian history and security, rejected Grozev’s hypothesis.[40][38]

On March 7, 2017, as some members of the U.S. Congress were expressing interest in meeting with or hearing testimony from Steele, he reemerged after weeks in hiding, appearing publicly on camera and stating, “I’m really pleased to be back here working again at the Orbis’s offices in London today.”[41]

Veracity of the dossier

Observers and experts have had varying reactions to the dossier. Generally, “former intelligence officers and other national-security experts” urged “skepticism and caution” but still took “the fact that the nation’s top intelligence officials chose to present a summary version of the dossier to both President Obama and President-elect Trump” as an indication “that they may have had a relatively high degree of confidence that at least some of the claims therein were credible, or at least worth investigating further.”[42]

Vice President Biden told reporters that while he and President Obama were receiving a briefing on the extent of Russian hackers trying to influence the US election, there was a two-page addendum which addressed the contents of the Steele Dossier.[43] Top intelligence officials told them they “felt obligated to inform them about uncorroborated allegations about President-elect Donald Trump out of concern the information would become public and catch them off-guard.”[44]

According to Paul Wood of BBC News, the information in Steele’s report is also reported by “multiple intelligence sources” and “at least one East European intelligence service.” They report that there is “more than one tape, not just video, but audio as well, on more than one date, in more than one place, in both Moscow and St. Petersburg.”[45][33] He added that “the CIA believes it is credible that the Kremlin has such kompromat—or compromising material— on the next US commander in chief” and “a joint taskforce, which includes the CIA and the FBI, has been investigating allegations that the Russians may have sent money to Mr Trump’s organisation or his election campaign.”[46][47][45]On March 30, 2017, Wood revealed that the FBI was using the dossier as a roadmap for its investigation.[48] On April 18, 2017, CNN reported that corroborated information from the dossier had been used as part of the basis for getting the FISA warrant to monitor former Trump foreign policy advisor Carter Page during the summer of 2016.[49]

Former Los Angeles Times Moscow correspondent Robert Gillette wrote in an op-ed in the Concord Monitor that the dossier has had at least one of its main factual assertions verified. On January 6, 2017, the Director of National Intelligence released a report assessing “with high confidence” that Russia’s combined cyber and propaganda operation was directed personally by Vladimir Putin, with the aim of harming Hillary Clinton’s candidacy and helping Trump.[50] Gillette wrote: “Steele’s dossier, paraphrasing multiple sources, reported precisely the same conclusion, in greater detail, six months earlier, in a memo dated June 20.”[51]

Susan Hennessey, a former National Security Administration lawyer now with the Brookings Institution, stated: “My general take is that the intelligence community and law enforcement seem to be taking these claims seriously. That itself is highly significant. But it is not the same as these allegations being verified. Even if this was an intelligence community document—which it isn’t—this kind of raw intelligence is still treated with skepticism.”[42][52] Hennessey and Benjamin Wittes wrote that “the current state of the evidence makes a powerful argument for a serious public inquiry into this matter.”[52]

Former CIA analyst Patrick Skinner said that he is “neither dismissing the report nor taking its claims at face value,” telling Wired: “I imagine a lot more will come out, and much will be nothing and perhaps some of it will be meaningful, and perhaps even devastating.”[42] Russian investigative journalist Andrei Soldatov writes that while “many of the report’s elements appear hastily compiled”, and there were many “shaky” claims, the document “rings frighteningly true” and “overall … reflects accurately the way decision-making in the Kremlin looks to close observers.”[53] Soldatov writes: “Unverifiable sensational details aside, the Trump dossier is a good reflection of how things are run in the Kremlin – the mess at the level of decision-making and increasingly the outsourcing of operations, combined with methods borrowed from the KGB and the secret services of the lawless 1990s.”[53]

Newsweek published a list of “13 things that don’t add up” in the dossier, writing that the document was a “strange mix of the amateur and the insightful” and stating that the document “contains lots of Kremlin-related gossip that could indeed be, as the author claims, from deep insiders—or equally gleaned” from Russian newspapers and blogs.[54] Former UK ambassador to Russia Sir Tony Brenton stated that certain aspects of the dossier were inconsistent with British intelligence’s understanding of how the Kremlin works, commenting: “I’ve seen quite a lot of intelligence on Russia, and there are some things in [the dossier] which look pretty shaky.”[55]

On February 10, 2017, CNN reported that some communications between “senior Russian officials and other Russian individuals” described in the dossier had been corroborated by multiple U.S. officials. Sources told CNN that some conversations had been “intercepted during routine intelligence gathering”, but refused to reveal the content of conversations, or specify which communications were detailed in the dossier. CNN was unable to confirm whether conversations were related to Trump. U.S. officials said the corroboration gave “US intelligence and law enforcement ‘greater confidence’ in the credibility of some aspects of the dossier as they continue to actively investigate its contents”.[56]

According to Business Insider, the dossier alleges that “the Trump campaign agreed to minimize US opposition to Russia’s incursions into Ukraine”.[57] In July 2016, the Republican National Convention made changes to the Republican Party’s platform on Ukraine: initially they proposed providing “lethal weapons” to Ukraine, but the line was changed to “appropriate assistance”. J. D. Gordon, who was one of Trump’s national security advisers during the campaign, said that he had advocated for changing language because that reflected what Trump had said.[57][58]

Responses

Donald Trump called the dossier “fake news” and criticized the intelligence and media sources that published it.[59] During a press conference on January 11, 2017, Trump denounced the unsubstantiated claims as false, saying that it was “disgraceful” for U.S. intelligence agencies to report them. Trump refused to answer a question from CNN’s senior White House correspondent Jim Acosta on the subject and called CNN “fake news.” In response, CNN said that it had published “carefully sourced reporting” on the matter which had been “matched by the other major news organizations,” as opposed to BuzzFeed‘s posting of “unsubstantiated materials.”[60][20] James Clapper described the leaks as damaging to US national security.[61] This also contradicted Trump’s previous claim that Clapper said the information was false; Clapper’s statement actually said the intelligence community has made no judgement on the truth or falsity of the information.[62]

Russian press secretary Dmitry Peskov insisted in an interview that the document is a fraud, saying “I can assure you that the allegations in this funny paper, in this so-called report, they are untrue. They are all fake.”[63] The President of Russia, Vladimir Putin, called the people who leaked the document “worse than prostitutes”[64] and referred to the dossier itself as “rubbish.”[65] Putin went on to state he believed that the dossier was “clearly fake,”[66]fabricated as a plot against the legitimacy of President-elect Donald Trump.[67]

Some of Steele’s former colleagues expressed support for his character, saying “The idea his work is fake or a cowboy operation is false – completely untrue. Chris is an experienced and highly regarded professional. He’s not the sort of person who will simply pass on gossip.”[68]

Trump’s personal attorney Michael Cohen, in a denial of some allegations, said “I’m telling you emphatically that I’ve not been to Prague, I’ve never been to Czech [Republic], I’ve not been to Russia. The story is completely inaccurate, it is fake news meant to malign Mr. Trump.”[69] Cohen said that between August 23–29 he was in Los Angeles. According to Radio Free Europe/Radio Liberty, “A Czech intelligence source told the Respekt magazine that there is no record of Cohen arriving in Prague by plane, although the news weekly pointed out he could have traveled by car or train from a nearby EU country, avoiding passport control under Schengen zone travel rules.”[70]

Among journalists, Bob Woodward called the dossier a “garbage document,” while Carl Bernstein took the opposite view, noting that the senior-most U.S. intelligence officials had determined that the content was worth reporting to the president and the president-elect.[71]

Ynet, an Israeli online news site, reported on January 12 that U.S. intelligence advised Israeli intelligence officers to be cautious about sharing information with the incoming Trump administration, until the possibility of Russian influence over Trump, suggested by Steele’s report, has been fully investigated.[72]

Aleksej Gubarev, chief of technology company XBT and a figure mentioned in the dossier, sued BuzzFeed for defamation on February 3, 2017. The suit, filed in a Broward County, Florida court,[73] centers on allegations from the dossier that XBT had been “using botnets and porn traffic to transmit viruses, plant bugs, steal data and conduct ‘altering operations’ against the Democratic Party leadership.”[74] In the High Court of Justice, Steele’s lawyers said that their client did not intend for the memos to be released, and that one of the memos “needed to be analyzed and further investigated/verified.”[75]

White House Press Secretary Sean Spicer responded to CNN’s report of February 10, of a partial corroboration of the dossier, by saying, “We continue to be disgusted by CNN’s fake news reporting.”[56]

On March 2, 2017, media began reporting that the Senate may call Steele to testify about the Trump dossier.[76]

On March 27, 2017, Senate Judiciary Chairman Chuck Grassley asked the Department of Justice to initiate an inquiry into Fusion GPS, who initially retained Steele to write the dossier.[77] Fusion GPS was previously associated with pro-Russia lobbying activities due to sanctions imposed by the Magnitsky Act. Grassley’s committee made direct inquiries of Fusion GPS: “When political opposition research becomes the basis for law enforcement or intelligence efforts, it raises substantial questions about the independence of law enforcement and intelligence from politics.”[78] The other basis for Grassley’s concern is the fact that Fusion GPS was working as a pro-Russia lobbyist at the same time it had retained Steele to research and write the Trump dossier.[79] Grassley was concerned that the FBI was improperly using the dossier as the basis for an investigation into Russian influence of the 2016 U.S. presidential election.[77]

See also

Useful idiot

From Wikipedia, the free encyclopedia

In political jargon, a useful idiot is a person perceived as a propagandist for a cause the goals of which they are not fully aware of, and who is used cynically by the leaders of the cause.

Usage in Russian

In the Russian language, the equivalent term “useful fools” (Russianполезные дуракиtr. polezniye duraki) was already in use in 1941. It was mockingly used against Russian “nihilists” of 1860s who, for Polish agents, were said to be no more than “useful fools and silly enthusiasts”.[1] The phrase is often attributed to Lenin in the West, and by some Russian writers including Vladimir Bukovsky in 1984.[2] However, in a 1987 article, American journalist William Safire noted that a Library of Congress librarian had not been able to find the phrase in Lenin’s works.[3] The book They Never Said It also suggests the attribution is false.[4]

Usage in English

In the memoir of actor Alexander Granach, the phrase was used in the description of a boyhood incident in a shtetl in Western Ukraine.[5]

In June 1948, The New York Times used the term in an article on contemporary Italian politics, citing the social-democratic Italian paper L’Umanità.[6] In January 1958, Time magazine started to use the phrase.[7][8][9][10][11][12]

In 2016, the term was used by the Editorial Board of The New York Times to describe President-elect Donald Trump.[13] Michael Hayden, former NSA director and former CIA director, described Trump as a polezni durak, translating the term as “the useful fool, some naif, manipulated by Moscow, secretly held in contempt, but whose blind support is happily accepted and exploited”.[14]

Useful innocents

A similar term, useful innocents, appears in Austrian-American economist Ludwig von Mises‘ “Planned Chaos” (1947). Von Mises claims the term was used by communists for liberals that von Mises describes as “confused and misguided sympathizers”.[15] The term useful innocents also appears in a Readers Digest article (1946) titled “Yugoslavia’s Tragic Lesson to the World”, authored by Bogdan Raditsa (Bogdan Radica), a “high ranking official of the Yugoslav Government”. Raditsa says: “In the Serbo-Croat language the communists have a phrase for true democrats who consent to collaborate with them for ‘democracy.’ It is Korisne Budale, or Useful Innocents.”[16] Although Raditsa translates the phrase as “Useful Innocents”, the word budala (plural: budale) actually translates as “fool” and synonyms thereof.

The French equivalent, “Innocents utiles” or Useful innocents, was used in a newspaper article title in 1946.[17][18]

See also

References

https://en.wikipedia.org/wiki/Useful_idiot

References

https://en.wikipedia.org/wiki/Donald_Trump%E2%80%93Russia_dossier

Federal Security Service

From Wikipedia, the free encyclopedia
Federal Security Service of the Russian Federation
Федеральная служба безопасности Российской Федерации
Common name Federal Security Service
Abbreviation FSB (ФСБ)
FSB Emblem.png

Emblem of the Federal Security Service
FSB Flag.png

Flag of the Federal Security Service
Agency overview
Formed April 12, 1995
Preceding agency KGB
Employees around 200,000–300,000[1]
Legal personality Governmental: Government agency
Jurisdictional structure
Federal agency Russia
General nature
Operational structure
Headquarters Lubyanka Square, Moscow, Russia
Website
www.fsb.ru

The Federal Security Service of the Russian Federation (FSB; Russian: Федеральная служба безопасности Российской Федерации (ФСБ), tr. Federal’naya sluzhba bezopasnosti Rossiyskoy Federatsii; IPA: [fʲɪdʲɪˈralʲnəjə ˈsluʐbə bʲɪzɐˈpasnəstʲɪ rɐˈsʲijskəj fʲɪdʲɪˈratsɨjɪ]) is the principal security agency of Russia and the main successor agency to the USSR‘s Committee of State Security (KGB). Its main responsibilities are within the country and include counter-intelligence, internal and border security, counter-terrorism, and surveillance as well as investigating some other types of grave crimes and federal law violations. It is headquartered in Lubyanka Square, Moscow‘s centre, in the main building of the former KGB. The Director of the FSB since 2008 is general of the army Alexander Bortnikov.

The immediate predecessor of the FSB was the Federal Counterintelligence Service (FSK) of Russia, itself a successor to the KGB: on 12 April 1995, Russian president Boris Yeltsin signed a law mandating a reorganization of the FSK, which resulted in the creation of the FSB. In 2003, the FSB’s responsibilities were widened by incorporating the previously independent Border Guard Service and a major part of the abolished Federal Agency of Government Communication and Information (FAPSI). The two major structural components of the former KGB that remain administratively independent of the FSB are the Foreign Intelligence Service (SVR) and the State Guards (FSO).

Under Russian federal law, the FSB is a military service just like the armed forces, the MVD, the FSO, the SVR, the FSKN, Main Directorate for Drugs Control and EMERCOM‘s civil defence, but its commissioned officers do not usually wear military uniforms.

Overview

The FSB is mainly responsible for internal security of the Russian state, counterespionage, and the fight against organized crime, terrorism, and drug smuggling. Since 2003, when the Federal Border Guards Service was incorporated to the FSB, it has also been responsible for overseeing border security.[1] The FSB is engaged mostly in domestic affairs, while espionage duties are responsibility of the Russian Foreign Intelligence Service. However, the FSB also includes the FAPSI agency, which conducts electronic surveillance abroad. All law enforcement and intelligence agencies in Russia work under the guidance of FSB, if needed.[1]

The FSB combines functions and powers similar to those exercised by the United States FBI National Security Branch, Immigration and Customs Enforcement (ICE), the Federal Protective Service, the National Security Agency (NSA), U.S. Customs and Border Protection, United States Coast Guard, and partly the Drug Enforcement Administration. The FSB employs about 66,200 uniformed staff, including about 4,000 special forces troops. It also employs about 160,000–200,000 border guards.[1]

Under Article 32 of the Federal Constitutional Law On the Government of the Russian Federation,[2] the FSB head answers directly to the RF president and the FSB director is the RF president’s appointment, though he is a member of the RF government which is headed by the Chairman of Government; he also, ex officio, is a permanent member of the Security Council of Russia presided over by the president and chairman of the National Anti-terrorism Committee of Russia.

History

Initial recognition of the KGB

The FSB headquarters at Lubyanka Square

The Federal Security Service is one of the successor organisations of the Soviet Committee of State Security (KGB). Following the attempted coup of 1991—in which some KGB units as well as the KGB head Vladimir Kryuchkov played a major part—the KGB was dismantled and ceased to exist from November 1991.[3][4] In December 1991, two government agencies answerable to the Russian president were created by president Yeltsin’s decrees on the basis of the relevant main directorates of the defunct KGB: Foreign Intelligence Service (SVR, the former First Main Directorate) and the Federal Agency of Government Communications and Information (FAPSI, merging the functions of the former 8th Main Directorate and 16th Main Directorate of the KGB). In January 1992, another new institution, the Ministry of Security took over domestic and border security responsibilities.[5]Following the 1993 constitutional crisis, the Ministry of Security was reorganized on 21 December 1993 into the Federal Counter-Intelligence Service (FSK). The FSK was headed by Sergei Stepashin. Before the start of the main military activities of the First Chechen War the FSK was responsible for the covert operations against the separatists led by Dzhokhar Dudayev.[1]

Creation of the FSB

FSB medal for “distinguished military service”. The FSB had overall command of the federal forces in Chechnya in 2001–2003.

In 1995, the FSK was renamed and reorganized into the Federal Security Service (FSB) by the Federal Law of 3 April 1995, “On the Organs of the Federal Security Service in the Russian Federation”.[6] The FSB reforms were rounded out by decree No. 633, signed by Boris Yeltsin on 23 June 1995. The decree made the tasks of the FSB more specific, giving the FSB substantial rights to conduct cryptographic work, and described the powers of the FSB director. The number of deputy directors was increased to 8: 2 first deputies, 5 deputies responsible for departments and directorates and 1 deputy director heading the Moscow City and Moscow regional directorate. Yeltsin appointed Colonel-General Mikhail Ivanovich Barsukov as the new director of the FSB. In 1998 Yeltsin appointed Vladimir Putin, a KGB veteran who would later succeed Yeltsin as federal president, as director of the FSB.[7] Putin was reluctant to take over the directorship, but once appointed conducted a thorough reorganization, which included the dismissal of most of the FSB’s top personnel.[1] Putin appointed Nikolai Patrushev as the head of FSB in 1999.[5]

Role in the Second Chechen War

After the main military offensive of the Second Chechen War ended and the separatists changed tactics to guerilla warfare, overall command of the federal forces in Chechnya was transferred from the military to the FSB in January 2001. While the army lacked technical means of tracking the guerrilla groups, the FSB suffered from insufficient human intelligence due to its inability to build networks of agents and informants. In the autumn of 2002, the separatists launched a massive campaign of terrorism against the Russian civilians, including the Dubrovka theatre attack. The inability of the federal forces to conduct efficient counter-terrorist operations led to the government to transfer the responsibility of “maintaining order” in Chechnya from the FSB to the Ministry of Internal Affairs (MVD) in July 2003.[8]

Putin reforms

President Putin meeting with Director of FSB Nikolai Patrushev on 9 August 2000

After becoming President, Vladimir Putin launched a major reorganization of the FSB. First, the FSB maybe was placed under direct control of the President by a decree issued on 17 May 2000.[5] Internal structure of the agency was reformed by a decree signed on 17 June 2000. In the resulting structure, the FSB was to have a director, a first deputy director and nine other deputy directors, including one possible state secretary and the chiefs of six departments: Economic Security Department, Counterintelligence Department, Organizational and Personnel Service, Department of activity provision, Department for Analysis, Forecasting and Strategic Planning, Department for Protection of the Constitutional System and the Fight against Terrorism. In 2003, the agency’s responsibilities were considered considerably widened. The Border Guard Service of Russia, with its staff of 210,000, was integrated to the FSB via a decree was signed on 11 March 2003. The merger was completed by 1 July 2003. In addition, The Federal Agency of Government Communication and Information (FAPSI) was abolished and the FSB was granted a major part of its functions, while other parts went to the Ministry of Defense.[5] Among the reasons for this strengthening of the FSB were enhanced need for security after increased terror attacks against Russian civilians starting from the Moscow theater hostage crisis; the need to end the permanent infighting between the FSB, FAPSI and the Border Guards due to their overlapping functions and the need for more efficient response to migration, drug trafficking and illegal arms trading. It has also been pointed out, that the FSB was the only power base of the new president, and the restructuring therefore strengthened Putin’s position (see Political groups under Vladimir Putin’s presidency).[5] On 28 June 2004 in a speech to high-ranking FSB officers, Putin emphasized three major tasks of the agency: neutralizing foreign espionage, safeguarding economic and financial security of the country and combating organized crime.[5] In September 2006, the FSB was shaken by a major reshuffle, which, combined with some earlier reassignments (most remarkably, those of FSB Deputy Directors Yury Zaostrovtsev and Vladimir Anisimov in 2004 and 2005, respectively), were widely believed to be linked to the Three Whales Corruption Scandal that had slowly unfolded since 2000. Some analysts considered it to be an attempt to undermine FSB Director Nikolay Patrushev‘s influence, as it was Patrushev’s team from the Karelian KGB Directorate of the late 1980s – early 1990s that had suffered most and he had been on vacations during the event.[9][10][11]

By 2008, the agency had one Director, two First Deputy Directors and 5 Deputy Directors. It had the following 9 divisions:[5]

  1. Counter-Espionage
  2. Service for Defense of Constitutional Order and Fight against Terrorism
  3. Border Service
  4. Economic Security Service
  5. Current Information and International Links
  6. Organizational and Personnel Service
  7. Monitoring Department
  8. Scientific and Technical Service
  9. Organizational Security Service

Fight against terrorism

FSB special forces members during a special operation in Makhachkala, as a result of which “one fighter was killed and two terrorist attacks prevented” in 2010.

Starting from the Moscow theater hostage crisis in 2002, Russia was faced with increased levels of Islamist terrorism. The FSB, being the main agency responsible for counter-terrorist operations, was in the front line in the fight against terror. During the Moscow theater siege and the Beslan school siege, FSB’s Spetsnaz units Alpha Group and Vympel played a key role in the hostage release operations. However, their performance was criticised due to the high number of hostage casualties. In 2006, the FSB scored a major success in its counter-terrorist efforts when it successfully killed Shamil Basayev, the mastermind behind the Beslan tragedy and several other high-profile terrorist acts. According to the FSB, the operation was planned over six months and made possible due to the FSB’s increased activities in foreign countries that were supplying arms to the terrorists. Basayev was tracked via the surveillance of this arms trafficking. Basayev and other militants were preparing to carry out a terrorist attack in Ingushetia when FSB agents destroyed their convoy; 12 militants were killed.[12][13] During the last years of the Vladimir Putin‘s second presidency (2006–2008), terrorist attacks in Russia dwindled, falling from 257 in 2005 to 48 in 2007. Military analyst Vitaly Shlykov praised the effectiveness of Russia’s security agencies, saying that the experience learned in Chechnya and Dagestan had been key to the success. In 2008, the American Carnegie Endowment‘s Foreign Policy magazine named Russia as “the worst place to be a terrorist” and highlighted especially Russia’s willingness to prioritize national security over civil rights.[14] By 2010, Russian forces, led by the FSB, had managed to eliminate out the top leadership of the Chechen insurgency, except for Dokka Umarov.[15]

Increased terrorism and expansion of the FSB’s powers

President Dmitry Medvedev meeting with FSB Director Alexander Bortnikov on the way from Moscow to Dagestan‘s capital Makhachkala in June 2009

Starting from 2009, the level of terrorism in Russia increased again. Particularly worrisome was the increase of suicide attacks. While between February 2005 and August 2008, no civilians were killed in such attacks, in 2008 at least 17 were killed and in 2009 the number rose to 45.[16] In March 2010, Islamist militants organised the 2010 Moscow Metro bombings, which killed 40 people. One of the two blasts took place at Lubyanka station, near the FSB headquarters. Militant leader Doku Umarov—dubbed “Russia’s Osama Bin Laden”—took responsibility for the attacks. In July 2010, President Dmitry Medvedev expanded the FSB’s powers in its fight against terrorism. FSB officers received the power to issue warnings to citizens on actions that could lead to committing crimes and arrest people for 15 days if they fail to comply with legitimate orders given by the officers. The bill was harshly criticized by human rights organizations.[17]

Role

Counterintelligence

In 2011, the FSB said it had exposed 199 foreign spies, including 41 professional spies and 158 agents employed by foreign intelligence services.[18] The number has risen in recent years: in 2006 the FSB reportedly caught about 27 foreign intelligence officers and 89 foreign agents.[19] Comparing the number of exposed spies historically, the then-FSB Director Nikolay Kovalyov said in 1996: “There has never been such a number of spies arrested by us since the time when German agents were sent in during the years of World War II.” The 2011 figure is similar to what was reported in 1995–1996, when around 400 foreign intelligence agents were uncovered during the two-year period.[20] In a high-profile case of foreign espionage, the FSB said in February 2012 that an engineer working at the Plesetsk Cosmodrome, Russia’s main space center for military launches, had been sentenced to 13 years in prison on charges of state treason. A court judged that the engineer had sold information about testing of new Russian strategic missile systems to the American CIA.[21] An increasing number of scientists have been accused of espionage and illegal technology exports by the FSB during the last decade: researcher Igor Sutyagin,[22] physicist Valentin Danilov,[23] physical chemist Oleg Korobeinichev,[24] academician Oskar Kaibyshev,[25] and physicist Yury Ryzhov.[26] Ecologist and journalist Alexander Nikitin, who worked with the Bellona Foundation, was accused of espionage. He published material exposing hazards posed by the Russian Navy’s nuclear fleet. He was acquitted in 1999 after spending several years in prison (his case was sent for re-investigation 13 times while he remained in prison). Other cases of prosecution are the cases of investigative journalist and ecologist Grigory Pasko,[27][28] Vladimir Petrenko who described danger posed by military chemical warfare stockpiles, and Nikolay Shchur, chairman of the Snezhinskiy Ecological Fund.[20] Other arrested people include Viktor Orekhov, a former KGB officer who assisted Soviet dissidents, Vladimir Kazantsev who disclosed illegal purchases of eavesdropping devices from foreign firms, and Vil Mirzayanov who had written that Russia was working on a nerve-gas weapon.[20]

Counter-terrorism

FSB officers on the scene of the Domodedovo International Airport bombing in 2011. Combating terrorism is one of the main tasks of the agency.

In 2011, the FSB prevented 94 “crimes of a terrorist nature”, including eight terrorist attacks. In particular, the agency foiled a planned suicide bombing in Moscow on New Year’s Eve. However, the agency failed to prevent terrorists perpetrating the Domodedovo International Airport bombing.[18] Over the years, FSB and affiliated state security organizations have killed all presidents of the separatist Chechen Republic of Ichkeria including Dzhokhar Dudaev, Zelimkhan Yandarbiev, Aslan Maskhadov, and Abdul-Khalim Saidullaev. Just before his death, Saidullaev claimed that the Russian government “treacherously” killed Maskhadov, after inviting him to “talks” and promising his security “at the highest level”.[29] During the Moscow theater hostage crisis and Beslan school hostage crisis, all hostage takers were killed on the spot by FSB spetsnaz forces. Only one of the suspects, Nur-Pashi Kulayev, survived and was convicted later by the court. It is reported that more than 100 leaders of terrorist groups have been killed during 119 operations on North Caucasus during 2006.[19] On 28 July 2006 the FSB presented a list of 17 terrorist organizations recognized by the Supreme Court of the Russian Federation, to Rossiyskaya Gazeta newspaper, which published the list that day. The list had been available previously, but only through individual request.[30][31] Commenting on the list, Yuri Sapunov, head of anti-terrorism at the FSB, named three main criteria necessary for organizations to be listed.[32]

Foreign intelligence

According to some unofficial sources,[33][34][35] since 1999, the FSB has also been tasked with the intelligence-gathering on the territory of the CIS countries, wherein the SVR is legally forbidden from conducting espionage under the inter-government agreements. Such activity is in line with Article 8 of the Federal Law on the FSB.[36]

Targeted killing

In the summer of 2006, the FSB was allegedly given the legal power to engage in targeted killing of terrorism suspects overseas if so ordered by the president.[37]

Border protection

Border guards of the Federal Security Service pursuing trespassers of the maritime boundary during exercises in Kaliningrad Oblast

The Federal Border Guard Service (FPS) has been part of the FSB since 2003. Russia has 61,000 kilometers (38,000 mi) of sea and land borders, 7,500 kilometers (4,700 mi) of which is with Kazakhstan, and 4,000 kilometers (2,500 mi) with China. One kilometer (1,100 yd) of border protection costs around 1 million rubles per year.[38]

Export control

The FSB is engaged in the development of Russia’s export control strategy and examines drafts of international agreements related to the transfer of dual-use and military commodities and technologies. Its primary role in the nonproliferation sphere is to collect information to prevent the illegal export of controlled nuclear technology and materials.[39]

Claims of intimidation of foreign diplomats and journalists[edit]

The FSB has been accused by The Guardian of using psychological techniques to intimidate western diplomatic staff and journalists, with the intention of making them curtail their work in Russia early.[40] The techniques allegedly involve entering targets’ houses, moving household items around, replacing items with similar (but slightly different) items, and even sending sex toys to a male target’s wife, all with the intention of confusing and scaring the target.[40] Guardian journalist, Luke Harding, claims to have been the subject of such techniques.[40]

Doping scandal

Following allegations by a Russian former lab director about the 2014 Winter Olympics in Sochi, WADA commissioned an independent investigation led by Richard McLaren. McLaren’s investigation concluded in a report published in July 2016 that the Ministry of Sport and the Federal Security Service (FSB) had operated a “state-directed failsafe system” using a “disappearing positive [test] methodology” (DPM) from “at least late 2011 to August 2015.” However, WADA later admitted that there was not sufficient evidence from the report.[41][42]

2016 US presidential elections

On 29 December 2016, the White House sanctioned the FSB and several other Russian companies for helping the Russian military intelligence service, the Main Intelligence Directorate (GRU), to allegedly disrupt and spread disinformation during the 2016 US presidential election. In addition, the State Department also declared 35 Russian diplomats and officials persona non grata and denied Russian government officials access to two Russian-owned installations in Maryland and New York.[43]

Organization

The reception room of the Federal Security Service building located on Kuznetsky Most in Moscow

Below the nationwide level, the FSB has regional offices in the federal subjects of Russia. It also has administrations in the armed forces and other military institutions. Sub-departments exist for areas such as aviation, special training centers, forensic expertise, military medicine, etc.[5]

Structure of the Federal Office (incomplete):

Besides the services (departments) and directorates of the federal office, the territorial directorates of FSB in the federal subjects are also subordinate to it. Of these, St. Petersburg and Leningrad Oblast Directorate of FSB and its predecessors (historically covering both Leningrad/Saint Petersburg and Leningrad Oblast) have played especially important roles in the history of this organization, as many of the officers of the Directorate, including Vladimir Putin and Nikolay Patrushev, later assumed important positions within the federal FSB office or other government bodies. After the last Chief of the Soviet time, Anatoly Kurkov, the St. Petersburg and Leningrad Oblast Directorate were led by Sergei Stepashin (29 November 1991 – 1992), Viktor Cherkesov (1992 –1998), Alexander Grigoryev (1 October 1998 – 5 January 2001), Sergei Smirnov (5 January 2001 – June 2003), Alexander Bortnikov (June 2003 – March 2004) and Yury Ignashchenkov (since March 2004).

Directors of the FSB

On 20 June 1996, Boris Yeltsin fired Director of FSB Mikhail Barsukov and appointed Nikolay Kovalyov as acting Director and later Director of the FSB. Aleksandr Bortnikov took over on 12 May 2008.

Criticism of FSB political role in Russia

The FSB has been criticised for corruption and human rights violations. Some Kremlin critics such as Yulia Latynina and Alexander Litvinenko have claimed that the FSB is engaged in suppression of internal dissent; Litvinenko died in 2006 as a result of polonium poisoning.[45] A number of opposition lawmakers and investigative journalists were murdered in the 2000s while investigating corruption and other alleged crimes perpetrated by FSB officers: Sergei Yushenkov, Yuri Shchekochikhin, Galina Starovoitova, Anna Politkovskaya, Alexander Litvinenko, Paul Klebnikov (US), Nadezhda Chaikova, Nina Yefimova, and others.[46][47]

The FSB has been further criticised by some for failure to bring Islamist terrorism in Russia under control.[48] In the mid-2000s, the pro-Kremlin Russian sociologist Olga Kryshtanovskaya claimed that FSB played a dominant role in the country’s political, economic and even cultural life.[49][50][51] FSB officers have been frequently accused of extortion, bribery and illegal takeovers of private companies, often working together with tax inspection officers. Active and former FSB officers are also present as “curators” in “almost every single large enterprise”, both in public and private sectors.[52][53]

Former FSB officer, a defector, Alexander Litvinenko, along with a series of other authors such as Yury Felshtinsky, David Satter, Boris Kagarlitsky, Vladimir Pribylovsky, Mikhail Trepashkin (also former FSB officer) claimed in the early 2000s that the 1999 apartment bombings in Moscow and other Russian cities were a false flag attack coordinated by the FSB in order to win public support for a new full-scale war in Chechnya and boost former FSB Director Vladimir Putin‘s, then the prime minister, popularity in the lead-up to parliamentary elections and presidential transfer of power in Russia later that year.[54][55][56][57][58][59][60][61][62][63][64][65]

In his book Mafia State, Luke Harding, the Moscow correspondent for The Guardian from to 2007 to 2011 and a fierce critic of Russian politics, alleges that the FSB subjected him to continual psychological harassment, with the aim of either coercing him into practicing self-censorship in his reporting, or to leave the country entirely. He says that FSB used techniques known as Zersetzung (literally “corrosion” or “undermining”) which were perfected by the East German Stasi.[66]

Konstantin Preobrazhenskiy criticised the continuing celebration of the professional holiday of the old and the modern Russian security services on the anniversary of the creation of the Cheka: “The successors of the KGB still haven’t renounced anything; they even celebrate their professional holiday the same day, as during repression, on the 20th of December. It is as if the present intelligence and counterespionage services of Germany celebrated Gestapo Day. I can imagine how indignant our press would be!”[67][68][69] In the same time, in 2007, during a memorial to the victims of the 1937 Great Purge at Butovo firing range Vladimir Putin honored the victims of the Stalin’s purge and told the audience that the Great Purge was prepared by the years of the previous hostilities of the Soviet regime including extermination of entire strata of the society: clergy, Russian peasantry and the Cossacks. In his speech Putin mainly criticized the Red Terror under the lead of Felix Dzerzhinsky as the then Cheka head, which resulted in the deaths of thousands, including opponents of the regime and the clergy.[70][71]

See also

References

https://en.wikipedia.org/wiki/Federal_Security_Service

The Sting

From Wikipedia, the free encyclopedia
The Sting
Stingredfordnewman.jpg

Theatrical release poster by Richard Amsel
Directed by George Roy Hill
Produced by Tony Bill
Michael Phillips
Julia Phillips
Written by David S. Ward
Starring Paul Newman
Robert Redford
Robert Shaw
Music by Marvin Hamlisch
Cinematography Robert Surtees
Edited by William Reynolds
Distributed by Universal Pictures
Release date
  • December 25, 1973
Running time
129 minutes
Country United States
Language English
Budget $5.5 million[1]
Box office $159.6 million[1]

The Sting is a 1973 American caper film set in September 1936, involving a complicated plot by two professional grifters (Paul Newman and Robert Redford) to con a mob boss (Robert Shaw).[2] The film was directed by George Roy Hill,[3] who had directed Newman and Redford in the western Butch Cassidy and the Sundance Kid. Created by screenwriter David S. Ward, the story was inspired by real-life cons perpetrated by brothers Fred and Charley Gondorff and documented by David Maurer in his book The Big Con: The Story of the Confidence Man.

The title phrase refers to the moment when a con artist finishes the “play” and takes the mark’s money. If a con is successful, the mark does not realize he has been “taken” (cheated), at least not until the con men are long gone. The film is played out in distinct sections with old-fashioned title cards, the lettering and illustrations rendered in a style reminiscent of the Saturday Evening Post. The film is noted for its anachronistic use of ragtime, particularly the melody “The Entertainer” by Scott Joplin, which was adapted (along with others by Joplin) for the movie by Marvin Hamlisch (and a top-ten chart single for Hamlisch when released as a single from the film’s soundtrack). The film’s success created a resurgence of interest in Joplin’s work.[4]

The Sting was hugely successful at the 46th Academy Awards, being nominated for 10 Oscars and winning seven, including Best PictureBest Director and Best Original Screenplay.

Plot

The film takes place in 1936, at the height of the Great Depression. Johnny Hooker, a grifter in Joliet, Illinois, cons $11,000 in cash ($189,800 today) in a pigeon drop from an unsuspecting victim with the aid of his partners Luther Coleman and Joe Erie. Buoyed by the windfall, Luther announces his retirement and advises Hooker to seek out an old friend, Henry Gondorff, in Chicago to teach him “the big con”. Unfortunately, their victim was a numbers racket courier for vicious crime boss Doyle Lonnegan. Corrupt Joliet police Lieutenant William Snyder confronts Hooker, revealing Lonnegan’s involvement and demanding part of Hooker’s cut. Having already spent his share, Hooker pays Snyder in counterfeit bills. Lonnegan’s men murder both the courier and Luther, and Hooker flees for his life to Chicago.

Hooker finds Henry Gondorff, a once-great con-man now hiding from the FBI, and asks for his help in taking on the dangerous Lonnegan. Gondorff is initially reluctant, but he relents and recruits a core team of experienced con men to con Lonnegan. They decide to resurrect an elaborate obsolete scam known as “the wire”, using a larger crew of con artists to create a phony off-track betting parlor. Aboard the opulent 20th Century Limited, Gondorff, posing as boorish Chicago bookie Shaw, buys into Lonnegan’s private, high-stakes poker game. Shaw infuriates Lonnegan with his obnoxious behavior, then outcheats him to win $15,000. Hooker, posing as Shaw’s disgruntled employee, Kelly, is sent to collect the winnings and instead convinces Lonnegan that he wants to take over Shaw’s operation. Kelly reveals that he has a partner named Les Harmon (actually con man Kid Twist) in the Chicago Western Unionoffice, who will allow them to win bets on horse races by past-posting.

Meanwhile, Snyder has tracked Hooker to Chicago, but his pursuit is thwarted when he is summoned by undercover FBI agents led by Agent Polk, who orders him to assist in their plan to arrest Gondorff using Hooker. At the same time, Lonnegan has grown frustrated with the inability of his men to find and kill Hooker. Unaware that Kelly is Hooker, he demands that Salino, his best assassin, be given the job. A mysterious figure with black leather gloves is then seen following and observing Hooker.

Kelly’s connection appears effective, as Harmon provides Lonnegan with the winner of one horse race and the trifecta of another race. Lonnegan agrees to finance a $500,000 ($8,629,000 today) bet at Shaw’s parlor to break Shaw and gain revenge. Shortly thereafter, Snyder captures Hooker and brings him before FBI Agent Polk. Polk forces Hooker to betray Gondorff by threatening to incarcerate Luther Coleman’s widow.

The night before the sting, Hooker sleeps with Loretta, a waitress from a local restaurant. As Hooker leaves the building the next morning, he sees Loretta walking toward him. The black-gloved man appears behind Hooker and shoots her dead – she was Lonnegan’s hired killer, Loretta Salino, and the gunman was hired by Gondorff to protect Hooker.

Armed with Harmon’s tip to “place it on Lucky Dan”, Lonnegan makes the $500,000 bet at Shaw’s parlor on Lucky Dan to win. As the race begins, Harmon arrives and expresses shock at Lonnegan’s bet, explaining that when he said “place it” he meant, literally, that Lucky Dan would “place” (i.e., finish second). In a panic, Lonnegan rushes the teller window and demands his money back. A moment later, Agent Polk, Lt. Snyder, and a half dozen FBI officers storm the parlor. Polk confronts Gondorff, then tells Hooker he is free to go. Gondorff, reacting to the betrayal, shoots Hooker in the back. Polk then shoots Gondorff and orders Snyder to get the ostensibly-respectable Lonnegan away from the crime scene. With Lonnegan and Snyder safely away, Hooker and Gondorff rise amid cheers and laughter. Agent Polk is actually Hickey, a con man, running a con atop Gondorff’s con to divert Snyder and provide a solid “blow off”. As the con men strip the room of its contents, Hooker refuses his share of the money, saying “I’d only blow it”, and walks away with Gondorff.

Cast

Production

Filming on location in Pasadena, California. Stand-ins are used to set up the shot.

The movie was filmed on the Universal Studios backlot, with a few small scenes shot in Wheeling, West Virginia, some scenes filmed at the Santa Monica Pier, in Pasadena, and in Chicago at Union Station and the former LaSalle Street Station prior to its demolition.[5][6] Lonnegan’s limp was authentic; Shaw had slipped on a wet handball court at the Beverly Hills Hotel a week before filming began and had injured the ligaments in his knee. He wore a leg brace during production which was hidden under the wide 1930s style trousers. This incident was revealed by Julia Phillips in her 1991 autobiography You’ll Never Eat Lunch in This Town Again. She stated that Shaw saved The Sting, since no other actor would accept the part; Paul Newman hand-delivered the script to Shaw in London in order to ensure his participation. Philips’s book asserts that Shaw was not nominated for a Best Supporting Actor Academy Award because he demanded that his name follow those of Newman and Redford before the film’s opening title.

Rob Cohen (later director of action films such as The Fast and the Furious) years later told of how he found the script in the slush pile when working as a reader for Mike Medavoy, a future studio head, but then an agent. He wrote in his coverage that it was “the great American screenplay and … will make an award-winning, major-cast, major-director film.” Medavoy said that he would try to sell it on that recommendation, promising to fire Cohen if he could not. Universal bought it that afternoon, and Cohen keeps the coverage framed on the wall of his office.[7]

Roy Huggins, creator and chief writer of the TV western-comedy Maverick, noted during interview that the first half of “The Sting” bore resemblance to his script for the episode Shady Deal at Sunny Acres.[8]

Reception

The film received rave reviews and was a box office smash in 1973–74, taking in more than US$160 million ($800 million today). As of October 2016, it is the 22nd highest-grossing film in the United States adjusted for ticket price inflation.[9] In 2005, the film was selected for preservation in the United States National Film Registry by the Library of Congress as being “culturally, historically, or aesthetically significant”. The Writers Guild of America ranked the screenplay #39 on its list of 101 Greatest Screenplays ever written.[10]

Awards

Wins

The film won seven Academy Awards and received three other nominations.[11] At the 46th Academy Awards, Julia Phillips became the first female producer to be nominated for and to win Best Picture.[12]

Nominations

Music

The soundtrack album, executive produced by Gil Rodin, included several Scott Joplinragtime compositions, adapted by Marvin Hamlisch. According to Joplin scholar Edward A. Berlin, ragtime had experienced a revival in the 1970s due to several separate, but coalescing events:

  1. Joshua Rifkin‘s recording of Joplin rags on Nonesuch Records, a classical label, became a “classical” best-seller.
  2. The New York Public Library issued a two-volume collection of Joplin’s music, thereby giving the stamp of approval of one of the nation’s great institutions of learning.
  3. Treemonisha received its first full staging, as part of a Afro-American Music Workshop at Morehouse College, in Georgia.
  4. Gunther Schuller, president of the New England Conservatory of Music, led a student ensemble in a performance of period orchestrations of Joplin’s music.
  5. Inspired by Schuller’s recording, the producer of the movie The Sting had Marvin Hamlisch score Joplin’s music for the film, thereby bringing Joplin to a mass, popular public.[4]

There are some variances from the film soundtrack, as noted. Joplin’s music was no longer popular by the 1930s, although its use in The Sting evokes the 1930s gangster movie, The Public Enemy, which featured Joplin’s music.[citation needed] The two Jazz Age-style tunes written by Hamlisch are chronologically closer[citation needed] to the film’s time period than are the Joplin rags:

  1. “Solace” (Joplin)—orchestral version
  2. The Entertainer” (Joplin)—orchestral version
  3. The Easy Winners” (Joplin)
  4. “Hooker’s Hooker” (Hamlisch)
  5. “Luther”—same basic tune as “Solace”, re-arranged by Hamlisch as a dirge
  6. “Pine Apple Rag” / “Gladiolus Rag” medley (Joplin)
  7. “The Entertainer” (Joplin)—piano version
  8. “The Glove” (Hamlisch)—a Jazz Age style number; only a short segment was used in the film
  9. “Little Girl” (Madeline Hyde, Francis Henry)—heard only as a short instrumental segment over a car radio
  10. “Pine Apple Rag” (Joplin)
  11. “Merry-Go-Round Music” medley; “Listen to the Mocking Bird”, “Darling Nellie Gray”, “Turkey in the Straw” (traditional)—”Listen to the Mocking Bird” was the only portion of this track that was actually used in the film, along with a segment of “King Cotton”, a Sousa march, a segment of “The Diplomat”, another Sousa march, a segment of Sousa’s Washington Post March, and a segment of “The Regimental Band”, a Charles C. Sweeleymarch, all of which were not on the album. All six tunes were recorded from the Santa Monica Pier carousel’s band organ.
  12. “Solace” (Joplin)—piano version
  13. “The Entertainer” / “The Ragtime Dance” medley (Joplin)

The album sequence differs from the film sequence, a standard practice with vinyl LPs, often for aesthetic reasons. Some additional content differences:

  • Selected snippets of Joplin’s works, some appearing on the album and some not, provided linking music over the title cards that introduced major scenes. (The final card, “The Sting”, introducing the film’s dramatic conclusion, had no music.)
  • Some tunes in the film are different takes than those on the album.[citation needed]
  • A Joplin tune used in the film but not appearing in the soundtrack album was “Cascades”. The middle (fast) portion of it was played when Hooker was running from Snyder along the ‘L’ train platform.
  • The credits end with “The Rag-time Dance” (Joplin) medley which features a ‘stop-time’ motif similar to a later work “Stop-Time Rag” (Joplin).

Chart positions

Year Chart Position
1974 US Billboard 200 1
Australian Kent Music Report Albums Chart
Preceded by
Chicago VII by Chicago
Billboard 200 number-one album
May 4 – June 7, 1974
Succeeded by
Sundown by Gordon Lightfoot
Preceded by
Tubular Bells by Mike Oldfield
Australian Kent Music Report number-one album
June 17 – July 28, 1974
August 5–11, 1974
Succeeded by
Caribou by Elton John

Sequel

A sequel with different players, The Sting II, appeared in 1983. In the same year a prequel was planned, exploring the earlier career of Henry Gondorff. Famous confidence man Soapy Smith was scripted to be Gondorff’s mentor. When the sequel failed, the prequel was scrapped.

Home media

A deluxe DVD, The Sting: Special Edition (part of the Universal Legacy Series) was released in September 2005, including a “making of” featurette called “The Art of the Sting” with interviews from the cast and crew. The film was released on Blu-ray Disc in 2012, as a part of Universal’s 100th anniversary string of releases.

Judiciary

The Supreme Court of India referenced the movie in a judgement involving a sting operation.[13]

See also

References

  1. Jump up to:a b “The Sting, Box Office Information”. The Numbers. Retrieved January 4, 2012.
  2. Jump up^ Variety film review; December 12, 1973, page 16.
  3. Jump up^ “The Sting”TCM databaseTurner Classic Movies. Retrieved February 23, 2016.
  4. Jump up to:a b Edward A. Berlin (1996). “Basic Repertoire List – Joplin”. Classical Net. Retrieved September 8, 2012.
  5. Jump up^ “LaSalle Street Station”Metra. Retrieved July 10, 2014.
  6. Jump up^ “Movies Filmed in Chicago”. City of Chicago. Retrieved July 10, 2014.
  7. Jump up^ Lussier, Germaine (November 21, 2008). “Screenings: ‘The Sting’ as part of Paul Newman Retrospective”Times-Herald RecordNews Corporation. Retrieved November 21, 2008.
  8. Jump up^ “Roy Huggins on the Maverick episode “Shady Deal at Sunny Acres” (video interview, part 6 of 10, 23:05)”EmmyTVLegends. Retrieved 6 June2017When I walked into Universal on the morning “Sting” came out, Max Baer Jr. was…outside my office, and he says, “Roy, are you going to sue?” I didn’t know what he was talking about. “What do you mean?” He says, “You didn’t see ‘Sting’?” I say no; he says, “Well see it, because the first half of it is ‘Shady Deal at Sunny Acres’!”
  9. Jump up^ http://www.boxofficemojo.com/alltime/adjusted.htm
  10. Jump up^ Savage, Sophia (February 27, 2013). “WGA Lists Greatest Screenplays, From ‘Casablanca’ and ‘Godfather’ to ‘Memento’ and ‘Notorious'”. Archived from the original on August 13, 2006. Retrieved February 28,2013.
  11. Jump up^ “The 46th Academy Awards (1974) Nominees and Winners”oscars.org. Retrieved October 2, 2011.
  12. Jump up^ “NY Times: The Sting”NY Times. Retrieved December 29, 2008.
  13. Jump up^ “Rajat Prasad Vs. Respondent: C.B.I.” (PDF). National Judicial Academy. Point 10.

External links

https://en.wikipedia.org/wiki/The_Sting

Story 2: Republican Sellout The Republican Voter Base By Not Repealing Obamacare Completely — Leaves Many Obamacare Regulations, Subsidies, and Taxes In Place –Republican Replacement of Obamacare  Is A Big Bailout Bill — The Stupid Republican Party About To Commit Political Suicide — Rest In Peace — Videos

Image result for cartoons branco republician replacement for obamacare

Senator Rand Paul Answering Questions On Republican Healthcare

Are Republicans for Bailouts Now?! | Rand Paul on Healthcare Bill

Rand Paul on the Healthcare Debate! He’s Awesome!

Rand Paul Offers Interesting Plan to Dramatically Transform U S Health Care System

The Pronk Pops Show Podcasts Portfolio

Listen To Pronk Pops Podcast or Download Shows 926-927

Listen To Pronk Pops Podcast or Download Shows 916-925

Listen To Pronk Pops Podcast or Download Shows 906-915

Listen To Pronk Pops Podcast or Download Shows 889-896

Listen To Pronk Pops Podcast or Download Shows 884-888

Listen To Pronk Pops Podcast or Download Shows 878-883

Listen To Pronk Pops Podcast or Download Shows 870-877

Listen To Pronk Pops Podcast or Download Shows 864-869

Listen To Pronk Pops Podcast or Download Shows 857-863

Listen To Pronk Pops Podcast or Download Shows 850-856

Listen To Pronk Pops Podcast or Download Shows 845-849

Listen To Pronk Pops Podcast or Download Shows 840-844

Listen To Pronk Pops Podcast or Download Shows 833-839

Listen To Pronk Pops Podcast or Download Shows 827-832

Listen To Pronk Pops Podcast or Download Shows 821-826

Listen To Pronk Pops Podcast or Download Shows 815-820

Listen To Pronk Pops Podcast or Download Shows 806-814

Listen To Pronk Pops Podcast or Download Shows 800-805

Listen To Pronk Pops Podcast or Download Shows 793-799

Listen To Pronk Pops Podcast or Download Shows 785-792

Listen To Pronk Pops Podcast or Download Shows 777-784

Listen To Pronk Pops Podcast or Download Shows 769-776

Listen To Pronk Pops Podcast or Download Shows 759-768

Listen To Pronk Pops Podcast or Download Shows 751-758

Listen To Pronk Pops Podcast or Download Shows 745-750

Listen To Pronk Pops Podcast or Download Shows 738-744

Listen To Pronk Pops Podcast or Download Shows 732-737

Listen To Pronk Pops Podcast or Download Shows 727-731

Listen To Pronk Pops Podcast or Download Shows 720-726

Listen To Pronk Pops Podcast or DownloadShows 713-719

Listen To Pronk Pops Podcast or DownloadShows 705-712

Listen To Pronk Pops Podcast or Download Shows 695-704

Listen To Pronk Pops Podcast or Download Shows 685-694

Listen To Pronk Pops Podcast or Download Shows 675-684

Listen To Pronk Pops Podcast or Download Shows 668-674

Listen To Pronk Pops Podcast or Download Shows 660-667

Listen To Pronk Pops Podcast or Download Shows 651-659

Listen To Pronk Pops Podcast or Download Shows 644-650

Listen To Pronk Pops Podcast or Download Shows 637-643

Listen To Pronk Pops Podcast or Download Shows 629-636

Listen To Pronk Pops Podcast or Download Shows 617-628

Listen To Pronk Pops Podcast or Download Shows 608-616

Listen To Pronk Pops Podcast or Download Shows 599-607

Listen To Pronk Pops Podcast or Download Shows 590-598

Listen To Pronk Pops Podcast or Download Shows 585- 589

Listen To Pronk Pops Podcast or Download Shows 575-584

Listen To Pronk Pops Podcast or Download Shows 565-574

Listen To Pronk Pops Podcast or Download Shows 556-564

Listen To Pronk Pops Podcast or Download Shows 546-555

Listen To Pronk Pops Podcast or Download Shows 538-545

Listen To Pronk Pops Podcast or Download Shows 532-537

Listen To Pronk Pops Podcast or Download Shows 526-531

Listen To Pronk Pops Podcast or Download Shows 519-525

Listen To Pronk Pops Podcast or Download Shows 510-518

Listen To Pronk Pops Podcast or Download Shows 500-509

Listen To Pronk Pops Podcast or Download Shows 490-499

Listen To Pronk Pops Podcast or Download Shows 480-489

Listen To Pronk Pops Podcast or Download Shows 473-479

Listen To Pronk Pops Podcast or Download Shows 464-472

Listen To Pronk Pops Podcast or Download Shows 455-463

Listen To Pronk Pops Podcast or Download Shows 447-454

Listen To Pronk Pops Podcast or Download Shows 439-446

Listen To Pronk Pops Podcast or Download Shows 431-438

Listen To Pronk Pops Podcast or Download Shows 422-430

Listen To Pronk Pops Podcast or Download Shows 414-421

Listen To Pronk Pops Podcast or Download Shows 408-413

Listen To Pronk Pops Podcast or Download Shows 400-407

Listen To Pronk Pops Podcast or Download Shows 391-399

Listen To Pronk Pops Podcast or Download Shows 383-390

Listen To Pronk Pops Podcast or Download Shows 376-382

Listen To Pronk Pops Podcast or Download Shows 369-375

Listen To Pronk Pops Podcast or Download Shows 360-368

Listen To Pronk Pops Podcast or Download Shows 354-359

Listen To Pronk Pops Podcast or Download Shows 346-353

Listen To Pronk Pops Podcast or Download Shows 338-345

Listen To Pronk Pops Podcast or Download Shows 328-337

Listen To Pronk Pops Podcast or Download Shows 319-327

Listen To Pronk Pops Podcast or Download Shows 307-318

Listen To Pronk Pops Podcast or Download Shows 296-306

Listen To Pronk Pops Podcast or Download Shows 287-295

Listen To Pronk Pops Podcast or Download Shows 277-286

Listen To Pronk Pops Podcast or Download Shows 264-276

Listen To Pronk Pops Podcast or Download Shows 250-263

Listen To Pronk Pops Podcast or Download Shows 236-249

Listen To Pronk Pops Podcast or Download Shows 222-235

Listen To Pronk Pops Podcast or Download Shows 211-221

Listen To Pronk Pops Podcast or Download Shows 202-210

Listen To Pronk Pops Podcast or Download Shows 194-201

Listen To Pronk Pops Podcast or Download Shows 184-193

Listen To Pronk Pops Podcast or Download Shows 174-183

Listen To Pronk Pops Podcast or Download Shows 165-173

Listen To Pronk Pops Podcast or Download Shows 158-164

Listen To Pronk Pops Podcast or Download Shows151-157

Listen To Pronk Pops Podcast or Download Shows 143-150

Listen To Pronk Pops Podcast or Download Shows 135-142

Listen To Pronk Pops Podcast or Download Shows 131-134

Listen To Pronk Pops Podcast or Download Shows 124-130

Listen To Pronk Pops Podcast or Download Shows 121-123

Listen To Pronk Pops Podcast or Download Shows 118-120

Listen To Pronk Pops Podcast or Download Shows 113 -117

Listen To Pronk Pops Podcast or Download Show 112

Listen To Pronk Pops Podcast or Download Shows 108-111

Listen To Pronk Pops Podcast or Download Shows 106-108

Listen To Pronk Pops Podcast or Download Shows 104-105

Listen To Pronk Pops Podcast or Download Shows 101-103

Listen To Pronk Pops Podcast or Download Shows 98-100

Listen To Pronk Pops Podcast or Download Shows 94-97

Listen To Pronk Pops Podcast or Download Show 93

Listen To Pronk Pops Podcast or Download Show 92

Listen To Pronk Pops Podcast or Download Show 91

Listen To Pronk Pops Podcast or Download Shows 88-90

Listen To Pronk Pops Podcast or Download Shows 84-87

Listen To Pronk Pops Podcast or Download Shows 79-83

Listen To Pronk Pops Podcast or Download Shows 74-78

Listen To Pronk Pops Podcast or Download Shows 71-73

Listen To Pronk Pops Podcast or Download Shows 68-70

Listen To Pronk Pops Podcast or Download Shows 65-67

Listen To Pronk Pops Podcast or Download Shows 62-64

Listen To Pronk Pops Podcast or Download Shows 58-61

Listen To Pronk Pops Podcast or Download Shows 55-57

Listen To Pronk Pops Podcast or Download Shows 52-54

Listen To Pronk Pops Podcast or Download Shows 49-51

Listen To Pronk Pops Podcast or Download Shows 45-48

Listen To Pronk Pops Podcast or Download Shows 41-44

Listen To Pronk Pops Podcast or Download Shows 38-40

Listen To Pronk Pops Podcast or Download Shows 34-37

Listen To Pronk Pops Podcast or Download Shows 30-33

Listen To Pronk Pops Podcast or Download Shows 27-29

Listen To Pronk Pops Podcast or Download Shows 17-26

Listen To Pronk Pops Podcast or Download Shows 16-22

Listen To Pronk Pops Podcast or Download Shows 10-15

Listen To Pronk Pops Podcast or Download Shows 1-9

 

Read Full Post | Make a Comment ( None so far )

The Pronk Pops Show 926, July 11, 2017, Story 1: Much Ado About Nothing — What Dirt/Leverage/ Compromising Information Did The Russians Have On Hillary Clinton? — Donald Trump Jr. Wanted To Know — Smells Like A Russian Intelligence Setup and/or Democrat Dirty Trick — Who Leaked The Emails To New York Times? FBI leakers — American People Ignoring Paranoid Progressive Propaganda of Big Lie Media — Still Waiting For Any Evidence of Trump/Russian/Putin Collusion — Clinton Collusion Conspiracy Crashing — Desperate Delusional Democrat Deniers of Reality — Videos — Story 2: When Will Attorney General Sessions Appoint A Special Counsel To Investigate Intelligence Community Leaks and Hillary Clinton Destruction of Government Records, Mishandling of Classified Documents and Related Pay for Play Public Corruption of Clinton Foundation? — Was Democratic Hired Opposition Research firm Fusion GPS and Christopher Steele Former British Intelligent MI-6 Agent A Cutout For The Russian Intellegence Disinformation Campaign Contained in The Russian Donald Trump Dossier? — Videos

Posted on July 12, 2017. Filed under: United States Constitution, Videos, Wealth, Wisdom | Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , |

Project_1

The Pronk Pops Show Podcasts

Pronk Pops Show 926,  July 11, 2017

Pronk Pops Show 925,  July 10, 2017

Pronk Pops Show 924,  July 6, 2017

Pronk Pops Show 923,  July 5, 2017

Pronk Pops Show 922,  July 3, 2017 

Pronk Pops Show 921,  June 29, 2017

Pronk Pops Show 920,  June 28, 2017

Pronk Pops Show 919,  June 27, 2017

Pronk Pops Show 918,  June 26, 2017 

Pronk Pops Show 917,  June 22, 2017

Pronk Pops Show 916,  June 21, 2017

Pronk Pops Show 915,  June 20, 2017

Pronk Pops Show 914,  June 19, 2017

Pronk Pops Show 913,  June 16, 2017

Pronk Pops Show 912,  June 15, 2017

Pronk Pops Show 911,  June 14, 2017

Pronk Pops Show 910,  June 13, 2017

Pronk Pops Show 909,  June 12, 2017

Pronk Pops Show 908,  June 9, 2017

Pronk Pops Show 907,  June 8, 2017

Pronk Pops Show 906,  June 7, 2017

Pronk Pops Show 905,  June 6, 2017

Pronk Pops Show 904,  June 5, 2017

Pronk Pops Show 903,  June 1, 2017

Pronk Pops Show 902,  May 31, 2017

Pronk Pops Show 901,  May 30, 2017

Pronk Pops Show 900,  May 25, 2017

Pronk Pops Show 899,  May 24, 2017

Pronk Pops Show 898,  May 23, 2017

Pronk Pops Show 897,  May 22, 2017

Pronk Pops Show 896,  May 18, 2017

Pronk Pops Show 895,  May 17, 2017

Pronk Pops Show 894,  May 16, 2017

Pronk Pops Show 893,  May 15, 2017

Pronk Pops Show 892,  May 12, 2017

Pronk Pops Show 891,  May 11, 2017

Pronk Pops Show 890,  May 10, 2017

Pronk Pops Show 889,  May 9, 2017

Pronk Pops Show 888,  May 8, 2017

Pronk Pops Show 887,  May 5, 2017

Pronk Pops Show 886,  May 4, 2017

Pronk Pops Show 885,  May 3, 2017

Pronk Pops Show 884,  May 1, 2017

Pronk Pops Show 883 April 28, 2017

Pronk Pops Show 882: April 27, 2017

Pronk Pops Show 881: April 26, 2017

Pronk Pops Show 880: April 25, 2017

Pronk Pops Show 879: April 24, 2017

Pronk Pops Show 878: April 21, 2017

Pronk Pops Show 877: April 20, 2017

Pronk Pops Show 876: April 19, 2017

Pronk Pops Show 875: April 18, 2017

Pronk Pops Show 874: April 17, 2017

Pronk Pops Show 873: April 13, 2017

Pronk Pops Show 872: April 12, 2017

Pronk Pops Show 871: April 11, 2017

Pronk Pops Show 870: April 10, 2017

Pronk Pops Show 869: April 7, 2017

Pronk Pops Show 868: April 6, 2017

Pronk Pops Show 867: April 5, 2017

Pronk Pops Show 866: April 3, 2017

Image result for cartoons democrats russion collusion

Image result for fusion gps trump russian dossierImage result for fusion gps trump russian dossier

Image result for fusion gps trump russian dossier

Image result for cartoons democrats russion collusion

Image result for cartoons democrats russion collusion

Image result for cartoons democrats russion collusion

Image result for cartoons democrats russion collusion

 

Image result for fusion gps trump russian dossier

Image result for cartoons democrats russion collusion

Image result for cartoons democrats russion collusion

Image result for cartoons democrats russion collusion

Story 1: Much Ado About Nothing — What Dirt/Leverage/ Compromising Information Did The Russians Have On Hillary Clinton? — Donald Trump Jr. Wanted To Know — Smells Like A Russian Intelligence Setup and/or Democrat Dirty Trick — Who Leaked The Emails To New York Times? FBI leakers — American People Ignoring Paranoid Progressive Propaganda of Big Lie Media — Still Waiting For Any Evidence of Trump/Russian/Putin Collusion — Clinton Collusion Conspiracy Crashing — Desperate Delusional Democrat Deniers of Reality — Videos —

“YOU HAVE ZERO CREDIBILITY” HANNITY DESTROYS THE PROPAGANDA MEDIA IN EXPLOSIVE OPENING MONOLOGUE

DON JR (FULL INTERVIEW) ON HANNITY ABOUT MEETING W/ RUSSIAN LAWYER

Sekulow on Don Trump Jr. controversy: Much ado about nothing

‘IT WAS A WASTE OF 20 MINUTES’ – DON TRUMP JR ON MEETING W/ RUSSIAN LAWYER – KRAUTHAMMER REACTS

Brit Hume on ‘farcical episode’ involving Donald Trump Jr.

HEATED DEBATE ON TRUMP JR RUSSIAN MEETING – ERIC BOLLING vs KAT TIMPF

Why Donald Trump Jr.’s email release could be so damaging

“Fake News York Times” Tries Desperately to Slime Donald Trump Jr. to Dilute Trump’s G20 Success

Here’s Why Alan Dershowitz Doesn’t See Any Legal Jeopardy for Trump Jr.

Krauthammer Turns on Trump, Says Trump Jr Revelations Damning

THE FIVE – REACTION TO TRUMP JR RUSSIAN MEETING CONTROVERSY

Donald Trump JR is being SETUP by Fusion GPS (FAKE DOSSIER)

Donald Trump Jr. releases private emails on Russia meeting

Donald Trump, Jr. Russian Collusion Email Scandal | True News

Ben Shapiro: Donald Trump Jr. releases email chain from Russia offering material on Hillary Clinton

EXPOSED: Democratic Operatives Caught FRAMING Trump With Russian Collusion Scandal

Trump Jr.’s released email chain distracts from his father’s agenda: Senator Wicker

Source: Justice Dept. probe to examine Trump Jr. emails

BREAKING: Dems W/ Ties To Clinton Campaign Paid For The “Trump Russia Dossier”

Donald Trump Jr. releases email chain on Russia meeting

TRUMP KEEPS WINNING | TUCKER INTERVIEWS SCOTT ADAMS – TUCKER CARLSON TONIGHT

Why the Profoundly Stupid Love “Morning Joe”

PAUL JOSEPH WATSON REACTS TO TRUMP JR RUSSIAN MEETING CONTROVERSY

Roger Stone: Donald Trump Jr Did His Job Investigating Hillary Russia Ties

TRUMP KEEPS WINNING | TUCKER INTERVIEWS SCOTT ADAMS – TUCKER CARLSON TONIGHT

What is Fake News?

Russian lawyer who got inside Donald Trump’s inner circle had been denied US visa

By her own account, the Russian lawyer that managed to slide her way into Trump Tower last year and meet with President Donald Trump’s eldest son, his campaign manager and son-in-law is a former Moscow prosecutor who had been denied a visa to enter the United States.

Natalia Veselnitskaya filed an affidavit in a federal case in New York describing how she managed to get special permission to enter the United States after the visa denial to help represent a Russian company called Prevezon Holdings owned by the Russian businessman Denis Katsyv in a case brought against it by U.S. prosecutors.

“I represent victims in many criminal cases involving economic crimes. I have been retained by Denis Katsyv and the defendants in this action to assist their attorneys in the United States, Baker & Hostetler LLP to prepare their defense,” she wrote in the January 2016 affidavit filed in court in New York City.

“As counsel to Defendants, it is important that I be able to participate in the defense of this action by traveling to the United States. For that reason, I applied for a visa to enter the United States, but was denied,” she added. “I also applied for entry visas for my children, so that they could be together with me over the Christmas holiday while I was working in New York on this lawsuit, but this was also denied. However, the United States did issue a parole letter for me to enter the United States in order to help defend this lawsuit.”

It was apparently during the time she was in the United States on that parole entry that she arranged to meet with Donald Trump Jr., Trump son-in-law Jared Kushner and former campaign manager Paul Manafort on June 9, 2016 at Trump Tower.

During the meeting Veselnitskaya raised the issue of restoring U.S. adoptions inside Russia if the United States would repeal the Magnitsky Act, a law passed in 2012 punishing Moscow for human rights violations in connection with the death of a lawyer who had discovered a massive money laundering scheme inside the country.

Another player in the Russian influence scandal, the U.S.-based political firm Fusion GPS, was also involved in helping Prevezon, Katsyv and Baker Hostetler, according to the Grassley letter. Fusion has been a major focal point of the FBI and Congress because it hired a former British intelligence agent named Christopher Steele to produce a salacious intelligence dossier that made wild and still unsubstantiated claims about Trump ties to Russia.

Congressional investigators involved in the Russian influence case told Circa on Sunday that they are almost certain to probe if Veselnitskaya used her parole entry status to contact the Trump family and whether there is any connection to the Steele dossier and Fusion GPS.

“This is new information that raises all sorts of new questions and we are digging into it as we speak,” one congressional investigator told Circa, speaking only on condition of anonymity.

President Trump’s lawyers said Saturday they feared Veselnitskaya’s meeting at Trump Tower may have been part of a broader election opposition effort to smear the Republican by creating the impression he and his family had extensive ties to Russia as the Kremlin was interfering in the 2016 election.

“We have learned from both our own investigation and public reports that the participants in the meeting misrepresented who they were and who they worked for,” said Mark Corallo, a spokesman for President Trump’s legal team. “Specifically, we have learned that the person who sought the meeting is associated with Fusion GPS, a firm which according to public reports, was retained by Democratic operatives to develop opposition research on the President and which commissioned the phony Steele dossier. “

In her affidavit, Veselnitskaya described her path to becoming a successful private attorney in Moscow, starting with working as a Russian government prosecutor in Moscow,

“I have been practicing law since 1998. I am the founder and managing partner of the law offices of Kamerton Consulting. In 1998, I graduated with distinction from the Moscow State Legal Academy with a degree in jurisprudence,” she wrote. “Upon graduation from the Academy, I started working at the Prosecutor’s Office. I worked there for three years, overseeing the legality of statutes that were adopted by legislators of Moscow Oblast. After that I moved into private business.”

She also swore in the affidavit she did not speak English. Trump lawyers said she brought a Russian translator to the June meeting.Veselnitskaya also claimed U.S. government officials so distrusted her that they had her stopped and searched in London on her way back to New York in late 2015.

“I was detained for two hours by Heathrow Airport officials who specifically targeted me on the basis of the parole number that the United States Government had assigned to me. During this detention I was unjustifiably subjected to a strip search, for no apparent reason. I should not be subjected to such humiliation when I have been promised entry into the United States to defend against the scandalous accusations in this lawsuit on behalf of my clients.”

https://www.circa.com/story/2017/07/09/politics/russian-lawyer-who-got-inside-donald-trumps-inner-circle-had-been-denied-us-visa

As part of his Russia investigation, special counsel Robert Mueller plans to review the meeting between Donald Trump Jr. and a Kremlin-linked lawyer, and the email thread that detailed the planning for that meeting, according to a report Tuesday.CNN reported that Mueller will examine the meeting between Trump Jr., former campaign chairman Paul Manafort and Jared Kushner, President Trump’s adviser and son-in-law, with a Russian attorney who claimed to have damaging information about Hillary Clinton.Trump Jr., released an email chain from June 2016 leading up to the meeting showing that he agreed to meet with the attorney who was offering him “very high level and sensitive information” that would “incriminate” Clinton, the Democratic nominee for president.Mueller is investigating Russia’s interference in the 2016 election, and possible collusion with the Trump campaign.http://www.washingtonexaminer.com/robert-mueller-to-review-donald-trump-jrs-meeting-with-russian-attorney-emails-report/article/2628338

Russian Dirt on Clinton? ‘I Love It,’ Donald Trump Jr.

Senate intel panel to seek testimony from Trump Jr.: Senate source

The U.S. Senate’s intelligence committee is seeking documents from Donald Trump Jr. and intends to call on him to testify before lawmakers, a Senate source told Reuters on Tuesday after Trump Jr. released an email chain citing Russian support for his father before last year’s U.S. election.

The source said there is no date set yet to hear testimony from U.S. President Donald Trump’s eldest son, and that the committee is in the process of sending Trump Jr. its request for information.

Donald Trump Jr. tweeted images of emails regarding his 2016 meeting with a Russian lawyer on Tuesday. An intermediary said he could connect Trump Jr. with people who had information “that would incriminate Hillary [Clinton] … and would be very useful to your father.” Trump Jr. agreed to the meeting, which former campaign chairman Paul Manafort and Trump son-in-law and adviser Jared Kushner also attended in June 2016. They met with Russian attorney Natalia Veselnitskaya, who Trump Jr. said ultimately did not provide the promised material on Clinton.

In the emails, Trump Jr. corresponds with publicist Rob Goldstone, who represents the son of an Azerbaijan-born billionaire who has also done business with the Trumps. Trump Jr. forwarded the thread to Kushner and Manafort.

Here, the text appears in chronological order; headers were added by NPR. See the text as tweeted here, combined into one pdf. NPR journalists have annotated the text below with context and analysis.

Story 2: When Will Attorney General Sessions Appoint A Special Counsel To Investigate Intelligence Community Leaks and Hillary Clinton Destruction of Government Records, Mishandling of Classified Documents and Related Pay for Play Public Corruption of Clinton Foundation? — Was Democratic Hired Opposition Research firm Fusion GPS and Christopher Steele Former British Intelligent MI-6 Agent A Cutout For The Russian Intellegence Disinformation Campaign Contained in The Russian Donald Trump Dossier? Yes — Videos

Report: Pro-Clinton Group Behind Russian Dossier on Trump

EXPOSED: Democratic Operatives Caught FRAMING Trump With Russian Collusion Scandal

Christopher Steele, investigator behind Trump-Russia dossier, breaks his silence

Former British diplomat on Russian “honeytrap” tactic

Comey comments on Fusion GPS

MOTHER OF ALL HOAXES: Pro-Clinton Group Behind Fake Russian Dossier, Now Being Investigated

“YOU HAVE ZERO CREDIBILITY” HANNITY DESTROYS THE PROPAGANDA MEDIA IN EXPLOSIVE OPENING MONOLOGUE

Sen Grassley:’Democratic Opposition Research firm Fusion GPS Behind Trump Dossier Was Funded Russia?

Fusion GPS

From Wikipedia, the free encyclopedia
Fusion GPS
Founded 2009
Headquarters Washington D.C.
Key people
Glenn Simpson
Website fusiongps.com

Fusion GPS is a commercial research and strategic intelligence firm based in Washington D.C. The company conducts open-source investigations, provides research and strategic advice for businesses, law firms and investors, as well as for political inquiries, such as opposition research.[1] Fusion GPS uses “source networks to find information that is not readily accessible or in the public domain”.[2]

History

The company was co-founded in 2009 by Glenn R. Simpson and Peter Fritsch, both former journalists for The Wall Street Journal.

Work

Opposition research on Mitt Romney

Fusion GPS was hired by Democrats in 2012 to do opposition research on Mitt Romney. Some of the work that received the most media attention was focused on investigating the marriage records of a large donor to the Romney presidential campaign, Frank VanderSloot.[2][3]

Planned Parenthood

In August 2015, Planned Parenthood retained Fusion GPS to defensively investigate the veracity of a series of undercover videos released by pro-life activists that they claim showed Planned Parenthood officials agreeing to sell fetal tissues obtained through abortions to medical researchers.[2] Fusion GPS hired video and transcription experts to analyze the videos and summarized the findings in a forensic report.[4] The report concluded that the “unedited” videos posted by activists had been edited. The pro-life activists attributed the gaps to “bathroom breaks and waiting periods.”[5]

The report was provided to U.S. congressional leadership as evidence as they were considering funding and other issues related to Planned Parenthood operations. After a grand jury cleared Planned Parenthood of any wrongdoing, the pro-life activists behind the undercover videos were later arrested and charged with 15 felonies, including unlawfully recording people without their permission and conspiracy to invade privacy.[6]These charges were dropped 6 months later, but on March 28, 2017, Daleiden and Merritt were charged with 15 felonies in the State of California – one for each of the people whom they had filmed without consent, and one for criminal conspiracy to invade privacy. On 21 June 2017, fourteen of these charges were dismissed, with leave to amend, on the grounds that they were legally insufficient.[7]

USA v. Prevezon

During 2015 and 2016, Fusion GPS was hired by the BakerHostetler law firm which was defending Prevezon from an asset seizure by the U.S. government.[8][9] As part of their litigation support, Fusion GPS investigated Bill Browder, a witness central to the case.[10] During the course of the case, Browder claimed that Fusion GPS had previously been hired to undertake a pro-Russia campaign to aimed at stopping passage of the Magnitsky Act,[11] named after Sergei Magnitsky, a lawyer and auditor who died while being held without charges in a Russian government prison after he revealed that the Kremlin had stolen hundreds of millions of dollars from Hermitage Capital Management.

On March 30, 2017, Senate Judiciary Chairman Chuck Grassley, R-Iowa called for a U.S. Department of Justice investigation into connections between Fusion GPS and Russia, and an inquiry as to whether Fusion GPS was acting as an unregistered foreign agent.[11] The company has denied the claim that they were engaged in lobbying or violated the Foreign Agents Registration Act.[9][12]

Trump dossier and Christopher Steele

In September 2015, Fusion GPS was hired to do opposition research for Republicans who opposed Donald Trump’s bid during the Republican primary campaign for the 2016 presidential election. When Trump had emerged as the probable Republican candidate for the 2016 U.S. presidential election in the spring of 2016, Republican donors stopped funding the investigation, and Democratic supporters of Hillary Clinton became Fusion GPS’s new clients.[13] In June 2016, after the Democratic National Committee had been hacked and its emails began to be published online, Fusion GPS retained Christopher Steele, a private British corporate intelligence investigator and former MI-6 agent, to research any Russian connections to Trump. Steele issued a series of memos from June to December 2016, which became the document known as the Donald Trump–Russia dossier.[13]

In January 2017, the U.S. intelligence community briefed then-President Barack Obama and President-Elect Donald Trump on the contents of the dossier.[14] CNN reported that U.S. investigators had corroborated some parts of the dossier in February 2017.[15] In March 2017, former FBI director James Comey confirmed that the FBI was conducting an official investigation into one of the central allegations in the dossier, that the Trump campaign had coordinated with Russia to influence the 2016 Presidential election.[16]

In March 2017, U.S. Senator Chuck Grassley initiated an inquiry into whether the FBI had relied on the dossier and on Steele to further its investigation into Trump and his Russian ties.[11] Others have credited Steele with raising questions about the alleged collusion between Russia and the Trump campaign.[17]

See also

External Links

https://en.wikipedia.org/wiki/Fusion_GPS

The Pronk Pops Show Podcasts Portfolio

Listen To Pronk Pops Podcast or Download Shows 926-927

Listen To Pronk Pops Podcast or Download Shows 916-925

Listen To Pronk Pops Podcast or Download Shows 906-915

Listen To Pronk Pops Podcast or Download Shows 889-896

Listen To Pronk Pops Podcast or Download Shows 884-888

Listen To Pronk Pops Podcast or Download Shows 878-883

Listen To Pronk Pops Podcast or Download Shows 870-877

Listen To Pronk Pops Podcast or Download Shows 864-869

Listen To Pronk Pops Podcast or Download Shows 857-863

Listen To Pronk Pops Podcast or Download Shows 850-856

Listen To Pronk Pops Podcast or Download Shows 845-849

Listen To Pronk Pops Podcast or Download Shows 840-844

Listen To Pronk Pops Podcast or Download Shows 833-839

Listen To Pronk Pops Podcast or Download Shows 827-832

Listen To Pronk Pops Podcast or Download Shows 821-826

Listen To Pronk Pops Podcast or Download Shows 815-820

Listen To Pronk Pops Podcast or Download Shows 806-814

Listen To Pronk Pops Podcast or Download Shows 800-805

Listen To Pronk Pops Podcast or Download Shows 793-799

Listen To Pronk Pops Podcast or Download Shows 785-792

Listen To Pronk Pops Podcast or Download Shows 777-784

Listen To Pronk Pops Podcast or Download Shows 769-776

Listen To Pronk Pops Podcast or Download Shows 759-768

Listen To Pronk Pops Podcast or Download Shows 751-758

Listen To Pronk Pops Podcast or Download Shows 745-750

Listen To Pronk Pops Podcast or Download Shows 738-744

Listen To Pronk Pops Podcast or Download Shows 732-737

Listen To Pronk Pops Podcast or Download Shows 727-731

Listen To Pronk Pops Podcast or Download Shows 720-726

Listen To Pronk Pops Podcast or DownloadShows 713-719

Listen To Pronk Pops Podcast or DownloadShows 705-712

Listen To Pronk Pops Podcast or Download Shows 695-704

Listen To Pronk Pops Podcast or Download Shows 685-694

Listen To Pronk Pops Podcast or Download Shows 675-684

Listen To Pronk Pops Podcast or Download Shows 668-674

Listen To Pronk Pops Podcast or Download Shows 660-667

Listen To Pronk Pops Podcast or Download Shows 651-659

Listen To Pronk Pops Podcast or Download Shows 644-650

Listen To Pronk Pops Podcast or Download Shows 637-643

Listen To Pronk Pops Podcast or Download Shows 629-636

Listen To Pronk Pops Podcast or Download Shows 617-628

Listen To Pronk Pops Podcast or Download Shows 608-616

Listen To Pronk Pops Podcast or Download Shows 599-607

Listen To Pronk Pops Podcast or Download Shows 590-598

Listen To Pronk Pops Podcast or Download Shows 585- 589

Listen To Pronk Pops Podcast or Download Shows 575-584

Listen To Pronk Pops Podcast or Download Shows 565-574

Listen To Pronk Pops Podcast or Download Shows 556-564

Listen To Pronk Pops Podcast or Download Shows 546-555

Listen To Pronk Pops Podcast or Download Shows 538-545

Listen To Pronk Pops Podcast or Download Shows 532-537

Listen To Pronk Pops Podcast or Download Shows 526-531

Listen To Pronk Pops Podcast or Download Shows 519-525

Listen To Pronk Pops Podcast or Download Shows 510-518

Listen To Pronk Pops Podcast or Download Shows 500-509

Listen To Pronk Pops Podcast or Download Shows 490-499

Listen To Pronk Pops Podcast or Download Shows 480-489

Listen To Pronk Pops Podcast or Download Shows 473-479

Listen To Pronk Pops Podcast or Download Shows 464-472

Listen To Pronk Pops Podcast or Download Shows 455-463

Listen To Pronk Pops Podcast or Download Shows 447-454

Listen To Pronk Pops Podcast or Download Shows 439-446

Listen To Pronk Pops Podcast or Download Shows 431-438

Listen To Pronk Pops Podcast or Download Shows 422-430

Listen To Pronk Pops Podcast or Download Shows 414-421

Listen To Pronk Pops Podcast or Download Shows 408-413

Listen To Pronk Pops Podcast or Download Shows 400-407

Listen To Pronk Pops Podcast or Download Shows 391-399

Listen To Pronk Pops Podcast or Download Shows 383-390

Listen To Pronk Pops Podcast or Download Shows 376-382

Listen To Pronk Pops Podcast or Download Shows 369-375

Listen To Pronk Pops Podcast or Download Shows 360-368

Listen To Pronk Pops Podcast or Download Shows 354-359

Listen To Pronk Pops Podcast or Download Shows 346-353

Listen To Pronk Pops Podcast or Download Shows 338-345

Listen To Pronk Pops Podcast or Download Shows 328-337

Listen To Pronk Pops Podcast or Download Shows 319-327

Listen To Pronk Pops Podcast or Download Shows 307-318

Listen To Pronk Pops Podcast or Download Shows 296-306

Listen To Pronk Pops Podcast or Download Shows 287-295

Listen To Pronk Pops Podcast or Download Shows 277-286

Listen To Pronk Pops Podcast or Download Shows 264-276

Listen To Pronk Pops Podcast or Download Shows 250-263

Listen To Pronk Pops Podcast or Download Shows 236-249

Listen To Pronk Pops Podcast or Download Shows 222-235

Listen To Pronk Pops Podcast or Download Shows 211-221

Listen To Pronk Pops Podcast or Download Shows 202-210

Listen To Pronk Pops Podcast or Download Shows 194-201

Listen To Pronk Pops Podcast or Download Shows 184-193

Listen To Pronk Pops Podcast or Download Shows 174-183

Listen To Pronk Pops Podcast or Download Shows 165-173

Listen To Pronk Pops Podcast or Download Shows 158-164

Listen To Pronk Pops Podcast or Download Shows151-157

Listen To Pronk Pops Podcast or Download Shows 143-150

Listen To Pronk Pops Podcast or Download Shows 135-142

Listen To Pronk Pops Podcast or Download Shows 131-134

Listen To Pronk Pops Podcast or Download Shows 124-130

Listen To Pronk Pops Podcast or Download Shows 121-123

Listen To Pronk Pops Podcast or Download Shows 118-120

Listen To Pronk Pops Podcast or Download Shows 113 -117

Listen To Pronk Pops Podcast or Download Show 112

Listen To Pronk Pops Podcast or Download Shows 108-111

Listen To Pronk Pops Podcast or Download Shows 106-108

Listen To Pronk Pops Podcast or Download Shows 104-105

Listen To Pronk Pops Podcast or Download Shows 101-103

Listen To Pronk Pops Podcast or Download Shows 98-100

Listen To Pronk Pops Podcast or Download Shows 94-97

Listen To Pronk Pops Podcast or Download Show 93

Listen To Pronk Pops Podcast or Download Show 92

Listen To Pronk Pops Podcast or Download Show 91

Listen To Pronk Pops Podcast or Download Shows 88-90

Listen To Pronk Pops Podcast or Download Shows 84-87

Listen To Pronk Pops Podcast or Download Shows 79-83

Listen To Pronk Pops Podcast or Download Shows 74-78

Listen To Pronk Pops Podcast or Download Shows 71-73

Listen To Pronk Pops Podcast or Download Shows 68-70

Listen To Pronk Pops Podcast or Download Shows 65-67

Listen To Pronk Pops Podcast or Download Shows 62-64

Listen To Pronk Pops Podcast or Download Shows 58-61

Listen To Pronk Pops Podcast or Download Shows 55-57

Listen To Pronk Pops Podcast or Download Shows 52-54

Listen To Pronk Pops Podcast or Download Shows 49-51

Listen To Pronk Pops Podcast or Download Shows 45-48

Listen To Pronk Pops Podcast or Download Shows 41-44

Listen To Pronk Pops Podcast or Download Shows 38-40

Listen To Pronk Pops Podcast or Download Shows 34-37

Listen To Pronk Pops Podcast or Download Shows 30-33

Listen To Pronk Pops Podcast or Download Shows 27-29

Listen To Pronk Pops Podcast or Download Shows 17-26

Listen To Pronk Pops Podcast or Download Shows 16-22

Listen To Pronk Pops Podcast or Download Shows 10-15

Listen To Pronk Pops Podcast or Download Shows 1-9

 

 

Read Full Post | Make a Comment ( None so far )

The Pronk Pops Show 869, April 7, 2017, Story 1: Trump Imperial Presidency of The American Empire –Trump Just Another Progressive Global Interventionist Not An American First Nationalist –Another Undeclared War — 59 Tomhawk Cruise Missiles Attack al Shayrat Airbase Destroying 6 Aircraft and One Runway — Videos — Story 2: What is Next? United States Led Coalition of Egypt, Jordan, Kurds, Saudi Arabia, and Turkey to Destroy Islamic State, Jabhat Al Nustra Front ( al-Qaeda’s Syrian affiliate), Radical Islamic Terrorist Jihadists in Syria, Hezbollah, and Bashar al-Assad Syrian Regime –Videos — Story 3: Supreme Court Justice Neil Gorsuch Confirmed 54 Yes — 45 No — Videos

Posted on April 7, 2017. Filed under: American History, Blogroll, Breaking News, Chemical Explosion, Congress, Countries, Donald J. Trump, Donald Trump, Egypt, European History, European Union, Foreign Policy, France, Government, Government Dependency, Government Spending, Great Britain, History, House of Representatives, Illegal Immigration, Immigration, Independence, Iraq, Islamic Republic of Iran, Islamic State, Israel, Israel, Italy, Jordan, Language, Libya, Lying, Middle East, Natural Gas, News, Oil, Philosophy, Photos, President Barack Obama, President Trump, Qatar, Radio, Rand Paul, Raymond Thomas Pronk, Resources, Rule of Law, Russia, Senate, Spying, Surveillance and Spying On American People, Syria, Technology, Terror, Terrorism, Turkey, United Kingdom, United States of America, Videos, Violence, War, Wealth, Weapons, Wisdom | Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , |

Project_1

The Pronk Pops Show Podcasts

Pronk Pops Show 869: April 7, 2017

Pronk Pops Show 868: April 6, 2017

Pronk Pops Show 867: April 5, 2017

Pronk Pops Show 866: April 3, 2017

Pronk Pops Show 865: March 31, 2017

Pronk Pops Show 864: March 30, 2017

Pronk Pops Show 863: March 29, 2017

Pronk Pops Show 862: March 28, 2017

Pronk Pops Show 861: March 27, 2017

Pronk Pops Show 860: March 24, 2017

Pronk Pops Show 859: March 23, 2017

Pronk Pops Show 858: March 22, 2017

Pronk Pops Show 857: March 21, 2017

Pronk Pops Show 856: March 20, 2017

Pronk Pops Show 855: March 10, 2017

Pronk Pops Show 854: March 9, 2017

Pronk Pops Show 853: March 8, 2017

Pronk Pops Show 852: March 6, 2017

Pronk Pops Show 851: March 3, 2017

Pronk Pops Show 850: March 2, 2017

Pronk Pops Show 849: March 1, 2017

Pronk Pops Show 848: February 28, 2017

Pronk Pops Show 847: February 27, 2017

Pronk Pops Show 846: February 24, 2017

Pronk Pops Show 845: February 23, 2017

Pronk Pops Show 844: February 22, 2017

Pronk Pops Show 843: February 21, 2017

Pronk Pops Show 842: February 20, 2017

Pronk Pops Show 841: February 17, 2017

Pronk Pops Show 840: February 16, 2017

Pronk Pops Show 839: February 15, 2017

Pronk Pops Show 838: February 14, 2017

Pronk Pops Show 837: February 13, 2017

Pronk Pops Show 836: February 10, 2017

Pronk Pops Show 835: February 9, 2017

Pronk Pops Show 834: February 8, 2017

Pronk Pops Show 833: February 7, 2017

Pronk Pops Show 832: February 6, 2017

Pronk Pops Show 831: February 3, 2017

Pronk Pops Show 830: February 2, 2017

Pronk Pops Show 829: February 1, 2017

Pronk Pops Show 828: January 31, 2017

Pronk Pops Show 827: January 30, 2017

Pronk Pops Show 826: January 27, 2017

Pronk Pops Show 825: January 26, 2017

Pronk Pops Show 824: January 25, 2017

Pronk Pops Show 823: January 24, 2017

Pronk Pops Show 822: January 23, 2017

Pronk Pops Show 821: January 20, 2017

Pronk Pops Show 820: January 19, 2017

Pronk Pops Show 819: January 18, 2017

Pronk Pops Show 818: January 17, 2017

Pronk Pops Show 817: January 13, 2017

Pronk Pops Show 816: January 12, 2017

Pronk Pops Show 815: January 11, 2017

Pronk Pops Show 814: January 10, 2017

Pronk Pops Show 813: January 9, 2017

Image result for al-Shayrat air base

Image result for al-Shayrat air base

Image result for al-Shayrat air baseImage result for al-Shayrat air baseImage result for al sharat air field syria aerial viewImage result for al-Shayrat air baseImage result for al-Shayrat air baseImage result for number killed in syrian civil WARImage result for branco cartons trump war syriaImage result for branco cartons trump war syriaImage result for branco cartons trump war syria

Image result for branco cartons trump war syriaImage result for branco cartons trump war syriaImage result for al-Shayrat air baseImage result for al sharat air field syria aerial viewImage result for Syria Chemical AttackImage result for Syria Chemical Attack

Image result for Syria Chemical Attack

Image result for Syria Chemical AttackImage result for al-Nusra FrontImage result for al-Nusra Front chemical gas
Image result for al-Nusra Front

Image result for al-Nusra FrontImage result for al-Nusra FrontImage result for al-Nusra Front chemical gas

Image result for Syria Chemical Attack

Image result for Syria Chemical Attack

Image result for Syria Chemical AttackImage result for al-Nusra Front chemical gas

Image result for al-Nusra Front chemical gas

SYRIA FALSE FLAG LEADS TO WAR – Ron Paul

The world reacts to the strikes against Syria

Gen. Jack Keane reacts to US airstrikes in Syria

Mark Steyn: Trump hit a reset button for the world

President Trump’s Syria policy raises concerns

Sen. Paul: We didn’t have the debate, we simply went to war

A look at the intel that led to US strike on Syrian airbase

US Strikes Syria: Chemical attack not the first in Syrian civil war

Marco Rubio: President had legal, moral authority to attack

Israeli PM Netanyahu ‘fully supports’ US strike on Syria

President Trump Orders U.S. Airstrike on Syria

Trump turns on Assad: How will US strikes impact war in Syria? (part 1)

BREAKING! WE’RE AT WAR! TRUMP JUST LAUNCHED A MASSIVE STRIKE AGAINST SYRIA WW3 HAS BEGUN!!!

Issue Analysis: Trump, Assad, Syria, China, North Korea, UN Resolutions, Russia and What’s Next?

President Donald Trump Bombs Syria

Syria Chemical Attack: Push For Ousting Bashar al-Assad

Seymour Hersh: Obama “Cherry-Picked” Intelligence on Syrian Chemical Attack to Justify U.S. Strike

Global Empire – The World According to Seymour Hersh [Part Two]

Global Empire – The World According to Seymour Hersh [Part One]

Turkey’s interests in the Syrian civil war

Saudi Arabia’s role in the Syrian civil war

Why Do Saudi Arabia And Iran Hate Each Other?

TURKEY vs SYRIA Military Power Comparison | Turkish Army VS Syrian Arab Army | 2016

Image result for phosgene posters

Toxicity of Phosgene with Audio

FSA use poison gas on SAA and Syrian people supplied by Turkey

Phosgene Exposure

Gas warfare in the First World War

What is Sarin Gas?

Published on Sep 7, 2013

Hank discusses the chemistry of sarin, the nerve agent that killed more than 1400 people in a chemical weapons attack in Syria.

Like SciShow? Want to help support us, and also get things to put on your walls, cover your torso and hold your liquids? Check out our awesome products over at DFTBA Records: http://dftba.com/artist/52/SciShow

AMERICA’S TOP GENERAL JUST GAVE TRUMP SOMETHING THAT WILL SCARE NORTH KOREA TO DEATH!

Published on Apr 7, 2017

Sub for more: http://nnn.is/the_new_media | Danny Gold for Liberty Writers reports, Anyone who has been watching the news recently is sure to have heard all about North Korea and their nukes. They also know President Donald Trump is NOT happy about it and he and Mattis are ready to STRIKE BACK!

 

Why did Donald Trump strike al-Shayrat air base?

An aerial view of the al-Shayrat Airfield near Homs, Syria, 07 October 2016
An aerial view of the al-Shayrat Airfield near Homs, Syria, 07 October 2016 CREDIT: US DEPARTMENT OF DEFENCE HANDUT

The strike on al-Shayrat air base near the western Syrian city of Homs was both a symbolic and a tactical one.

The airfield is not just a valuable military target, it is also the one from which the Syrian government launched its chemical attack on Tuesday.

Donald Trump had intended the raid as a direct retaliation. 

Shayrat is one of the largest and most active Syrian Air Force bases, which has served as the nerve centre of its missions against rebels in Homs, as well as Palmyra, where government forces have been battling Islamic State of Iraq and the Levant (Isil).

Watch | Donald Trump: Syria strike in ‘vital’ US interest

However, it is believed that the US gave advance warning of the missile strike to Russia, which gave the Syrian military some time to move most of its assets to another base.

The Russians, who intervened militarily on behalf of the Bashar al-Assad regime in October 2015, have aircraft stationed at bases across Syria and the US could not risk accidentally hitting one.

Russia reportedly reinforced the base and built additional runways before beefing up its operations there.

Maj Gen. Igor Konashenkov, Russian defense ministry spokesman, reported on Friday that only 23 of the 59 Tomahawk cruise missiles reached the air base.

The raid damaged one of its two runways, according to pictures shared on social media which also showed severe fire damage to other parts of the base.

Rami Adbulrahman, director of UK-based Syrian Observatory for Human Rights monitor said he was told 90 per cent of the base was destroyed and senior airforce commander, Brigadier Khalil Issa Ibrahim, was among the seven reported killed.

Before 2013 the base was used to store chemical weapons but nothing was targeted that could have contained them now.

It was believed there may have been sarin gas stored in one warehouse but that was avoided.

Maj Konashenkov said they destroyed six MiG-23 fighter jets of the Syrian air force which were under repairs, but did not damage other warplanes.

A former pilot who was stationed at Shayrat before he defected said Shayrat could hold up to 45 aircraft and that had they all been hit it would have had a major impact on the Syrian military’s strike capacity.

The mayor of Homs criticised the strikes, saying they only aided terrorists as the base was the main operations centre for carrying out strikes against Isil.

Fares Shehabi, an MP for Aleppo, posted on Twitter: “Trump attacked an airport solely dedicated to fighting ISIS in central Syria and providing aid to besieged civilians in Deir Ezzor.”

http://www.telegraph.co.uk/news/2017/04/07/did-donald-trump-strike-al-shayrat-air-base/

Jumping to conclusions; something is not adding up in Idlib chemical weapons attack

70

BEIRUT, LEBANON (4:47 P.M.) – At least 58 people were killed in a horrific gas attack in the Idlib Governorate this morning. However, even before investigations could be conducted and for evidence to emerge, Federica Mogherini, the Italian politician High Representative of the European Union (EU) for Foreign Affairs and Security Policy, condemned the Syrian government stating that the “Assad regime bears responsibility for ‘awful’ Syria ‘chemical’ attack.”

The immediate accusation from a high ranking EU official serves a dangerous precedent where public outcry can be made even before the truth surrounding the tragedy can emerge

Israeli President, Benjamin Netanyahu, joined in on the condemnation, as did Amnesty International.

Merely hours after the alleged chemical weapons attack in Khan Sheikhun, supposedly by the Syrian government, holes are beginning to emerge from opposition sources, discrediting the Al-Qaeda affiliated White Helmets claims.

For one, seen in the above picture, the White Helmets are handling the corpses of people without sufficient safety gear, most particularly with the masks mostly used , as well as no gloves. Although this may seem insignificant, understanding the nature of sarin gas that the opposition claim was used, only opens questions.

Within seconds of exposure to sarin, the affects of the gas begins to target the muscle and nervous system. There is an almost immediate release of the bowels and the bladder, and vomiting is induced. When sarin is used in a concentrated area, it has the likelihood of killing thousands of people. Yet, such a dangerous gas, and the White Helmets are treating bodies with little concern to their exposed skin. This has to raise questions.

It also raises the question why a “doctor” in a hospital full of victims of sarin gas has the time to tweet and make video calls. This will probably be dismissed and forgotten however.

Terrorist Mohammed Alloush is not a gas expert, he is just one of the participants in the crime https://twitter.com/maytham956/status/849235559117619201 

@maytham956 Hmm…’Patients are flooding in’ YET this ‘doctor’ (seems the main source of ‘gas attack’) has time to film, tweet and videocalls… pic.twitter.com/SfLOfjE2pG

View image on Twitter

It is known that about 250 people from Majdal and Khattab were kidnapped by Al-Qaeda terrorists last week. Local sources have claimed that many of those dead from the chemical weapons were those from Majdal and Khattab.

ALSO READ  In Video | ISIS Hunters secure gas fields in east Palmyra

This would suggest that on the eve of upcoming peace negotiations, terrorist forces have once again created a false flag scenario. This bares resemblance to the Ghouta chemical weapons attack in 2013 where the Syrian Army was accused of using the weapons of mass destruction on the day that United Nations Weapon’s Inspectors arrived in Damascus.

Later, in a separate chemical weapon usage allegation, Carla del Ponte, a UN weapons inspector said that there was no evidence that the government had committed the atrocity. This had however not stopped the calls for intervention against the Syrian government, a hope that the militant forces wished to eventuate from their use of chemical weapons against civilians in Khan-al-Assal.

Therefore, it is completely unsurprising that Orient TV has already prepared a “media campaign” to cover the Russian and Syrian airstrikes in Hama countryside against terrorist forces, with the allegations that the airforces have been using chemical weapons. And most telling, there announcement of covering the use of chemical weapons by the Syrian government, hours before this allegation even emerged…….. Seems like someone forgot to tell him that it would not occur for a few more hours before his tweet.

Orient TV reporter :
“tomorrow we are launching a media campaign to cover the airstrikes on Hama country side including the usage of CW”

Meanwhile, pick up  trucks have been photographed around bodies of those killed. Again, it must be questioned why there are people around sarin gas without any protective gear, and not affected at all when it can begin attacking the body within seconds? Also, the pick up trucks remain consistent to what local sources have said that many of those dead were kidnapped by Al-Qaeda terrorists from pro-government towns in rural Hama.

ALSO READ  Update from Syrian airbase targeted by US missiles

Also, what is brought into question is where the location of the hose is coming from in the below picture, a dugout carved into the rock. This also suggests that the location is at a White Helmets base where there are dug out hiding spots carved into the mountainside and where they have easy access to equipment, as highlighted by Twitter user Ian Grant.

In response to the allegations, the Syrian Arab Army soldiers in northern Hama denied the use of chemicals weapons today. This is consistent with the Russian Ministry of Defense who denied any involvement in the attack.

The army “has not and does not use them, not in the past and not in the future, because it does not have them in the first place,” a military source said.

And this of course begs the question. With the Syrian Army and its allies in a comfortable position in Syria, making advances across the country, and recovering lost points in rural Hama, why would they now resort to using chemical weapons? It is a very simple question with no clear answer. It defies any logic that on the eve of a Syria conference in Brussels and a week before peace negotiations are to resume, that the Syrian government would blatantly use chemical weapons. All evidence suggests this is another false chemical attack allegation made against the government as seen in the Khan-al-Assal 2013 attack where the terrorist groups hoped that former President Obama’s “red-line” would be crossed leading to US-intervention in Syria against the government.

Most telling however, is that most recent report shows that the government does not deny striking Khan Sheikhun. Al-Masdar’s Yusha Yuseef was informed by the Syrian Army that the air force targeted a missile factory in Khan Sheikoun, using Russian-manufactured Su-22 fighter jet to carry out the attack. Most importantly, the Su-22’s bombs are unique and cannot be filled with any chemical substances, which is different than bombs dropped from attack helicopters. Yuseef was then told that the Syrian Air Force did not know there were any chemical substances inside the missile factory in Khan Sheikhoun. It remains to be known whether there actually were chemicals in the missile factory targeted by the airstrikes, or whether the terrorist forces used gas on the kidnapped civilians from the pro-government towns and brought them in the lorry trucks to the site of the airstrikes. Whether they were gassed by the militant forces, or the airstrikes caused a chemical weapon factory to explode, the gruesome deaths of children, seen foaming in the mouth because of the gas, lays in the hands of the terrorists.

ALSO READ  Autopsies confirm Assad behind chemical attack in southern Idlib: Turkish state media

Therefore, it becomes evident that the area targeted was definitely a terrorist location, where it is known that the White Helmets share operation rooms with terrorist forces like Al-Qaeda as seen after the liberation of eastern Aleppo. Civilians and fighting forces, including Kurdish militias, have all claimed that militant groups that operate in Idlib, Hama and Aleppo countrysides, have used chemical weapons in the past. Therefore, before the war cries begin and the denouncement of the government from high officials in power positions begin, time must be given so that all evidence can emerge. However, this is an important factor that has never existed in the Syrian War, and the terrorist forces continue to hope that Western-intervention against the government will occur, at the cost of the lives of innocent civilians.

https://www.almasdarnews.com/article/jumping-conclusions-something-not-adding-idlib-chemical-weapons-attack/

The Western media refutes their  own lies.

Not only do they confirm that the Pentagon has been training the terrorists in the use of chemical weapons, they also acknowledge the existence of a not so secret “US-backed plan to launch a chemical weapon attack on Syria and blame it on Assad’s regime” 

London’s Daily Mail in a 2013 article confirmed the existence of an Anglo-American project endorsed by the White House (with the assistance of Qatar) to wage a chemical weapons attack on Syria and place the blame of Bashar Al Assad.

The following Mail Online article was published and subsequently removed. Note the contradictory discourse: “Obama issued warning to Syrian president Bashar al Assad”, “White House gave green light to chemical weapons attack”.

This Mail Online report published in January 2013 was subsequently removed from Mail Online. For further details click here

The Pentagon’s Training of  “Rebels” (aka Al Qaeda Terrorists) in the Use of Chemical Weapons

CNN accuses Bashar Al Assad of killing his own people while also acknowledging that the “rebels” are not only in possession of chemical weapons, but that these “moderate terrorists” affiliated with Al Nusra are trained in the use of chemical weapons by specialists on contract to the Pentagon.

In a twisted logic, the Pentagon’s mandate was to ensure that the rebels aligned with Al Qaeda would not acquire or use WMD, by actually training them in the use of chemical weapons (sounds contradictory):

“The training [in chemical weapons], which is taking place in Jordan and Turkey, involves how to monitor and secure stockpiles and handle weapons sites and materials, according to the sources. Some of the contractors are on the ground in Syria working with the rebels to monitor some of the sites, according to one of the officials.

The nationality of the trainers was not disclosed, though the officials cautioned against assuming all are American. (CNN, December 09, 2012, emphasis added)

screenshot of the CNN article, the original link has been redirected to CNN blogs,

The above report by CNN’s award winning journalist Elise Labott (relegated to the status a CNN blog), refutes CNN’s numerous accusations directed against Bashar Al Assad.

Who is doing the training of terrorists in the use of chemical weapons?  From the horse’s mouth: CNN

Sources: U.S. helping underwrite Syrian rebel training on securing chemical weapons

And these are the same terrorists (trained by the Pentagon) who are the alleged target of  Washington’s counterterrorism bombing campaign initiated by Obama in August 2014:

“The Pentagon scheme established in 2012 consisted in equipping and training Al Qaeda rebels in the use of chemical weapons, with the support of military contractors hired by the Pentagon, and then holding the Syrian government responsible  for using the WMD against the Syrian people.

What is unfolding is a diabolical scenario –which is an integral part of military planning– namely a situation where opposition terrorists advised by Western defense contractors are actually in possession of chemical weapons.

This is not a rebel training exercise in non-proliferation. While president Obama states that “you will be held accountable” if “you” (meaning the Syrian government) use chemical weapons, what is contemplated as part of this covert operation is the possession of chemical weapons by the US-NATO sponsored terrorists, namely “by our” Al Qaeda affiliated operatives, including the Al Nusra Front which constitutes the most effective Western financed and trained fighting group, largely integrated by foreign mercenaries. In a bitter twist, Jabhat al-Nusra, a US sponsored “intelligence asset”, was recently put on the State Department’s list of terrorist organizations.

The West claims that it is coming to the rescue of the Syrian people, whose lives are allegedly threatened by Bashar Al Assad. The truth of the matter is that the Western military alliance is not only supporting the terrorists, including the Al Nusra Front, it is also making chemical weapons available to its proxy “opposition” rebel forces.

The next phase of this diabolical scenario is that the chemical weapons in the hands of Al Qaeda operatives will be used against civilians, which could potentially lead an entire nation into a humanitarian disaster.

The broader issue is: who is a threat to the Syrian people? The Syrian government of Bashar al Assad or the US-NATO-Israel military alliance which is recruiting “opposition” terrorist forces, which are now being trained in the use of chemical weapons.” (Michel Chossudovsky, May 8, 2013, minor edit)

http://www.blacklistednews.com/Pentagon_Trained_Syria%E2%80%99s_Al_Qaeda_%E2%80%9CRebels%E2%80%9D_in_the_Use_of_Chemical_Weapons/57792/0/38/38/Y/M.html

4 DEADLIEST CHEMICAL WEAPONS

During the World War I, a new, deadly type of weapon was used for the first time; toxic gas. Considered uncivilised prior to the war, the development and military usage of poisonous gas grenades was soon called for by the demands of both sides to find a new way to overcome the stalemate of unforeseen trench warfare.

First used at the Second Battle of Ypres on 22 April 1915, cylinders filled with toxic gas soon became one of the most devastating and effective weapons used in the entire Great War, killing more than 90,000 soldiers and injuring about 1.25 million. In this article, we are going to explore the 4 of most deadly chemical weapons ever conceived, their history, usage, and effects on the human beings.

4.Mustard Gas(Yperite)

While Germans were releasing the mustard gas in year 1917 near the Belgian city of Ypres for the first time, chemist Frederic Guthrie was most likely turning in his grave. In year 1860, this British professor discovered the mustard gas, and also experienced its toxic effects first-hand for the first time. 57 years later, after its first military usage at Ypres, it got its infamous nickname, Yperite.

In the beginning, Germans planned to use the mustard gas only as a paralyzing agent. However, they soon found out, that when in sufficient concentrations, this gas could be easily lethal to the majority of the enemy soldiers.

https://i2.wp.com/upload.wikimedia.org/wikipedia/commons/d/dc/British_55th_Division_gas_casualties_10_April_1918.jpg

Soldiers after the mustard gas attack

Due to its dangerous properties, mustard gas soon became a popular chemical weapon, used in WWII, during the North Yemen Civil War, and even by Saddam Husein in year 1988. Even 150 years after its discovery, antidote is still to be discovered.

Pure mustard gas is colourless, oily liquid at room temperature. When used in its impure form, as warfare agent, it is usually green-brown in color and has an specific odor resembling mustard or garlic, hence the name. Yperite fumes are more than 6 times heavier than air, staying near the ground for several hours, effectively filling and contaminating enemy’s trenches, and killing everyone without proper protection.

https://i1.wp.com/upload.wikimedia.org/wikipedia/commons/f/fd/155mmMustardGasShells.jpg

Mustard gas shells

Lethal dose for an adult man weighing 160 lbs is approximately 7,5 g of liquid mustard gas, when in contact with his skin for several minutes. However, when used in its gaseous form, lethality greatly depends on its concentration and on the length of exposure. Gas mask is usually not enough to be protected from this gas; it can easily penetrate the skin and kill the victim from inside. It easily passes through most of the clothes, shoes or other materials. For instance, standard rubber gloves could protect the skin for only about ten minutes.

4 or 6 hours after exposure, burning sensation appears in the affected areas, followed by reddening of the skin. After next 16 hours, large blisters appear on the affected skin, subsequently causing severe scarring and sometimes even necrosis. If the eyes were affected, temporary or permanent blindness typically occurs after few days.

https://i1.wp.com/upload.wikimedia.org/wikipedia/commons/6/68/Mustard_gas_burns.jpg

Soldier with mustard gas burns

When inhaled, first symptoms start to manifest themselves after several hours, starting with chest pain, bloody coughing and vomiting, followed by muscle spasms. Death usually occurs within 3 days, caused either by lung edema or heart failure.

3.Phosgene

In year 1812, 22-year old British amateur chemist John Davy syntetized the phosgene gas for the first time. However, it didn’t contain any phosphorus, its name was derived from greek words phos(light) and gennesis(birth). John Davy probably assumed that his invention would be used in a more sensible way, however, on 9.th of December, 88 tons of phosgene were released during the trench warfare in France, killing 69 men and seriously injuring more then 1,200.

https://i2.wp.com/upload.wikimedia.org/wikipedia/commons/9/9d/Phosgene_poster_ww2.jpg

U.S. Army phosgene identification poster(WWII)

Germans were satisfied by the results, so they soon started using grenades filled by phosgene in combat. It accounts for more than 60% of all deaths caused by the chemical warfare during the First World War, more than chlorine and mustard gas combined.

During the Second World War, most soldiers were well-prepared for the possible use of this deadly gas, so the casualties were nowhere that high. However, phosgene-filled grenades used during the 1942 Battle of Kerch by Nazi Germany allegedly injured at least 10,000 Soviet soldiers.

https://i0.wp.com/upload.wikimedia.org/wikipedia/commons/b/ba/Nach_Gasangriff_1917.jpg

British casualties after German phosgene attack

Which deadly properties does this gas possess? At low temperatures, it is a colourless liquid. However, when heated to more than 8 degrees celsius, it evaporates quickly. Its odor has been often described by the survivors as pleasant, similar to newly mown hay or wet grass. After release, it contaminates the area for about 10 minutes, double the time in the winter. When compared to chlorine, phosgene has a major advantage; first symptoms start to manifest themselves after much longer time period, usually after more than five minutes, allowing more phosgene to be inhaled.

After one inhales high concentrations of this lethal gas, his chances of survival are very mild. After few minutes, he is likely to die of suffocation, because phosgene aggresively disrupts the blood-air barrier in the lungs.

https://i1.wp.com/upload.wikimedia.org/wikipedia/commons/3/34/Australian_infantry_small_box_respirators_Ypres_1917.jpg

Australian soldiers wearing gas masks(WWI)

After inhaling less concentrated phosgene, you might be little bit better off. One hour after exposure, first symptoms include strong burning sensation in pharynx and trachea, severe headache and vomiting, followed by pulmonary edema(swelling and fluid buildup), which often leads to suffocation.

To this day, phosgene remains one of the most dangerous chemical weapons in the world. Although not as deadly as sarin or nerve gas, it is very easy to manufacture; no wonder it’s often used during terrorist attacks. Homemade phosgene grenade can be easily created by exposing a bottle of chloroform to UV-light source for a few days.

2.Sarin

If previous two chemicals weren’t dangerous enough, here comes the sarin, often known as the most powerful of all nerve agents.

Sarin was developed back in 1938 by a group of 4 German scientists, Scharder, Ambros, Rudiger and van der Linde, during their research of pesticides. During the WWII, this deadly gas was first used by the Nazi Germany in June 1942. At the end of the war, Germany allegedly possessed more than 10 tons of sarin.

https://i1.wp.com/blogs.reuters.com/great-debate/files/2013/04/japan-sarin1.jpg

Japanese firemen decontaminating the Tokyo subway after sarin attack

However, it is most famous for being used during the 1995 terrorist attack on the Tokio subway by a Japanese cult Aum Shinrikyo, killing 13 people and allegedly injuring more than 5,000. It was also used back in August 2013 by al-Assad’s forces in Ghouta, Syria, killing more than 1,700 people.

Sarin belongs to the group of nerve gasses, the deadliest of all toxic gasses used in chemical warfare. It is highly toxic; a single drop of sarin the size of the head of a pin is enough to kill an adult human. In addition, most of the victims usually die few minutes after contamination.

It usually enters the organism via respiration, but it can also penetrate the skin or be ingested. In home temperature, sarin is a colourless liquid without significant odor, similar to water. However, when exposed to higher temperatures, it starts to evaporate, being still odorless. After release, it often remains deadly for more than 24 hours.

https://i2.wp.com/asset0.cbsistatic.com/cnwk.1d/i/tim2/2013/08/30/762px-Demonstration_cluster_bomb_620x488.jpg

Missile filled with sarin containers

Immediately after exposure, first symptoms include strong headaches, increased salivation and lacrimation(secretion of tears), followed by gradual paralysis of the muscles. Death is caused by asphyxiation or heart failure.

According to some sources, Sarin is 500 times more deadly than kyanide, with its lethal dose being only about 800 micrograms. Only 5 tons of sarin, obiviously properly dosed, would be enough to wipe out entire humanity.

1.Agent Orange

This mixture of two herbicides, most famous for its usage in Vietnam War, is not a chemical weapon in the true sense of the word. It was discovered in year 1943 by American botanic Arthur Galston. In year 1951, further research started by the scientific team in the military base of Detrick, Maryland.

https://i0.wp.com/24.media.tumblr.com/270a4453b15492b15b6551f10388fef4/tumblr_mt92auzYjZ1s88ji3o1_1280.jpg

Barrel of ”Agent Orange”

During the War of Vietnam, it was widely used for deforestation of the large areas covered by thick jungle, to enable easier and more effective bombing of enemy bases and supply routes. Although designed as herbicide, the Agent Orange also contained large amounts of dioxin, a highly toxic compound, making it one of the most deadly chemical weapons ever deployed.

In years 1962-1971, military operation with codenames ”Ranch Hand” or ”Trail Dust” took place in Southern Vietnam. During this operation, jungles in the region were heavily showered by this herbicide, primarily in the areas of Mekong delta. Mixture was storaged in orange barrels, hence the name ”Agent Orange”. During the operation, more than 20 million gallons of this dangerous chemical were used, destroying large areas of jungle, contaminating air, water and food sources.

https://i2.wp.com/digitaljournalist.org/issue0401/images/griffiths/09.jpg

Vietnamese babies born with severe birth defects

In high concentrations, dioxin causes severe inflammation of skin, lungs and mucous tissues, sometimes resulting in chronic obstructive pulmonary disease, pulmonary edema, or even death, however, it also affects eyes, liver and kidneys. It is also highly effective carcinogen, known for causing laryngeal and lung cancer.

It is estimated, that the usage of Agent Orange during the Vietnam War led to more than 400,000 people being killed or maimed, and 500,000 children born with mild to severe birth defects as a result of contamination. Agent Orange alone killed 10 times more people than all other chemical weapons combined.

Tomahawk (missile)

From Wikipedia, the free encyclopedia
For the sounding rocket, see TE-416 Tomahawk.
Tomahawk
Tomahawk Block IV cruise missile -crop.jpg

A BGM-109 Tomahawk flying in November 2002
Type Long-range, all-weather, subsonic cruise missile
Place of origin United States
Service history
In service 1983–present
Used by United States Navy
Royal Navy
Production history
Manufacturer General Dynamics (initially)
Raytheon/McDonnell Douglas
Unit cost $250,000(FY2014)[1] (Block IV)
Specifications
Weight 2,900 lb (1,300 kg), 3,500 lb (1,600 kg) with booster
Length Without booster: 18 ft 3 in (5.56 m)

With booster: 20 ft 6 in (6.25 m)

Diameter 20.4 in (0.52 m)
Warhead Nuclear: W80 warhead (retired)[2]
Conventional: 1,000 pounds (450 kg) High explosive or Submunitions dispenser with BLU-97/B Combined Effects Bomb or PBXN
Detonation
mechanism
FMU-148 since TLAM Block III, others for special applications

Engine Williams International F107-WR-402turbofan
using TH-dimer fuel
and a solid-fuel rocket booster
Wingspan 8 ft 9 in (2.67 m)
Operational
range
Block II TLAM-A – 1,350 nmi (1,550 mi; 2,500 km) Block III TLAM-C, Block IV TLAM-E – 900 nmi (1,000 mi; 1,700 km)

Block III TLAM-D – 700 nmi (810 mi; 1,300 km)[3]

Speed Subsonic; about 550 mph (890 km/h)
Guidance
system
GPS, INS, TERCOM, DSMAC, active radar homing (RGM/UGM-109B)
Launch
platform
Vertical Launch System (VLS) and horizontal submarine torpedo tubes (known as TTL (torpedo tube launch))

The Tomahawk (US /ˈtɑːməhɔːk/ or UK /ˈtɒməhɔːk/) is a long-range, all-weather, subsonic cruise missile. Introduced by General Dynamics (now Boeing Defense, Space & Security)[4][5] in the 1970s, it was initially designed as a medium to long-range, low-altitude missile that could be launched from a surface platform. It has been improved several times, and after corporate divestitures and acquisitions, is now made by Raytheon. Some Tomahawks were also manufactured by McDonnell Douglas.

Description

The Tomahawk missile family consists of a number of subsonic, jet engine-powered missiles designed to attack a variety of surface targets. Although a number of launch platforms have been deployed or envisaged, only sea (both surface ship and submarine) launched variants are currently in service. Tomahawk has a modular design, allowing a wide variety of warhead, guidance, and range capabilities. The Tomahawk project was originally awarded to Applied Physics Laboratory in Laurel, Maryland by the US Navy. James H. Walker led a team of scientists to design and build this new long range missile. The original design, updated with advanced technology, is still used today.

The missile is named after the Tomahawk, a one-handed axe used as a tool and a weapon by pre-contact Native Americans in the United States.

Variants

There have been several variants of the BGM-109 Tomahawk employing various types of warheads.

  • BGM-109A Tomahawk Land Attack Nuclear (TLAM-N) – Not deployed.[6]
  • BGM-109A Tomahawk Land Attack Missile – Nuclear (TLAM-A) with a W80 thermonuclear weapon. Retired from service sometime between 2010 and 2013.[2]
  • RGM/UGM-109B Tomahawk Anti Ship Missile (TAS-M) – active radar homing anti-ship missile variant; withdrawn from service in the 1990s.
  • BGM-109C Tomahawk Land Attack Missile – Conventional (TLAM-C) with a unitary warhead. This was initially a modified Bullpup warhead.
  • BGM-109D Tomahawk Land Attack Missile – Dispenser (TLAM-D) with cluster munitions.
  • RGM/UGM-109E Tomahawk Land Attack Missile (TLAM Block IV) – improved version of the TLAM-C.
  • BGM-109G Ground Launched Cruise Missile (GLCM) – with a W84 nuclear warhead; withdrawn from service in 1991.
  • AGM-109H/L Medium Range Air to Surface Missile (MRASM) – a shorter range, turbojet powered ASM with cluster munitions ; never entered service, cost US$569,000 (1999).[7]

Ground-launched cruise missiles (GLCM) and their truck-like launch vehicles were employed at bases in Europe; they were withdrawn from service to comply with the 1987 Intermediate-Range Nuclear Forces Treaty. Many of the anti-ship versions were converted into TLAMs at the end of the Cold War. The Block III TLAMs that entered service in 1993 can fly farther and use Global Positioning System (GPS) receivers to strike more precisely. Block III TLAM-Cs retain the DSMAC II navigation system, allowing GPS only missions, which allow for rapid mission planning, with some reduced accuracy, DSMAC only missions, which take longer to plan but terminal accuracy is somewhat better, and GPS aided missions which combine both DSMAC II and GPS navigation which provides the greatest accuracy. Block IV TLAMs are completely redesigned with an improved turbofan engine. The F107-402 engine provided the new BLK III with a throttle control, allowing in-flight speed changes. This engine also provided better fuel economy. The Block IV TLAMs have enhanced deep-strike capabilities and are equipped with a real-time targeting system for striking fleeing targets. Additionally, the BLOCK IV missiles have the capabilities to be re-targeted inflight, and the ability to transmit, via satcom, an image immediately prior to impact to assist in determining if the missile was attacking the target and the likely damage from the attack.

Upgrades

UGM-109 Tomahawk missile detonates above a test target, 1986

A major improvement to the Tomahawk is network-centric warfare-capabilities, using data from multiple sensors (aircraft, UAVs, satellites, foot soldiers, tanks, ships) to find its target. It will also be able to send data from its sensors to these platforms. It will be a part of the networked force being implemented by the Pentagon.

Tomahawk Block III[7][6] introduced in 1993 added time-of-arrival control and navigation through Digital Scene Matching Area Correlator (DSMAC) and jam-resistant GPS, smaller, lighter WDU-36 warhead, engine improvements and extended missile’s range.

Tactical Tomahawk Weapons Control System (TTWCS)[8] takes advantage of a loitering feature in the missile’s flight path and allows commanders to redirect the missile to an alternative target, if required. It can be reprogrammed in-flight to attack predesignated targets with GPS coordinates stored in its memory or to any other GPS coordinates. Also, the missile can send data about its status back to the commander. It entered service with the US Navy in late 2004. The Tactical Tomahawk Weapons Control System (TTWCS) added the capability for limited mission planning on board the firing unit (FRU).

Tomahawk Block IV[9][10][11] introduced in 2006 adds the strike controller which can change the missile in flight to one of 15 preprogrammed alternate targets or redirect it to a new target. This targeting flexibility includes the capability to loiter over the battlefield awaiting a more critical target. The missile can also transmit battle damage indication imagery and missile health and status messages via the two-way satellite data link. Firing platforms now have the capability to plan and execute GPS-only missions. Block IV also has an improved anti-jam GPS receiver for enhanced mission performance. Block IV includes Tomahawk Weapons Control System (TTWCS), and Tomahawk Command and Control System (TC2S).

On 16 August 2010, the Navy completed the first live test of the Joint Multi-Effects Warhead System (JMEWS), a new warhead designed to give the Tomahawk the same blast-fragmentation capabilities while introducing enhanced penetration capabilities in a single warhead. In the static test, the warhead detonated and created a hole large enough for the follow-through element to completely penetrate the concrete target.[12] In February 2014, U.S. Central Command sponsored development and testing of the JMEWS, analyzing the ability of the programmable warhead to integrate onto the Block IV Tomahawk, giving the missile bunker buster effects to better penetrate hardened structures.[13]

In 2012, the USN studied applying Advanced Anti-Radiation Guided Missile (AARGM) technology into the Tactical Tomahawk.[14]

In 2014, Raytheon began testing Block IV improvements to attack sea and moving land targets.[15] The new passive radar seeker will pick up the electromagnetic radar signature of a target and follow it, and actively send out a signal to bounce off potential targets before impact to discriminate its legitimacy before impact.[13] Mounting the multi-mode sensor on the missile’s nose would remove fuel space, but company officials believe the Navy would be willing to give up space for the sensor’s new technologies.[16] The previous Tomahawk Anti-Ship Missile, retired over a decade earlier, was equipped with inertial guidance and the seeker of the Harpoon missile and there was concern with its ability to clearly discriminate between targets from a long distance, since at the time Navy sensors did not have as much range as the missile itself, which would be more reliable with the new seeker’s passive detection and active millimeter-wave radar.[17][18] Raytheon estimates adding the new seeker would cost $250,000 per missile.[19] Other upgrades include sea-skim mode[20] – low-altitude flight over water at high subsonic speeds. The first Block IV TLAMs modified with a maritime attack capability will enter service in 2018-2019.[21]

A supersonic version of the Tomahawk is under consideration for development with a ramjet to increase its speed to Mach 3. A limiting factor to this is the dimensions of shipboard launch tubes. Instead of modifying every ship able to carry cruise missiles, the ramjet-powered Tomahawk would still have to fit within a 21-inch diameter and 20-foot long tube.[16]

In October 2015, Raytheon announced the Tomahawk had demonstrated new capabilities in a test launch, using its onboard camera to take a reconnaissance photo and transmit it to fleet headquarters. It then entered a loitering pattern until given new targeting coordinates to strike.[22]

By January 2016, Los Alamos National Laboratory was working on a project to turn unburned fuel left over when a Tomahawk reaches its target into an additional explosive force. To do this, the missile’s JP-10 fuel is turned into a fuel air explosive to combine with oxygen in the air and burn rapidly. The thermobaric explosion of the burning fuel acts, in effect, as an additional warhead and can even be more powerful than the main warhead itself when there is sufficient fuel left in the case of a short range target.[11][23]

TACTOM(Tactical Tomahawk) is Tomahawk’s modernization program that will incorporate an all-weather-seeker[24] that will complement Tomahawk’s Synthetic Guidance Mode; which uses a high-throughput radio signal to update the missile in flight, giving it new target information as a maritime or land target moves.

Launch systems

Each missile is stored and launched from a pressurized canister[25] that protects it during transportation and storage, and also serves as a launch tube. These canisters were racked in armored box launchers (ABL), which were installed on the re-activated Iowa-class battleships USS Iowa, USS New Jersey, USS Missouri, and USS Wisconsin. The ABLs were also installed on eight Spruance-class destroyers, the four Virginia-class cruisers, and the USS Long Beach. These canisters are also in vertical launching systems (VLS) in other surface ships, capsule launch systems (CLS) in the later Los Angeles-class submarines, and in submarines’ torpedo tubes. All ABL equipped ships have been decommissioned.

For submarine-launched missiles (called UGM-109s), after being ejected by gas pressure (vertically via the VLS) or by water impulse (horizontally via the torpedo tube), the missile exits the water and a solid-fuel booster is ignited for the first few seconds of airborne flight until transition to cruise.

After achieving flight, the missile’s wings are unfolded for lift, the airscoop is exposed and the turbofan engine is employed for cruise flight. Over water, the Tomahawk uses inertial guidance or GPS to follow a preset course; once over land, the missile’s guidance system is aided by terrain contour matching (TERCOM). Terminal guidance is provided by the Digital Scene Matching Area Correlation (DSMAC) system or GPS, producing a claimed circular error probable of about 10 meters.

The Tomahawk Weapon System consists of the missile, Theater Mission Planning Center (TMPC)/Afloat Planning System, and either the Tomahawk Weapon Control System (on surface ships) or Combat Control System (for submarines).

Several versions of control systems have been used, including:

  • v2 TWCS – Tomahawk Weapon Control System (1983), also known as “green screens,” was based on an old tank computing system.
  • v3 ATWCS – Advanced Tomahawk Weapon Control System (1994), first Commercial Off the Shelf, uses HP-UX.
  • v4 TTWCS – Tactical Tomahawk Weapon Control System, (2003).
  • v5 TTWCS – Next Generation Tactical Tomahawk Weapon Control System. (2006)

Navigation and other details

The TLAM-D contains 166 sub-munitions in 24 canisters: 22 canisters of seven each, and two canisters of six each to conform to the dimensions of the airframe. The sub-munitions are the same type of Combined Effects Munition bomblet used in large quantities by the U.S. Air Force with the CBU-87 Combined Effects Munition. The sub-munitions canisters are dispensed two at a time, one per side. The missile can perform up to five separate target segments which enables it to attack multiple targets. However, in order to achieve a sufficient density of coverage typically all 24 canisters are dispensed sequentially from back to front.

TERCOM – Terrain Contour Matching. A digital representation of an area of terrain is mapped based on digital terrain elevation data or stereo imagery. This map is then inserted into a TLAM mission which is then loaded onto the missile. When the missile is in flight it compares the stored map data with radar altimeter data collected as the missile overflies the map. Based on comparison results the missile’s inertial navigation system is updated and the missile corrects its course. TERCOM was based on, and was a significant improvement on, “Fingerprint,” a technology developed in 1964 for the SLAM.[26]

On July 26, 2014 it was announced that 196 additional Block IV missiles had been purchased.[27]

DSMAC – Digital Scene Matching Area Correlation. A digitized image of an area is mapped and then inserted into a TLAM mission. During the flight the missile will verify that the images that it has stored correlates with the image it sees below itself. Based on comparison results the missile’s inertial navigation system is updated and the missile corrects its course.

  • Total program cost: $US 11,210,000,000[28]

Operational history

Remnants of a shot down Tomahawk from Operation Allied Force, showing the turbofan engine at the Museum of Aviation in Belgrade, Serbia

United States Navy

In the 1991 Gulf War, 288 Tomahawks were launched, 12 from submarines and 276 from surface ships.[29] The first salvo was fired by the Destroyer USS Paul F. Foster[30] on January 17, 1991. The attack submarines USS Pittsburgh and USS Louisville followed.

On 17 January 1993, 46 Tomahawks were fired at the Zafraniyah Nuclear Fabrication Facility outside Baghdad, in response to Iraq’s refusal to cooperate with UN disarmament inspectors. One missile crashed into the side of the Al Rasheed Hotel, killing two civilians.[31]

On 26 June 1993, 23 Tomahawks were fired at the Iraqi Intelligence Service’s command and control center.[32]

On 10 September 1995, the USS Normandy launched 13 Tomahawk missiles from the central Adriatic Sea against a key air defense radio relay tower in Bosnian Serb territory during Operation Deliberate Force.[33]

On 3 September 1996, 44 cruise missiles between UGM-109 and B-52 launched AGM-86s, were fired at air defence targets in Southern Iraq.[34][35]

On 20 August 1998, 79 Tomahawk missiles were fired simultaneously at two separate targets in Afghanistan and Sudan in retaliation for the bombings of American embassies by Al-Qaeda.[2]

On 16 December 1998, 415 Tomahawk missiles were fired at key Iraqi targets during Operation Desert Fox.[36]

In early 1999, 218 Tomahawk missiles were fired by US ships and a British submarine during Operation Allied Force against key targets in Serbia and Montenegro.[3]

In October 2001, approximately 50 Tomahawk missiles struck targets in Afghanistan in the opening hours of Operation Enduring Freedom.[4][37]

During the 2003 invasion of Iraq, more than 802 Tomahawk missiles were fired at key Iraqi targets.[38]

On 3 March 2008, two Tomahawk missiles were fired at a target in Somalia by a US vessel during the Dobley airstrike, reportedly in an attempt to kill Saleh Ali Saleh Nabhan, an al Qaeda militant.[39][40]

On 17 December 2009, two Tomahawk missiles were fired at targets in Yemen.[41] One of the targets was hit by a TLAM-D missile. The target was described as an ‘alleged Al-Qaeda training camp’ in al-Ma’jalah in al-Mahfad a region of the Abyan governorate of Yemen. Amnesty International reported that 55 people were killed in the attack, including 41 civilians (21 children, 14 women, and six men). The US and Yemen governments refused to confirm or deny involvement, but diplomatic cables released as part of United States diplomatic cables leak later confirmed the missile was fired by a US Navy ship.[42]

On 19 March 2011, 124 Tomahawk missiles[43] were fired by U.S. and British forces (112 US, 12 British)[44] against at least 20 Libyan targets around Tripoli and Misrata.[45] As of 22 March 2011, 159 UGM-109 were fired by US and UK ships against Libyan targets.[46]

On 23 September 2014, 47 Tomahawk missiles were fired by the United States from the USS Arleigh Burke and USS Philippine Sea, which were operating from international waters in the Red Sea and Persian Gulf, against ISIL targets in Syria in the vicinity of Raqqa, Deir ez-Zor, Al-Hasakah and Abu Kamal,[47] and against Khorasan group targets in Syria west of Aleppo.[48]

On 13 October 2016 five Tomahawk cruise missiles were launched by USS Nitze at three radar sites in Yemen held by Houthi rebels in response to anti-ship missiles fired at US Navy ships the day before.[49]

On 6 April 2017, 59 Tomahawk missiles were launched from the USS Ross (DDG-71) and USS Porter (DDG-78), targeting Shayrat, a military airfield near Homs, in Syria. The strike was in retaliation for the alleged use of chemical weapons by Syrian President Bashir Al-Assad. Initial reports indicate that the Syrian airbase was ‘almost completely destroyed’ after the US strike.[50]

As of 2015, the United States Navy has a stockpile of around 3,500 Tomahawk cruise missiles of all variants, with a combined worth of approximately US $2.6 billion.[51]

Royal Navy

In 1995 the US agreed to sell 65 Tomahawks to the UK for torpedo-launch from her nuclear attack submarines. The first missiles were acquired and test-fired in November 1998; all Royal Navy fleet submarines are now Tomahawk capable, including the new Astute-class.[52][53][54][55] The Kosovo War in 1999 saw the Swiftsure-class HMS Splendid become the first British submarine to fire the Tomahawk in combat. It has been reported that seventeen of the twenty Tomahawks fired by the British during that conflict hit their targets accurately;[citation needed] the UK subsequently bought 20 more Block III to replenish stocks.[56] The Royal Navy has since fired Tomahawks during the 2000s Afghanistan War, in Operation Telic as the British contribution to the 2003 Iraq War, and during Operation Ellamy in Libya in 2011.

In April 2004, the UK and US governments reached an agreement for the British to buy 64 of the new generation of Tomahawk missile—the Block IV or TacTom missile.[57] It entered service with the Royal Navy on 27 March 2008, three months ahead of schedule.[58] In July 2014 the US approved the sale to the UK of a further 65 submarine-launched Block IV’s at a cost of US$140m including spares and support;[59] as of 2011 the Block III missiles were on Britain’s books at £1.1m and the Block IV at £0.87m including VAT.[60]

The Sylver Vertical Launching System on the new Type 45 destroyer is claimed by its manufacturers to have the capability to fire the Tomahawk, although the A50 launcher carried by the Type 45 is too short for the weapon (the longer A70 silo would be required). Nevertheless, the Type 45 has been designed with weight and space margin for a strike-length Mk41 or Sylver A70 silo to be retrofitted, allowing Type 45 to use the TLAM Block IV if required. The new Type 26 frigates will have strike-length VLS tubes. SYLVER user France is developing MdCN, a version of the Storm Shadow/Scalp cruise missile that has a shorter range but a higher speed than Tomahawk and can be launched from the SYLVER system.

United States Air Force

The Air Force is a former operator of the nuclear-armed version of the Tomahawk, the BGM-109G Gryphon.

Other users

The Netherlands (2005) and Spain (2002 and 2005) were interested in acquiring the Tomahawk system, but the orders were later cancelled in 2007 and 2009 respectively.[61][62]

In 2009 the Congressional Commission on the Strategic Posture of the United States stated that Japan would be concerned if the TLAM-N were retired, but the government of Japan has denied that it had expressed any such view.[63]

It is believed that the SLCM version of the Popeye was developed by Israel after the US Clinton administration refused an Israeli request in 2000 to purchase Tomahawk SLCM’s because of international Missile Technology Control Regime proliferation rules.[64]

As of March 12, 2015 Poland has expressed interest in purchasing long-range Tomahawk missiles for its future submarines.[65]

Operators

Map with Tomahawk operators in blue

Current operators

See also

https://en.wikipedia.org/wiki/Tomahawk_(missile)

Story 2: What is Next?  United States Led Coalition of Egypt, Jordan, Kurds, Saudi Arabia, and Turkey to Destroy Islamic State, Jabhat Al Nustra Front ( al-Qaeda’s Syrian affiliate), Radical Islamic Terrorist Jihadists in Syria, Hezbollah, and Bashar al-Assad Syrian Regime –Videos — Military strike comes after Trump previously railed against Syria intervention

What comes next after Syria missile attack

Story 3: Supreme Court Justice Neil Gorsuch Confirmed 54 Yes — 45 Nos

Senate confirms Neil Gorsuch for Supreme Court (C-SPAN)

The Senate Goes “Nuclear”

Mike Pence Reads Final Vote Confirming Neil Gorsuch To Supreme Court | NBC News

Senate Democrats trigger “nuclear option” to curb filibusters

Harry Reid goes Nuclear Pushes Major Senate Filibuster Rules Change

 

Reid, Democrats trigger ‘nuclear’ option; eliminate most filibusters on nominees

The Senate goes nuclear

Embed Share

Play Video1:11
It’s more than just a rule change: The so-called “nuclear option” will fundamentally alter the way the Senate operates – for good.(Casey Capachi/(In Play))
November 21, 2013

Senate Democrats took the dramatic step Thursday of eliminating filibusters for most nominations by presidents, a power play they said was necessary to fix a broken system but one that Republicans said will only rupture it further.

Democrats used a rare parliamentary move to change the rules so that federal judicial nominees and executive-office appointments can advance to confirmation votes by a simple majority of senators, rather than the 60-vote supermajority that has been the standard for nearly four decades.

The immediate rationale for the move was to allow the confirmation of three picks by President Obama to the U.S. Court of Appeals for the District of Columbia Circuit — the most recent examples of what Democrats have long considered unreasonably partisan obstruction by Republicans.

In the long term, the rule change represents a substantial power shift in a chamber that for more than two centuries has prided itself on affording more rights to the minority party than any other legislative body in the world. Now, a president whose party holds the majority in the Senate is virtually assured of having his nominees approved, with far less opportunity for political obstruction.

The main combatants Thursday were the chamber’s two chiefs, Majority Leader Harry M. Reid (D-Nev.) and Minority Leader Mitch McConnell (R-Ky.), who have clashed for several years over Republican filibusters of Obama’s agenda and nominees.

Reid said the chamber “must evolve” beyond parliamentary roadblocks. “The American people believe the Senate is broken, and I believe the American people are right,” he said, adding: “It’s time to get the Senate working again.”

McConnell linked the rule change to the methods used to approve Obama’s health-care law solely with Democratic votes. The normally reserved GOP leader paced at his desk during his speech, often turning his back to Democrats to address only his fellow Republicans.

“It’s a sad day in the history of the Senate,” McConnell told reporters, calling the move a Democratic “power grab.”

The clash ended with a vote nearly as partisan as the times — 52 to 48, with all but three Democrats backing the move and every Republican opposing it.

The vote was the culmination of more than 25 years of feuding over nominations, beginning with President Ronald Reagan’s choices for the Supreme Court and including Obama’s picks for obscure federal regulatory agencies. Each side in Thursday’s debate cited its own statistics to state its case.

Democrats said the attempted filibusters of Chuck Hagel during his confirmation hearing to become defense secretary, a first for any nominee to lead the Pentagon — as well as a blockade of picks to head the National Labor Relations Board and the Consumer Financial Protection Bureau — exceeded anything Democrats did when they were in the minority. In addition, Democrats charged that Republicans didn’t even have substantive objections to the D.C. Circuit nominees they filibustered.

After the vote, Obama told reporters at the White House that Republicans had turned nomination fights into a “reckless and relentless tool” to grind the gears of government to a halt and noted that “neither party has been blameless for these tactics.” However, he said, “today’s pattern of obstruction . . . just isn’t normal; it’s not what our founders envisioned.”

Republicans countered that they had confirmed 99 percent of Obama’s judicial selections. McConnell accused Democrats of eyeing the D.C. Circuit in an effort to stack the court, which reviews many cases related to federal laws and regulations, to tilt its balance in a liberal direction.

What made the day so historic for senators, former senators and the small collection of parliamentary experts in Washington was the simple majority vote used to execute the changes — a tactic so extreme it is known as the “nuclear option.”

Previous majorities had threatened to upend filibuster rules in this manner, but relying on a simple majority vote had been used only for relatively minor procedural changes to how amendments were handled, never to eliminate the super­majority requirement altogether. Before Thursday, the standard precedent was that major rule changes needed a two-thirds majority. The change was so significant that Reid and his leadership team held a victory party with liberal activists afterward in a room just off the Senate floor.

Republicans said the way Democrats upended the rules will result in fallout for years. “It’s another raw exercise of political power to permit the majority to do anything it wants whenever it wants to do it,” Sen. Lamar Alexander (Tenn.), the GOP’s parliamentary expert, told reporters.

Republicans vowed to reciprocate if they reclaim the majority.

“Democrats won’t be in power in perpetuity,” said Sen. Richard C. Shelby (Ala.), a 27-year member. “This is a mistake — a big one for the long run. Maybe not for the short run. Short-term gains, but I think it changes the Senate tremendously in a bad way.”

After the vote, Reid told reporters that his views on the issue had evolved — from eight years ago, when Republicans held the majority and he led the fight to protect the filibuster. He acknowledged that he wouldn’t mind seeing the supermajority requirement abolished for everything but that there were not enough votes in his caucus to support such a move.

Reid first faced pressure on this issue from junior Democrats four years ago, particularly Sen. Jeff Merkley, a former speaker of the Oregon state House, who became the point person for growing the anti-filibuster movement. But Reid repeatedly rejected their effort as too radical.

Even if Republicans want to do away with the filibuster someday, Reid said, Thursday’s move was worth it because the current climate had become too hostile to get anything significant done. Reid said he faced a choice: “Continue like we are or have democracy?”

The rule change does not apply to Supreme Court nominations or to legislation.

Individual senators will still be able to seize the floor for marathon speeches opposing nominees, as Sen. Rand Paul (R-Ky.) did in a nearly 13-hour session in March against the nomination of John Brennan as CIA director. But once such speeches end, the majority will be able to confirm nominees without needing bipartisan support.

With the Senate majority very much up for grabs in midterm elections next year, Democrats placed a big bet on maintaining control of the chamber. GOP leaders have suggested that, if given the Senate majority back, they might further strip filibuster rules so they could dismantle Obama’s landmark domestic achievement, the Affordable Care Act, on a simple majority vote.

In his remarks, McConnell finally turned to Democrats and said that a majority of them had never served in the minority and then lectured the longtime members who knew what it was like to be on the other side.

“The solution to this problem is at the ballot box,” he said. “We look forward to having a great election in 2014.”

https://www.washingtonpost.com/politics/senate-poised-to-limit-filibusters-in-party-line-vote-that-would-alter-centuries-of-precedent/2013/11/21/d065cfe8-52b6-11e3-9fe0-fd2ca728e67c_story.html?utm_term=.5bf7f548abcf

The Pronk Pops Show Podcasts Portfolio

Listen To Pronk Pops Podcast or Download Shows 864-869

Listen To Pronk Pops Podcast or Download Shows 857-863

Listen To Pronk Pops Podcast or Download Shows 850-856

Listen To Pronk Pops Podcast or Download Shows 845-849

Listen To Pronk Pops Podcast or Download Shows 840-844

Listen To Pronk Pops Podcast or Download Shows 833-839

Listen To Pronk Pops Podcast or Download Shows 827-832

Listen To Pronk Pops Podcast or Download Shows 821-826

Listen To Pronk Pops Podcast or Download Shows 815-820

Listen To Pronk Pops Podcast or Download Shows 806-814

Listen To Pronk Pops Podcast or Download Shows 800-805

Listen To Pronk Pops Podcast or Download Shows 793-799

Listen To Pronk Pops Podcast or Download Shows 785-792

Listen To Pronk Pops Podcast or Download Shows 777-784

Listen To Pronk Pops Podcast or Download Shows 769-776

Listen To Pronk Pops Podcast or Download Shows 759-768

Listen To Pronk Pops Podcast or Download Shows 751-758

Listen To Pronk Pops Podcast or Download Shows 745-750

Listen To Pronk Pops Podcast or Download Shows 738-744

Listen To Pronk Pops Podcast or Download Shows 732-737

Listen To Pronk Pops Podcast or Download Shows 727-731

Listen To Pronk Pops Podcast or Download Shows 720-726

Listen To Pronk Pops Podcast or DownloadShows 713-719

Listen To Pronk Pops Podcast or DownloadShows 705-712

Listen To Pronk Pops Podcast or Download Shows 695-704

Listen To Pronk Pops Podcast or Download Shows 685-694

Listen To Pronk Pops Podcast or Download Shows 675-684

Listen To Pronk Pops Podcast or Download Shows 668-674

Listen To Pronk Pops Podcast or Download Shows 660-667

Listen To Pronk Pops Podcast or Download Shows 651-659

Listen To Pronk Pops Podcast or Download Shows 644-650

Listen To Pronk Pops Podcast or Download Shows 637-643

Listen To Pronk Pops Podcast or Download Shows 629-636

Listen To Pronk Pops Podcast or Download Shows 617-628

Listen To Pronk Pops Podcast or Download Shows 608-616

Listen To Pronk Pops Podcast or Download Shows 599-607

Listen To Pronk Pops Podcast or Download Shows 590-598

Listen To Pronk Pops Podcast or Download Shows 585- 589

Listen To Pronk Pops Podcast or Download Shows 575-584

Listen To Pronk Pops Podcast or Download Shows 565-574

Listen To Pronk Pops Podcast or Download Shows 556-564

Listen To Pronk Pops Podcast or Download Shows 546-555

Listen To Pronk Pops Podcast or Download Shows 538-545

Listen To Pronk Pops Podcast or Download Shows 532-537

Listen To Pronk Pops Podcast or Download Shows 526-531

Listen To Pronk Pops Podcast or Download Shows 519-525

Listen To Pronk Pops Podcast or Download Shows 510-518

Listen To Pronk Pops Podcast or Download Shows 500-509

Listen To Pronk Pops Podcast or Download Shows 490-499

Listen To Pronk Pops Podcast or Download Shows 480-489

Listen To Pronk Pops Podcast or Download Shows 473-479

Listen To Pronk Pops Podcast or Download Shows 464-472

Listen To Pronk Pops Podcast or Download Shows 455-463

Listen To Pronk Pops Podcast or Download Shows 447-454

Listen To Pronk Pops Podcast or Download Shows 439-446

Listen To Pronk Pops Podcast or Download Shows 431-438

Listen To Pronk Pops Podcast or Download Shows 422-430

Listen To Pronk Pops Podcast or Download Shows 414-421

Listen To Pronk Pops Podcast or Download Shows 408-413

Listen To Pronk Pops Podcast or Download Shows 400-407

Listen To Pronk Pops Podcast or Download Shows 391-399

Listen To Pronk Pops Podcast or Download Shows 383-390

Listen To Pronk Pops Podcast or Download Shows 376-382

Listen To Pronk Pops Podcast or Download Shows 369-375

Listen To Pronk Pops Podcast or Download Shows 360-368

Listen To Pronk Pops Podcast or Download Shows 354-359

Listen To Pronk Pops Podcast or Download Shows 346-353

Listen To Pronk Pops Podcast or Download Shows 338-345

Listen To Pronk Pops Podcast or Download Shows 328-337

Listen To Pronk Pops Podcast or Download Shows 319-327

Listen To Pronk Pops Podcast or Download Shows 307-318

Listen To Pronk Pops Podcast or Download Shows 296-306

Listen To Pronk Pops Podcast or Download Shows 287-295

Listen To Pronk Pops Podcast or Download Shows 277-286

Listen To Pronk Pops Podcast or Download Shows 264-276

Listen To Pronk Pops Podcast or Download Shows 250-263

Listen To Pronk Pops Podcast or Download Shows 236-249

Listen To Pronk Pops Podcast or Download Shows 222-235

Listen To Pronk Pops Podcast or Download Shows 211-221

Listen To Pronk Pops Podcast or Download Shows 202-210

Listen To Pronk Pops Podcast or Download Shows 194-201

Listen To Pronk Pops Podcast or Download Shows 184-193

Listen To Pronk Pops Podcast or Download Shows 174-183

Listen To Pronk Pops Podcast or Download Shows 165-173

Listen To Pronk Pops Podcast or Download Shows 158-164

Listen To Pronk Pops Podcast or Download Shows151-157

Listen To Pronk Pops Podcast or Download Shows 143-150

Listen To Pronk Pops Podcast or Download Shows 135-142

Listen To Pronk Pops Podcast or Download Shows 131-134

Listen To Pronk Pops Podcast or Download Shows 124-130

Listen To Pronk Pops Podcast or Download Shows 121-123

Listen To Pronk Pops Podcast or Download Shows 118-120

Listen To Pronk Pops Podcast or Download Shows 113 -117

Listen To Pronk Pops Podcast or Download Show 112

Listen To Pronk Pops Podcast or Download Shows 108-111

Listen To Pronk Pops Podcast or Download Shows 106-108

Listen To Pronk Pops Podcast or Download Shows 104-105

Listen To Pronk Pops Podcast or Download Shows 101-103

Listen To Pronk Pops Podcast or Download Shows 98-100

Listen To Pronk Pops Podcast or Download Shows 94-97

Listen To Pronk Pops Podcast or Download Show 93

Listen To Pronk Pops Podcast or Download Show 92

Listen To Pronk Pops Podcast or Download Show 91

Listen To Pronk Pops Podcast or Download Shows 88-90

Listen To Pronk Pops Podcast or Download Shows 84-87

Listen To Pronk Pops Podcast or Download Shows 79-83

Listen To Pronk Pops Podcast or Download Shows 74-78

Listen To Pronk Pops Podcast or Download Shows 71-73

Listen To Pronk Pops Podcast or Download Shows 68-70

Listen To Pronk Pops Podcast or Download Shows 65-67

Listen To Pronk Pops Podcast or Download Shows 62-64

Listen To Pronk Pops Podcast or Download Shows 58-61

Listen To Pronk Pops Podcast or Download Shows 55-57

Listen To Pronk Pops Podcast or Download Shows 52-54

Listen To Pronk Pops Podcast or Download Shows 49-51

Listen To Pronk Pops Podcast or Download Shows 45-48

Listen To Pronk Pops Podcast or Download Shows 41-44

Listen To Pronk Pops Podcast or Download Shows 38-40

Listen To Pronk Pops Podcast or Download Shows 34-37

Listen To Pronk Pops Podcast or Download Shows 30-33

Listen To Pronk Pops Podcast or Download Shows 27-29

Listen To Pronk Pops Podcast or Download Shows 17-26

Listen To Pronk Pops Podcast or Download Shows 16-22

Listen To Pronk Pops Podcast or Download Shows 10-15

Listen To Pronk Pops Podcast or Download Shows 1-9

Read Full Post | Make a Comment ( None so far )

The Pronk Pops Show 854, March 8, 2017, Story 1: FBI Search For Vault 7 Leaker Who Gave Wikileaks The CIA Collection of Hacking and Malware Software Tools — Sources and Methods — Treason By The Lying Lunatic Left — Videos — Story 2: -Soros’ and Obama’s Seditious and Subversive War On Trump With Organizing For Action Applying Saul Alinsky’s Rules for Radicals — Videos

Posted on March 9, 2017. Filed under: American History, Blogroll, Breaking News, Congress, Corruption, Countries, Crime, Culture, Donald J. Trump, Donald J. Trump, Donald Trump, Donald Trump, Education, Empires, Employment, Foreign Policy, Fourth Amendment, Freedom of Speech, Government, Health, High Crimes, History, House of Representatives, News, Obama, Philosophy, Photos, Politics, Polls, President Trump, Progressives, Raymond Thomas Pronk, Rule of Law, Scandals, Second Amendment, Senate, Taxation, Taxes, Terror, Terrorism, Unemployment, United States Constitution, United States of America, United States Supreme Court, Videos, Violence, War, Wealth, Weather, Wisdom | Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , |

Project_1

The Pronk Pops Show Podcasts

Pronk Pops Show 854: March 9, 2017

Pronk Pops Show 853: March 8, 2017

Pronk Pops Show 852: March 6, 2017

Pronk Pops Show 851: March 3, 2017

Pronk Pops Show 850: March 2, 2017

Pronk Pops Show 849: March 1, 2017

Pronk Pops Show 848: February 28, 2017

Pronk Pops Show 847: February 27, 2017

Pronk Pops Show 846: February 24, 2017

Pronk Pops Show 845: February 23, 2017

Pronk Pops Show 844: February 22, 2017

Pronk Pops Show 843: February 21, 2017

Pronk Pops Show 842: February 20, 2017

Pronk Pops Show 841: February 17, 2017

Pronk Pops Show 840: February 16, 2017

Pronk Pops Show 839: February 15, 2017

Pronk Pops Show 838: February 14, 2017

Pronk Pops Show 837: February 13, 2017

Pronk Pops Show 836: February 10, 2017

Pronk Pops Show 835: February 9, 2017

Pronk Pops Show 834: February 8, 2017

Pronk Pops Show 833: February 7, 2017

Pronk Pops Show 832: February 6, 2017

Pronk Pops Show 831: February 3, 2017

Pronk Pops Show 830: February 2, 2017

Pronk Pops Show 829: February 1, 2017

Pronk Pops Show 828: January 31, 2017

Pronk Pops Show 827: January 30, 2017

Pronk Pops Show 826: January 27, 2017

Pronk Pops Show 825: January 26, 2017

Pronk Pops Show 824: January 25, 2017

Pronk Pops Show 823: January 24, 2017

Pronk Pops Show 822: January 23, 2017

Pronk Pops Show 821: January 20, 2017

Pronk Pops Show 820: January 19, 2017

Pronk Pops Show 819: January 18, 2017

Pronk Pops Show 818: January 17, 2017

Pronk Pops Show 817: January 13, 2017

Pronk Pops Show 816: January 12, 2017

Pronk Pops Show 815: January 11, 2017

Pronk Pops Show 814: January 10, 2017

Pronk Pops Show 813: January 9, 2017

Pronk Pops Show 812: December 12, 2016

Pronk Pops Show 811: December 9, 2016

Pronk Pops Show 810: December 8, 2016

Pronk Pops Show 809: December 7, 2016

Pronk Pops Show 808: December 6, 2016

Pronk Pops Show 807: December 5, 2016

Pronk Pops Show 806: December 2, 2016

Pronk Pops Show 805: December 1, 2016

 Story 1: FBI Search For Vault 7 Leaker Who Gave Wikileaks The CIA Collection of Hacking and Malware Software Tools — Treason By The Lying Lunatic Left — Videos —

 

Image result for cia wikileaks hacker tools

Image result for cia wikileaks hacker tools

Image result for cartoons cia hacker tools

Image result for cartoons cia hacker tools

Image result for intelligence communityImage result for cia wikileaks hacker tools

TREASON OR BETRAYAL? FBI SET TO LAUNCH CRIMINAL INVESTIGATION INTO WIKILEAKS OVER CIA HACK

Hannity : Former intelligence officials on surveillance tactics and document leaks : 3/8/2017

Treason is in the air

Investigating national security leaks

UK: Assange holds presser on CIA hacking leaks

WATCH: WikiLeaks Julian Assange Press Conference On CIA Hacking (3/9/2017)

Julian Assange Press Conference On The CIA Vault 7 Release | March 9th, 2017

Julian Assange Wikileaks Press Conference, Q&A on CIA Vault 7, Year Zero [03/09/2017]

WikiLeaks publishes apparent CIA hacking tools

WikiLeaks Dump Shows CIA Using Cell Phones And Smart TVs To Listen And WATCH “Everyday Americans”

Can the CIA control your phone? WikiLeaks claims explained

What Pisses Me Off About Wikileaks Vault 7 Release

WikiLeaks Vault 7: What You Should Know and Fear, CIA vs. NSA Turf Battles, How Trump Was Right

VAULT 7: CIA Staged Fake Russian Hacking to Set Up Trump — Russian Cyber-Attack M.O. As False Flag

Lionel “Wikileaks Vault 7 Shows That Trump Is Not Crazy. The CIA Spy On Everybody.”

Wikileaks Claims CIA Is Hacking Americans’ Electronics – Tucker Carlson Tonight – Fox News – 3/7/17

Silent Coup: Obama, FISA, NSA, Deep State vs. President Donald Trump

TUCKER CARLSON reacts to latest CIA scandal and the big story ‘OBAMA CARE LITE’

Former CIA Director: Wikileaks Dump Could Be ‘Very Damaging’ | Andrea Mitchell | MSNBC

CIA lost control of its hacking tools – Wikileaks Vault7 report finding

Fall Out of Wikileak’s Vault 7 Year Zero Release Has Begun. Investigations Initiated.

WikiLeaks Fallout: CIA Revelations Rock The Political Establishment

Bombshell: WikiLeaks Releases Trove Of CIA Documents

Whistleblower: NSA Collecting Data On Every U.S. Citizen

NSA Whistleblower William Binney: The Future of FREEDOM

NSA Surveillance and What To Do About It

Our Almost Orwellian State & NSA Surveillance Forum

How the Government Tracks You: NSA Surveillance

US Surveillance: An Analysis of EO 12333 and Its Global Implications

E.O: 12333 VS Kyle from Secular Talk, debunked again.

Executive Order 12333 (The President’s Inherent Article II Power to Conduct Foreign Intelligence)

Executive Order 12333 (Greatest Hits)

The Silent Order NSA Sees Everything Hears Everything Documentary HD

Judge Rules NSA Surveillance “Almost Orwellian” — Obama Prepares to Leave Spying Program Intact

Glenn Greenwald: The NSA Can “Literally Watch Every Keystroke You Make”

NSA has collected bulk data on Americans since Reagan

NSA surveillance program “almost Orwellian,” federal judge rules

Judgement NSA Violates Unconstitutional Patriot Act

ALGORITHM: The Hacker Movie

FBI prepares for new hunt for WikiLeaks’ source

March 7 at 6:55 PM
The FBI has begun preparing for a major mole hunt to determine how anti-secrecy group WikiLeaks got an alleged arsenal of hacking tools the CIA has used to spy on espionage targets, according to people familiar with the matter.

The leak rattled government and technology industry officials, who spent Tuesday scrambling to determine the accuracy and scope of the thousands of documents released by the group. They were also trying to assess the damage the revelations may cause, and what damage may come from future releases promised by WikiLeaks, these people said.

It was all a familiar scenario for a government that has repeatedly seen sensitive information compromised in recent years.

But cracks keep appearing in the system. Last year, the FBI arrested Harold T. Martin III, an NSA contractor who took home documents detailing some of the agency’s most sensitive offensive cyberweapons. Some of those files later appeared online, although investigators are still trying to determine Martin’s role, if any, in that part of the case.

WikiLeaks says it has a trove on the CIA’s hacking secrets. Washington Post national security reporter Greg Miller explains what these documents reveal. (Dalton Bennett, Greg Miller/The Washington Post)

He has pleaded not guilty to charges that he violated the Espionage Act. Officials call the Martin case the largest theft of classified information in U.S. history.

Now, less than a year after the Martin case, U.S. intelligence agencies are rushing to determine whether they again have suffered an embarrassing compromise at the hands of one of their own.

“Anybody who thinks that the Manning and Snowden problems were one-offs is just dead wrong,’’ said Joel Brenner, former head of U.S. counterintelligence at the office of the Director of National Intelligence. “Ben Franklin said three people can keep a secret if two of them are dead. If secrets are shared on systems in which thousands of people have access to them, that may really not be a secret anymore. This problem is not going away, and it’s a condition of our existence.’’

In Silicon Valley, industry figures said they received no heads-up from the government or the hacking community that such a move by WikiLeaks was in the works. By midday Tuesday, industry officials said they still had not heard from the FBI.

It wasn’t immediately clear if the CIA had sent a crimes report to the Justice Department — a formal mechanism alerting law enforcement of a potentially damaging and illegal national security leak. Such a report would offer the FBI a road map for where to begin investigating, and whom to question.

The FBI and CIA both declined to comment.

Once investigators verify the accuracy of the WikiLeaks documents, a key question to answer is who had access to the information, according to veterans of past leak probes. The FBI has spent years investigating WikiLeaks, and authorities are eager to figure out whether it has recruited a new, well-placed source from the U.S. government.

Anti-secrecy group Wikileaks on Tuesday said it had obtained a top-secret trove of hacking tools used by the CIA to break into phones, communication apps and other electronic devices, and published confidential documents on those programs. (Reuters)

In releasing thousands of pages of documents, WikiLeaks indicated that its source was a former government employee or contractor.

“This extraordinary collection, which amounts to more than several hundred million lines of code, gives its possessor the entire hacking capacity of the CIA,’’ WikiLeaks said in announcing the first release of documents. “The archive appears to have been circulated among former U.S. government hackers and contractors in an unauthorized manner, one of whom has provided WikiLeaks with portions of the archive.’’

One former intelligence official said if that claim is accurate, “there’s going to be another major mole hunt . . . If this is all correct, it’s a big deal.’’

A key distinction for investigators will be whether WikiLeaks reveals the actual computer code — or enough details about such code — that others can develop and deploy some of the hacking tools, according to current and former officials.

The security failures highlighted by damaging leaks from Snowden and Manning have proven difficult to address.

Manning was arrested in Iraq in May 2010 after transmitting documents to WikiLeaks that came to be known as the Iraq and Afghanistan “War Logs.’’ She also leaked a video showing a U.S. Apache helicopter in Baghdad opening fire on a group of people that the crew thought were insurgents. Among the dead were two journalists who worked for Reuters. She also leaked documents pertaining to Guantanamo Bay prisoners, as well as 250,000 State Department cables.

In response to the Manning case, the Obama administration created the National Insider Threat Task Force, designed to teach and train government workers and contractors to spot potential leakers.

Manning, formerly known as Bradley Manning, came out as transgender after her 2013 conviction. In the waning days of his presidency, Barack Obama commuted her 35-year prison sentence, and she is due to be released in coming months.

The post-Manning efforts did not stop Snowden from taking reams of data about sensitive bulk intelligence collection in 2013 and giving the material to reporters. Those revelations, including a court document showing how the government gathered Americans’ phone records, sparked years of political debate about privacy and government surveillance in the digital age.

Snowden has remained out of reach of the U.S. government, living in Russia.

Brenner, the former counterintelligence official, said the net effect of the new leaks could be “very dangerous to us, because they “accelerate the leveling of the playing field between the United States and its adversaries in cyberspace.’’

The bigger lesson of the newest leak, Brenner argued, is that U.S. pursuit of dominance in cyberspace may actually be destabilizing over the long run. “That is a very unsettling debate for our military and our intelligence services, but I think it’s coming,’’ he said.

Snowden also weighed in regarding the alleged CIA documents, tweeting: “What @Wikileaks has here is genuinely a big deal. Looks authentic.’’

https://www.washingtonpost.com/world/national-security/fbi-prepares-for-new-hunt-for-wikileaks-source/2017/03/07/28dcb9e0-0356-11e7-ad5b-d22680e18d10_story.html?utm_term=.0d9871aa3c4c

U.S. aware of CIA security breach in 2016; contractors suspected in leak

By John Walcott and Andrea Shalal | WASHINGTON/BERLIN

U.S. intelligence and law enforcement officials said on Wednesday they have been aware since the end of last year of a security breach at the CIA and were focusing on contractors as the likeliest source of documents being passed on to anti-secrecy group WikiLeaks detailing the agency’s hacking tools.

The officials, who spoke on condition of anonymity, told Reuters that they believed documents published by WikiLeaks on Tuesday about CIA techniques used between 2013 and 2016 were authentic.

The documents showed that CIA hackers could get into Apple Inc (AAPL.O) iPhones, Google Inc (GOOGL.O) Android devices and other gadgets in order to capture text and voice messages before they were encrypted with sophisticated software.

The White House said on Wednesday that President Donald Trump was “extremely concerned” about a CIA security breach that led to the Wikileaks release, and the administration would be tough on leakers.

“Anybody who leaks classified information will be held to the highest degree of law,” spokesman Sean Spicer told reporters.

One official with knowledge of the investigation said companies that are contractors for the CIA have been checking to see which of their employees had access to the material that Wikileaks published, and then going over their computer logs, emails and other communications for any evidence of who might be responsible.

One reason the investigation is focused on a potential leak by contractors rather than for example a hack by Russian intelligence, another official said, is that so far there is no evidence that Russian intelligence agencies tried to exploit any of the leaked material before it was published.

One European official, speaking on condition of anonymity, said the Wikileaks material could in fact lead to closer cooperation between European intelligence agencies and U.S. counterparts, which share concerns about Russian intelligence operations.

U.S. intelligence agencies have accused Russia of seeking to tilt last year’s U.S. presidential election in Trump’s favor, including by hacking into Democratic Party emails. Moscow has denied the allegation.

The lobby of the CIA Headquarters Building in Langley, Virginia, U.S. on August 14, 2008. REUTERS/Larry Downing/File Photo

One major security problem was that the number of contractors with access to information with the highest secrecy classification has “exploded” because of federal budget constraints, the first U.S. official said.

U.S. intelligence agencies have been unable to hire additional permanent staff needed to keep pace with technological advances such as the “Internet of Things” that connects cars, home security and heating systems and other devices to computer networks, or to pay salaries competitive with the private sector, the official said.

Reuters could not immediately verify the contents of the published documents. On Tuesday, several contractors and private cyber security experts said the materials appeared to be legitimate.

A person familiar with Wikileaks’ activities said Wikileaks has had the CIA hacking material for months, and that the release of the material was in the works “for a long time.”

A Congressional official said that the U.S. House of Representatives Intelligence Committee has begun asking questions about the WikiLeaks disclosures.

GERMAN CONCERN

In Germany on Wednesday, the chief federal prosecutor’s office said that it would review the Wikileaks documents because some suggested that the CIA ran a hacking hub from the U.S. consulate in Frankfurt.

“We’re looking at it very carefully,” a spokesman for the federal prosecutor’s office told Reuters. “We will initiate an investigation if we see evidence of concrete criminal acts or specific perpetrators.”

Chancellor Angela Merkel is scheduled to visit Washington on March 14 for her first meeting with Trump, who has sharply criticized Berlin for everything from its trade policy to what he considers inadequate levels of military spending.

The Wikileaks documents may also complicate bilateral intelligence ties that have just begun to recover after a series of scandals, including news in 2013 that the U.S. National Security Agency had bugged Merkel’s cellphone. The Frankfurt consulate was investigated by German lawmakers after that incident.

Merkel told lawmakers last month she did not know how closely Germany’s spies cooperated with their U.S. counterparts until 2015 when former NSA contractor Edward Snowden revealed the BND spy agency had for years passed on information to the NSA about European companies and politicians.

Germany scaled back the level of cooperation with the NSA after those revelations.

U.S. officials have acknowledged that the consulate in Frankfurt is home to a CIA base. A facility adjacent to the city’s airport and the Rhein-Main Air Base has for many years been home to the CIA’s “Tefran” station, a U.S. center for collecting intelligence on Iranian activities in Europe, maintaining surveillance on Iranian officials and targeting potential defectors working in Iran’s nuclear weapons program.

Foreign ministry spokesman Sebastian Fischer told a regular government news conference that Germany took the issue seriously, but more work needed to be done to verify the authenticity of the documents. Berlin was in close touch with Washington about the case and such matters generally, he said.

Government spokesman Steffen Seibert said Germany’s domestic intelligence agency had the job of uncovering espionage activities in Germany, and carried out its work comprehensively.

Wikileaks reported that CIA employees had been given diplomatic passports and State Department identities to carry out their work in Frankfurt, focused on targets in Europe, the Middle East and Africa. The documents included advice for CIA experts about life in Germany, noting that shops are closed on Sundays, and to have “your cover-for-action story down pat” when they were asked by German authorities when entering the country.

(Reporting by John Walcott, Mark Hosenball, Yara Bayoumy in Washington and Matthias Sobolewski and Andrea Shalal in Berlin; Writing by Grant McCool; Editing by Peter Graff, Grant McCool and Frances Kerry)

http://www.reuters.com/article/us-cia-wikileaks-idUSKBN16F2AP?il=0

Wikileaks to hand over alleged CIA spying tools to tech companies

Assange
Assange said he would give tech companies the details of hacks affecting their products  CREDIT: WIKILEAKS

Wikileaks will hand Central Intelligence Agency hacking tools to technology companies in order for them to defend their customers against spying.

Julian Assange, founder of the website, said he had decided to provide the classified information to giants such as Microsoft, Samsung and Apple whose products were implicated in the alleged CIA leaks.

The announcement comes after Wikileaks on Tuesday released a raft of documents that it claims detail tools the CIA used to hack into peoples computers, televisions and smartphones, among other internet-connected devices.

Wikileaks didn’t disclose details of how the tools worked, but basic information that allegedly proves the cyber weapons arsenal exists.

Samsung F8000
The CIA could have hacked Samsung’s F8000 smart TVs to turn them into spying toolsCREDIT: SAMSUNG

In the wake of the release, Assange said tech companies had asked Wikileaks to pass them details of the hacks that affect their products in order for them to fix them.

“After considering what we think is the best way to proceed and hearing calls from some of the manufacturers we have decided to work with them, to give them exclusive access to some of the technical details we have,” said Assange.

With the information Assange said the companies can “effectively disarm” the alleged CIA hacking tools.

It is not clear how long it will take for all of the vulnerabilities to be fixed or if they can all be solved. Some could be blocked in a couple of days, said Assange, while other more critical one could take weeks.

Assange warned that other hacks, such as the one used to turn on a “fake off” spying mode on Samsung smart TVs, may have to be manually blocked. This could prove difficult as it would require people to know their device had been infected in order for it to be fixed.

https://cf-particle-html.eip.telegraph.co.uk/25f7b704-4ac6-4678-a1a0-b3beeb494718.html?ref=http://www.telegraph.co.uk/technology/2017/03/09/wikileaks-hand-alleged-cia-spying-tools-tech-companies/&title=Wikileaks%20to%20hand%20over%20alleged%20CIA%20spying%20tools%20to%20tech%20companies

Apple has responded directly to the alleged CIA hacking tools mentioned in the documents. It says the security vulnerabilities that could have been used to access iPhones were fixed as of its latest security update. Samsung and Google meanwhile have said they are investigating the claims but it is unclear what action they have taken.

The CIA has not commented on the authenticity of the leaks.

http://www.telegraph.co.uk/technology/2017/03/09/wikileaks-hand-alleged-cia-spying-tools-tech-companies/

Assange: WikiLeaks Will Work With Tech Companies

 WikiLeaks has offered to help the likes of Google and Apple identify the software holes used by purported CIA hacking tools – and that puts the tech industry in something of a bind.

While companies have both a responsibility and financial incentive to fix problems in their software, accepting help from WikiLeaks raises legal and ethical questions. And it’s not even clear at this point exactly what kind of assistance WikiLeaks can offer.

THE PROMISE

WikiLeaks founder Julian Assange said Thursday that the anti-secrecy site will help technology companies find and fix software vulnerabilities in everyday gadgets such as phones and TVs. In an online news conference, Assange said some companies had asked for more details about the purported CIA cyberespionage toolkit that he revealed in a massive disclosure on Tuesday.

“We have decided to work with them, to give them some exclusive access to the additional technical details we have, so that fixes can be developed and pushed out,” Assange said. The digital blueprints for what he described as “cyberweapons” would be published to the world “once this material is effectively disarmed by us.”

Any conditions WikiLeaks might set for its cooperation weren’t immediately known. Nor was it clear if WikiLeaks holds additional details on specific vulnerabilities, or merely the tools designed to exploit them.

Apple declined comment on the WikiLeaks offer, and Google didn’t respond to requests for comment. Microsoft said it hopes that anyone with knowledge of software vulnerabilities would report them through the company’s usual channels.

LEGAL QUESTIONS

Tech companies could run into legal difficulties in accepting the offer, especially if they have government contracts or employees with security clearances.

“The unauthorized release of classified documents does not mean it’s unclassified,” said Stewart Baker, a former official at the Department of Homeland Security and former legal counsel for the National Security Agency. “Doing business with WikiLeaks and reviewing classified documents poses a real risk for at least their government contracting arms and their cleared employees.”

Other lawyers, however, are convinced that much of the information in the documents is so widely known that they are now part of the public domain. That means tech companies would be unlikely to face any legal liability for digging deeper with WikiLeaks.

Alternatively, suppose tech companies don’t accept WikiLeaks’ offer to help fix any security flaws – and are subsequently hacked. At that point, they could face charges of negligence, particularly in Europe where privacy laws are much stricter than in the U.S., said Michael Zweiback, a former assistant U.S. attorney and cybercrime adviser now in private practice.

GETTING TOO CLOSE TO WIKILEAKS

Public perception might be a bigger problem. “They don’t want to be seen as endorsing or supporting an organization with a tainted reputation and an unclear agenda,” said Robert Cattanach, a former U.S. Department of Justice attorney.

During the 2016 election, WikiLeaks published thousands of emails, some embarrassing, from breached Democratic Party computers and the account of a top aide to Hillary Clinton. U.S. intelligence agencies concluded those emails were stolen by hackers connected to the Russian government in an attempt to help Donald Trump win the presidency.

The CIA did not respond directly to Assange’s offer, but it appeared to take a dim view of it.

“Julian Assange is not exactly a bastion of truth and integrity,” CIA spokeswoman Heather Fritz Horniak said.

But most tech companies already have digital hotlines to receive tips about security weaknesses, even if they come from unsavory characters. So it wouldn’t break new ground for them to consult with a shadowy organization such as WikiLeaks.

A BETTER PATH

Ideally, the CIA would have shared such vulnerabilities directly with companies, as other government agencies have long done. In that case, companies would not only be dealing with a known entity in an aboveboard fashion, they might also obtain a more nuanced understanding of the problems than their engineers could glean from documents or lines of computer code.

And if companies could learn details about how the CIA found these vulnerabilities, they might also find additional holes using the same technique, said Johannes Ullrich, director of the Internet Storm Center at the SANS Institute.

And there are risks obtaining actual hacking tools from WikiLeaks. Some might have unadvertised features that could, for instance, start extracting data as soon as they launch. Ullrich said the CIA also might have left some traps to attack people running its exploits. If these aren’t detailed in the documents, only the CIA would be able to help tech companies avoid setting them off.

If all goes well, WikiLeaks could emerge looking better than some parts of the U.S. government.

“I am not a fan of WikiLeaks, but I don’t think it is fair to throw rocks at everything they do,” said Cindy Cohn, executive director of the Electronic Frontier Foundation, a group specializing in online privacy and other digital rights. “What WikiLeaks is demonstrating is that the CIA does not have the best interests of these companies at heart.”

BETTER THAN NOTHING

There’s one more unknown, which is just how much help WikiLeaks can actually provide. Apple, Google and Microsoft say they’ve already rendered many of the alleged CIA cyberespionage tools obsolete with earlier updates that patched related software holes.

Still, the companies will probably want to check out what WikiLeaks has, assuming that the organization hasn’t set unreasonable conditions on its cooperation. Some privacy and security experts believe the CIA’s own refusal to contact the affected companies about the vulnerabilities gives them little choice.

“We all should have better security, and certainly at this point, not trying to fixing them makes no sense,” Cohn said.

Liedtke reported from San Ramon, Calif. Raphael Satter in Paris, Paisley Dodds in London and Deb Riechmann in Washington contributed to this report.

This story has been corrected to reflect that purported CIA tools are not aimed at “defeating encryption” but at hijacking computers.

http://hosted.ap.org/dynamic/stories/U/US_WIKILEAKS_CIA?SITE=AP&SECTION=HOME&TEMPLATE=DEFAULT&CTIME=2017-03-09-17-09-24

Why Is Obama Expanding Surveillance Powers Right Before He Leaves Office?

It could be to prevent Trump from extending them even more.

Obama waves at the end of his farewell address in Chicago
The Obama administration made it easier for the NSA to share information with other intelligence agencies, just weeks before the inauguration.Jonathan Ernst / Reuters
On Thursday, the Obama administration finalized new rules that allow the National Security Agency to share information it gleans from its vast international surveillance apparatus with the 16 other agencies that make up the U.S. intelligence community.With the new changes, which were long in the works, those agencies can apply for access to various feeds of raw, undoctored NSA intelligence. Analysts will then be able to sift through the contents of those feeds as they see fit, before implementing required privacy protections. Previously, the NSA applied those privacy protections itself, before forwarding select pieces of information to agencies that might need to see them.The updated procedures will multiply the number of intelligence analysts who have access to NSA surveillance, which is captured in large quantities and often isn’t subject to warrant requirements. The changes rankled privacy advocates, who oppose a broadening of surveillance powers—especially on the cusp of Donald Trump’s inauguration. Trump and Mike Pompeo, the president-elect’s nominee for CIA director, have made it clear that they think overzealous civil-liberties protections should be cleared away in favor of stronger surveillance laws.
But while the changes may subject more Americans to warrantless surveillance, the last-minute timing of the announcement actually might have been designed to cut future privacy losses. Susan Hennessey, a Brookings fellow and the managing editor of Lawfare, says firming up the changes before Trump takes office makes it harder for the incoming president to encroach even further on civil liberties.I spoke with Hennessey, who was previously an attorney in the NSA general counsel’s office, about the lasting effects of the new intelligence-sharing procedures. A transcript of our conversation follows, lightly edited for clarity and concision.


Kaveh Waddell: First off, what do these changes mean for the intelligence community? Has a lack of information-sharing among agencies been holding back investigations?

Susan Hennessey: The origin of these changes dates back, honestly, to just after 9/11. There was this identified issue of “stovepiping”: Intelligence wasn’t being shared frequently or fast enough. Some modifications have already been made throughout the years.

Under Executive Order 12333 as it previously existed, NSA analysts had to make an initial determination and apply a set of privacy rules before sharing raw signals-intelligence information with other parts of the intelligence community. After this change, it doesn’t necessarily have to be an NSA analyst that makes that determination—that information can be shared with other parts of the intelligence community.

So it doesn’t change the substantive rules, it doesn’t change the scope of collection, it doesn’t change the types of protection, it doesn’t change the possible uses; it essentially just broadens the group of people who can apply those protections to the raw intelligence.

Waddell: And by extension, it broadens the group of people who get to see raw intelligence, before those rules are applied?

Hennessey: Yes. This is something that has been at the forefront of privacy and civil-liberties advocates’ minds when they’ve expressed concern with this type of collection. But it’s not accurate to say the rule change means it’s a raw signals-intelligence free-for-all, that anybody can get signals intelligence.

Intelligence agencies other than the NSA will have to provide justification for why they need access to that data. It can only be for foreign intelligence, or other enumerated purposes. So it’s not that those agencies will just be able to see whatever they want—it’s that they will be able to request, with particular justifications, access to more raw signals intelligence than they had before. Then, they will need to apply those minimization procedures for themselves.

The civil-liberties concern often surrounds the use of incidentally collected information. Under the new rule, the FBI could not obtain access to or search raw intelligence information for ordinary criminals in an ordinary criminal investigation against a U.S. person. However, if the FBI incidentally seized evidence of a crime, they are allowed to use that information. So that tends to be where the tension is for people who are concerned with the potential impacts that this change could have on U.S. persons.

Waddell: The fact that more Americans could potentially be subject to warrantless searches, just by virtue of being caught up in the raw signals intelligence that’s shared—is that something that concerns you?

Hennessey: No. Look, I think it’s important to understand that these minimization procedures are taken very seriously, and all other agencies that are handling raw signals intelligence are essentially going to have to import these very complex oversight and compliance mechanisms that currently exist at the NSA.

Within the NSA, those are extremely strong and protective mechanisms. I think people should feel reassured that the rules cannot be violated—certainly not without it coming to the attention of oversight and compliance bodies. I am confident that all of the agencies in the U.S. intelligence community will discharge those very same obligations with the same level of diligence and rigor, adhering to both the spirit and the letter of the law.

That said, there are potentially broader reforms that might be undertaken. I don’t think that they necessarily need to be linked to the sharing of data. But it’s reasonable to at least engage in a conversation about whether or not it’s appropriate to have particular post-collection reforms, like for example imposing an obligation for law enforcement to obtain a warrant in particular circumstances.

That’s a long way of saying that nothing about this particular rule change exposing Americans to additional privacy risks. However, that doesn’t mean that there are not still reasonable and responsible reforms which might take place.

Waddell: I found it interesting that you said the change could, in one way, actually be viewed as a “huge source of comfort.” I think you were referring to the timing of the change. Why is that?

Hennessey: These changes have actually been in process for eight or nine years. One of the things that I think individuals who had insight into intelligence activities and were concerned about the election of Donald Trump—specifically, some of the statements he’s made about adherence to the rule of law—a lot of those people’s minds went very quickly to these procedures.

It’s important to understand the distinction between Executive Order 12333 and the Foreign Intelligence Surveillance Act: One very oversimplified way to think about it is that FISA is a statute that governs collection that takes place within the United States, but that is aimed at a foreign target; 12333 collection is aimed at a foreign target, and takes place outside the United States. That’s shorthand that glosses over some technical and legal nuance, but those are the broad buckets people should be thinking about.

FISA is a statute, so you’d need congressional action to change those rules, and you have a built-in check there. But 12333 is not constrained by statute; it’s constrained by executive order. In theory, a president could change an executive order—that’s within his constitutional power. It’s not as easy as just a pen stroke, but it’s theoretically possible.

Executive Order 12333 requires that this series of protective procedures exist and are adhered to. The procedures are kind of where the rubber meets the road on privacy. They’re the details, the nitty-gritty: What can you actually see? What can you share? What do you have to minimize? So they’re really, really important in terms of what the relationship between U.S. citizens and the intelligence community looks like.

When they were in rewrites, they were sort of vulnerable. There was the possibility that an incoming administration would say, “Hey! While you’re in the process of rewriting, let’s go ahead and adjust some of the domestic protections.” And I think a reasonable observer might assume that while the protections the Obama administration was interested in putting into place increased privacy protections—or at the very least did not reduce them—that the incoming administration has indicated that they are less inclined to be less protective of privacy and civil liberties. So I think it is a good sign that these procedures have been finalized, in part because it’s so hard to change procedures once they’re finalized.

Waddell: Is that why we just went through an eight- or nine-year process to get here?

Hennessey: Exactly. For questions both of genuine complexity and just government bureaucracy, the time horizon here is longer than a single term of the presidency.

So I don’t think that it’s necessarily true that the intelligence community or the Department of Justice was rushing to get these procedures passed; if anything, they’re a little bit late. But I think the bottom line is that it’s comforting to a large national-security community that these are procedures that are signed off by Director of National Intelligence James Clapper and Attorney General Loretta Lynch, and not by the DNI and attorney general that will ultimately be confirmed under the Trump Administration.

Waddell: Is there anything else we should be thinking about with these new changes?

Hennessey: People sometimes focus on the top-line stuff and end up missing the things that aren’t necessarily the symbolic expressions of privacy—the things that make us feel good—but are the functional elements of privacy and civil liberties. What rules do people apply day-to-day and how? There’s going to be a need moving forward to have disciplined conversations about the legal protections that really matter.

If there is a silver lining to some of the anxieties that the incoming administration has produced, I think it’s the potential to move the conversation into a much more productive place. But that opportunity will end up being lost if the responses are the same old same. That’s my last shred of optimism, and I’m hanging on to it.

https://www.theatlantic.com/technology/archive/2017/01/obama-expanding-nsa-powers/513041/

Executive Orders

Executive Order 12333–United States intelligence activities

Source: The provisions of Executive Order 12333 of Dec. 4, 1981, appear at 46 FR 59941, 3 CFR, 1981 Comp., p. 200, unless otherwise noted.

Table of Contents

Preamble

Part 1.Goals, Direction, Duties, and Responsibilities With Respect to the National Intelligence Effort
1.1 Goals
1.2 The National Security Council
1.3 National Foreign Intelligence Advisory Groups
1.4 The Intelligence Community
1.5 Director of Central Intelligence
1.6 Duties and Responsibilities of the Heads of Executive Branch Departments and Agencies
1.7 Senior Officials of the Intelligence Community
1.8 The Central Intelligence Agency
1.9 The Department of State
1.10 The Department of the Treasury
1.11 The Department of Defense
1.12 Intelligence Components Utilized by the Secretary of Defense
1.13 The Department of Energy
1.14 The Federal Bureau of Investigation
Part 2.Conduct of Intelligence Activities
2.1 Need
2.2 Purpose
2.3 Collection of Information
2.4 Collection Techniques
2.5 Attorney General Approval
2.6 Assistance to Law Enforcement Authorities
2.7 Contracting
2.8 Consistency With Other Laws
2.9 Undisclosed Participation in Organizations Within the United States
2.10 Human Experimentation
2.11 Prohibition on Assassination
2.12 Indirect Participation
Part 3.General Provisions
3.1 Congressional Oversight
3.2 Implementation
3.3 Procedures
3.4 Definitions
3.5 Purpose and Effect
3.6 Revocation

Timely and accurate information about the activities, capabilities, plans, and intentions of foreign powers, organizations, and persons and their agents, is essential to the national security of the United States. All reasonable and lawful means must be used to ensure that the United States will receive the best intelligence available. For that purpose, by virtue of the authority vested in me by the Constitution and statutes of the United States of America, including the National Security Act of 1947, as amended, and as President of the United States of America, in order to provide for the effective conduct of United States intelligence activities and the protection of constitutional rights, it is hereby ordered as follows:

Part 1

Goals, Direction, Duties and Responsibilities With Respect to the National Intelligence Effort

1.1Goals. The United States intelligence effort shall provide the President and the National Security Council with the necessary information on which to base decisions concerning the conduct and development of foreign, defense and economic policy, and the protection of United States national interests from foreign security threats. All departments and agencies shall cooperate fully to fulfill this goal.
(a) Maximum emphasis should be given to fostering analytical competition among appropriate elements of the Intelligence Community.
(b) All means, consistent with applicable United States law and this Order, and with full consideration of the rights of United States persons, shall be used to develop intelligence information for the President and the National Security Council. A balanced approach between technical collection efforts and other means should be maintained and encouraged.
(c) Special emphasis should be given to detecting and countering espionage and other threats and activities directed by foreign intelligence services against the United States Government, or United States corporations, establishments, or persons.
(d) To the greatest extent possible consistent with applicable United States law and this Order, and with full consideration of the rights of United States persons, all agencies and departments should seek to ensure full and free exchange of information in order to derive maximum benefit from the United States intelligence effort.

1.2The National Security Council.
(a) Purpose. The National Security Council (NSC) was established by the National Security Act of 1947 to advise the President with respect to the integration of domestic, foreign and military policies relating to the national security. The NSC shall act as the highest Executive Branch entity that provides review of, guidance for and direction to the conduct of all national foreign intelligence, counterintelligence, and special activities, and attendant policies and programs.
(b) Committees. The NSC shall establish such committees as may be necessary to carry out its functions and responsibilities under this Order. The NSC, or a committee established by it, shall consider and submit to the President a policy recommendation, including all dissents, on each special activity and shall review proposals for other sensitive intelligence operations.

1.3National Foreign Intelligence Advisory Groups.
(a) Establishment and Duties. The Director of Central Intelligence shall establish such boards, councils, or groups as required for the purpose of obtaining advice from within the Intelligence Community concerning:
(1) Production, review and coordination of national foreign intelligence;
(2) Priorities for the National Foreign Intelligence Program budget;
(3) Interagency exchanges of foreign intelligence information;
(4) Arrangements with foreign governments on intelligence matters;
(5) Protection of intelligence sources and methods;
(6) Activities of common concern; and
(7) Such other matters as may be referred by the Director of Central Intelligence.
(b) Membership. Advisory groups established pursuant to this section shall be chaired by the Director of Central Intelligence or his designated representative and shall consist of senior representatives from organizations within the Intelligence Community and from departments or agencies containing such organizations, as designated by the Director of Central Intelligence. Groups for consideration of substantive intelligence matters will include representatives of organizations involved in the collection, processing and analysis of intelligence. A senior representative of the Secretary of Commerce, the Attorney General, the Assistant to the President for National Security Affairs, and the Office of the Secretary of Defense shall be invited to participate in any group which deals with other than substantive intelligence matters.

1.4The Intelligence Community. The agencies within the Intelligence Community shall, in accordance with applicable United States law and with the other provisions of this Order, conduct intelligence activities necessary for the conduct of foreign relations and the protection of the national security of the United States, including:
(a) Collection of information needed by the President, the National Security Council, the Secretaries of State and Defense, and other Executive Branch officials for the performance of their duties and responsibilities;
(b) Production and dissemination of intelligence;
(c) Collection of information concerning, and the conduct of activities to protect against, intelligence activities directed against the United States, international terrorist and international narcotics activities, and other hostile activities directed against the United States by foreign powers, organizations, persons, and their agents;
(d) Special activities;
(e) Administrative and support activities within the United States and abroad necessary for the performance of authorized activities; and
(f) Such other intelligence activities as the President may direct from time to time.

1.5Director of Central Intelligence. In order to discharge the duties and responsibilities prescribed by law, the Director of Central Intelligence shall be responsible directly to the President and the NSC and shall:
(a) Act as the primary adviser to the President and the NSC on national foreign intelligence and provide the President and other officials in the Executive Branch with national foreign intelligence;
(b) Develop such objectives and guidance for the Intelligence Community as will enhance capabilities for responding to expected future needs for national foreign intelligence;
(c) Promote the development and maintenance of services of common concern by designated intelligence organizations on behalf of the Intelligence Community;
(d) Ensure implementation of special activities;
(e) Formulate policies concerning foreign intelligence and counterintelligence arrangements with foreign governments, coordinate foreign intelligence and counterintelligence relationships between agencies of the Intelligence Community and the intelligence or internal security services of foreign governments, and establish procedures governing the conduct of liaison by any department or agency with such services on narcotics activities;
(f) Participate in the development of procedures approved by the Attorney General governing criminal narcotics intelligence activities abroad to ensure that these activities are consistent with foreign intelligence programs;
(g) Ensure the establishment by the Intelligence Community of common security and access standards for managing and handling foreign intelligence systems, information, and products;
(h) Ensure that programs are developed which protect intelligence sources, methods, and analytical procedures;
(i) Establish uniform criteria for the determination of relative priorities for the transmission of critical national foreign intelligence, and advise the Secretary of Defense concerning the communications requirements of the Intelligence Community for the transmission of such intelligence;
(j) Establish appropriate staffs, committees, or other advisory groups to assist in the execution of the Director’s responsibilities;
(k) Have full responsibility for production and dissemination of national foreign intelligence, and authority to levy analytic tasks on departmental intelligence production organizations, in consultation with those organizations, ensuring that appropriate mechanisms for competitive analysis are developed so that diverse points of view are considered fully and differences of judgment within the Intelligence Community are brought to the attention of national policymakers;
(l) Ensure the timely exploitation and dissemination of data gathered by national foreign intelligence collection means, and ensure that the resulting intelligence is disseminated immediately to appropriate government entities and military commands;
(m) Establish mechanisms which translate national foreign intelligence objectives and priorities approved by the NSC into specific guidance for the Intelligence Community, resolve conflicts in tasking priority, provide to departments and agencies having information collection capabilities that are not part of the National Foreign Intelligence Program advisory tasking concerning collection of national foreign intelligence, and provide for the development of plans and arrangements for transfer of required collection tasking authority to the Secretary of Defense when directed by the President;
(n) Develop, with the advice of the program managers and departments and agencies concerned, the consolidated National Foreign Intelligence Program budget, and present it to the President and the Congress;
(o) Review and approve all requests for reprogramming National Foreign Intelligence Program funds, in accordance with guidelines established by the Office of Management and Budget;
(p) Monitor National Foreign Intelligence Program implementation, and, as necessary, conduct program and performance audits and evaluations;
(q) Together with the Secretary of Defense, ensure that there is no unnecessary overlap between national foreign intelligence programs and Department of Defense intelligence programs consistent with the requirement to develop competitive analysis, and provide to and obtain from the Secretary of Defense all information necessary for this purpose;
(r) In accordance with law and relevant procedures approved by the Attorney General under this Order, give the heads of the departments and agencies access to all intelligence, developed by the CIA or the staff elements of the Director of Central Intelligence, relevant to the national intelligence needs of the departments and agencies; and
(s) Facilitate the use of national foreign intelligence products by Congress in a secure manner.

1.6Duties and Responsibilities of the Heads of Executive Branch Departments and Agencies.
(a) The heads of all Executive Branch departments and agencies shall, in accordance with law and relevant procedures approved by the Attorney General under this Order, give the Director of Central Intelligence access to all information relevant to the national intelligence needs of the United States, and shall give due consideration to the requests from the Director of Central Intelligence for appropriate support for Intelligence Community activities.
(b) The heads of departments and agencies involved in the National Foreign Intelligence Program shall ensure timely development and submission to the Director of Central Intelligence by the program managers and heads of component activities of proposed national programs and budgets in the format designated by the Director of Central Intelligence, and shall also ensure that the Director of Central Intelligence is provided, in a timely and responsive manner, all information necessary to perform the Director’s program and budget responsibilities.
(c) The heads of departments and agencies involved in the National Foreign Intelligence Program may appeal to the President decisions by the Director of Central Intelligence on budget or reprogramming matters of the National Foreign Intelligence Program.

1.7Senior Officials of the Intelligence Community. The heads of departments and agencies with organizations in the Intelligence Community or the heads of such organizations, as appropriate, shall:
(a) Report to the Attorney General possible violations of federal criminal laws by employees and of specified federal criminal laws by any other person as provided in procedures agreed upon by the Attorney General and the head of the department or agency concerned, in a manner consistent with the protection of intelligence sources and methods, as specified in those procedures;
(b) In any case involving serious or continuing breaches of security, recommend to the Attorney General that the case be referred to the FBI for further investigation;
(c) Furnish the Director of Central Intelligence and the NSC, in accordance with applicable law and procedures approved by the Attorney General under this Order, the information required for the performance of their respective duties;
(d) Report to the Intelligence Oversight Board, and keep the Director of Central Intelligence appropriately informed, concerning any intelligence activities of their organizations that they have reason to believe may be unlawful or contrary to Executive order or Presidential directive;
(e) Protect intelligence and intelligence sources and methods from unauthorized disclosure consistent with guidance from the Director of Central Intelligence;
(f) Disseminate intelligence to cooperating foreign governments under arrangements established or agreed to by the Director of Central Intelligence;
(g) Participate in the development of procedures approved by the Attorney General governing production and dissemination of intelligence resulting from criminal narcotics intelligence activities abroad if their departments, agencies, or organizations have intelligence responsibilities for foreign or domestic narcotics production and trafficking;
(h) Instruct their employees to cooperate fully with the Intelligence Oversight Board; and
(i) Ensure that the Inspectors General and General Counsels for their organizations have access to any information necessary to perform their duties assigned by this Order.

1.8The Central Intelligence Agency. All duties and responsibilities of the CIA shall be related to the intelligence functions set out below. As authorized by this Order; the National Security Act of 1947, as amended; the CIA Act of 1949, as amended; appropriate directives or other applicable law, the CIA shall:
(a) Collect, produce and disseminate foreign intelligence and counterintelligence, including information not otherwise obtainable. The collection of foreign intelligence or counterintelligence within the United States shall be coordinated with the FBI as required by procedures agreed upon by the Director of Central Intelligence and the Attorney General;
(b) Collect, produce and disseminate intelligence on foreign aspects of narcotics production and trafficking;
(c) Conduct counterintelligence activities outside the United States and, without assuming or performing any internal security functions, conduct counterintelligence activities within the United States in coordination with the FBI as required by procedures agreed upon by the Director of Central Intelligence and the Attorney General;
(d) Coordinate counterintelligence activities and the collection of information not otherwise obtainable when conducted outside the United States by other departments and agencies;
(e) Conduct special activities approved by the President. No agency except the CIA (or the Armed Forces of the United States in time of war declared by Congress or during any period covered by a report from the President to the Congress under the War Powers Resolution (87 Stat. 855)1) may conduct any special activity unless the President determines that another agency is more likely to achieve a particular objective;
(f) Conduct services of common concern for the Intelligence Community as directed by the NSC;
(g) Carry out or contract for research, development and procurement of technical systems and devices relating to authorized functions;
(h) Protect the security of its installations, activities, information, property, and employees by appropriate means, including such investigations of applicants, employees, contractors, and other persons with similar associations with the CIA as are necessary; and
(i) Conduct such administrative and technical support activities within and outside the United States as are necessary to perform the functions described in sections (a) through (h) above, including procurement and essential cover and proprietary arrangements.

1.9The Department of State. The Secretary of State shall:
(a) Overtly collect information relevant to United States foreign policy concerns;
(b) Produce and disseminate foreign intelligence relating to United States foreign policy as required for the execution of the Secretary’s responsibilities;
(c) Disseminate, as appropriate, reports received from United States diplomatic and consular posts;
(d) Transmit reporting requirements of the Intelligence Community to the Chiefs of United States Missions abroad; and
(e) Support Chiefs of Missions in discharging their statutory responsibilities for direction and coordination of mission activities.

1.10The Department of the Treasury. The Secretary of the Treasury shall:
(a) Overtly collect foreign financial and monetary information;
(b) Participate with the Department of State in the overt collection of general foreign economic information;
(c) Produce and disseminate foreign intelligence relating to United States economic policy as required for the execution of the Secretary’s responsibilities; and
(d) Conduct, through the United States Secret Service, activities to determine the existence and capability of surveillance equipment being used against the President of the United States, the Executive Office of the President, and, as authorized by the Secretary of the Treasury or the President, other Secret Service protectees and United States officials. No information shall be acquired intentionally through such activities except to protect against such surveillance, and those activities shall be conducted pursuant to procedures agreed upon by the Secretary of the Treasury and the Attorney General.

1.11The Department of Defense. The Secretary of Defense shall:
(a) Collect national foreign intelligence and be responsive to collection tasking by the Director of Central Intelligence;
(b) Collect, produce and disseminate military and military-related foreign intelligence and counterintelligence as required for execution of the Secretary’s responsibilities;
(c) Conduct programs and missions necessary to fulfill national, departmental and tactical foreign intelligence requirements;
(d) Conduct counterintelligence activities in support of Department of Defense components outside the United States in coordination with the CIA, and within the United States in coordination with the FBI pursuant to procedures agreed upon by the Secretary of Defense and the Attorney General;
(e) Conduct, as the executive agent of the United States Government, signals intelligence and communications security activities, except as otherwise directed by the NSC;
(f) Provide for the timely transmission of critical intelligence, as defined by the Director of Central Intelligence, within the United States Government;
(g) Carry out or contract for research, development and procurement of technical systems and devices relating to authorized intelligence functions;
(h) Protect the security of Department of Defense installations, activities, property, information, and employees by appropriate means, including such investigations of applicants, employees, contractors, and other persons with similar associations with the Department of Defense as are necessary;
(i) Establish and maintain military intelligence relationships and military intelligence exchange programs with selected cooperative foreign defense establishments and international organizations, and ensure that such relationships and programs are in accordance with policies formulated by the Director of Central Intelligence;
(j) Direct, operate, control and provide fiscal management for the National Security Agency and for defense and military intelligence and national reconnaissance entities; and
(k) Conduct such administrative and technical support activities within and outside the United States as are necessary to perform the functions described in sections (a) through (j) above.

1.12Intelligence Components Utilized by the Secretary of Defense. In carrying out the responsibilities assigned in section 1.11, the Secretary of Defense is authorized to utilize the following:
(a) Defense Intelligence Agency, whose responsibilities shall include;
(1) Collection, production, or, through tasking and coordination, provision of military and military-related intelligence for the Secretary of Defense, the Joint Chiefs of Staff, other Defense components, and, as appropriate, non-Defense agencies;
(2) Collection and provision of military intelligence for national foreign intelligence and counterintelligence products;
(3) Coordination of all Department of Defense intelligence collection requirements;
(4) Management of the Defense Attache system; and
(5) Provision of foreign intelligence and counterintelligence staff support as directed by the Joint Chiefs of Staff.
(b) National Security Agency, whose responsibilities shall include:
(1) Establishment and operation of an effective unified organization for signals intelligence activities, except for the delegation of operational control over certain operations that are conducted through other elements of the Intelligence Community. No other department or agency may engage in signals intelligence activities except pursuant to a delegation by the Secretary of Defense;
(2) Control of signals intelligence collection and processing activities, including assignment of resources to an appropriate agent for such periods and tasks as required for the direct support of military commanders;
(3) Collection of signals intelligence information for national foreign intelligence purposes in accordance with guidance from the Director of Central Intelligence;
(4) Processing of signals intelligence data for national foreign intelligence purposes in accordance with guidance from the Director of Central Intelligence;
(5) Dissemination of signals intelligence information for national foreign intelligence purposes to authorized elements of the Government, including the military services, in accordance with guidance from the Director of Central Intelligence;
(6) Collection, processing and dissemination of signals intelligence information for counterintelligence purposes;
(7) Provision of signals intelligence support for the conduct of military operations in accordance with tasking, priorities, and standards of timeliness assigned by the Secretary of Defense. If provision of such support requires use of national collection systems, these systems will be tasked within existing guidance from the Director of Central Intelligence;
(8) Executing the responsibilities of the Secretary of Defense as executive agent for the communications security of the United States Government;
(9) Conduct of research and development to meet the needs of the United States for signals intelligence and communications security;
(10) Protection of the security of its installations, activities, property, information, and employees by appropriate means, including such investigations of applicants, employees, contractors, and other persons with similar associations with the NSA as are necessary;
(11) Prescribing, within its field of authorized operations, security regulations covering operating practices, including the transmission, handling and distribution of signals intelligence and communications security material within and among the elements under control of the Director of the NSA, and exercising the necessary supervisory control to ensure compliance with the regulations;
(12) Conduct of foreign cryptologic liaison relationships, with liaison for intelligence purposes conducted in accordance with policies formulated by the Director of Central Intelligence; and
(13) Conduct of such administrative and technical support activities within and outside the United States as are necessary to perform the functions described in sections (1) through (12) above, including procurement.
(c) Offices for the collection of specialized intelligence through reconnaissance programs, whose responsibilities shall include:
(1) Carrying out consolidated reconnaissance programs for specialized intelligence;
(2) Responding to tasking in accordance with procedures established by the Director of Central Intelligence; and
(3) Delegating authority to the various departments and agencies for research, development, procurement, and operation of designated means of collection.

(d)

The foreign intelligence and counterintelligence elements of the Army, Navy, Air Force, and Marine Corps,

whose responsibilities shall include:

(1) Collection, production and dissemination of military and military-related foreign intelligence and counterintelligence, and information on the foreign aspects of narcotics production and trafficking. When collection is conducted in response to national foreign intelligence requirements, it will be conducted in accordance with guidance from the Director of Central Intelligence. Collection of national foreign intelligence, not otherwise obtainable, outside the United States shall be coordinated with the CIA, and such collection within the United States shall be coordinated with the FBI;
(2) Conduct of counterintelligence activities outside the United States in coordination with the CIA, and within the United States in coordination with the FBI; and
(3) Monitoring of the development, procurement and management of tactical intelligence systems and equipment and conducting related research, development, and test and evaluation activities.
(e) Other offices within the Department of Defense appropriate for conduct of the intelligence missions and responsibilities assigned to the Secretary of Defense. If such other offices are used for intelligence purposes, the provisions of Part 2 of this Order shall apply to those offices when used for those purposes.

1.13The Department of Energy. The Secretary of Energy shall:
(a) Participate with the Department of State in overtly collecting information with respect to foreign energy matters;
(b) Produce and disseminate foreign intelligence necessary for the Secretary’s responsibilities;
(c) Participate in formulating intelligence collection and analysis requirements where the special expert capability of the Department can contribute; and
(d) Provide expert technical, analytical and research capability to other agencies within the Intelligence Community.

1.14The Federal Bureau of Investigation. Under the supervision of the Attorney General and pursuant to such regulations as the Attorney General may establish, the Director of the FBI shall:
(a) Within the United States conduct counterintelligence and coordinate counterintelligence activities of other agencies within the Intelligence Community. When a counterintelligence activity of the FBI involves military or civilian personnel of the Department of Defense, the FBI shall coordinate with the Department of Defense;
(b) Conduct counterintelligence activities outside the United States in coordination with the CIA as required by procedures agreed upon by the Director of Central Intelligence and the Attorney General;
(c) Conduct within the United States, when requested by officials of the Intelligence Community designated by the President, activities undertaken to collect foreign intelligence or support foreign intelligence collection requirements of other agencies within the Intelligence Community, or, when requested by the Director of the National Security Agency, to support the communications security activities of the United States Government;
(d) Produce and disseminate foreign intelligence and counterintelligence; and
(e) Carry out or contract for research, development and procurement of technical systems and devices relating to the functions authorized above.

Part 2

Conduct of Intelligence Activities

2.1Need. Accurate and timely information about the capabilities, intentions and activities of foreign powers, organizations, or persons and their agents is essential to informed decisionmaking in the areas of national defense and foreign relations. Collection of such information is a priority objective and will be pursued in a vigorous, innovative and responsible manner that is consistent with the Constitution and applicable law and respectful of the principles upon which the United States was founded.

2.2Purpose. This Order is intended to enhance human and technical collection techniques, especially those undertaken abroad, and the acquisition of significant foreign intelligence, as well as the detection and countering of international terrorist activities and espionage conducted by foreign powers. Set forth below are certain general principles that, in addition to and consistent with applicable laws, are intended to achieve the proper balance between the acquisition of essential information and protection of individual interests. Nothing in this Order shall be construed to apply to or interfere with any authorized civil or criminal law enforcement responsibility of any department or agency.

2.3Collection of Information. Agencies within the Intelligence Community are authorized to collect, retain or disseminate information concerning United States persons only in accordance with procedures established by the head of the agency concerned and approved by the Attorney General, consistent with the authorities provided by Part 1 of this Order. Those procedures shall permit collection, retention and dissemination of the following types of information:
(a) Information that is publicly available or collected with the consent of the person concerned;
(b) Information constituting foreign intelligence or counterintelligence, including such information concerning corporations or other commercial organizations. Collection within the United States of foreign intelligence not otherwise obtainable shall be undertaken by the FBI or, when significant foreign intelligence is sought, by other authorized agencies of the Intelligence Community, provided that no foreign intelligence collection by such agencies may be undertaken for the purpose of acquiring information concerning the domestic activities of United States persons;
(c) Information obtained in the course of a lawful foreign intelligence, counterintelligence, international narcotics or international terrorism investigation;
(d) Information needed to protect the safety of any persons or organizations, including those who are targets, victims or hostages of international terrorist organizations;
(e) Information needed to protect foreign intelligence or counterintelligence sources or methods from unauthorized disclosure. Collection within the United States shall be un