The Pronk Pops Show 876, April 19, 2017, Story 1: Murdoch Sons Killing Fox News — Talent Exits — Who is next? — Adorable Deplorable Audience Abandons Fox News — Going, Going, Gone — Life Is Not Fair! — Big Lie Media Dying — Videos — Story 2: Totalitarians of Lying Lunatic Left Attempt to Suppress Speech of Conservatives, Libertarians, and Classical Liberals — Nothing New — Go On Offense And Attack The Collectivist Totalitarians — Battle For Berkeley — Berkeley Protesters Take the Pepsi Challenge — Why the Right Won — Chief of Police Orders Berkeley Police To Stand Down — Videos

Posted on April 19, 2017. Filed under: American History, Blogroll, Breaking News, College, Communications, Congress, Constitutional Law, Corruption, Countries, Culture, Donald J. Trump, Donald J. Trump, Donald Trump, Donald Trump, Elections, Employment, Federal Government, Foreign Policy, Free Trade, Freedom of Speech, Government, Government Dependency, Government Spending, Hillary Clinton, History, House of Representatives, Human, Law, Life, Media, News, Obama, Philosophy, Photos, Politics, Progressives, Raymond Thomas Pronk, Rule of Law, Scandals, Senate, Social Networking, Taxation, Taxes, Terror, Terrorism, United States Constitution, United States of America, Videos, Violence, Wall Street Journal, Wealth, Welfare Spending, Wisdom | Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , |

Project_1

The Pronk Pops Show Podcasts

Pronk Pops Show 876: April 19, 2017

Pronk Pops Show 875: April 18, 2017

Pronk Pops Show 874: April 17, 2017

Pronk Pops Show 873: April 13, 2017

Pronk Pops Show 872: April 12, 2017

Pronk Pops Show 871: April 11, 2017

Pronk Pops Show 870: April 10, 2017

Pronk Pops Show 869: April 7, 2017

Pronk Pops Show 868: April 6, 2017

Pronk Pops Show 867: April 5, 2017

Pronk Pops Show 866: April 3, 2017

Pronk Pops Show 865: March 31, 2017

Pronk Pops Show 864: March 30, 2017

Pronk Pops Show 863: March 29, 2017

Pronk Pops Show 862: March 28, 2017

Pronk Pops Show 861: March 27, 2017

Pronk Pops Show 860: March 24, 2017

Pronk Pops Show 859: March 23, 2017

Pronk Pops Show 858: March 22, 2017

Pronk Pops Show 857: March 21, 2017

Pronk Pops Show 856: March 20, 2017

Pronk Pops Show 855: March 10, 2017

Pronk Pops Show 854: March 9, 2017

Pronk Pops Show 853: March 8, 2017

Pronk Pops Show 852: March 6, 2017

Pronk Pops Show 851: March 3, 2017

Pronk Pops Show 850: March 2, 2017

Pronk Pops Show 849: March 1, 2017

Pronk Pops Show 848: February 28, 2017

Pronk Pops Show 847: February 27, 2017

Pronk Pops Show 846: February 24, 2017

Pronk Pops Show 845: February 23, 2017

Pronk Pops Show 844: February 22, 2017

Pronk Pops Show 843: February 21, 2017

Pronk Pops Show 842: February 20, 2017

Pronk Pops Show 841: February 17, 2017

Pronk Pops Show 840: February 16, 2017

Pronk Pops Show 839: February 15, 2017

Pronk Pops Show 838: February 14, 2017

Pronk Pops Show 837: February 13, 2017

Pronk Pops Show 836: February 10, 2017

Pronk Pops Show 835: February 9, 2017

Pronk Pops Show 834: February 8, 2017

Pronk Pops Show 833: February 7, 2017

Pronk Pops Show 832: February 6, 2017

Pronk Pops Show 831: February 3, 2017

Pronk Pops Show 830: February 2, 2017

Pronk Pops Show 829: February 1, 2017

Pronk Pops Show 828: January 31, 2017

Pronk Pops Show 827: January 30, 2017

Pronk Pops Show 826: January 27, 2017

Pronk Pops Show 825: January 26, 2017

Pronk Pops Show 824: January 25, 2017

Pronk Pops Show 823: January 24, 2017

Pronk Pops Show 822: January 23, 2017

Pronk Pops Show 821: January 20, 2017

Pronk Pops Show 820: January 19, 2017

Pronk Pops Show 819: January 18, 2017

Pronk Pops Show 818: January 17, 2017

Pronk Pops Show 817: January 13, 2017

Pronk Pops Show 816: January 12, 2017

Pronk Pops Show 815: January 11, 2017

Pronk Pops Show 814: January 10, 2017

Pronk Pops Show 813: January 9, 2017

Story 1: Murdoch Sons Killing Fox News — Talent Exits — Who is next? — Adorable Deplorable Audience Abandons Fox News — Going, Going, Gone — Life Is Not Fair! —  Big Lie Media Dying — Videos — 

Image result for bill o'reilly on media mattersImage result for media mattersImage result for media mattersImage result for cartoons on george soros

The Bonner group/A Super PAC and fundraiser for Hillary & DNC. The Campaign against Bill OReily is orchestrated by MM & BG.

Glenn Beck ✔ @glennbeck The Bonner group/A Super PAC and fundraiser for Hillary & DNC. The Campaign against Bill OReily is orchestrated by MM & BG. #Smearproof 5:58 AM – 19 Apr 2017 321 321 Retweets 232 232 likes

http://www.glennbeck.com/2017/04/19/exclusive-proof-that-liberals-are-working-to-remove-bill-oreilly-from-fox-news/?utm_source=glennbeck&utm_medium=contentcopy_link

Bill O’Reilly Gets a $25M Copy of the Home Game Sayonara and “Hit the Road” Without Even a Goodbye

The Real Reason Bill O’Reilly Was Fired From Fox That Nobody’s Talking About

Bill O’Reilly’s Out at Fox | It Had Nothing to Do With Sexual Harassment | It Was Sponsors and Money

Mark Levin Reveals Why He Despised Bill O’Reilly

MARK LEVIN: I’m Not Gonna Defend Bill O’Reilly, But The Left Works As A CABAL

LIMBAUGH: Fox News Is Not Gonna Be The Way It Is For Long

Pitchfork and Torch Mob Crows Over O’Reilly’s Heave-Ho: Mum’s the Word As to Bill Clinton’s Victims

Ted Koppel tells Bill O’Reilly he’s ruined journalism

Bill O’Reilly Back On The Air After New Accuser Alleges Sexual Harassment | TODAY

Howard Stern Making Fun Of Bill O’Reilly Sexually Harassing Women 04/03/17

Sponsors split from FOX News over sexual harassment scandal

After Bill O’Reilly Blasts Megyn Kelly, She Insists: Ailes Made Fox Look Bad

Bill O’Reilly Calls His Critics “Hate Sites”

Bill O’Reilly Lashes Out At Media Matters And Salon For Highlighting His Anti-Immigration Coverage

Behold the Death Knell of Mainstream Corporate News Media

Megyn Kelly Flops and Folds at Fox and Faces a Career Stall at NBC Media Wasteland and Landfill

Why The Fake News Media Keeps Losing | Mike Cernovich and Stefan Molyneux

Sources: Fox News Has Decided Bill O’Reilly Has to Go

By Gabriel Sherman

The Murdochs have decided Bill O’Reilly’s 21-year run at Fox News will come to an end. According to sources briefed on the discussions, network executives are preparing to announce O’Reilly’s departure before he returns from an Italian vacation on April 24. Now the big questions are how the exit will look and who will replace him.

Wednesday morning, according to sources, executives are holding emergency meetings to discuss how they can sever the relationship with the country’s highest-rated cable-news host without causing collateral damage to the network. The board of Fox News’ parent company, 21st Century Fox, is scheduled to meet on Thursday to discuss the matter.

Sources briefed on the discussions say O’Reilly’s exit negotiations are moving quickly. Right now, a key issue on the table is whether he would be allowed to say good-bye to his audience, perhaps the most loyal in all of cable (O’Reilly’s ratings have ticked up during the sexual-harassment allegations). Fox executives are leaning against allowing him to have a sign-off, sources say. The other main issue on the table is money. O’Reilly recently signed a new multiyear contract worth more than $20 million per year. When Roger Ailes left Fox News last summer, the Murdochs paid out $40 million, the remainder of his contract.

According to sources, Fox News wants the transition to be seamless. Executives are currently debating possible replacement hosts. Names that have been discussed include Eric Bolling, Dana Perino, and Tucker Carlson, who would move from his successful 9 p.m. slot and create a need for a new host at that time. One source said Sean Hannity is happy at 10 p.m. and would not want to move.

The Murdochs’ decision to dump O’Reilly shocked many Fox News staffers I’ve spoken to in recent days. Late last week, the feeling inside the company was that Rupert Murdoch would prevail over his son James, who lobbied to jettison the embattled host. It’s still unclear exactly how the tide turned. According to one source, Lachlan Murdoch’s wife helped convince her husband that O’Reilly needed to go, which moved Lachlan into James’s corner. The source added that senior executives at other divisions within the Murdoch empire have complained that if O’Reilly’s allegations had happened to anyone else at their companies, that person would be gone already.

Spokespersons for 21st Century Fox and Fox News did not respond to requests for comment, nor did O’Reilly’s agent, Carole Cooper.

http://nymag.com/daily/intelligencer/2017/04/sources-fox-news-has-decided-bill-oreilly-has-to-go.html

Bill O’Reilly has been forced out of his position as a prime-time host on Fox News, the company said on Wednesday, after the disclosure of multiple settlements involving sexual harassment allegations against him. His ouster brings an abrupt and embarrassing end to his two-decade reign as one of the most popular and influential commentators in television.

Bill O’Reilly’s Show Lost More Than Half Its Advertisers in a Week

“After a thorough and careful review of the allegations, the company and Bill O’Reilly have agreed that Bill O’Reilly will not be returning to the Fox News Channel,” 21st Century Fox, Fox News’s parent company, said in a statement.

Mr. O’Reilly’s departure comes two and a half weeks after an investigation by The New York Times revealed how Fox News and 21st Century Fox had repeatedly stood by Mr. O’Reilly even as sexual harassment allegations piled up against him. The Times found that the company and Mr. O’Reilly reached settlements with five women who had complained about sexual harassment or other inappropriate behavior by him. The agreements totaled about $13 million.

Document: Fox Statement on Bill O’Reilly’s Departure

Since then, more than 50 advertisers had abandoned his show, and women’s rights groups called for his ouster. Inside the company, women expressed outrage and questioned whether top executives were serious about maintaining a culture based on “trust and respect,” as they had promised last summer when another sexual harassment scandal forced the ouster of Fox News’s chairman, Roger Ailes.

That put pressure on 21st Century Fox and the Murdoch family that controlled it. After the dismissal of Mr. Ailes, the company struck two settlements involving sexual harassment complaints against Mr. O’Reilly and also extended his contract, even as it was aware of the complaints about his behavior.

Last week, the Murdochs enlisted the law firm Paul, Weiss, Rifkind, Wharton & Garrison to conduct an investigation into Mr. O’Reilly’s behavior after one woman, who had detailed her allegations against Mr. O’Reilly to The Times, called the company’s hotline to report her complaints. Another complaint was reported on Tuesday, according to the lawyer who represents the woman making the allegations.

Mr. O’Reilly has denied the allegations against him.

Mr. O’Reilly, 67, has been an anchor at Fox News since he started at the network in 1996. He was the top-rated host in cable news, serving up defiant commentary every weekday at 8 p.m., with a message that celebrated patriotism and expressed scorn for political correctness. His departure is a significant blow to Fox News’s prime-time lineup, which in January lost another star, Megyn Kelly, from a lineup that dominated the prime-time cable news ratings.

https://www.nytimes.com/2017/04/19/business/media/bill-oreilly-fox-news-allegations.html?_r=0

Media Matters President Angelo Carusone: “Even If Bill O’Reilly Stays, His Show Will Never Be As Profitable”

Carusone: Fox News Said It Themselves … ‘If You Have A Television Show And You Have Advertiser Problems, You No Longer Have A Television Show That Is Viable.”

Video ››› April 5, 2017 6:30 PM EDT ››› MEDIA MATTERS STAFF

From the April 5 edition of Cheddar News:

KRISTEN SCHOLER (CO-HOST): We know that you’ve been following the developments in these sexual harassment claims against Fox News’ Bill O’Reilly, and as of right now ABC reporting 22 advertisers pulling out of advertising at least temporarily on his show. How is this going to force Fox News to respond long term? We’ve heard the response short-term which is it’s working with these advertisers, but big picture what do you think this means?

ANGELO CARUSONE: One thing that at the top that I point out is, when we think about the number of advertisers that have dropped, that 22 number is the ones that have given public statements.  From just observing the program and his advertisers the last couple of weeks, and then what his advertising looked like last night, and just from my own experience of running and being involved in similar kinds of advertiser efforts, like against Glenn Beck, I suspect that many more advertisers have actually adjusted their ad buys but just haven’t given public statements yet. Because many of the advertisers that had been advertising on the program every single night for the past few weeks did not appear last night after this controversy blew up, and I don’t think they’ll be there tonight.

JON STEINBERG (CO-HOST): Angelo, at what point — because they’re sticking by this guy, because he brings in money. And they basically don’t care; they don’t care how  bad it is or what he’s done, he makes them so much money that they’re going to stick with him. At what point is it enough advertisers that the math — the problem is, this looks bad for them, and it could be even worse for them, they could have gotten ahead of this and been like, “this guy’s toxic, we’re done,” right? Instead they paid his settlements, stuck by him, now they’re going to lose money and now they’re going to have to pull the ripcord on him, at which point it looks like they’re just doing it for the money.

CARUSONE: And I think that’s the exact right question, which is at what point does it actually start to affect them? What happens during these kinds of flare-ups is that there’s an assumption on the public’s part that if O’Reilly was to leave the program in a couple of days, that everything was pointless and worth it and Fox News is totally fine and Bill O’Reilly is totally fine. That’s actually just not true, and during the Glenn Beck period, after he lost a wave of advertisers, his advertiser rates never recovered. He limped along for over a year. His advertiser rates were a quarter of what other Fox News programs were even though he had a million viewers than many other Fox News programs, comparable ones, during similar time slots. He was beating the programs around him by a million viewers but his advertiser rates for the same advertisers, and for the same commercials, were sometimes a fifth of what they were on just a program an hour later or an hour earlier. That’s because they fell precipitously after he lost a lot of advertisers. The market addressed that issue; once you started to see there’s a problem buying ads on that show, media buyers weren’t going to pay the same rates anymore, and they never did. So that’s the first thing that I would point out, that no matter what, even if Bill O’Reilly stays, his program will never be as profitable as it was three days ago. That is just a bottom-line fact.

https://www.mediamatters.org/video/2017/04/05/media-matters-president-angelo-carusone-even-if-bill-oreilly-stays-his-show-will-never-be-profitable/215934

Political views of Bill O’Reilly

From Wikipedia, the free encyclopedia

American commentator Bill O’Reilly regularly expresses his point of view on a wide variety of political, social, and moral issues. He has personally labeled his political philosophytraditionalism.[1]The O’Reilly Factor, since its inception on the Fox News Channel in 1996, has been the primary outlet of his opinions. O’Reilly started his own radio program, The Radio Factor, a few years later. He has also written several non-fiction books detailing some of his beliefs. O’Reilly generally leans to the right on most issues,[citation needed] most notably the Bush administration’s War on Terror, but breaks from the conservative and Republican majority on such issues as the global warming controversy, gun control, gay marriage and the death penalty.

Political views

Political affiliation

On The O’Reilly Factor and on his former talk-radio program, Bill O’Reilly has focused on news and commentary related to politics and culture.[2] O’Reilly has long said that he does not identify with any political ideology, writing in his book The O’Reilly Factor that the reader “might be wondering if whether I’m conservative, liberal, libertarian, or exactly what…. See, I don’t want to fit any of those labels, because I believe that the truth doesn’t have labels. When I see corruption, I try to expose it. When I see exploitation, I try to fight it. That’s my political position.”[3] On December 6, 2000, the Daily News in New York reported, however, that he had been registered with the Republican Party in the state of New York since 1994. When questioned about this, he said that he was not aware of it and says he registered as an independent after the interview.[4] During a broadcast of The Radio Factor, O’Reilly said that there was no option to register as an independent voter; however, there was in fact a box marked “I do not wish to enroll in party.”[5] Despite being registered as an Independent, many view him as a conservative figure.[2] A Pew Research February 2009 poll found that 66% of his television viewers identify themselves as conservative, 24% moderate, and 3% liberal.[6] A November 2008 poll by Zogby International found that O’Reilly was the second most trusted news personality after Rush Limbaugh.[7]

In a 2003 interview with Terry Gross on National Public Radio, O’Reilly said:

I’m not a political guy in the sense that I embrace an ideology. To this day I’m an independent thinker, an independent voter, I’m a registered independent… there are certain fundamental things that this country was founded upon that I respect and don’t want changed. That separates me from the secularists who want a complete overhaul of how the country is run.[8]

Domestic politics

O’Reilly has opined on many domestic issues. O’Reilly said the Bill Clintonimpeachment stemming from the Lewinsky scandal was “not about sex. This is about honesty and cruelty. For Mr. Clinton, it was about undermining the justice system.” In the same article he writes that Gary Condit, a moderate Democraticcongressman from California who had an extramarital affair with Chandra Levy prior to her disappearance and death, should be held to the same standard.[9]

According to the Newsmax publication, O’Reilly has repeatedly claimed that Clinton had the Internal Revenue Service audit him.[10] O’Reilly says that he was audited three times since his program debuted in 1996.

O’Reilly has been critical of former Attorney GeneralJanet Reno, calling her “perhaps the worst attorney general in history”, and that the FBI became a “disorganized mess” during her tenure. He later praised former Attorney General John Ashcroft for going after the Arthur Andersen accounting firm, as well as Enron, WorldCom, Sam Waksal of Imclone and Martha Stewart.[11]

In 2002, O’Reilly had criticized Democratic Senator Hillary Clinton, stating that she would run for president in 2008. In an interview with Jay Leno on The Tonight Show, he said, “I just feel that Hillary is a socialist, and I’m paying enough tax. Hillary wants to take my money [and] your money… and give it to strangers. There’s something about that that offends me.” He said that she had voted for every single spending bill that year. In the same interview, he accused her of running as a political carpetbagger, and said that she intends to abolish the Electoral College in favor of the popular vote, claiming that it would be done only to give her an advantage in the presidential race.[12]

After criticizing the overturn of Snyder v. Phelps by the Fourth Circuit Court of Appeals, O’Reilly offered on March 30, 2010 to help Snyder pay the US$16,510 in court costs while he prepared an appeal to the Supreme Court.[13][14]

2004 presidential election

During the lead up to the 2004 presidential election, O’Reilly said that the Democratic Party has been taken over by the “far-left” in a conversation with former Democratic Congressman Brad Carson.[15] Shortly following the election, O’Reilly ridiculed a message in which Democratic challenger John Kerry thanked his supporters for their support as well as opposing “the attacks from big news organizations such as Fox, Sinclair Broadcasting, and conservative talk radio.”[16] O’Reilly shot back, calling Kerry a “sissy” six times.[17] Kerry himself stated publicly in a 2006 interview that he always felt he’d have a “fair shot” at conveying his views on The O’Reilly Factor and regrets not doing an interview prior to the election.[18]

Although O’Reilly has never officially endorsed any candidate, he did advise his audience not to support Democratic South Dakota senator Tom Daschle in his Senate re-election bid on his radio program, saying that, “[W]ith all due respect to the senator, we don’t have any respect for him at all. And we hope he loses in South Dakota. And I — really, I stay out of all these races, but you guys listening in South Dakota, vote for the other guy.”[19] Daschle would lose the 2004 Senate election in South Dakota to John Thune.[20]

2008 presidential election

In the 2008 Democratic primary, O’Reilly urged his viewers not to vote for a candidate, this time John Edwards, and called Edwards a “phony” regarding his public statements on poverty.[21] O’Reilly has, on many occasions, admitted to “having no respect for him”, and called him “arrogant” for keeping his campaign staffer Amanda Marcotte on after making remarks O’Reilly called offensive to Christians.[22]

O’Reilly has also criticized Republicans. When speaking to Ed Schulz in 2007, O’Reilly said that then-presidential candidate Rudy Giuliani had “terrible character judgement” with Bernard Kerik and felt that “disqualified him from being president.”[23]

“Culture War” and domestic politics

O’Reilly has taken to using the abbreviation “S-P”, for “SecularProgressive“, as a shorthand way of referring to a political category of people who want “drastic change” in the country.[citation needed] O’Reilly classifies the group as “far left”, and almost always refers to the group in a negative manner. However, he says that he is not equating the negative qualities he sees in “SPs” with a “liberal” political ideology, saying the SP camp is far more “libertine” with social values:

Liberal thought, however, can be a good thing. Progressive programs to help the poor, fight injustice and give working people a fair shake are all positive. But libertine actions damage a just society because actions have consequences. Kids who drink and take drugs are likely to hurt themselves and others. But obviously, the SPs do not make judgments like that.[24]

In his book Culture Warrior, O’Reilly called President John F. Kennedy and Dr. Martin Luther King Jr. examples of liberals who were also traditionalists, also citing current US Senators Joe Lieberman of Connecticut and Evan Bayh of Indiana as liberal/Democratic “traditionalists”.

Foreign politics

Immigration and border control

O’Reilly has supported stricter border controls, including placement of the National Guard troops on the US-Mexican border and has criticized President George W. Bush for not allocating enough resources to make border security effective. He also criticized Ronald Reagan‘s act of amnesty, claiming that it made the illegal immigration problem worse.[25] O’Reilly makes a distinction between criminal illegal immigrants and non-criminals by saying that criminal illegal immigrants should be deported immediately. O’Reilly criticizes the lack of cooperation between local sanctuary cities and the INS.[26]

The Iraq War

O’Reilly initially supported the invasion of Iraq. Speaking on ABC’s Good Morning America on March 18, 2003, O’Reilly promised that “If the Americans go in and overthrow Saddam Hussein and it’s clean [of weapons of mass destruction]…I will apologize to the nation, and I will not trust the Bush administration again.”[27] In another appearance on the same program on February 10, 2004, O’Reilly responded to repeated requests for him to honor his pledge: “My analysis was wrong and I’m sorry. I was wrong. I’m not pleased about it at all.”[28] With regard to never again trusting the current U.S. government, he said, “I am much more skeptical of the Bush administration now than I was at that time.”

O’Reilly has questioned the U.S. invasion of Iraq in hindsight, in particular the performance of Defense Secretary Donald Rumsfeld. However, he maintains that the United States “did a good thing by trying to liberate a country”.[citation needed] O’Reilly says the war effort should continue as long as progress is being made. He has also said that some anti-war activists are actively rooting for the United States to lose:

General McCaffrey says strong progress is being made. He believes the Sunnis have turned against Al Qaeda and that the Maliki government is neutralizing the Shi’ia death squads.

Again, I don’t know. With all America has sacrificed in Iraq, though, it seems reasonable to let the end game play out. If things are getting better, don’t derail the train.

But the anti-war crew is now fully invested in defeat. So the struggle at home is becoming even more vicious. Iraq is a shooting war. America’s a political war. Both are driven by hatred.[29]

O’Reilly called the Iraqi people a “prehistoric group”, citing a poll showing that only two percent of them viewed the U.S. Forces as liberators and 55 percent preferred that they leave. “We cannot intervene in the Muslim world ever again”, he said. “What we can do is bomb the living daylights out of them (…) no more ground troops, no more hearts and minds, ain’t going to work.”[30]

In an interview with White House Press Secretary (and former Fox News colleague) Tony Snow, O’Reilly said that the United States cannot win given the circumstances of Iraqis not supporting the effort:

You can’t win. No one could. No nation could unless the Iraqi people turn on all the terrorists. And they’re not. They’re not, Tony.

O’Reilly went on to say that the country was corrupt and compared the situation to the American support of South Vietnam during the Vietnam War:

It’s like South Vietnam. It’s the same thing. There were a lot of South Vietnamese helping us. A lot fought and died on our side but there wasn’t enough of them to prevent the communists which were more united.[31]

O’Reilly would go on to praise General David Petraeus for reducing American casualties and advancing American objectives with the 2007 troop surge:

The cost has been great. We all know that. In suffering and cash. And the Iraqi government is still a mess. But General Petraeus, backed by a brave and professional U.S. military, has restored much order, largely defeated the Iraqi Al Qaeda thugs, and at least given the good people of that country a chance to prosper. General David Petraeus is “The Factor” person of the year by a wide margin.[32]

During The Rumble with Jon Stewart, O’Reilly admitted that “We should not have gone to Iraq. Afghanistan we had to.”[33]

Terrorism

O’Reilly has endorsed an aggressive War on Terror policy.[34] He supports coercive measures to extract information from detainees at Guantanamo Bay, which he visited on two occasions. He has said that, in comparison to procedures used under the regimes of dictators such as Adolf Hitler and Pol Pot, the U.S.’s tactics are not torture and are beneficial even when involving physical techniques,[35] claiming that “Torture is taking my fingers off, disfiguring me, taking my eye out — not keeping me in a cold room and uncomfortable with blaring rock music.”[36] O’Reilly cites waterboarding as a successful coercive measure that should not be classified as torture, citing that Abu Zubaydah and Khaled Sheikh Mohammed have both given up valuable information after being subjected to the technique:

In my opinion, it is immoral to allow terrorists to kill people when you can stop them. If you capture someone who knows the inner workings of a terror outfit, you make life very uncomfortable for that person within boundaries set by Congress.

But let’s stop the nonsense here. America’s not a bad country because it waterboarded Zubaydah. The Bush administration has done its job. We haven’t been attacked since 9/11.

The liberal press, politicians, the ACLU can’t stop any wrongdoing. They’re all lost in a fog of misguided indignation, crazy with hatred for Bush, but we the people must take a stand here. This isn’t a game. This is life and death. And if you don’t believe it, I know scores of people right here in New York City that will tell you about their dead loved ones.

Waterboarding should be a last resort, but it must be an option.[37]

He has also said that detainees should be judged under military tribunals, but not protected under the Geneva Convention because the convention requires combatants to wear a uniform.[35]

He has been critical of politicians such as Democratic Speaker of the HouseNancy Pelosi and private citizens such as financier George Soros for wanting to try terror suspects in civilian courts.[38]

O’Reilly has said that both political parties in the United States are “playing games” with regards to the war on terrorism:

…both the right and the left are playing games to some extent. Certainly, Al Qaeda remains dangerous, but the only way to hit them is to invade Pakistan. Do the Democrats want to do that?

On the other hand, it would be a tragedy if after all the blood and treasure Americans have sacrificed, Al Qaeda has not been badly damaged.

America should be united in fighting these savages, but we’re not. Ideology has poisoned a reasoned, disciplined approach to defeating the jihadists. America’s great strength, diversity of thought, can also be a weakness. And Al Qaeda knows it.

The old saying goes, “United we stand, divided we fall.” Well, we’re divided.[39]

George Soros

O’Reilly has accused billionaire businessman, investor and political activist George Soros of trying to influence the 2008 election by donating to causes and organizations that O’Reilly calls the “radical left”, such as moveon.org, which regularly criticizes conservative politicians. O’Reilly said of Soros “If Mike Myers didn’t invent Dr. Evil, some would give Soros that moniker.”[40] O’Reilly also accused Media Matters for America of receiving funds from Soros;[41] although Media Matters denies having any funding directly or indirectly from Soros,[42] he and the group’s founder, David Brock, have raised money together to fund political advertisements challenging John McCain in the 2008 election for what politico.com called “attack ads”.[43] O’Reilly responded to the politico report by labeling Soros, Brock and Paul Begala an “American axis of evil” and saying

This, ladies and gentlemen, is ultra dangerous. Most Americans have no idea who Soros or Brock are. They will only know what they see on TV, smear stuff against McCain. And the pipeline extends directly to NBC News, which will publicize every piece of slime Brock can create. Only one word describes this: despicable.[44]

O’Reilly alleged that PBS personality Bill Moyers oversaw $500,000 worth of money transferred from the Shoeman Center Foundation (a group Soros donated to) to Media Matters.[45]

you know, you’ve got to admire Soros for coming up with this organization. I mean, you know, he’s made billions by doing this in business, by being in Curaçao and Bermuda and France, where he was convicted of a felony. And he knows how to do this. He knows how to move the money around and use it to gain influence. And now he’s set his sights on changing the basic fabric of this country.[46]

The organization to which O’Reilly refers is the Open Society Institute.[45]

ACLU

O’Reilly has been critical of the American Civil Liberties Union (ACLU), calling it “the most dangerous organization in the United States of America” especially in their challenging of the Justice Department and the Department of Defense regarding the War on Terror. He has called them a “fascist” organization in response to their threatened lawsuit against Los Angeles County for failing to remove a cross from its official seal.[47]

O’Reilly alleged hypocrisy on the part of the ACLU for stating that New York City‘s random searches of bags in the public transportation as a breach of personal rights, but requiring people entering their New York headquarters to consent to a bag search.[48]

O’Reilly asserted that the ACLU is now a political organization rather than an advocacy group, taking positions and cases based on politics rather than free speech.

He has come down hard on the organization for its actions on behalf of the North American Man Boy Love Association (NAMBLA) which is currently under suspicion of involvement with the rape and murder of a young boy:

Now many of these people subscribe to a philosophy of relativism. That is a theory which says there’s no absolute right or wrong. All moral values are relative. What’s wrong for you is not wrong for your neighbor if he or she doesn’t think his or her actions are wrong. That’s what the North American Man-Boy Love Association (NAMBLA) is all about. Those loons believe it’s OK to rape kids because they want to.[49]

The ACLU defends NAMBLA’s freedom of speech surrounding their publications and has said that the legal blame in the murder should go to who committed it.[50]

The ACLU has said that they sometimes have to defend “unpopular” speech or speech that they don’t agree with, including the Ku Klux Klan‘s, saying their only “client” is the Bill of Rights.[51] O’Reilly alleges the ACLU “cherry picks” its cases to promote a left wing agenda while not supporting causes of free speech that conservatives support in his criticism of the ACLU defending live sex shows in Oregon.[52]

O’Reilly decried the group’s criticism of The Minutemen, claiming the latter were only engaging in a form of protest, a right the ACLU defends. O’Reilly alleges that the organization is protesting the Minutemen because they are going against the ACLU’s agenda.[53][54]

O’Reilly accused the organization of having an anti-Christian bias when it protested the portrayal of the nativity scene in New York City Public Schools, but did not protest displayal of the Jewish menorah or the Islamic star and crescent.[55]

O’Reilly criticized the ACLU for suing San Diego County for renting property to the Boy Scouts of America in Balboa Park. The ACLU brought up a law claiming that the Boy Scouts discriminated against gays and atheists. O’Reilly criticized the San Diego City Council for voting 6-2 to vote the Scouts out before a ruling on the lawsuit was made.

It would be impossible for the Boy Scouts (search) or any children’s organization to admit avowed homosexuals because of the potential liability. Say the Scouts put openly gay and straight kids together and some sexual activity occurred. Well, parents could sue for millions, same way parents could sue if the Scouts put boys and girls together and underaged sex occurred. As far as the atheist issue is concerned, the Scouts say no specific belief in God is necessary, only an acknowledgement of a higher power. And that power could be nature. Come on. The whole discrimination thing is bogus.

Part of the Boy Scout Oath begins, “On my honor, I will do my best to do my duty to God and my country” and the final point of the Scout Law reads, “A Scout is reverent,” with the Boy Scouts’ of America official explanation being that “a Scout is reverent toward God. He is faithful in his religious duties. He respects the beliefs of others.”[56] However, the bylaws of the organization specifically state that Scouts must “respect the religious beliefs of others” and “in no case where a unit is connected with a church or other distinctively religious organization shall members of other denominations or faith be required, because of their membership in the unit, to take part in or observe a religious ceremony distinctly unique to that organization or church.”[57]

O’Reilly argues this is a liberal definition of what God may be, allowing diversity for anyone believing in a higher power to join.

He went on to compare the ACLU to Nazis:

Now the ACLU is free to come to your town and sue the heck out of it. And believe me, that organization will. The ACLU doesn’t care about the law or the Constitution or what the people want. It’s a fascist organization that uses lawyers instead of Panzers. It’ll find a way to inflict financial damage on any concern that opposes its secular agenda and its growing in power.

He later went on to criticize the Boy Scout leadership for not standing up to the ACLU.[58]

On October 16, 2006 at Mount Pleasant High School in Michigan, a student stood up publicly in the cafeteria and called the principal of the school “a skank and a tramp.” In addition to this, the student called the school administrators Nazis and questioned the sexuality of the vice-principal. The school suspended the boy for 10 days, an action that brought a lawsuit by the ACLU. O’Reilly criticized the ACLU for defending the remarks as satire when he saw it as hate speech.[59]

Social views

Abortion

O’Reilly supported California Proposition 73 because it would have required parental notification of underage girls seeking an abortion. “[T]he left-wing media has been able to convince millions of Americans that the government knows what’s best for families, not the parents.”[60]

O’Reilly strongly condemns doctors who provide legal abortion services. Since 2005, he has repeatedly referred to physician and abortion doctor George Tiller as “Tiller the baby killer” on his Fox News prime time show, claiming that there must be “a special place in hell” for him. In May 2009, Tiller was murdered by anti-abortion gunman Scott Roeder.[61]

O’Reilly ardently condemns the practice of partial birth abortion. He has criticized the practice being done without explanations being made and has criticized human rights groups such as Amnesty International and Human Rights Watch for not condemning the practice:

Once again, this isn’t about a women’s [sic] right to choose or the New York Times plea for reproductive rights. This is about late term abortions for just about any reason.[62]

Education

O’Reilly supports the discussion (but not the advocation) of intelligent design in schools and considers the opinion of the National Academy of Sciences and the American Association for the Advancement of Science‘s opposition to such theories “fascist”.[63] O’Reilly has also suggested that Richard Dawkins‘ argument for how science should be taught in school is equivalent to fascism.[64] He said he supports teachers saying that some people, especially in religious groups, believe that Charles Darwin‘s theory of evolution is wrong.

O’Reilly has said that there is a lack of leadership among the traditionalists and this has emboldened the secular-progressive cause. He consistently says that using religion to justify public policy is wrong:

Right now, religious people are the ones speaking out for traditional values. But America does not forge public policy based on religion. Thus as soon as God enters the debate, the secularists win.[65]

Gun rights

O’Reilly supports some forms of gun control, such as gun registration.[66][67]

Health care

O’Reilly opposed the nationalizedhealth care plan that filmmaker Michael Moore argues for in his film Sicko, saying it would create huge backlogs. He also said, however, that he thinks the government should perform more oversight functions on health care:

…[G]overnment-run health care would be a disaster, featuring long waits for treatment and an enormous rise in taxation. But there should be government oversight on private insurance companies and strict guidelines about abusing customers. There can be compromise and effective government control of medical care abuse in the USA. It is possible. But if Michael Moore’s plan ever gets traction, pray hard you never get sick.[68]

LGBT issues

O’Reilly’s stance on LGBT issues has been evolving.

On October 27, 2004, he was quoted saying: “I’ve been saying that all along, that if you open the door for gay marriage, then you have to have the polygamists and the triads and the commune people and everybody else, right?”[69]

O’Reilly supports civil unions for gay and lesbian couples, but has said that nobody has the “right” to marry; he says that marriage, like driving a car, is a privilege, not a right. He has said that if the government felt marriage was a right, then it would not stop polygamists and incestuous couples from marrying.[70] O’Reilly further explained his position in his book Culture Warrior:

To this culture warrior, gay marriage is not a vital issue. I don’t believe the republic will collapse if Larry marries Brendan. However, it is clear that most Americans want heterosexual marriage to maintain its special place in American society. And as long as gays are not penalized in the civil arena, I think the folks should make the call at the ballot box. Traditional marriage is widely seen as a social stabilizer, and I believe that is true.[71]

On March 26, 2013, O’Reilly stated “I support civil unions, I always have. The gay marriage thing, I don’t feel that strongly about it one way or the other. I think the states should do it.” O’Reilly then said, “The compelling argument is on the side of homosexuals … ‘We’re Americans, we just want to be treated like everybody else.’ That’s a compelling argument, and to deny that you’ve got to have a very strong argument on the other side. And the other side hasn’t been able to do anything but thump the Bible.[72]

O’Reilly discussed a story surrounding around a teenage lesbian couple being elected as the “cutest couple” in their school yearbook. He stated that he believed that this couple was elected by the students to “tweak the adults” and to “cause trouble”. He explains further here:

High school kids, they experiment. They experiment all over the place, they have a chip on their shoulder. They do things just to get a reaction, just to rebel. Parents might say “We don’t want to normalize homosexuality in a public way in an academic setting among minors. We don’t think that reflects how we feel about it”.[73]

O’Reilly is known to favor adoption by a same-sex couple since 2002.[74]

O’Reilly is opposed to the School Success and Opportunity Act (Assembly Bill 1266), which extends gender identity and expression discrimination protection to transgender and gender-nonconforming K-12 students in public schools. O’Reilly described the law as “madness” and “anarchy” on Fox News Channel.[75]

Just before the repeal of the “Don’t Ask, Don’t Tell” law banning homosexuals from serving in the military, he appeared on the Tonight Show and called the law “nonsense” and said he didn’t understand why the President, in his role as commander in chief of the armed forces, simply didn’t sign an executive order rescinding it.

US legal system

He regularly criticizes jurists in controversial cases as “activist judges.” He uses the issue of gay marriage as an example. “The folks decide that by voting and, in the case of gay marriage, the folks have decided. And that decision should be respected.”[76]

He has suggested convicted rapists, mass murderers, terrorists, and other people who commit crimes against humanity be sent to a gulag style prison in Alaska with strict rules and minimal privileges. He has said this would serve as a replacement for the death penalty, to which he is opposed.[77]

Jessica’s Law

O’Reilly is a self-professed proponent of stricter penalties for child molesters. He has fervently supported Jessica’s Law,[78] and criticized the law’s detractors.[79] He has given verbal support for Republican Doug Forrester in the 2005 New Jersey gubernatorial election, suggesting that his opponent, Democrat Jon Corzine, would be less likely to support a national version of the law, though stopped short of actually endorsing Forrester.[80]

O’Reilly has been particularly critical of the Debra LaFave case, in which she was convicted of having sex with a 14-year-old boy, but was only sentenced to house arrest and seven years probation.[81]

He criticizes many politicians who oppose mandatory minimum sentences for child molesters, and calls several states “child predator-friendly.”[81]

Entertainment media

Film industry

O’Reilly has been very critical of the U.S. film industry for producing films featuring violence and human suffering, such as the Saw series. He has compared this to the brutal displays of death in the Colosseums of ancient Rome.[82] O’Reilly has said that films like these are marketed to children and can have consequences on their personal development. He commented on Kill Bill: Volume 1:

It’s the most violent movie ever made, featuring brutal dismemberments and a scalping close-up. And you should see the raves this movie is getting from the pinhead critics. And who’s lining up to see it? Children, that’s who.[83]

O’Reilly severely chastized billionaire Mark Cuban, owner of the Dallas Mavericks, for his support of Brian De Palma‘s film Redacted that portrayed the rape of an Iraqi girl by American soldiers. O’Reilly claimed that the film would be used as a recruiting tool by terrorists.[84]

Music industry

O’Reilly has criticized the rap and hip hop industry for promoting an “anti-social” culture. He has said he does not care if adults listen to the music, but argues that children are not able to process the information and determine it to be destructive behavior. He has gone after several rappers such as 50 Cent, Jay Z, Jadakiss, Eminem, Lupe Fiasco, Nas, Ludacris, Lil Wayne, Common, Nelly, Snoop Dogg, and Young Jeezy:

Every educator that I’ve talked to, and I’ve talked to hundreds, say that the kind of gangsta rap that Ludacris traffics in has debased the culture, made it more difficult for them to teach children and indeed, led children into anti-social behavior.[85]

In 2007, O’Reilly had a dispute with Nas after the rapper was hired to play a concert at Virginia Tech one year after the school had experienced the Virginia Tech massacre. “Having a rapper who trades in violence perform at Virginia Tech insults the victims, the university and the entire commonwealth,” declared Bill O’Reilly.[86]Nas subsequently called Bill O’Reilly a racist, and accused O’Reilly of going to extremes for publicity. He repeated this stance again in July 2008, when a dispute between Nas and O’Reilly led to Nas taking a petition to Fox News, and appearing on both Fox News, and the The Colbert Report. Also in 2008, Nas challenged Bill O’Reilly to a public debate, to which O’Reilly did not accept.

In May 2015, O’Reilly blamed the decline of American religion particularly the declining numbers of American Christians on hip hop music citing the genre as “pernicious entertainment” and an adducing factor for contributing to the decline. O’Reilly remarked that people of faith are being marginalized by a secular media and pernicious entertainment and rap industry often glorifies depraved behavior causing the minds of people who consume the music as the least likely to reject religion.”[87] American rapper Killer Mike subsequently criticized him for his remarks calling O’Reilly “full of s**t than an outhouse” and then mocked him while he was a guest Real Time with Bill Maher.[88]

Several rappers and hip hop producers have appeared on The O’Reilly Factor. Rapper Cam’ron and hip hop entrepreneur Damon Dash appeared on the program to defend their supposed corruption of young people, to which Damon Dash responded:

So, if you know there is negative in something, try to find the positive as opposed to always talking about the negative. That’s the thing I don’t understand, why we’re criticized so hard within hip-hop. No one talks about the jobs we create, no one talks about the things we do within our community, and no one talks about the businesses we’ve done, how we’ve opened the doors and shown people that it’s cool to be smart, it’s cool to be a CEO, and it’s cool to not take advantage but to reap the benefits of all your labor and to do it fairly.[89]

Bill O’Reilly has also interviewed Marilyn Manson on the topic of being a “dangerous” influence on U.S. youth. O’Reilly asked Manson if he thought his work encouraged kids to have sex, homosexuality, use drugs and profanity. He also asked Manson whether his songs encouraged suicide or not. Marilyn Manson answered that in his view the songs were about getting through those feelings, and that ultimately people make their own decisions.[90]

News media

O’Reilly believes the American news media is corrupt and often criticizes it for not reporting topics that hurt the liberal agenda. He has often stated that he is the only one in the media holding people accountable on both sides. In June 2007, Adweek Magazine sponsored a survey that asked participants who they trusted more as a source of political information between ABC News and O’Reilly. According to the poll, 36 percent believe that O’Reilly is a better source than ABC News, while 26 percent believe the opposite. According to the survey, 23 percent of Democrats believed that O’Reilly was a better source while 55 percent of Republicans believed the same.[91]

O’Reilly has criticized the media for not highlighting Rosie O’Donnell‘s controversial remarks saying the United States attacked itself on September 11th while they highlighted Ann Coulter‘s remarks about calling Senator John Edwards a “fag.” O’Reilly said in response to the situation:

Doing the math, Ms. O’Donnell says something 100 times more offensive than Ms. Coulter, in my opinion, yet there’s no coverage about it. But there’s no left wing media bias in this country. Oh no![92]

O’Reilly has criticized journalists who donate to political parties after a report stated that nine out of 10 journalists donated to Democrats or liberal causes; he has said this has resulted in news media tilting to the left.[93]

O’Reilly says that news coverage about positive improvements for American and Iraqi objectives in Iraq have been largely ignored. He conjectured that the ignoring of the positive news took place to help a Democrat win a presidential election.[94]

O’Reilly has asked his viewers and listeners to not patronize the following media outfits, saying those organizations “have regularly helped distribute defamatory, false or non-newsworthy information supplied by far-left websites”:[95]

Television news

In an interview with commentator Bill Maher, former CBS News anchor Dan Rather accused Fox News Channel of receiving “talking points” from the Republican controlledWhite House. O’Reilly criticized Rather heavily, responding that Rather did not offer any evidence to support the claim. O’Reilly cited his defense of Rather during the Memogate incident:

As you may remember, I defended Rather in the Bush National Guard debacle. I said Rather did not intentionally put on a bogus story. He just didn’t check it out, he was too anxious for the story to be true.

Now many of you criticized me for that defense, but I’m a fact-based guy. And there’s no evidence Dan Rather fabricated anything. It was sloppy reporting that did him in.

But now the fabrication word is in play again. If Dan Rather has evidence of White House dictums coming to FOX News employees, he needs to display that evidence. We are awaiting his appearance. We’ll let you know when it is.[96]

O’Reilly has gone after PBS personality Bill Moyers. O’Reilly criticized Moyers for having no balance in his presentations, citing a criticism by PBS’ own ombudsman. He also called Moyers dishonest for making disparaging remarks about O’Reilly to Rolling Stone and then later denying he made the remarks when confronted by one of O’Reilly’s producers.[97]

CNN journalists were prominent among those critical of O’Reilly when he stated that he “couldn’t get over the fact” that a largely African-American crowd at a Harlem restaurant behaved no differently than patrons of a white restaurant and garnered media coverage O’Reilly objected to CNN’s portrayal of his commentary, stating that CNN had been irresponsible in mischaracterizing his remark as racist, when in fact, he said, he was actually speaking against racism.[98]

O’Reilly scolded MSNBC and CNN for not providing coverage of the ceremony that awarded Lieutenant Michael P. Murphy the Medal of Honor during their primetime shows. O’Reilly said that “[O]n their prime-time broadcast last night, CNN and MSNBC just said no to Lieutenant Michael Murphy and his proud family,” that the networks “despise the Bush administration and believe anything positive like American heroes in war zones, detract from their negative assessment of the administration” and that they should not claim to support the troops and ignore their heroism.[99] MSNBC and CNN had covered the events during their daytime programs.[100][101]

NBC News and MSNBC

O’Reilly has criticized NBC News and their affiliated cable service MSNBC several times for their coverage of the war in Iraq, claiming that it is biased toward the war’s opponents.[102][103] He later called NBC News the most “anti-military news operation in the country,” when he cited an example of NBC correspondent William Arkin that called American troops “mercenaries.”[84]

He also criticized the network of trying to downplay the War on Terror in the wake of American casualties in Iraq.[104]

Robert Greenwald, who had directed the controversial documentary Outfoxed that criticized O’Reilly and the Fox News Channel, put together an event of homeless veterans criticizing O’Reilly for calling John Edwards dishonest when Edwards asserted that there were about 200,000 homeless veterans. O’Reilly denied Edwards claim, stating “They may be out there, but there are not many of them out there, OK. So if you know where there is a veteran sleeping under a bridge, you call me immediately, and we will make sure that man does not do it.”[105] After government statistics supported Edwards[citation needed], O’Reilly then said that there was no linkage between the economy and homeless veterans and claims that Veterans Affairs has up to 150,000 beds ready for them every night.[106] O’Reilly felt Greenwald’s event was a “contrived” situation after O’Reilly’s producers had interviewed some of the homeless veterans whom were protesting and found out that some did not actually hear O’Reilly’s comments. O’Reilly blasted NBC’s Steve Capus and the New York Daily News for covering the event and claimed that Capus did not know about the nature of the event.[107]

O’Reilly called NBC hypocritical for putting supporters of legalizing prostitution in the wake of Democratic Governor of New YorkEliot Spitzer resigning his post after allegedly engaging in the act in an effort and felt they would not be as defensive if a Republican had gotten in trouble.[108]

Although he praised the late Meet the Press host Tim Russert in the past,[109] O’Reilly criticized Russert for what he saw as a misinterpretation of what were seen as potentially racially insensitive comments by former President Bill Clinton. In his comments, Russert challenged Senator Hillary Clinton about her husband’s remarks regarding Senator Barack Obama, when Mr. Clinton referred to Obama’s position on Iraq as a “fairy tale.” O’Reilly said that Russert “should have known better” and realized the former President’s comments were regarding Obama’s Iraq policy and not his entire candidacy.[110]

Tape doctoring incidents

O’Reilly would join in the criticism of others when NBC News was found to have doctored tapes on multiple occasions. The first was about accused killer George Zimmerman that portrayed Zimmerman as having a racial motivation.[111] He also criticized veteran news correspondent Andrea Mitchell for her reporting of a doctored tape of Mitt Romney to portray him as out of touch.[112] After the Sandy Hook Shooting, O’Reilly and others criticized MSNBC’s Martin Bashir of dishonesty when Bashir only played a part of the entire tape that portrayed the father of a victim being heckled when the entire tape showed the audience only saying something after he made it clear he was looking for an answer.[111] O’Reilly criticized MSNBC host Rachel Maddow showed a tape of Senator John McCain portraying him as insensitive to the plight of a person who lost a family member to gun violence. Although Maddow did readily admit the tape may have been doctored, O’Reilly criticized her nonetheless for airing it knowing that it could have been edited.[113]

Press

O’Reilly has accused the print press of purposely misquoting him and using their hard news pages to further their editorial points of view. He has said that print media is too liberal and attacks opposing viewpoints.[114]

In 2003, O’Reilly criticized the Los Angeles Times for endorsing then-governor Gray Davis, who was running against Arnold Schwarzenegger and a whole field of different candidates, including Republicans, Democrats and Independents, in a recall election. He said that he “has never seen a newspaper try to destroy someone as aggressively as the Times is doing.” He also criticized The New York Times on the same issue for referring to Schwarzenegger solely as a bodybuilder. He made the claim that Californians have canceled their subscriptions due to the “extreme left-wing bias” of the newspaper.[115]

O’Reilly has accused the media of being hypercritical of President Bush’s handling of North Korea and Iran pursuing nuclear weapons while not being critical of President Bill Clinton for what was the same course of action.[116]

The New York Times

O’Reilly frequently criticizes The New York Times, accusing them of omitting information that would be damaging to left-wing organizations and causes.[117]

On March 15, 2007, The New York Times ran an editorial titled “Immigration Misery” that had claimed a “screaming baby girl has been forcibly weaned from breast milk and taken dehydrated to an emergency room so that the nation’s borders will be secure.” Upon further investigation, the only two babies admitted to the hospital in the area of Bedford, Massachusetts (where the raid took place) were due to dehydration because of pneumonia and not as a result of being “forcibly weaned.” O’Reilly alleged that the information in the editorial was falsified and claimed The Times wanted to promote illegal immigration in order to make the illegal immigrants into legal US citizens and register them as Democrats.[118]

He accused The Times of promoting NBC News over ABC News.[119]

On June 2, 2007, Homeland Security stopped a plot by four terror suspects thought to be linked to Al Qaeda. Authorities have alleged that the suspects were trying to blow up an oil pipeline in the Howard Beach section of New York City that carries jet fuel to JFK Airport. O’Reilly went on his program and told his listeners that he expected The Times to report it as a featured story on its Sunday edition for June 3, but found that the story was on page 37[citation needed]. A story that occupied the front page talked about brick laying in India. O’Reilly accused the newspaper of burying the story not to highlight a successful foiled terror plot because it contradicts the paper’s editorial point of view.[104] O’Reilly claims that as polls show most Americans feel Republicans would do a better job of handling a terrorist threat than Democrats, The Times intentionally gave the news less exposure in hopes of influencing their readers’ focus away from issues that Democrats tend to poll weaker than Republicans in.[120] O’Reilly has also said that the paper would highlight any terrorist attack if one was to occur so they may criticize the Bush Administration:

So The Times wins both ways. The paper diminishes the War on Terror by putting it on page 37, but if something bad ever happened, it can attack President Bush.[121]

O’Reilly has accused the paper of being deceptive about television ratings for The O’Reilly Factor against that of MSNBC during the same time slot, citing that the paper felt that MSNBC was “competitive” with his program when O’Reilly’s ratings were significantly higher.[122]

O’Reilly has questioned the paper’s interpretation of violence statistics among veterans of the military. His contention is that the paper is out to disparage the military as being overly violent after returning home from deployment in the War on Terror.[123]

O’Reilly criticized the paper for running an article alleging Senator John McCain had an “inappropriate relationship” during the lobbyist controversy story the paper had. O’Reilly raised the question about why the paper had endorsed McCain on January 25, 2008 for the Republican nomination if they had information that alleged an inappropriate relationship.[124]

In May 2009, O’Reilly severely criticized the paper as “corrupt” for dropping a story about a possible violation of campaign laws by ACORN and the Obama campaign. O’Reilly claimed that sworn testimony before Congress by a former ACORN employee, Anita Moncrief corroborated the story. O’Reilly stated:

Strong evidence suggests the paper killed a story linking ACORN to some Obama people. Instead they ran a general piece stating ACORN has a left-wing bias, knowing that story would be largely ignored while the Obama connection would not be.[125]

In response, the New York Times ombudsman, Clark Hoyt stated it “was a normal and reasonable editorial decision” not to run the article. He said the Times had run four other stories on ACORN. The story in question had remained unpublished because Anita Moncrief had not provided independently verifiable proof. In addition, The Times ombudsman stated that Moncrief had not given sworn testimony to Congress as claimed by O’Reilly, and that she had credibility problems, having been fired from Acorn for employee theft.[126]

Internet medi

O’Reilly has accused a few liberal political websites of “distorting the truth” and “engaging in hatred”:

There are no rules. These people will do and say pretty much anything to harm people with whom they disagree politically. The trend started back in the ClintonLewinsky days, and now thousands of bloggers are operating, throwing dirt all over the place. Now they’re not all bad. Some of these bloggers are good, accurate watchdogs. But there are plenty of awful ones.[127]

He has criticized the Daily Kos website, accusing it of calling for increased attacks upon American troops in Iraq, and for Iran to attack Israel. O’Reilly has also alleged that Daily Kos bloggers have called the Pope a primate and evangelicals “nut cases”, that they wish for the success of any subsequent attempts at the assassination of Vice President Dick Cheney after he avoided an attempt on his life in Afghanistan during a 2007 visit, and have said that the world is “better off” without White House Press SecretaryTony Snow when Snow publicly said he had cancer.[128]

In summer of 2007, O’Reilly said that the entire field of 2008 Democratic Presidential Candidates (aside from Senator Joseph Biden) went to the Yearly Kos convention that was sponsored by the Daily Kos. He has said that sites like the Kos are taking control of the Democratic Party through intimidation:

As we have been reporting, a group of far-left bloggers has succeeded in frightening most of the Democratic presidential candidates and moving the party significantly to the left, at least in the primary season. The lead intimidators are MoveOn, Media Matters and the vicious Daily Kos. These people savagely attack those with whom they disagree. And the politicians don’t want to become smear targets. So most of the Democratic candidates have agreed to speak at the Kos convention this coming weekend, something that is beyond shameful.[129]

O’Reilly has compared the Huffington Post to the Nazis and the KKK. He also called MoveOn.org the “new Klan.” In response, Arianna Huffington wrote that O’Reilly had confused bloggers with anonymous commentors and suggested he enroll in “How to Use the Internet 101.”[130] Huffington alleged that offensive comments are taken down from her site when confronted by one of O’Reilly’s producers. She also noted that offensive comments are posted by users of O’Reilly’s own site, billoreilly.com.[131] O’Reilly alleged that Huffington had no standards of conduct and did not remove comments about wishing Nancy Reagan had died after she fell that were written on her site. “She says it is down, but it is not. She does not tell the truth.”[132] O’Reilly later alleged that Huffington implied Pope Benedict XVI was a Nazi.[133] O’Reilly referred to a satirical article written by comedian Chris Kelly, which mocked O’Reilly on Huffington’s website.[134]

Environmental issues

O’Reilly generally supports the notion of a clean environment, although he has said that he is not entirely certain that fossil fuels are the cause of global warming. Nonetheless, he has expressed support for a long-term strategy to curb fossil fuel use. He has said he would not support the Kyoto Treaty for economic reasons, but supports the use of fewer polluting agents, more conservation, and “tons more innovation” such as tax credits for alternative fuels.[135] He has said that renewable energy is a waste of time because “God controls the climate” and that “nobody can control the climate except God, so give a little extra at mass”.[136]

Economic views

O’Reilly is a frequent critic of government welfare and poverty programs. He is also critical of the estate tax. However, he does not differentiate between the marginal tax rate (46 percent) and the effective tax rate (roughly nine percent ).[137]

O’Reilly has said French unemployment and subsequent riots are the “common effects of socialist thinking”. He claims the French unemployment rate is high because of entitlements sanctioned by the French government, and that these entitlements make employers hesitant to hire young employees for fear that they will be required to give benefits to underperforming workers.[138]

He says he supports income-based affirmative action as opposed to race-related affirmative action.[139]

Trade with hostile countries

O’Reilly has been critical of companies doing business with countries that are hostile to the United States. O’Reilly criticized General Electric for doing business with Iran. O’Reilly cited how NBC News‘ correspondent John Hockenberry did a report on Dateline highlighting GE’s business relationship with the Bin Laden family and was criticized by the company, who owns NBC, for the Dateline report.[140]

Free markets, profits, and the oil companies

O’Reilly questions the free market by suggesting that the oil companies need an excuse to raise prices thereby overlooking the fact that in a free market, oil companies have the right to increase prices so as to increase profits or for any other reason. Rather than praise oil companies for their record profits, O’Reilly has been critical of oil companies, claiming their record profits are evidence that they have price-gouged Americans with artificially high gas prices.[141] and has said he is personally boycotting products by Exxon-Mobil.[142] It therefore appears that O’Reilly does not recognize profit maximization as a virtue. He has often taken an opposing point of view to conservatives such as fellow Fox News analyst and commentator, Neil Cavuto.[141] During one discussion on The O’Reilly Factor, Cavuto accused O’Reilly of “push[ing] populist nonsense.”[143] He said blocking Brazilian ethanol imports was “awful” and has criticized both the Bush Administration and the Clinton Administration for not doing enough to stem the cost of oil from “foreign predators”.[142]

Protectionism

In a May 8, 2006 article published at the Jewish World Review, O’Reilly said, “There is no question that illegal workers deliver more profit to business than American workers do. A Harvard study says that the employment of illegal foreign workers has driven down wages among American high school dropouts, the lowest labor pool rung, by 7 percent.”[144]

Idyllic civilization

Bill O’Reilly on his show The O’Reilly Factor has expressed the view that “if everybody followed the teachings of Jesus Christ, […] we’d have peace on earth, […] everybody would love one another, and we’d almost be an idyllic civilization.”[145]

Ethanol

O’Reilly claims that the United States is not doing enough to make itself independent of foreign oil, stating that “There’s no way the ethanol industry could be dominated by five mega-companies. I mean corn and sugar cannot be carteled. The oil racket is simple: We control the marketplace, and you have to buy from us. … If Brazil can develop an ethanol industry that makes it completely independent of foreign oil, then the USA can.”[144]

https://en.wikipedia.org/wiki/Political_views_of_Bill_O%27Reilly

Story 2: Totalitarians of Lying Lunatic Left Attempt to Suppress Speech of Conservatives, Libertarians, and Classical Liberals — Nothing New — Go On Offense And Attack The Collectivist Totalitarians — Battle For Berkeley — Berkeley Protesters Take the Pepsi Challenge — Why the Right Won — Chief of Police Orders Berkeley Police To Stand Down — Videos

Image result for media matters david brock Image result for media matters and bill o'rielly

Image result for media matters and bill o'rielly

Image result for cartoons on george sorosImage result for cartoons on george sorosImage result for berkely april 15, 2017Image result for berkely april 15, 2017Image result for berkely april 15, 2017Image result for berkely april 15, 2017Image result for cartoons berkely april 15, 2017Image result for berkely april 15, 2017Image result for cartoons berkely april 15, 2017Image result for berkely april 15, 2017Image result for cartoons berkely april 15, 2017Image result for berkely april 15, 2017

Does Free Speech Offend You?

Ben Shapiro on Free Speech, College Campuses, and The Regressive Left

Ben Shapiro – Practical Tactics For Fighting The Left

UC Berkley Must Be Disciplined For Furthering Leftist Violence Against Conservatives

Amid Mounting Controversy, Media Matters Says It’s Time for Bill OReilly to Go | Cheddar

HIDDEN CAM: Media Matters Brags About Sabotaging Roger Stone

Published on Oct 28, 2016

Project Veritas Action has released the sixth video in a multi-part series that is sending shockwaves through the DNC and the Clinton campaign. In a new video released by Project Veritas Action, a PVA journalist exposes how his pay for play with Robert Creamer landed him a meeting with Bradley Beychock, the President of Media Matters For America, an organization that has been attacking James O’Keefe for years.

During the meeting, Beychock gave the PVA journalist a tour of their offices. He also proudly boasted about the Media Matters assault on conservative writer and political consultant Roger Stone.

Battle of Berkeley: Why the Right Won

Published on Apr 17, 2017

Berkeley erupted into political violence on April 15th, 2017, with leftwing radicals attacking the Freedom Rally hosted by Trump supporters. The Antifa thugs were roundly defeated by the Freedom Rally attendees, but where did this violence start? I discuss the events that lead up to this day and uncover the progression of leftwing violence that’s destroying a city that once celebrated free speech.

Lauren Southern And The Madness Behind The Battle Of Berkeley

THE BEAUTIFUL LAUREN SOUTHERN; ProudBoys and Some Ugly Antifa

The Battle of Berkeley in 81 seconds

Berkeley Protesters Take the Pepsi Challenge

Battle of Berkeley 3 FULL DAY[ANTIFA Vs FREE SPEECH PROTESTERS]Patriots Day Rally Ft. Based Stickman

Trump Supporters chase Antifa down the street at FREE SPEECH Rally in Berkeley

Battle of Berkeley 3 as Antifa circled the park

2017 The Battle for Berkeley LARP!

Patriot’s Day Riot in the Streets

UC Berkeley Cancels Coulter Appearance Over Security Concerns

Conservative Commentator Ann Coulter To Speak At UC Berkeley

Ben Shapiro interviews Ann Coulter; Adios America; 7/13/2015; C-Span

UC Berkeley Presses Campus Republicans To Cancel Another Conservative Speaker

WARNING:TRUMP SUPPORTERS ATTACKED AT BERKELEY BY ANTI TRUMP PROTESTERS

Free Speech Battle For Berkeley, California! | Lauren Southern and Stefan Molyneux

Berkeley Mayor Connected to Antifa

Tucker Carlson Has UC Berkeley Protest Leader Yvette Felarca Explain Fascism

Lauren Southern Coverage of Antifa vs Trump Supporters Battle

Berkeley April 15,Based stick man Antifa smashing

ANTIFA VS America Compilation

Antifa Reddit Admits They Lost Berkeley Battle with Trump Supporters

Berkeley April 15,BAMN leader Yvette Felarca assaults patriots

Berkeley Leftists Riot Against Milo (Mini Documentary: Arrest Yvette Felarca Part 2)

Handicap Senior Citizen U.S Military Vet Stands Up & Cucks Antifa

Is It Wrong To Bash Antifa Leftist Scum?

Berkeley Police Refuse To Stop the Riots – When Told People are Being Beaten, Officer Says “…and?”

Steyn: Media annoyed someone has outfaked their fake news

BILL O’REILLY EXPOSES GEORGE SOROS

EXPOSED : George Soros Owned Media Matters Sabotages Pro Trump Media

George Soros Lost Interview Compilation – Left Wing Oligarch

George Soros exposed!

George Soros Warns The World About Fox News And How Dangerous IT Really Is

George Soros, Puppet Master

Mark Levin: Media Matters is “A Criminal Enterprise”!

Andrew Breitbart — Media War

Thomas Sowell — Dismantling America

TAKE IT TO THE LIMITS: Milton Friedman on Libertarianism

Andrew Breitbart Predicted and Warned us about George Soro’s Media Matters Controlling our Media

One World Government & Collectivism – G. Edward Griffin

The Quigley Formula – G. Edward Griffin lecture

The Mainstream Media Are Enemies of Freedom, Agents of Tyranny and Must Be Overthrown

Super rich are in a conspiracy to rule the world – G. Edward Griffin – 2007

Antifa and Conservatives Throw Down At ‘Battle Of Berkeley’…

battle of berkeley
In the course of history, there have been many great battles. Thermopylae. Gettysburg. Tupac and Biggie. The forces of good and douchebag have long utilized beating the crap out of each other to resolve their grievances. Well, last weekend, yet another battle was had. Conservative and leftist blood alike was shed at what shall henceforth be referred to as the Battle of Berkeley

For the third time this year, Trump supporters and Antifa clashed on the streets of Berkeley, California. The two forces met Saturday during the pro-Trump Patriot Day rally.

Berkeley Police have arrested at least 15 people this morning and afternoon, after antifascists met Trump supporters at a pro-Trump rally. Police attempted to maintain order with poles and fence mesh, but the barriers did not stop the two sides from violently engaging.

Trump supporters had organized a Patriot Day rally, starring Lauren Southern, a former reporter for conservative Canadian outlet The Rebel Media and Kyle Chapman, a man who achieved internet stardom as “Based Stickman” after assaulting a member of Antifa with a stick at the March 4 scuffle in Berkeley, among others.

Berkeley police have confiscated banned items such as knives, flagpoles, and sticks used as weapons.

https://www.louderwithcrowder.com/antifa-conservatives-battle-of-berkeley/

The Pronk Pops Show Podcasts Portfolio

Listen To Pronk Pops Podcast or Download Shows 870-876

Listen To Pronk Pops Podcast or Download Shows 864-869

Listen To Pronk Pops Podcast or Download Shows 857-863

Listen To Pronk Pops Podcast or Download Shows 850-856

Listen To Pronk Pops Podcast or Download Shows 845-849

Listen To Pronk Pops Podcast or Download Shows 840-844

Listen To Pronk Pops Podcast or Download Shows 833-839

Listen To Pronk Pops Podcast or Download Shows 827-832

Listen To Pronk Pops Podcast or Download Shows 821-826

Listen To Pronk Pops Podcast or Download Shows 815-820

Listen To Pronk Pops Podcast or Download Shows 806-814

Listen To Pronk Pops Podcast or Download Shows 800-805

Listen To Pronk Pops Podcast or Download Shows 793-799

Listen To Pronk Pops Podcast or Download Shows 785-792

Listen To Pronk Pops Podcast or Download Shows 777-784

Listen To Pronk Pops Podcast or Download Shows 769-776

Listen To Pronk Pops Podcast or Download Shows 759-768

Listen To Pronk Pops Podcast or Download Shows 751-758

Listen To Pronk Pops Podcast or Download Shows 745-750

Listen To Pronk Pops Podcast or Download Shows 738-744

Listen To Pronk Pops Podcast or Download Shows 732-737

Listen To Pronk Pops Podcast or Download Shows 727-731

Listen To Pronk Pops Podcast or Download Shows 720-726

Listen To Pronk Pops Podcast or DownloadShows 713-719

Listen To Pronk Pops Podcast or DownloadShows 705-712

Listen To Pronk Pops Podcast or Download Shows 695-704

Listen To Pronk Pops Podcast or Download Shows 685-694

Listen To Pronk Pops Podcast or Download Shows 675-684

Listen To Pronk Pops Podcast or Download Shows 668-674

Listen To Pronk Pops Podcast or Download Shows 660-667

Listen To Pronk Pops Podcast or Download Shows 651-659

Listen To Pronk Pops Podcast or Download Shows 644-650

Listen To Pronk Pops Podcast or Download Shows 637-643

Listen To Pronk Pops Podcast or Download Shows 629-636

Listen To Pronk Pops Podcast or Download Shows 617-628

Listen To Pronk Pops Podcast or Download Shows 608-616

Listen To Pronk Pops Podcast or Download Shows 599-607

Listen To Pronk Pops Podcast or Download Shows 590-598

Listen To Pronk Pops Podcast or Download Shows 585- 589

Listen To Pronk Pops Podcast or Download Shows 575-584

Listen To Pronk Pops Podcast or Download Shows 565-574

Listen To Pronk Pops Podcast or Download Shows 556-564

Listen To Pronk Pops Podcast or Download Shows 546-555

Listen To Pronk Pops Podcast or Download Shows 538-545

Listen To Pronk Pops Podcast or Download Shows 532-537

Listen To Pronk Pops Podcast or Download Shows 526-531

Listen To Pronk Pops Podcast or Download Shows 519-525

Listen To Pronk Pops Podcast or Download Shows 510-518

Listen To Pronk Pops Podcast or Download Shows 500-509

Listen To Pronk Pops Podcast or Download Shows 490-499

Listen To Pronk Pops Podcast or Download Shows 480-489

Listen To Pronk Pops Podcast or Download Shows 473-479

Listen To Pronk Pops Podcast or Download Shows 464-472

Listen To Pronk Pops Podcast or Download Shows 455-463

Listen To Pronk Pops Podcast or Download Shows 447-454

Listen To Pronk Pops Podcast or Download Shows 439-446

Listen To Pronk Pops Podcast or Download Shows 431-438

Listen To Pronk Pops Podcast or Download Shows 422-430

Listen To Pronk Pops Podcast or Download Shows 414-421

Listen To Pronk Pops Podcast or Download Shows 408-413

Listen To Pronk Pops Podcast or Download Shows 400-407

Listen To Pronk Pops Podcast or Download Shows 391-399

Listen To Pronk Pops Podcast or Download Shows 383-390

Listen To Pronk Pops Podcast or Download Shows 376-382

Listen To Pronk Pops Podcast or Download Shows 369-375

Listen To Pronk Pops Podcast or Download Shows 360-368

Listen To Pronk Pops Podcast or Download Shows 354-359

Listen To Pronk Pops Podcast or Download Shows 346-353

Listen To Pronk Pops Podcast or Download Shows 338-345

Listen To Pronk Pops Podcast or Download Shows 328-337

Listen To Pronk Pops Podcast or Download Shows 319-327

Listen To Pronk Pops Podcast or Download Shows 307-318

Listen To Pronk Pops Podcast or Download Shows 296-306

Listen To Pronk Pops Podcast or Download Shows 287-295

Listen To Pronk Pops Podcast or Download Shows 277-286

Listen To Pronk Pops Podcast or Download Shows 264-276

Listen To Pronk Pops Podcast or Download Shows 250-263

Listen To Pronk Pops Podcast or Download Shows 236-249

Listen To Pronk Pops Podcast or Download Shows 222-235

Listen To Pronk Pops Podcast or Download Shows 211-221

Listen To Pronk Pops Podcast or Download Shows 202-210

Listen To Pronk Pops Podcast or Download Shows 194-201

Listen To Pronk Pops Podcast or Download Shows 184-193

Listen To Pronk Pops Podcast or Download Shows 174-183

Listen To Pronk Pops Podcast or Download Shows 165-173

Listen To Pronk Pops Podcast or Download Shows 158-164

Listen To Pronk Pops Podcast or Download Shows151-157

Listen To Pronk Pops Podcast or Download Shows 143-150

Listen To Pronk Pops Podcast or Download Shows 135-142

Listen To Pronk Pops Podcast or Download Shows 131-134

Listen To Pronk Pops Podcast or Download Shows 124-130

Listen To Pronk Pops Podcast or Download Shows 121-123

Listen To Pronk Pops Podcast or Download Shows 118-120

Listen To Pronk Pops Podcast or Download Shows 113 -117

Listen To Pronk Pops Podcast or Download Show 112

Listen To Pronk Pops Podcast or Download Shows 108-111

Listen To Pronk Pops Podcast or Download Shows 106-108

Listen To Pronk Pops Podcast or Download Shows 104-105

Listen To Pronk Pops Podcast or Download Shows 101-103

Listen To Pronk Pops Podcast or Download Shows 98-100

Listen To Pronk Pops Podcast or Download Shows 94-97

Listen To Pronk Pops Podcast or Download Show 93

Listen To Pronk Pops Podcast or Download Show 92

Listen To Pronk Pops Podcast or Download Show 91

Listen To Pronk Pops Podcast or Download Shows 88-90

Listen To Pronk Pops Podcast or Download Shows 84-87

Listen To Pronk Pops Podcast or Download Shows 79-83

Listen To Pronk Pops Podcast or Download Shows 74-78

Listen To Pronk Pops Podcast or Download Shows 71-73

Listen To Pronk Pops Podcast or Download Shows 68-70

Listen To Pronk Pops Podcast or Download Shows 65-67

Listen To Pronk Pops Podcast or Download Shows 62-64

Listen To Pronk Pops Podcast or Download Shows 58-61

Listen To Pronk Pops Podcast or Download Shows 55-57

Listen To Pronk Pops Podcast or Download Shows 52-54

Listen To Pronk Pops Podcast or Download Shows 49-51

Listen To Pronk Pops Podcast or Download Shows 45-48

Listen To Pronk Pops Podcast or Download Shows 41-44

Listen To Pronk Pops Podcast or Download Shows 38-40

Listen To Pronk Pops Podcast or Download Shows 34-37

Listen To Pronk Pops Podcast or Download Shows 30-33

Listen To Pronk Pops Podcast or Download Shows 27-29

Listen To Pronk Pops Podcast or Download Shows 17-26

Listen To Pronk Pops Podcast or Download Shows 16-22

Listen To Pronk Pops Podcast or Download Shows 10-15

Listen To Pronk Pops Podcast or Download Shows 1-9

Read Full Post | Make a Comment ( None so far )

The Pronk Pops Show 866, April 3, 2017, Breaking News — Story 1: Obamagate Surveillance/Spying Scandal Spreading — Abuse of Power By Former National Security Adviser Susan Rice — Requested Revealing or Unmasking of American Citizen Identities Including Trump and Trump Campaign and Transition Teams For 7 Months (July 2016 – January 2017) — The Smoking Gun — What Did President Obama Know and When Did He Know It? — Videos — Story 2: Lying Lunatic Left Democratic National Committee Chair Tom Perez Cracks up — Trump Didn’t Win Election — Videos —

Posted on April 3, 2017. Filed under: American History, Blogroll, Breaking News, Communications, Congress, Constitutional Law, Corruption, Crime, Culture, Donald J. Trump, Donald J. Trump, Donald Trump, Donald Trump, Elections, Foreign Policy, Freedom of Speech, Government, Government Spending, High Crimes, Hillary Clinton, History, House of Representatives, Human, Illegal Immigration, Immigration, Language, Law, Legal Immigration, Life, News, Obama, Politics, Polls, President Barack Obama, President Trump, Presidential Appointments, Progressives, Radio, Raymond Thomas Pronk, Scandals, Senate, Trump Surveillance/Spying, United States of America, Videos | Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , |

Project_1

The Pronk Pops Show Podcasts

Pronk Pops Show 866: April 3, 2017

Pronk Pops Show 865: March 31, 2017

Pronk Pops Show 864: March 30, 2017

Pronk Pops Show 863: March 29, 2017

Pronk Pops Show 862: March 28, 2017

Pronk Pops Show 861: March 27, 2017

Pronk Pops Show 860: March 24, 2017

Pronk Pops Show 859: March 23, 2017

Pronk Pops Show 858: March 22, 2017

Pronk Pops Show 857: March 21, 2017

Pronk Pops Show 856: March 20, 2017

Pronk Pops Show 855: March 10, 2017

Pronk Pops Show 854: March 9, 2017

Pronk Pops Show 853: March 8, 2017

Pronk Pops Show 852: March 6, 2017

Pronk Pops Show 851: March 3, 2017

Pronk Pops Show 850: March 2, 2017

Pronk Pops Show 849: March 1, 2017

Pronk Pops Show 848: February 28, 2017

Pronk Pops Show 847: February 27, 2017

Pronk Pops Show 846: February 24, 2017

Pronk Pops Show 845: February 23, 2017

Pronk Pops Show 844: February 22, 2017

Pronk Pops Show 843: February 21, 2017

Pronk Pops Show 842: February 20, 2017

Pronk Pops Show 841: February 17, 2017

Pronk Pops Show 840: February 16, 2017

Pronk Pops Show 839: February 15, 2017

Pronk Pops Show 838: February 14, 2017

Pronk Pops Show 837: February 13, 2017

Pronk Pops Show 836: February 10, 2017

Pronk Pops Show 835: February 9, 2017

Pronk Pops Show 834: February 8, 2017

Pronk Pops Show 833: February 7, 2017

Pronk Pops Show 832: February 6, 2017

Pronk Pops Show 831: February 3, 2017

Pronk Pops Show 830: February 2, 2017

Pronk Pops Show 829: February 1, 2017

Pronk Pops Show 828: January 31, 2017

Pronk Pops Show 827: January 30, 2017

Pronk Pops Show 826: January 27, 2017

Pronk Pops Show 825: January 26, 2017

Pronk Pops Show 824: January 25, 2017

Pronk Pops Show 823: January 24, 2017

Pronk Pops Show 822: January 23, 2017

Pronk Pops Show 821: January 20, 2017

Pronk Pops Show 820: January 19, 2017

Pronk Pops Show 819: January 18, 2017

Pronk Pops Show 818: January 17, 2017

Pronk Pops Show 817: January 13, 2017

Pronk Pops Show 816: January 12, 2017

Pronk Pops Show 815: January 11, 2017

Pronk Pops Show 814: January 10, 2017

Pronk Pops Show 813: January 9, 2017

Breaking News — Story 1: Obamagate Surveillance/Spying Scandal Spreading — Abuse of Power By Former National Security Adviser Susan Rice — Requested Revealing or Unmasking of American Citizen Identities Including Trump and Trump Campaign and Transition Teams For 7 Months (July 2016 – January 2017) — The Smoking Gun — Videos — 

Image result for obama surveillance scandalImage result for obama surveillance scandal
Image result for dnc chair tom perez cartoonsImage result for dnc chair tom perez cartoons
Image result for obama surveillance scandalImage result for cartoons obama surveillance scandalImage result for cartoons obama surveillance scandalImage result for cartoons obama surveillance scandalImage result for cartoons obama surveillance scandal

Rice asked for Trump transition associates to be unmasked

Where does the Susan Rice story go from here?

Hume talks Supreme Court fight, Susan Rice revelations

Jennings: New surveillance details are ‘political bombshell’

Report: Obama adviser Susan Rice sought to unmask Trump associates

Susan Rice Requested Intel to Unmask Names of Trump Transition Officials

Obama’s SPY Susan Rice CAUGHT SPYING ON TRUMP and Trump’s Team said Rush Limbaugh

Furious AG Sessions: we will convict some people to make the leaking stop

Susan Rice Unmasked Trump Team, 1566

Published on Apr 3, 2017

This video is about Susan Rice Unmasked Trump Team, 1566

President Obama’s National Security Advisor, Susan Rice, deliberately unmasked President-Elect Donald Trump, and other incoming Trump officials, according to reporter Michael Chernovich.
Furthermore, Chernovich learned that New York Times reporter Maggie Haberman has had this story for at least 48 hours, and has chosen to sit on it in an effort to protect the reputation of Obama.
According to Chernovich:
“The White House Counsel’s office identified Rice as the person responsible for the unmasking after examining Rice’s document log requests.”
“The reports Rice requested to see are kept under tightly-controlled conditions. Each person must log her name before being granted access to them.”
According to Chernovich two other people close to Obama had authorization to unmask the names of Americans as well: CIA Director John Brennan and then-Attorney General Loretta Lynch.
Yesterday, Fox News announced that House Intelligence Committee Chairman Devin Nunes, R-Calif, knew who unmasked General Michael Flynn, saying that the person was:
“… very well known, very high up, very senior in the intelligence world.”
I had speculated that that person may have been Jeh Johnson, the former Director of Homeland Security. We will see in the morning if the Fox report confirms that it was indeed Susan Rice.
If it was Rice, that puts the source of this felonious conduct right at the door of former President Obama.

Susan Rice On Unmasking Of Trump Team, ‘I Know Nothing’

Multiple Felonies Committed By Obama Admin. Obama Surveillance on Trump.

Obama Official Admits They Were Surveilling Trump & His Team, Unmasking Names & Leaking Intel

Team Obama Gets Caught Committing Political Espionage, Spying on Trump & His Team

Susan Rice Reportedly “Unmasked” Trump in Incidental Data Collection

Trump Proven 100% Right about Obama Admin “Wiretapping”(Surveilling) Him & His Team

 Donald Trump’s Administration was Wiretapped | Rand Paul

Susan Rice, Ben Rhodes, John Brennan are suspects: James Comey Intelligence Hearing @ congressRand Paul Calls For Susan Rice To Testify On Unmasking Trump Officials

Susan Rice requested to unmask names of Trump transition officials, sources say

Multiple sources tell Fox News that Susan Rice, former national security adviser under then-President Barack Obama, requested to unmask the names of Trump transition officials caught up in surveillance.

The unmasked names, of people associated with Donald Trump, were then sent to all those at the National Security Council, some at the Defense Department, then-Director of National Intelligence James Clapper and then-CIA Director John Brennan – essentially, the officials at the top, including former Rice deputy Ben Rhodes.

The names were part of incidental electronic surveillance of candidate and President-elect Trump and people close to him, including family members, for up to a year before he took office.

It was not clear how Rice knew to ask for the names to be unmasked, but the question was being posed by the sources late Monday.

Such amazing reporting on unmasking and the crooked scheme against us by @foxandfriends. “Spied on before nomination.” The real story.

“What I know is this …  If the intelligence community professionals decide that there’s some value, national security, foreign policy or otherwise in unmasking someone, they will grant those requests,” former Obama State Department spokeswoman and Fox News contributor Marie Harf told Fox News’ Martha MacCallum on “The First 100 Days. “And we have seen no evidence … that there was partisan political notice behind this and we can’t say that unless there’s actual evidence to back that up.”

White House Press Secretary Sean Spicer, asked about the revelations at Monday’s briefing, declined to comment specifically on what role Rice may have played or officials’ motives.

“I’m not going to comment on this any further until [congressional] committees have come to a conclusion,” he said, while contrasting the media’s alleged “lack” of interest in these revelations with the intense coverage of suspected Trump-Russia links.

When names of Americans are incidentally collected, they are supposed to be masked, meaning the name or names are redacted from reports – whether it is international or domestic collection, unless it is an issue of national security, crime or if their security is threatened in any way. There are loopholes and ways to unmask through backchannels, but Americans are supposed to be protected from incidental collection. Sources told Fox News that in this case, they were not.

This comes in the wake of Evelyn Farkas’ television interview last month in which the former Obama deputy secretary of defense said in part: “I was urging my former colleagues and, frankly speaking, the people on the Hill – it was more actually aimed at telling the Hill people, get as much information as you can, get as much intelligence as you can, before President Obama leaves the administration.”

Meanwhile, Fox News also is told that House Intelligence Committee Chairman Devin Nunes knew about unmasking and leaking back in January, well before President Trump’s tweet in March alleging wiretapping.

Nunes has faced criticism from Democrats for viewing pertinent documents on White House grounds and announcing their contents to the press. But sources said “the intelligence agencies slow-rolled Nunes. He could have seen the logs at other places besides the White House SCIF [secure facility], but it had already been a few weeks. So he went to the White House because he could protect his sources and he could get to the logs.”

As the Obama administration left office, it also approved new rules that gave the NSA much broader powers by relaxing the rules about sharing intercepted personal communications and the ability to share those with 16 other intelligence agencies.

Rice is no stranger to controversy. As the U.S. Ambassador to the UN, she appeared on several Sunday news shows to defend the adminstration’s later debunked claim that the Sept. 11, 2012 attacks on a U.S. consulate in Libya was triggered by an Internet video.

Rice also told ABC News in 2014 that Army Sgt. Bowe Bergdahl “served the United States with honor and distinction” and that he “wasn’t simply a hostage; he was an American prisoner of war captured on the battlefield.”

Bergdahl is currently facing court-martial on charges of desertion and misbehavior before the enemy for allegedly walking off his post in Afghanistan.

http://www.foxnews.com/politics/2017/04/03/susan-rice-requested-to-unmask-names-trump-transition-officials-sources-say.html

JULIEGRACE BRUFKE,  Capitol Hill Reporter

GOP Kentucky Sen. Rand Paul said he believes former National Security Advisor Susan Rice should testify before Congress on her request to unmask the names of Trump transition officials collected during routine intelligence-gathering operations.

Paul argued the situation should not be downplayed, saying reforms need to be made to prevent individuals from being blackmailed on personal aspects of their lives through unmasking. He noted there was nothing stopping the former administration from looking through Trump officials and national security advisors’ conversations during the transition window.

“If it is allowed, we shouldn’t be allowing it, but I don’t think should just discount how big a deal it is that Susan Rice was looking at these,” he told reporters Monday. “And she needs to be asked, ‘Did President Obama ask her to do this? Was this a directive from President Obama?  I think she should testify under oath on this.”

Paul said he has long thought there are too many people with the ability to unmask individuals.

“The law says you can’t reverse target people, but how would you know that once you get inside the brain and the people that are unmasking people,” Paul continued. “So, what if I decided to unmask and I’m there and I only unmask the conversations of my Democrat opponents — shouldn’t there be more restrictions for unmasking people in the political process?”

He said he believes there should be two individuals at the top of the agency to allow for identities to be unmasked. Paul noted the process is indiscriminate, noting the United States previously captured every phone call in Italy for a month.

“Basically there’s no Fourth Amendment when you use these kinds of things, you go with a lower standard because we’ve got to protect the country and we don’t care about spying on foreigners,” he said, adding there are said to be millions of Americans caught up in the country’s foreign targeting.

Paul said the president did not bring up the matter on their golf trip Sunday, but he voiced his opinion on the matter.

http://dailycaller.com/2017/04/03/rand-paul-calls-for-susan-rice-to-testify-on-unmasking-trump-officials/#ixzz4dDyYjidj

Top Obama Adviser Sought Names of Trump Associates in Intel

By Eli Lake

APRIL 3, 2017 10:13 AM EDT

White House lawyers last month learned that the former national security adviser Susan Rice requested the identities of U.S. persons in raw intelligence reports on dozens of occasions that connect to the Donald Trump transition and campaign, according to U.S. officials familiar with the matter.

The pattern of Rice’s requests was discovered in a National Security Council review of the government’s policy on “unmasking” the identities of individuals in the U.S. who are not targets of electronic eavesdropping, but whose communications are collected incidentally. Normally those names are redacted from summaries of monitored conversations and appear in reports as something like “U.S. Person One.”

The National Security Council’s senior director for intelligence, Ezra Cohen-Watnick, was conducting the review, according to two U.S. officials who spoke with Bloomberg View on the condition of anonymity because they were not authorized to discuss it publicly. In February Cohen-Watnick discovered Rice’s multiple requests to unmask U.S. persons in intelligence reports that related to Trump transition activities. He brought this to the attention of the White House General Counsel’s office, who reviewed more of Rice’s requests and instructed him to end his own research into the unmasking policy.

The intelligence reports were summaries of monitored conversations — primarily between foreign officials discussing the Trump transition, but also in some cases direct contact between members of the Trump team and monitored foreign officials. One U.S. official familiar with the reports said they contained valuable political information on the Trump transition such as whom the Trump team was meeting, the views of Trump associates on foreign policy matters and plans for the incoming administration.

Rice did not respond to an email seeking comment on Monday morning. Her role in requesting the identities of Trump transition officials adds an important element to the dueling investigations surrounding the Trump White House since the president’s inauguration.

Both the House and Senate intelligence committees are probing any ties between Trump associates and a Russian influence operation against Hillary Clinton during the election. The chairman of the House intelligence committee, Representative Devin Nunes, is also investigating how the Obama White House kept tabs on the Trump transition after the election through unmasking the names of Trump associates incidentally collected in government eavesdropping of foreign officials.

Rice herself has not spoken directly on the issue of unmasking. Last month when she was asked on the “PBS NewsHour” about reports that Trump transition officials, including Trump himself, were swept up in incidental intelligence collection, Rice said: “I know nothing about this,” adding, “I was surprised to see reports from Chairman Nunes on that account today.”

Rice’s requests to unmask the names of Trump transition officials do not vindicate Trump’s own tweets from March 4 in which he accused Obama of illegally tapping Trump Tower. There remains no evidence to support that claim.

But Rice’s multiple requests to learn the identities of Trump officials discussed in intelligence reports during the transition period does highlight a longstanding concern for civil liberties advocates about U.S. surveillance programs. The standard for senior officials to learn the names of U.S. persons incidentally collected is that it must have some foreign intelligence value, a standard that can apply to almost anything. This suggests Rice’s unmasking requests were likely within the law.

The news about Rice also sheds light on the strange behavior of Nunes in the last two weeks. It emerged last week that he traveled to the White House last month, the night before he made an explosive allegation about Trump transition officials caught up in incidental surveillance. At the time he said he needed to go to the White House because the reports were only on a database for the executive branch. It now appears that he needed to view computer systems within the National Security Council that would include the logs of Rice’s requests to unmask U.S. persons.

The ranking Democrat on the committee Nunes chairs, Representative Adam Schiff, viewed these reports on Friday. In comments to the press over the weekend he declined to discuss the contents of these reports, but also said it was highly unusual for the reports to be shown only to Nunes and not himself and other members of the committee.

Indeed, much about this is highly unusual: if not how the surveillance was collected, then certainly how and why it was disseminated.

https://www.bloomberg.com/view/articles/2017-04-03/top-obama-adviser-sought-names-of-trump-associates-in-intel

White House logs indicate Susan Rice consumed unmasked intel on Trump associates

by Sara Carter and John Solomon

Computer logs that former President Obama’s team left behind in the White House indicate his national security adviser Susan Rice accessed numerous intelligence reports during Obama’s last seven months in office that contained National Security Agency intercepts involving Donald Trump and his associates, Circa has learned.

Intelligence sources said the logs discovered by National Security Council staff suggested Rice’s interest in the NSA materials, some of which included unmasked Americans’ identities, appeared to begin last July around the time Trump secured the GOP nomination and accelerated after Trump’s election in November launched a transition that continued through January.

The exact national security justifications for Rice accessing the reports isn’t clear and may require additional documentation that the House and Senate intelligence committees have requested from the NSA, America’s lead agency in spying on foreign powers.

Rice has not returned repeated calls for comment from Circa. But in an interview with PBS recently, she said she had no idea what House Intelligence Committee chairman Devin Nunes was talking about when he said Obama officials were monitoring Trump associates after the election.

Both the Republican chairman and Democratic vice chairman of the Housing Intelligence Committee have been shown the documents discovered by the NSC over the last 10 days.

But Circa reported last week that Obama opened the door for his political aides like Rice to more easily gain access to unmasked Americans’ names in NSA intercepts through a series of rule changes beginning in 2011.

http://circa.com/politics/accountability/white-house-logs-indicate-susan-rice-consumed-unmasked-intel-on-trump-associates

Obama adviser Ben Rhodes claims Obama didn’t spy on Americans — instantly receives brutal fact check

Chris Enloe

President Donald Trump took to Twitter early on Saturday to bash NBC News anchor Chuck Todd for reporting on the investigation into alleged collusion between Trump’s campaign and Russia instead of focusing on “Obama surveillance.”

Trump tweeted:

When will Sleepy Eyes Chuck Todd and @NBCNews start talking about the Obama SURVEILLANCE SCANDAL and stop with the Fake Trump/Russia story?

But Ben Rhodes, who served as a senior national security adviser for former President Barack Obama, took issue with Trump’s claim that the Obama administration surveyed him.

“There is no Obama SURVEILLANCE SCANDAL even when you capitalize the words,” he tweeted at Trump.

However, Twitter was quick to hit back at Rhodes, given the Obama administration’s record of surveillance — which isn’t the best. Under Obama’s leadership, domestic spying became a key issue after they were caught spying on journalists from the Associated Press and Fox News correspondent James Rosen.

The Obama administration was even forced to weather a massive NSA spying scandal after NSA contractor Edward Snowden leaked thousands of NSA documents, which revealed government collection programs like PRISM.

Needless to say, no one was buying Rhodes’ lies.

http://www.theblaze.com/news/2017/04/01/obama-adviser-ben-rhodes-claims-obama-didnt-spy-on-americans-instantly-receives-brutal-fact-check/

Global surveillance disclosures (2013–present)

From Wikipedia, the free encyclopedia
“Global surveillance disclosures” redirects here. For disclosures published before those of Edward Snowden, see Global surveillance disclosures (1970–2013).

Ongoing news reports in the international media have revealed operational details about the United States National Security Agency (NSA) and its international partners’ global surveillance[1] of foreign nationals and US citizens. The reports mostly emanate from a cache of top secret documents leaked by ex-NSA contractor Edward Snowden, which he obtained whilst working for Booz Allen Hamilton, one of the largest contractors for defense and intelligence in the United States.[2] In addition to a trove of US federal documents, Snowden’s cache reportedly contains thousands of Australian, British and Canadian intelligence files that he had accessed via the exclusive “Five Eyes” network. In June 2013, the first of Snowden’s documents were published simultaneously by The Washington Post and The Guardian, attracting considerable public attention.[3] The disclosure continued throughout 2013, and a small portion of the estimated full cache of documents was later published by other media outlets worldwide, most notably The New York Times (United States), the Canadian Broadcasting Corporation, the Australian Broadcasting Corporation, Der Spiegel (Germany), O Globo (Brazil), Le Monde (France), L’espresso (Italy), NRC Handelsblad (the Netherlands), Dagbladet (Norway), El País (Spain), and Sveriges Television (Sweden).[4]

These media reports have shed light on the implications of several secret treaties signed by members of the UKUSA community in their efforts to implement global surveillance. For example, Der Spiegel revealed how the German Bundesnachrichtendienst (BND) transfers “massive amounts of intercepted data to the NSA”,[5] while Swedish Television revealed the National Defence Radio Establishment (FRA) provided the NSA with data from its cable collection, under a secret treaty signed in 1954 for bilateral cooperation on surveillance.[6]Other security and intelligence agencies involved in the practice of global surveillance include those in Australia (ASD), Britain (GCHQ), Canada (CSEC), Denmark (PET), France (DGSE), Germany (BND), Italy (AISE), the Netherlands (AIVD), Norway (NIS), Spain (CNI), Switzerland (NDB), Singapore (SID) as well as Israel (ISNU), which receives raw, unfiltered data of US citizens that is shared by the NSA.[7][8][9][10][11][12][13][14]

On June 14, 2013, United States prosecutorscharged Edward Snowden with espionage and theft of government property.[15] In late July 2013, he was granted a one-year temporary asylum by the Russian government,[16] contributing to a deterioration of Russia–United States relations.[17][18] On August 6, 2013, US President Barack Obama made a public appearance on national television where he told Americans that “We don’t have a domestic spying program” and that “There is no spying on Americans”.[19] Towards the end of October 2013, the British Prime Minister David Cameron warned The Guardiannot to publish any more leaks, or it will receive a DA-Notice.[20] In November 2013, a criminal investigation of the disclosure was being undertaken by Britain’s Metropolitan Police Service.[21] In December 2013, The Guardian editor Alan Rusbridger said: “We have published I think 26 documents so far out of the 58,000 we’ve seen.”[22]

The extent to which the media reports have responsibly informed the public is disputed. In January 2014, Obama said that “the sensational way in which these disclosures have come out has often shed more heat than light”[23] and critics such as Sean Wilentz have noted that many of the Snowden documents released do not concern domestic surveillance.[24] In its first assessment of these disclosures, the Pentagon concluded that Snowden committed the biggest “theft” of U.S. secrets in the history of the United States.[25] Sir David Omand, a former director of GCHQ, described Snowden’s disclosure as the “most catastrophic loss to British intelligence ever”.[26]

Background

Barton Gellman, a Pulitzer Prize–winning journalist who led The Washington Posts coverage of Snowden’s disclosures, summarized the leaks as follows:

“Taken together, the revelations have brought to light a global surveillance system that cast off many of its historical restraints after the attacks of Sept. 11, 2001. Secret legal authorities empowered the NSA to sweep in the telephone, Internet and location records of whole populations.”

The disclosure revealed specific details of the NSA’s close cooperation with U.S. federal agencies such as the Federal Bureau of Investigation (FBI)[28][29] and the Central Intelligence Agency (CIA)[30][31] in addition to the agency’s previously undisclosed financial payments to numerous commercial partners and telecommunications companies,[32][33][34] as well as its previously undisclosed relationships with international partners such as Britain,[35][36] France[12][37] Germany,[5][38] and its secret treaties with foreign governments that were recently established for sharing intercepted data of each other’s citizens.[7][39][40][41] The disclosures were made public over the course of several months since June 2013, by the press in several nations from the trove leaked by the former NSA contractor Edward J. Snowden,[42] who obtained the trove while working for Booz Allen Hamilton.[2]

George Brandis, the current Attorney-General of Australia, asserted that Snowden’s disclosure is the “most serious setback for Western intelligence since the Second World War.”[43]

Global surveillance

Main article: Global surveillance

As of December 2013, global surveillance programs include:

Global surveillance programs
Program International contributors and/or partners Commercial partners
United StatesPRISM
United StatesXKeyscore
United KingdomTempora
United KingdomMUSCULAR
GermanyProject 6
Stateroom
Lustre

The NSA was also getting data directly from telecommunications companies codenamed Artifice, Lithium, Serenade, SteelKnight, and X. The real identities of the companies behind these codenames were not included in the Snowden document dump because they were protected as Exceptionally Controlled Information which prevents wide circulation even to those (like Snowden) who otherwise have the necessary security clearance.[65][66]

Disclosures

Although the exact size of Snowden’s disclosure remains unknown, the following estimates have been put up by various government officials:

As a contractor of the NSA, Snowden was granted access to U.S. government documents along with top secret documents of several allied governments, via the exclusive Five Eyes network.[69] Snowden claims that he is currently not in physical possession of any of these documents, after having surrendered all copies to the journalists he met in Hong Kong.[70]

According to his lawyer, Snowden has pledged not to release any documents while in Russia, leaving the responsibility for further disclosures solely to journalists.[71] As of 2014, the following news outlets have accessed some of the documents provided by Snowden: Australian Broadcasting Corporation, Canadian Broadcasting Corporation, Channel 4, Der Spiegel, El Pais, El Mundo, L’espresso, Le Monde, NBC, NRC Handelsblad, Dagbladet, O Globo, South China Morning Post, Süddeutsche Zeitung, Sveriges Television, The Guardian, The New York Times, and The Washington Post.

Historical context

In the 1970s, NSA analyst Perry Fellwock (under the pseudonym “Winslow Peck”) revealed the existence of the UKUSA Agreement, which forms the basis of the ECHELON network, whose existence was revealed in 1988 by Lockheed employee Margaret Newsham.[72][73] Months before the September 11 attacks and during its aftermath, further details of the global surveillance apparatus were provided by various individuals such as the former MI5 official David Shayler and the journalist James Bamford,[74][75] who were followed by:

In the aftermath of Snowden’s revelations, The Pentagon concluded that Snowden committed the biggest theft of U.S. secrets in the history of the United States.[25] In Australia, the coalition government described the leaks as the most damaging blow dealt to Australian intelligence in history.[43] Sir David Omand, a former director of GCHQ, described Snowden’s disclosure as the “most catastrophic loss to British intelligence ever”.[26]

Timeline

The Mira hotel in Hong Kong, where Edward Snowden hosted his first meeting with Glenn Greenwald, Laura Poitras, and journalist Ewen MacAskill of The Guardian[86]

In April 2012, NSA contractor Edward Snowden began downloading documents.[87] That year, Snowden had made his first contact with journalist Glenn Greenwald of The Guardian and he contacted documentary filmmaker Laura Poitras in January 2013.[88][89]

2013

May

In May 2013, Snowden went on temporary leave from his position at the NSA, citing the pretext of receiving treatment for his epilepsy. Towards the end of May, he traveled to Hong Kong.[90][91] Greenwald, Poitras and the Guardian’s defence and intelligence correspondent Ewen MacAskill flew to Hong Kong to meet Snowden.

June

After the U.S.-based editor of The Guardian, Janine Gibson, held several meetings in New York City, it was decided that Greenwald, Poitras and the Guardians defence and intelligence correspondent Ewen MacAskill would fly to Hong Kong to meet Snowden. On June 5, in the first media report based on the leaked material,[92]The Guardian exposed a top secret court order showing that the NSA had collected phone records from over 120 million Verizon subscribers.[93] Under the order, the numbers of both parties on a call, as well as the location data, unique identifiers, time of call, and duration of call were handed over to the FBI, which turned over the records to the NSA.[93] According to The Wall Street Journal, the Verizon order is part of a controversial data program, which seeks to stockpile records on all calls made in the U.S., but does not collect information directly from T-Mobile US and Verizon Wireless, in part because of their foreign ownership ties.[94]

On June 6, 2013, the second media disclosure, the revelation of the PRISM surveillance program (which collects the e-mail, voice, text and video chats of foreigners and an unknown number of Americans from Microsoft, Google, Facebook, Yahoo, Apple and other tech giants),[95][96][97][98] was published simultaneously by The Guardian and The Washington Post.[86][99]

Slide from a 2008 NSA presentation about XKeyscore, showing a worldmap with the locations of XKeyscore servers

Der Spiegel revealed NSA spying on multiple diplomatic missions of the European Union (EU) and the United Nations Headquarters in New York.[100][101] During specific episodes within a four-year period, the NSA hacked several Chinese mobile-phone companies,[102] the Chinese University of Hong Kong and Tsinghua University in Beijing,[103] and the Asian fiber-optic network operator Pacnet.[104] Only Australia, Canada, New Zealand and the UK are explicitly exempted from NSA attacks, whose main target in the EU is Germany.[105] A method of bugging encrypted fax machines used at an EU embassy is codenamed Dropmire.[106]

During the 2009 G-20 London summit, the British intelligence agency Government Communications Headquarters (GCHQ) intercepted the communications of foreign diplomats.[107] In addition, GCHQ has been intercepting and storing mass quantities of fiber-optic traffic via Tempora.[108] Two principal components of Tempora are called “Mastering the Internet” (MTI) and “Global Telecoms Exploitation“.[109] The data is preserved for three days while metadata is kept for thirty days.[110] Data collected by GCHQ under Tempora is shared with the National Security Agency (NSA) of the United States.[109]

From 2001 to 2011, the NSA collected vast amounts of metadata records detailing the email and internet usage of Americans via Stellar Wind,[111] which was later terminated due to operational and resource constraints. It was subsequently replaced by newer surveillance programs such as ShellTrumpet, which “processed its one trillionth metadata record” by the end of December 2012.[112]

The NSA follows specific procedures to target non-U.S. persons[113] and to minimize data collection from U.S. persons.[114] These court-approved policies allow the NSA to:[115][116]

  • keep data that could potentially contain details of U.S. persons for up to five years;
  • retain and make use of “inadvertently acquired” domestic communications if they contain usable intelligence, information on criminal activity, threat of harm to people or property, are encrypted, or are believed to contain any information relevant to cybersecurity;
  • preserve “foreign intelligence information” contained within attorney–client communications; and
  • access the content of communications gathered from “U.S. based machine[s]” or phone numbers in order to establish if targets are located in the U.S., for the purposes of ceasing further surveillance.

According to Boundless Informant, over 97 billion pieces of intelligence were collected over a 30-day period ending in March 2013. Out of all 97 billion sets of information, about 3 billion data sets originated from U.S. computer networks[117] and around 500 million metadata records were collected from German networks.[118]

In August 2013, it was revealed that the Bundesnachrichtendienst (BND) of Germany transfers massive amounts of metadata records to the NSA.[119]

Der Spiegel disclosed that Germany is the most targeted country of the 27 members of the European Union due to the NSA systematic monitoring and storage of Germany’s telephone and Internet connection data. According to the magazine the NSA stores data from around half a billion communications connections in Germany each month. This data includes telephone calls, emails, mobile-phone text messages and chat transcripts.[120]

On June 11, 2013, The Guardian published a snapshot of the NSA’s global map of electronic data collection for the month of March 2013. Known as the Boundless Informant, the program is used by the NSA to track the amount of data being analyzed over a specific period of time. The color scheme ranges from green (least subjected to surveillance) through yellow and orange to red (most surveillance). Outside the Middle East, only China, Germany, India, Kenya, Colombia, the United Kingdom, and the United States are colored orange or yellow

July[edit]

The NSA gained massive amounts of information captured from the monitored data traffic in Europe. For example, in December 2013, the NSA gathered on an average day metadata from some 15 million telephone connections and 10 million Internet datasets. The NSA also monitored the European Commission in Brussels and monitored EU diplomatic Facilities in Washington and at the United Nations by placing bugs in offices as well as infiltrating computer networks.[121]

The U.S. government made as part of its UPSTREAM data collection program deals with companies to ensure that it had access to and hence the capability to surveil undersea fiber-optic cables which deliver e-mails, Web pages, other electronic communications and phone calls from one continent to another at the speed of light.[122][123]

According to the Brazilian newspaper O Globo, the NSA spied on millions of emails and calls of Brazilian citizens,[124][125] while Australia and New Zealand have been involved in the joint operation of the NSA’s global analytical system XKeyscore.[126][127] Among the numerous allied facilities contributing to XKeyscore are four installations in Australia and one in New Zealand:

O Globo released an NSA document titled “Primary FORNSAT Collection Operations“, which revealed the specific locations and codenames of the FORNSAT intercept stations in 2002.[128]

According to Edward Snowden, the NSA has established secret intelligence partnerships with many Western governments.[127] The Foreign Affairs Directorate (FAD) of the NSA is responsible for these partnerships, which, according to Snowden, are organized such that foreign governments can “insulate their political leaders” from public outrage in the event that these global surveillance partnerships are leaked.[129]

In an interview published by Der Spiegel, Snowden accused the NSA of being “in bed together with the Germans”.[130] The NSA granted the German intelligence agencies BND (foreign intelligence) and BfV (domestic intelligence) access to its controversial XKeyscore system.[131] In return, the BND turned over copies of two systems named Mira4 and Veras, reported to exceed the NSA’s SIGINT capabilities in certain areas.[5] Every day, massive amounts of metadata records are collected by the BND and transferred to the NSA via the Bad Aibling Station near Munich, Germany.[5] In December 2012 alone, the BND handed over 500 million metadata records to the NSA.[132][133]

In a document dated January 2013, the NSA acknowledged the efforts of the BND to undermine privacy laws:

“The BND has been working to influence the German government to relax interpretation of the privacy laws to provide greater opportunities of intelligence sharing”.[133]

According to an NSA document dated April 2013, Germany has now become the NSA’s “most prolific partner”.[133] Under a section of a separate document leaked by Snowden titled “Success Stories”, the NSA acknowledged the efforts of the German government to expand the BND’s international data sharing with partners:

“The German government modifies its interpretation of the G-10 privacy law … to afford the BND more flexibility in sharing protected information with foreign partners.”[50]

In addition, the German government was well aware of the PRISM surveillance program long before Edward Snowden made details public. According to Angela Merkel’s spokesman Steffen Seibert, there are two separate PRISM programs – one is used by the NSA and the other is used by NATO forces in Afghanistan.[134] The two programs are “not identical”.[134]

The Guardian revealed further details of the NSA’s XKeyscore tool, which allows government analysts to search through vast databases containing emails, online chats and the browsing histories of millions of individuals without prior authorization.[135][136][137] Microsoft “developed a surveillance capability to deal” with the interception of encrypted chats on Outlook.com, within five months after the service went into testing. NSA had access to Outlook.com emails because “Prism collects this data prior to encryption.”[47]

In addition, Microsoft worked with the FBI to enable the NSA to gain access to its cloud storage service SkyDrive. An internal NSA document dating from August 3, 2012 described the PRISM surveillance program as a “team sport“.[47]

Even if there is no reason to suspect U.S. citizens of wrongdoing, the CIA‘s National Counterterrorism Center is allowed to examine federal government files for possible criminal behavior. Previously the NTC was barred to do so, unless a person was a terror suspect or related to an investigation.[138]

Snowden also confirmed that Stuxnet was cooperatively developed by the United States and Israel.[139] In a report unrelated to Edward Snowden, the French newspaper Le Monde revealed that France’s DGSE was also undertaking mass surveillance, which it described as “illegal and outside any serious control”.[140][141]

August

Documents leaked by Edward Snowden that were seen by Süddeutsche Zeitung (SZ) and Norddeutscher Rundfunk revealed that several telecom operators have played a key role in helping the British intelligence agency Government Communications Headquarters (GCHQ) tap into worldwide fiber-optic communications. The telecom operators are:

Each of them were assigned a particular area of the international fiber-optic network for which they were individually responsible. The following networks have been infiltrated by GCHQ: TAT-14 (Europe-USA), Atlantic Crossing 1 (Europe-USA), Circe South (France-UK), Circe North (The Netherlands-UK), Flag Atlantic-1, Flag Europa-Asia, SEA-ME-WE 3 (Southeast Asia-Middle East-Western Europe), SEA-ME-WE 4 (Southeast Asia-Middle East-Western Europe), Solas (Ireland-UK), UK-France 3, UK-Netherlands 14, ULYSSES (Europe-UK), Yellow (UK-USA) and Pan European Crossing.[143]

Telecommunication companies who participated were “forced” to do so and had “no choice in the matter”.[143] Some of the companies were subsequently paid by GCHQ for their participation in the infiltration of the cables.[143]According to the SZ, GCHQ has access to the majority of internet and telephone communications flowing throughout Europe, can listen to phone calls, read emails and text messages, see which websites internet users from all around the world are visiting. It can also retain and analyse nearly the entire European internet traffic.[143]

GCHQ is collecting all data transmitted to and from the United Kingdom and Northern Europe via the undersea fibre optic telecommunications cable SEA-ME-WE 3. The Security and Intelligence Division (SID) of Singapore co-operates with Australia in accessing and sharing communications carried by the SEA-ME-WE-3 cable. The Australian Signals Directorate (ASD) is also in a partnership with British, American and Singaporean intelligence agencies to tap undersea fibre optic telecommunications cables that link Asia, the Middle East and Europe and carry much of Australia’s international phone and internet traffic.[144]

The U.S. runs a top-secret surveillance program known as the Special Collection Service (SCS), which is based in over 80 U.S. consulates and embassies worldwide.[145][146] The NSA hacked the United Nations’ video conferencing system in Summer 2012 in violation of a UN agreement.[145][146]

The NSA is not just intercepting the communications of Americans who are in direct contact with foreigners targeted overseas, but also searching the contents of vast amounts of e-mail and text communications into and out of the country by Americans who mention information about foreigners under surveillance.[147] It also spied on the Al Jazeera and gained access to its internal communications systems.[148]

The NSA has built a surveillance network that has the capacity to reach roughly 75% of all U.S. Internet traffic.[149][150][151] U.S. Law-enforcement agencies use tools used by computer hackers to gather information on suspects.[152][153] An internal NSA audit from May 2012 identified 2776 incidents i.e. violations of the rules or court orders for surveillance of Americans and foreign targets in the U.S. in the period from April 2011 through March 2012, while U.S. officials stressed that any mistakes are not intentional.[154][155][156][157][158][159][160]

The FISA Court that is supposed to provide critical oversight of the U.S. government’s vast spying programs has limited ability to do so and it must trust the government to report when it improperly spies on Americans.[161] A legal opinion declassified on August 21, 2013, revealed that the NSA intercepted for three years as many as 56,000 electronic communications a year of Americans not suspected of having links to terrorism, before FISA court that oversees surveillance found the operation unconstitutional in 2011.[162][163][164][165][166] Under the Corporate Partner Access project, major U.S. telecommunications providers receive hundreds of millions of dollars each year from the NSA.[167] Voluntary cooperation between the NSA and the providers of global communications took off during the 1970s under the cover name BLARNEY.[167]

A letter drafted by the Obama administration specifically to inform Congress of the government’s mass collection of Americans’ telephone communications data was withheld from lawmakers by leaders of the House Intelligence Committee in the months before a key vote affecting the future of the program.[168][169]

The NSA paid GCHQ over £100 Million between 2009 and 2012, in exchange for these funds GCHQ “must pull its weight and be seen to pull its weight.” Documents referenced in the article explain that the weaker British laws regarding spying are “a selling point” for the NSA. GCHQ is also developing the technology to “exploit any mobile phone at any time.”[170] The NSA has under a legal authority a secret backdoor into its databases gathered from large Internet companies enabling it to search for U.S. citizens’ email and phone calls without a warrant.[171][172]

The Privacy and Civil Liberties Oversight Board urged the U.S. intelligence chiefs to draft stronger US surveillance guidelines on domestic spying after finding that several of those guidelines have not been updated up to 30 years.[173][174] U.S. intelligence analysts have deliberately broken rules designed to prevent them from spying on Americans by choosing to ignore so-called “minimisation procedures” aimed at protecting privacy[175][176] and used the NSA’s agency’s enormous eavesdropping power to spy on love interests.[177]

After the U.S. Foreign Secret Intelligence Court ruled in October 2011 that some of the NSA’s activities were unconstitutional, the agency paid millions of dollars to major internet companies to cover extra costs incurred in their involvement with the PRISM surveillance program.[178]

Mastering the Internet” (MTI) is part of the Interception Modernisation Programme (IMP) of the British government that involves the insertion of thousands of DPI (deep packet inspection) “black boxes” at various internet service providers, as revealed by the British media in 2009.[179]

In 2013, it was further revealed that the NSA had made a £17.2 million financial contribution to the project, which is capable of vacuuming signals from up to 200 fibre-optic cables at all physical points of entry into Great Britain.[180]

September

The Guardian and The New York Times reported on secret documents leaked by Snowden showing that the NSA has been in “collaboration with technology companies” as part of “an aggressive, multipronged effort” to weaken the encryption used in commercial software, and GCHQ has a team dedicated to cracking “Hotmail, Google, Yahoo and Facebook” traffic.[181][182][183][184][185][186]

Germany’s domestic security agency Bundesverfassungsschutz (BfV) systematically transfers the personal data of German residents to the NSA, CIA and seven other members of the United States Intelligence Community, in exchange for information and espionage software.[187][188][189] Israel, Sweden and Italy are also cooperating with American and British intelligence agencies. Under a secret treaty codenamed “Lustre“, French intelligence agencies transferred millions of metadata records to the NSA.[63][64][190][191]

The Obama Administration secretly won permission from the Foreign Intelligence Surveillance Court in 2011 to reverse restrictions on the National Security Agency’s use of intercepted phone calls and e-mails, permitting the agency to search deliberately for Americans’ communications in its massive databases. The searches take place under a surveillance program Congress authorized in 2008 under Section 702 of the Foreign Intelligence Surveillance Act. Under that law, the target must be a foreigner “reasonably believed” to be outside the United States, and the court must approve the targeting procedures in an order good for one year. But a warrant for each target would thus no longer be required. That means that communications with Americans could be picked up without a court first determining that there is probable cause that the people they were talking to were terrorists, spies or “foreign powers.” The FISC extended the length of time that the NSA is allowed to retain intercepted U.S. communications from five years to six years with an extension possible for foreign intelligence or counterintelligence purposes. Both measures were done without public debate or any specific authority from Congress.[192]

A special branch of the NSA called “Follow the Money” (FTM) monitors international payments, banking and credit card transactions and later stores the collected data in the NSA’s own financial databank “Tracfin”.[193] The NSA monitored the communications of Brazil’s president Dilma Rousseff and her top aides.[194] The agency also spied on Brazil’s oil firm Petrobras as well as French diplomats, and gained access to the private network of the Ministry of Foreign Affairs of France and the SWIFT network.[195]

In the United States, the NSA uses the analysis of phone call and e-mail logs of American citizens to create sophisticated graphs of their social connections that can identify their associates, their locations at certain times, their traveling companions and other personal information.[196] The NSA routinely shares raw intelligence data with Israel without first sifting it to remove information about U.S. citizens.[7][197]

In an effort codenamed GENIE, computer specialists can control foreign computer networks using “covert implants,” a form of remotely transmitted malware on tens of thousands of devices annually.[198][199][200][201] As worldwide sales of smartphones began exceeding those of feature phones, the NSA decided to take advantage of the smartphone boom. This is particularly advantageous because the smartphone combines a myriad of data that would interest an intelligence agency, such as social contacts, user behavior, interests, location, photos and credit card numbers and passwords.[202]

An internal NSA report from 2010 stated that the spread of the smartphone has been occurring “extremely rapidly”—developments that “certainly complicate traditional target analysis.”[202] According to the document, the NSA has set up task forces assigned to several smartphone manufacturers and operating systems, including Apple Inc.‘s iPhone and iOS operating system, as well as Google‘s Android mobile operating system.[202] Similarly, Britain’s GCHQ assigned a team to study and crack the BlackBerry.[202]

An NSA presentation called “Your target is using a BlackBerry? Now what?” shows an intercepted Mexican government e-mail.

Under the heading “iPhone capability”, the document notes that there are smaller NSA programs, known as “scripts”, that can perform surveillance on 38 different features of the iOS 3 and iOS 4 operating systems. These include the mapping feature, voicemail and photos, as well as Google Earth, Facebook and Yahoo! Messenger.[202]

On September 9, 2013, an internal NSA presentation on iPhone Location Services was published by Der Spiegel. One slide shows scenes from Apple’s 1984-themed television commercial alongside the words “Who knew in 1984…”; another shows Steve Jobs holding an iPhone, with the text “…that this would be big brother…”; and a third shows happy consumers with their iPhones, completing the question with “…and the zombies would be paying customers?”[203]

October

On October 4, 2013, The Washington Post and The Guardian jointly reported that the NSA and GCHQ had made repeated attempts to spy on anonymous Internet users who have been communicating in secret via the anonymity network Tor. Several of these surveillance operations involved the implantation of malicious code into the computers of Tor users who visit particular websites. The NSA and GCHQ had partly succeeded in blocking access to the anonymous network, diverting Tor users to insecure channels. The government agencies were also able to uncover the identity of some anonymous Internet users.[204][205][206][207][208][209][210][211][212]

The Communications Security Establishment Canada (CSEC) has been using a program called Olympia to map the communications of Brazil’s Mines and Energy Ministry by targeting the metadata of phone calls and emails to and from the ministry.[213][214]

The Australian Federal Government knew about the PRISM surveillance program months before Edward Snowden made details public.[215][216]

The NSA gathered hundreds of millions of contact lists from personal e-mail and instant messaging accounts around the world. The agency did not target individuals. Instead it collected contact lists in large numbers that amount to a sizable fraction of the world’s e-mail and instant messaging accounts. Analysis of that data enables the agency to search for hidden connections and to map relationships within a much smaller universe of foreign intelligence targets.[217][218][219][220]

The NSA monitored the public email account of former Mexican president Felipe Calderón (thus gaining access to the communications of high-ranking cabinet members), the emails of several high-ranking members of Mexico’s security forces and text and the mobile phone communication of current Mexican president Enrique Peña Nieto.[221][222] The NSA tries to gather cellular and landline phone numbers—often obtained from American diplomats—for as many foreign officials as possible. The contents of the phone calls are stored in computer databases that can regularly be searched using keywords.[223][224]

The NSA has been monitoring telephone conversations of 35 world leaders.[225] The U.S. government’s first public acknowledgment that it tapped the phones of world leaders was reported on October 28, 2013, by the Wall Street Journal after an internal U.S. government review turned up NSA monitoring of some 35 world leaders.[226]GCHQ has tried to keep its mass surveillance program a secret because it feared a “damaging public debate” on the scale of its activities which could lead to legal challenges against them.[227]

The Guardian revealed that the NSA had been monitoring telephone conversations of 35 world leaders after being given the numbers by an official in another U.S. government department. A confidential memo revealed that the NSA encouraged senior officials in such Departments as the White House, State and The Pentagon, to share their “Rolodexes” so the agency could add the telephone numbers of leading foreign politicians to their surveillance systems. Reacting to the news, German leader Angela Merkel, arriving in Brussels for an EU summit, accused the U.S. of a breach of trust, saying: “We need to have trust in our allies and partners, and this must now be established once again. I repeat that spying among friends is not at all acceptable against anyone, and that goes for every citizen in Germany.”[225] The NSA collected in 2010 data on ordinary Americans’ cellphone locations, but later discontinued it because it had no “operational value.”[228]

Under Britain’s MUSCULAR programme, the NSA and GCHQ have secretly broken into the main communications links that connect Yahoo and Googledata centers around the world and thereby gained the ability to collect metadata and content at will from hundreds of millions of user accounts.[229][230][231][232][233]

The mobile phone of German Chancellor Angela Merkel might have been tapped by U.S. intelligence.[234][235][236][237][238][239][240] According to the Spiegel this monitoring goes back to 2002[241][242][243] and ended in the summer of 2013,[226] while The New York Times reported that Germany has evidence that the NSA’s surveillance of Merkel began during George W. Bush‘s tenure.[244] After learning from Der Spiegel magazine that the NSA has been listening in to her personal mobile phone, Merkel compared the snooping practices of the NSA with those of the Stasi.[245] It was reported in March 2014, by Der Spiegel that Merkel had also been placed on an NSA surveillance list alongside 122 other world leaders.[246]

On October 31, 2013, Hans-Christian Ströbele, a member of the German Bundestag, met Snowden in Moscow and revealed the former intelligence contractor’s readiness to brief the German government on NSA spying.[247]

A highly sensitive signals intelligence collection program known as Stateroom involves the interception of radio, telecommunications and internet traffic. It is operated out of the diplomatic missions of the Five Eyes (Australia, Britain, Canada, New Zealand, United States) in numerous locations around the world. The program conducted at U.S. diplomatic missions is run in concert by the U.S. intelligence agencies NSA and CIA in a joint venture group called “Special Collection Service” (SCS), whose members work undercover in shielded areas of the American Embassies and Consulates, where they are officially accredited as diplomats and as such enjoy special privileges. Under diplomatic protection, they are able to look and listen unhindered. The SCS for example used the American Embassy near the Brandenburg Gate in Berlin to monitor communications in Germany’s government district with its parliament and the seat of the government.[240][248][249][250]

Under the Stateroom surveillance programme, Australia operates clandestine surveillance facilities to intercept phone calls and data across much of Asia.[249][251]

In France, the NSA targeted people belonging to the worlds of business, politics or French state administration. The NSA monitored and recorded the content of telephone communications and the history of the connections of each target i.e. the metadata.[252][253] The actual surveillance operation was performed by French intelligence agencies on behalf of the NSA.[63][254] The cooperation between France and the NSA was confirmed by the Director of the NSA, Keith B. Alexander, who asserted that foreign intelligence services collected phone records in “war zones” and “other areas outside their borders” and provided them to the NSA.[255]

The French newspaper Le Monde also disclosed new PRISM and Upstream slides (See Page 4, 7 and 8) coming from the “PRISM/US-984XN Overview” presentation.[256]

In Spain, the NSA intercepted the telephone conversations, text messages and emails of millions of Spaniards, and spied on members of the Spanish government.[257] Between December 10, 2012 and January 8, 2013, the NSA collected metadata on 60 million telephone calls in Spain.[258]

According to documents leaked by Snowden, the surveillance of Spanish citizens was jointly conducted by the NSA and the intelligence agencies of Spain.[259][260]

On October 4, 2013, The Washington Post published a powerpoint presentation leaked by Snowden, showing how the NSA had compromised the Tor encrypted network that is being employed by hundreds of thousands of people to circumvent “nation state internet policies”. By secretly exploiting a JavaScriptplug-in, the NSA was able to uncover the identities of various anonymous Internet users such as dissidents, terrorists, and other targets

November

The New York Times reported that the NSA carries out an eavesdropping effort, dubbed Operation Dreadnought, against the Iranian leader Ayatollah Ali Khamenei. During his 2009 visit to Iranian Kurdistan, the agency collaborated with GCHQ and the U.S.’s National Geospatial-Intelligence Agency, collecting radio transmissions between aircraft and airports, examining Khamenei’s convoy with satellite imagery, and enumerating military radar stations. According to the story, an objective of the operation is “communications fingerprinting”: the ability to distinguish Khamenei’s communications from those of other people in Iran.[261]

The same story revealed an operation code-named Ironavenger, in which the NSA intercepted e-mails sent between a country allied with the United States and the government of “an adversary”. The ally was conducting a spear-phishing attack: its e-mails contained malware. The NSA gathered documents and login credentials belonging to the enemy country, along with knowledge of the ally’s capabilities for attacking computers.[261]

According to the British newspaper The Independent, the British intelligence agency GCHQ maintains a listening post on the roof of the British Embassy in Berlin that is capable of intercepting mobile phone calls, wi-fi data and long-distance communications all over the German capital, including adjacent government buildings such as the Reichstag (seat of the German parliament) and the Chancellery (seat of Germany’s head of government) clustered around the Brandenburg Gate.[262]

Operating under the code-name “Quantum Insert”, GCHQ set up a fake website masquerading as LinkedIn, a social website used for professional networking, as part of its efforts to install surveillance software on the computers of the telecommunications operator Belgacom.[263][264][265] In addition, the headquarters of the oil cartel OPEC were infiltrated by GCHQ as well as the NSA, which bugged the computers of nine OPEC employees and monitored the General Secretary of OPEC.[263]

For more than three years GCHQ has been using an automated monitoring system code-named “Royal Concierge” to infiltrate the reservation systems of at least 350 upscale hotels in many different parts of the world in order to target, search and analyze reservations to detect diplomats and government officials.[266] First tested in 2010, the aim of the “Royal Concierge” is to track down the travel plans of diplomats, and it is often supplemented with surveillance methods related to human intelligence (HUMINT). Other covert operations include the wiretapping of room telephones and fax machines used in targeted hotels as well as the monitoring of computers hooked up to the hotel network.[266]

In November 2013, the Australian Broadcasting Corporation and The Guardian revealed that the Australian Signals Directorate (DSD) had attempted to listen to the private phone calls of the president of Indonesia and his wife. The Indonesian foreign minister, Marty Natalegawa, confirmed that he and the president had contacted the ambassador in Canberra. Natalegawa said any tapping of Indonesian politicians’ personal phones “violates every single decent and legal instrument I can think of—national in Indonesia, national in Australia, international as well”.[267]

Other high-ranking Indonesian politicians targeted by the DSD include:

Carrying the title “3G impact and update”, a classified presentation leaked by Snowden revealed the attempts of the ASD/DSD to keep up to pace with the rollout of 3G technology in Indonesia and across Southeast Asia. The ASD/DSD motto placed at the bottom of each page reads: “Reveal their secrets—protect our own.”[268]

Under a secret deal approved by British intelligence officials, the NSA has been storing and analyzing the internet and email records of UK citizens since 2007. The NSA also proposed in 2005 a procedure for spying on the citizens of the UK and other Five-Eyes nations alliance, even where the partner government has explicitly denied the U.S. permission to do so. Under the proposal, partner countries must neither be informed about this particular type of surveillance, nor the procedure of doing so.[39]

Towards the end of November, The New York Times released an internal NSA report outlining the agency’s efforts to expand its surveillance abilities.[269] The five-page document asserts that the law of the United States has not kept up with the needs of the NSA to conduct mass surveillance in the “golden age” of signals intelligence, but there are grounds for optimism because, in the NSA’s own words:

“The culture of compliance, which has allowed the American people to entrust NSA with extraordinary authorities, will not be compromised in the face of so many demands, even as we aggressively pursue legal authorities…”[270]

The report, titled “SIGINT Strategy 2012–2016″, also said that the U.S. will try to influence the “global commercial encryption market” through “commercial relationships”, and emphasized the need to “revolutionize” the analysis of its vast data collection to “radically increase operational impact”.[269]

On November 23, 2013, the Dutch newspaper NRC Handelsblad reported that the Netherlands was targeted by U.S. intelligence agencies in the immediate aftermath of World War II. This period of surveillance lasted from 1946 to 1968, and also included the interception of the communications of other European countries including Belgium, France, West Germany and Norway.[271] The Dutch Newspaper also reported that NSA infected more than 50,000 computer networks worldwide, often covertly, with malicious spy software, sometimes in cooperation with local authorities, designed to steal sensitive information.[42][272]

On November 23, 2013, the Dutch newspaper NRC Handelsblad released a top secret NSA presentation leaked by Snowden, showing five “Classes of Accesses” that the NSA uses in its worldwide signals intelligence operations.[42][272] These five “Classes of Accesses” are:

 3rd PARTY/LIAISON—refers to data provided by the international partners of the NSA. Within the framework of the UKUSA Agreement, these international partners are known as “third parties”.
 REGIONAL—refers to over 80 regional Special Collection Services (SCS). The SCS is a black budget program operated by the NSA and the CIA, with operations based in many cities such as Athens, Bangkok, Berlin, Brasília, Budapest, Frankfurt, Geneva, Lagos, Milan, New Delhi, Paris, Prague, Vienna, and Zagreb, and others, targeting Central America, the Arabian Peninsula, East Asia, and Continental Europe.
 CNE—an abbreviation for “Computer Network Exploitation“. It is performed by a special cyber-warfare unit of the NSA known as Tailored Access Operations (TAO), which infected over 50,000 computer networks worldwide with malicious software designed to steal sensitive information, and is mostly aimed at Brazil, China, Egypt, India, Mexico, Saudi Arabia, and parts of Eastern Europe
 LARGE CABLE—20 major points of accesses, many of them located within the United States
 FORNSAT—an abbreviation for “Foreign Satellite Collection”. It refers to intercepts from satellites that process data used by other countries such as Britain, Norway, Japan, and the Philippines.

December

According to the classified documents leaked by Snowden, the Australian Signals Directorate (ASD), formerly known as the Defence Signals Directorate, had offered to share intelligence information it had collected with the other intelligence agencies of the UKUSA Agreement. Data shared with foreign countries include “bulk, unselected, unminimised metadata” it had collected. The ASD provided such information on the condition that no Australian citizens were targeted. At the time the ASD assessed that “unintentional collection [of metadata of Australian nationals] is not viewed as a significant issue”. If a target was later identified as being an Australian national, the ASD was required to be contacted to ensure that a warrant could be sought. Consideration was given as to whether “medical, legal or religious information” would be automatically treated differently to other types of data, however a decision was made that each agency would make such determinations on a case-by-case basis.[273] Leaked material does not specify where the ASD had collected the intelligence information from, however Section 7(a) of the Intelligence Services Act 2001 (Commonwealth) states that the ASD’s role is “…to obtain intelligence about the capabilities, intentions or activities of people or organisations outside Australia…”.[274] As such, it is possible ASD’s metadata intelligence holdings was focused on foreign intelligence collection and was within the bounds of Australian law.

The Washington Post revealed that the NSA has been tracking the locations of mobile phones from all over the world by tapping into the cables that connect mobile networks globally and that serve U.S. cellphones as well as foreign ones. In the process of doing so, the NSA collects more than five billion records of phone locations on a daily basis. This enables NSA analysts to map cellphone owners’ relationships by correlating their patterns of movement over time with thousands or millions of other phone users who cross their paths.[275][276][277][278][279][280][281][282]

The Washington Post also reported that both GCHQ and the NSA make use of location data and advertising tracking files generated through normal internet browsing (with cookies operated by Google, known as “Pref”) to pinpoint targets for government hacking and to bolster surveillance.[283][284][285]

The Norwegian Intelligence Service (NIS), which cooperates with the NSA, has gained access to Russian targets in the Kola Peninsula and other civilian targets. In general, the NIS provides information to the NSA about “Politicians”, “Energy” and “Armament”.[286] A top secret memo of the NSA lists the following years as milestones of the Norway–United States of America SIGINT agreement, or NORUS Agreement:

The NSA considers the NIS to be one of its most reliable partners. Both agencies also cooperate to crack the encryption systems of mutual targets. According to the NSA, Norway has made no objections to its requests from the NIS.[287]

On December 5, Sveriges Television reported the National Defence Radio Establishment (FRA) has been conducting a clandestine surveillance operation in Sweden, targeting the internal politics of Russia. The operation was conducted on behalf of the NSA, receiving data handed over to it by the FRA.[288][289] The Swedish-American surveillance operation also targeted Russian energy interests as well as the Baltic states.[290] As part of the UKUSA Agreement, a secret treaty was signed in 1954 by Sweden with the United States, the United Kingdom, Canada, Australia and New Zealand, regarding collaboration and intelligence sharing.[291]

As a result of Snowden’s disclosures, the notion of Swedish neutrality in international politics was called into question.[citation needed] In an internal document dating from the year 2006, the NSA acknowledged that its “relationship” with Sweden is “protected at the TOP SECRET level because of that nation’s political neutrality.”[292] Specific details of Sweden’s cooperation with members of the UKUSA Agreement include:

  • The FRA has been granted access to XKeyscore, an analytical database of the NSA.[293]
  • Sweden updated the NSA on changes in Swedish legislation that provided the legal framework for information sharing between the FRA and the Swedish Security Service.[52]
  • Since January 2013, a counterterrorism analyst of the NSA has been stationed in the Swedish capital of Stockholm[52]
  • The NSA, GCHQ and the FRA signed an agreement in 2004 that allows the FRA to directly collaborate with the NSA without having to consult GCHQ.[52] About five years later, the Riksdag passed a controversial legislative change, briefly allowing the FRA to monitor both wireless and cable bound signals passing the Swedish border without a court order,[294] while also introducing several provisions designed to protect the privacy of individuals, according to the original proposal.[295] This legislation was amended 11 months later,[296] in an effort to strengthen protection of privacy by making court orders a requirement, and by imposing several limits on the intelligence-gathering.[297][298][299]

According to documents leaked by Snowden, the Special Source Operations of the NSA has been sharing information containing “logins, cookies, and GooglePREFID” with the Tailored Access Operations division of the NSA, as well as Britain’s GCHQ agency.[300]

During the 2010 G-20 Toronto summit, the U.S. embassy in Ottawa was transformed into a security command post during a six-day spying operation that was conducted by the NSA and closely coordinated with the Communications Security Establishment Canada (CSEC). The goal of the spying operation was, among others, to obtain information on international development, banking reform, and to counter trade protectionism to support “U.S. policy goals.”[301] On behalf of the NSA, the CSEC has set up covert spying posts in 20 countries around the world.[10]

In Italy the Special Collection Service of the NSA maintains two separate surveillance posts in Rome and Milan.[302] According to a secret NSA memo dated September 2010, the Italian embassy in Washington, D.C. has been targeted by two spy operations of the NSA:

  • Under the codename “Bruneau”, which refers to mission “Lifesaver”, the NSA sucks out all the information stored in the embassy’s computers and creates electronic images of hard disk drives.[302]
  • Under the codename “Hemlock”, which refers to mission “Highlands”, the NSA gains access to the embassy’s communications through physical “implants”.[302]

Due to concerns that terrorist or criminal networks may be secretly communicating via computer games, the NSA, GCHQ, CIA, and FBI have been conducting surveillance and scooping up data from the networks of many online games, including massively multiplayer online role-playing games (MMORPGs) such as World of Warcraft, as well as virtual worlds such as Second Life, and the Xbox gaming console.[303][304][305][306]

The NSA has cracked the most commonly used cellphone encryption technology, A5/1. According to a classified document leaked by Snowden, the agency can “process encrypted A5/1” even when it has not acquired an encryption key.[307] In addition, the NSA uses various types of cellphone infrastructure, such as the links between carrier networks, to determine the location of a cellphone user tracked by Visitor Location Registers.[308]

US district court judge for the District of Columbia, Richard Leon, declared[309][310][311][312][313][314] on December 16, 2013, that the mass collection of metadata of Americans’ telephone records by the National Security Agency probably violates the fourth amendment prohibition of unreasonable searches and seizures.[315] Leon granted the request for a preliminary injunction that blocks the collection of phone data for two private plaintiffs (Larry Klayman, a conservative lawyer, and Charles Strange, father of a cryptologist killed in Afghanistan when his helicopter was shot down in 2011)[316] and ordered the government to destroy any of their records that have been gathered. But the judge stayed action on his ruling pending a government appeal, recognizing in his 68-page opinion the “significant national security interests at stake in this case and the novelty of the constitutional issues.”[315]

However federal judge William H. Pauley III in New York City ruled[317] the U.S. government’s global telephone data-gathering system is needed to thwart potential terrorist attacks, and that it can only work if everyone’s calls are swept in. U.S. District Judge Pauley also ruled that Congress legally set up the program and that it does not violate anyone’s constitutional rights. The judge also concluded that the telephone data being swept up by NSA did not belong to telephone users, but to the telephone companies. He further ruled that when NSA obtains such data from the telephone companies, and then probes into it to find links between callers and potential terrorists, this further use of the data was not even a search under the Fourth Amendment. He also concluded that the controlling precedent is Smith v. Maryland: “Smith’s bedrock holding is that an individual has no legitimate expectation of privacy in information provided to third parties,” Judge Pauley wrote.[318][319][320][321] The American Civil Liberties Union declared on January 2, 2012 that it will appeal Judge Pauley’s ruling that NSA bulk the phone record collection is legal. “The government has a legitimate interest in tracking the associations of suspected terrorists, but tracking those associations does not require the government to subject every citizen to permanent surveillance,” deputy ACLU legal director Jameel Jaffer said in a statement.[322]

In recent years, American and British intelligence agencies conducted surveillance on more than 1,100 targets, including the office of an Israeli prime minister, heads of international aid organizations, foreign energy companies and a European Union official involved in antitrust battles with American technology businesses.[323]

A catalog of high-tech gadgets and software developed by the NSA’sTailored Access Operations (TAO) was leaked by the German news magazine Der Spiegel.[324] Dating from 2008, the catalog revealed the existence of special gadgets modified to capture computer screenshots and USB flash drives secretly fitted with radio transmitters to broadcast stolen data over the airwaves, and fake base stations intended to intercept mobile phone signals, as well as many other secret devices and software implants listed here:

The Tailored Access Operations (TAO) division of the NSA intercepted the shipping deliveries of computers and laptops in order to install spyware and physical implants on electronic gadgets. This was done in close cooperation with the FBI and the CIA.[324][325][326][327][328][329][330] NSA officials responded to the Spiegel reports with a statement, which said: “Tailored Access Operations is a unique national asset that is on the front lines of enabling NSA to defend the nation and its allies. [TAO’s] work is centred on computer network exploitation in support of foreign intelligence collection.”[331]

In a separate disclosure unrelated to Snowden, the French Trésor public, which runs a certificate authority, was found to have issued fake certificates impersonating Google in order to facilitate spying on French government employees via man-in-the-middle attacks.[332]

On December 4, 2013, The Washington Post released an internal NSA chart illustrating the extent of the agency’s mass collection of mobile phone location records, which amounts to about five billion on a daily basis.[275] The records are stored in a huge database known as FASCIA, which received over 27 terabytes of location data within seven months.[333]

2014

January

The NSA is working to build a powerful quantum computer capable of breaking all types of encryption.[334][335][336][337][338] The effort is part of a US$79.7 million research program known as “Penetrating Hard Targets”. It involves extensive research carried out in large, shielded rooms known as Faraday cages, which are designed to prevent electromagnetic radiation from entering or leaving.[335] Currently, the NSA is close to producing basic building blocks that will allow the agency to gain “complete quantum control on two semiconductorqubits“.[335] Once a quantum computer is successfully built, it would enable the NSA to unlock the encryption that protects data held by banks, credit card companies, retailers, brokerages, governments and health care providers.[334]

According to The New York Times, the NSA is monitoring approximately 100,000 computers worldwide with spy software named Quantum. Quantum enables the NSA to conduct surveillance on those computers on the one hand, and can also create a digital highway for launching cyberattacks on the other hand. Among the targets are the Chinese and Russian military, but also trade institutions within the European Union. The NYT also reported that the NSA can access and alter computers which are not connected with the internet by a secret technology in use by the NSA since 2008. The prerequisite is the physical insertion of the radio frequency hardware by a spy, a manufacturer or an unwitting user. The technology relies on a covert channel of radio waves that can be transmitted from tiny circuit boards and USB cards inserted surreptitiously into the computers. In some cases, they are sent to a briefcase-size relay station that intelligence agencies can set up miles away from the target. The technology can also transmit malware back to the infected computer.[42]

Channel 4 and The Guardian revealed the existence of Dishfire, a massive database of the NSA that collects hundreds of millions of text messages on a daily basis.[339] GCHQ has been given full access to the database, which it uses to obtain personal information of Britons by exploiting a legal loophole.[340]

Each day, the database receives and stores the following amounts of data:

  • Geolocation data of more than 76,000 text messages and other travel information[341]
  • Over 110,000 names, gathered from electronic business cards[341]
  • Over 800,000 financial transactions that are either gathered from text-to-text payments or by linking credit cards to phone users[341]
  • Details of 1.6 million border crossings based on the interception of network roaming alerts[341]
  • Over 5 million missed call alerts[341]
  • About 200 million text messages from around the world[339]

The database is supplemented with an analytical tool known as the Prefer program, which processes SMS messages to extract other types of information including contacts from missed call alerts.[341]

The Privacy and Civil Liberties Oversight Board report on mass surveillance was released on January 23, 2014. It recommends to end the bulk telephone metadata, i.e., bulk phone records – phone numbers dialed, call times and durations, but not call content collection – collection program, to create a “Special Advocate” to be involved in some cases before the FISA court judge and to release future and past FISC decisions “that involve novel interpretations of FISA or other significant questions of law, technology or compliance.”[342][343][344]

According to a joint disclosure by The New York Times, The Guardian, and ProPublica,[345][346][347][348][349] the NSA and GCHQ have begun working together to collect and store data from dozens of smartphoneapplication software by 2007 at the latest. A 2008 GCHQ report, leaked by Snowden asserts that “anyone using Google Maps on a smartphone is working in support of a GCHQ system”. The NSA and GCHQ have traded recipes for various purposes such as grabbing location data and journey plans that are made when a target uses Google Maps, and vacuuming up address books, buddy lists, phone logs and geographic data embedded in photos posted on the mobile versions of numerous social networks such as Facebook, Flickr, LinkedIn, Twitter and other services. In a separate 20-page report dated 2012, GCHQ cited the popular smartphone game “Angry Birds” as an example of how an application could be used to extract user data. Taken together, such forms of data collection would allow the agencies to collect vital information about a user’s life, including his or her home country, current location (through geolocation), age, gender, ZIP code, marital status, income, ethnicity, sexual orientation, education level, number of children, etc.[350][351]

A GCHQ document dated August 2012 provided details of the Squeaky Dolphin surveillance program, which enables GCHQ to conduct broad, real-time monitoring of various social media features and social media traffic such as YouTube video views, the Like button on Facebook, and Blogspot/Blogger visits without the knowledge or consent of the companies providing those social media features. The agency’s “Squeaky Dolphin” program can collect, analyze and utilize YouTube, Facebook and Blogger data in specific situations in real time for analysis purposes. The program also collects the addresses from the billions of videos watched daily as well as some user information for analysis purposes.[352][353][354]

During the 2009 United Nations Climate Change Conference in Copenhagen, the NSA and its Five Eyes partners monitored the communications of delegates of numerous countries. This was done to give their own policymakers a negotiating advantage.[355][356]

The Communications Security Establishment Canada (CSEC) has been tracking Canadian air passengers via free Wi-Fi services at a major Canadian airport. Passengers who exited the airport terminal continued to be tracked as they showed up at other Wi-Fi locations across Canada. In a CSEC document dated May 2012, the agency described how it had gained access to two communications systems with over 300,000 users in order to pinpoint a specific imaginary target. The operation was executed on behalf of the NSA as a trial run to test a new technology capable of tracking down “any target that makes occasional forays into other cities/regions.” This technology was subsequently shared with Canada’s Five Eyes partners – Australia, New Zealand, Britain, and the United States.[357][358][359][360]

On January 27, 2014, The New York Times released[347] an internal NSA document from a 2010 meeting that details the extent of the agency’s surveillance on smartphones. Data collected include phone settings, network connections, Web browsing history, buddy lists, downloaded documents, encryption usage, and user agents. Notice the following line of text at the bottom – “TOP SECRET//COMINT//REL TO USA, FVEY” – which is used to indicated that this top secret document is related to communications intelligence (COMINT), and can be accessed by the USA and its Five Eyes (FVEY) partners in Australia, Britain, Canada, and New Zealand

February

According to research by Süddeutsche Zeitung and TV network NDR the mobile phone of former German chancellor Gerhard Schröder was monitored from 2002 onwards, reportedly because of his government’s opposition to military intervention in Iraq. The source of the latest information is a document leaked by Edward Snowden. The document, containing information about the National Sigint Requirement List (NSRL), had previously been interpreted as referring only to Angela Merkel‘s mobile. However Süddeutsche Zeitung and NDR claim to have confirmation from NSA insiders that the surveillance authorisation pertains not to the individual, but the political post – which in 2002 was still held by Schröder. According to research by the two media outlets, Schröder was placed as number 388 on the list, which contains the names of persons and institutions to be put under surveillance by the NSA.[361][362][363][364]

GCHQ launched a cyber-attack on the activist network “Anonymous“, using denial-of-service attack (DoS) to shut down a chatroom frequented by the network’s members and to spy on them. The attack, dubbed Rolling Thunder, was conducted by a GCHQ unit known as the Joint Threat Research Intelligence Group (JTRIG). The unit successfully uncovered the true identities of several Anonymous members.[365][366][367][368]

The NSA Section 215 bulk telephony metadata program which seeks to stockpile records on all calls made in the U.S. is collecting less than 30 percent of all Americans’ call records because of an inability to keep pace with the explosion in cellphone use according to the Washington Post. The controversial program permits the NSA after a warrant granted by the secret Foreign Intelligence Surveillance Court to record numbers, length and location of every call from the participating carriers.[369][370]

The Intercept reported that the U.S. government is using primarily NSA surveillance to target people for drone strikes overseas. In its report The Intercept author detail the flawed methods which are used to locate targets for lethal drone strikes, resulting in the deaths of innocent people.[371] According to the Washington Post NSA analysts and collectors i.e. NSA personnel which controls electronic surveillance equipment use the NSA’s sophisticated surveillance capabilities to track individual targets geographically and in real time, while drones and tactical units aimed their weaponry against those targets to take them out.[372]

An unnamed US law firm, reported to be Mayer Brown, was targeted by Australia’s ASD. According to Snowden’s documents, the ASD had offered to hand over these intercepted communications to the NSA. This allowed government authorities to be “able to continue to cover the talks, providing highly useful intelligence for interested US customers”.[373][374]

NSA and GCHQ documents revealed that the anti-secrecy organization WikiLeaks and other activist groups were targeted for government surveillance and criminal prosecution. In particular, the IP addresses of visitors to WikiLeaks were collected in real time, and the US government urged its allies to file criminal charges against the founder of WikiLeaks, Julian Assange, due to his organization’s publication of the Afghanistan war logs. The WikiLeaks organization was designated as a “malicious foreign actor”.[375]

Quoting an unnamed NSA official in Germany, Bild am Sonntag reported that whilst President Obama’s order to stop spying on Merkel was being obeyed, the focus had shifted to bugging other leading government and business figures including Interior Minister Thomas de Maiziere, a close confidant of Merkel. Caitlin Hayden, a security adviser to President Obama, was quoted in the newspaper report as saying, “The US has made clear it gathers intelligence in exactly the same way as any other states.”[376][377]

The Intercept reveals that government agencies are infiltrating online communities and engaging in “false flag operations” to discredit targets among them people who have nothing to do with terrorism or national security threats. The two main tactics that are currently used are the injection of all sorts of false material onto the internet in order to destroy the reputation of its targets; and the use of social sciences and other techniques to manipulate online discourse and activism to generate outcomes it considers desirable.[378][379][380][381]

The Guardian reported that Britain’s surveillance agency GCHQ, with aid from the National Security Agency, intercepted and stored the webcam images of millions of internet users not suspected of wrongdoing. The surveillance program codenamed Optic Nerve collected still images of Yahoo webcam chats (one image every five minutes) in bulk and saved them to agency databases. The agency discovered “that a surprising number of people use webcam conversations to show intimate parts of their body to the other person”, estimating that between 3% and 11% of the Yahoo webcam imagery harvested by GCHQ contains “undesirable nudity”.[382]

March

The NSA has built an infrastructure which enables it to covertly hack into computers on a mass scale by using automated systems that reduce the level of human oversight in the process. The NSA relies on an automated system codenamed TURBINE which in essence enables the automated management and control of a large network of implants (a form of remotely transmitted malware on selected individual computer devices or in bulk on tens of thousands of devices). As quoted by The Intercept, TURBINE is designed to “allow the current implant network to scale to large size (millions of implants) by creating a system that does automated control implants by groups instead of individually.”[383] The NSA has shared many of its files on the use of implants with its counterparts in the so-called Five Eyes surveillance alliance – the United Kingdom, Canada, New Zealand, and Australia.

Among other things due to TURBINE and its control over the implants the NSA is capable of:

  • breaking into targeted computers and to siphoning out data from foreign Internet and phone networks
  • infecting a target’s computer and exfiltrating files from a hard drive
  • covertly recording audio from a computer’s microphone and taking snapshots with its webcam
  • launching cyberattacks by corrupting and disrupting file downloads or denying access to websites
  • exfiltrating data from removable flash drives that connect to an infected computer

The TURBINE implants are linked to, and relies upon, a large network of clandestine surveillance “sensors” that the NSA has installed at locations across the world, including the agency’s headquarters in Maryland and eavesdropping bases used by the agency in Misawa, Japan and Menwith Hill, England. Codenamed as TURMOIL, the sensors operate as a sort of high-tech surveillance dragnet, monitoring packets of data as they are sent across the Internet. When TURBINE implants exfiltrate data from infected computer systems, the TURMOIL sensors automatically identify the data and return it to the NSA for analysis. And when targets are communicating, the TURMOIL system can be used to send alerts or “tips” to TURBINE, enabling the initiation of a malware attack. To identify surveillance targets, the NSA uses a series of data “selectors” as they flow across Internet cables. These selectors can include email addresses, IP addresses, or the unique “cookies” containing a username or other identifying information that are sent to a user’s computer by websites such as Google, Facebook, Hotmail, Yahoo, and Twitter, unique Google advertising cookies that track browsing habits, unique encryption key fingerprints that can be traced to a specific user, and computer IDs that are sent across the Internet when a Windows computer crashes or updates.[383][384][385][386][387][388][389][390][391][392][393][394][395][396][397][398]

The CIA was accused by U.S. Senate Intelligence Committee Chairwoman Dianne Feinstein of spying on a stand-alone computer network established for the committee in its investigation of allegations of CIA abuse in a George W. Bush-era detention and interrogation program.[399]

A voice interception program codenamed MYSTIC began in 2009. Along with RETRO, short for “retrospective retrieval” (RETRO is voice audio recording buffer that allows retrieval of captured content up to 30 days into the past), the MYSTIC program is capable of recording “100 percent” of a foreign country’s telephone calls, enabling the NSA to rewind and review conversations up to 30 days and the relating metadata. With the capability to store up to 30 days of recorded conversations MYSTIC enables the NSA to pull an instant history of the person’s movements, associates and plans.[400][401][402][403][404][405]

On March 21, Le Monde published slides from an internal presentation of the Communications Security Establishment Canada, which attributed a piece of malicious software to French intelligence. The CSEC presentation concluded that the list of malware victims matched French intelligence priorities and found French cultural reference in the malware’s code, including the name Babar, a popular French children’s character, and the developer name “Titi”.[406]

The French telecommunications corporation Orange S.A. shares its call data with the French intelligence agency DGSE, which hands over the intercepted data to GCHQ.[407]

The NSA has spied on the Chinese technology company Huawei.[408][409][410] Huawei is a leading manufacturer of smartphones, tablets, mobile phone infrastructure, and WLAN routers and installs fiber optic cable. According to Der Spiegel this “kind of technology […] is decisive in the NSA’s battle for data supremacy.”[411] The NSA, in an operation named “Shotgiant”, was able to access Huawei’s email archive and the source code for Huawei’s communications products.[411] The US government has had longstanding concerns that Huawei may not be independent of the People’s Liberation Army and that the Chinese government might use equipment manufactured by Huawei to conduct cyberespionage or cyberwarfare. The goals of the NSA operation were to assess the relationship between Huawei and the PLA, to learn more the Chinese government’s plans and to use information from Huawei to spy on Huawei’s customers, including Iran, Afghanistan, Pakistan, Kenya, and Cuba. Former Chinese President Hu Jintao, the Chinese Trade Ministry, banks, as well as telecommunications companies were also targeted by the NSA.[408][411]

The Intercept published a document of an NSA employee discussing how to build a database of IP addresses, webmail, and Facebook accounts associated with system administrators so that the NSA can gain access to the networks and systems they administer.[412][413]

At the end of March 2014, Der Spiegel and The Intercept published, based on a series of classified files from the archive provided to reporters by NSA whistleblower Edward Snowden, articles related to espionage efforts by GCHQ and NSA in Germany.[414][415] The British GCHQ targeted three German internet firms for information about Internet traffic passing through internet exchange points, important customers of the German internet providers, their technology suppliers as well as future technical trends in their business sector and company employees.[414][415] The NSA was granted by the Foreign Intelligence Surveillance Court the authority for blanket surveillance of Germany, its people and institutions, regardless whether those affected are suspected of having committed an offense or not, without an individualized court order specifying on March 7, 2013.[415] In addition Germany’s chancellor Angela Merkel was listed in a surveillance search machine and database named Nymrod along with 121 others foreign leaders.[414][415] As The Intercept wrote: “The NSA uses the Nymrod system to ‘find information relating to targets that would otherwise be tough to track down,’ according to internal NSA documents. Nymrod sifts through secret reports based on intercepted communications as well as full transcripts of faxes, phone calls, and communications collected from computer systems. More than 300 ‘cites’ for Merkel are listed as available in intelligence reports and transcripts for NSA operatives to read.”[414]

April

Towards the end of April, Edward Snowden said that the United States surveillance agencies spy on Americans more than anyone else in the world, contrary to anything that has been said by the government up until this point.[416]

May

An article published by Ars Technica shows NSA’s Tailored Access Operations (TAO) employees intercepting a Cisco router.[417]

The Intercept and WikiLeaks revealed information about which countries were having their communications collected as part of the MYSTIC surveillance program. On May 19, The Intercept reported that the NSA is recording and archiving nearly every cell phone conversation in the Bahamas with a system called SOMALGET, a subprogram of MYSTIC. The mass surveillance has been occurring without the Bahamian government’s permission.[418] Aside from the Bahamas, The Intercept reported NSA interception of cell phone metadata in Kenya, the Philippines, Mexico and a fifth country it did not name due to “credible concerns that doing so could lead to increased violence.” WikiLeaks released a statement on May 23 claiming that Afghanistan was the unnamed nation.[419]

In a statement responding to the revelations, the NSA said “the implication that NSA’s foreign intelligence collection is arbitrary and unconstrained is false.”[418]

Through its global surveillance operations the NSA exploits the flood of images included in emails, text messages, social media, videoconferences and other communications to harvest millions of images. These images are then used by the NSA in sophisticated facial recognition programs to track suspected terrorists and other intelligence targets.[420]

June

Vodafone revealed that there were secret wires that allowed government agencies direct access to their networks.[421] This access does not require warrants and the direct access wire is often equipment in a locked room.[421] In six countries where Vodafone operates, the law requires telecommunication companies to install such access or allows governments to do so.[421] Vodafone did not name these countries in case some governments retaliated by imprisoning their staff.[421]Shami Chakrabarti of Liberty said “For governments to access phone calls at the flick of a switch is unprecedented and terrifying. Snowden revealed the internet was already treated as fair game. Bluster that all is well is wearing pretty thin – our analogue laws need a digital overhaul.”[421] Vodafone published its first Law Enforcement Disclosure Report on June 6, 2014.[421] Vodafone group privacy officer Stephen Deadman said “These pipes exist, the direct access model exists. We are making a call to end direct access as a means of government agencies obtaining people’s communication data. Without an official warrant, there is no external visibility. If we receive a demand we can push back against the agency. The fact that a government has to issue a piece of paper is an important constraint on how powers are used.”[421] Gus Hosein, director of Privacy International said “I never thought the telcos would be so complicit. It’s a brave step by Vodafone and hopefully the other telcos will become more brave with disclosure, but what we need is for them to be braver about fighting back against the illegal requests and the laws themselves.”[421]

Above-top-secret documentation of a covert surveillance program named Overseas Processing Centre 1 (OPC-1) (codenamed “CIRCUIT”) by GCHQ was published by The Register. Based on documents leaked by Edward Snowden, GCHQ taps into undersea fiber optic cables via secret spy bases near the Strait of Hormuz and Yemen. BT and Vodafone are implicated.[422]

The Danish newspaper Dagbladet Information and The Intercept revealed on June 19, 2014, the NSA mass surveillance program codenamed RAMPART-A. Under RAMPART-A, ‘third party’ countries tap into fiber optic cables carrying the majority of the world’s electronic communications and are secretly allowing the NSA to install surveillance equipment on these fiber-optic cables. The foreign partners of the NSA turn massive amounts of data like the content of phone calls, faxes, e-mails, internet chats, data from virtual private networks, and calls made using Voice over IP software like Skype over to the NSA. In return these partners receive access to the NSA’s sophisticated surveillance equipment so that they too can spy on the mass of data that flows in and out of their territory. Among the partners participating in the NSA mass surveillance program are Denmark and Germany.[423][424][425]

July

During the week of July 4, a 31-year-old male employee of Germany‘s intelligence service BND was arrested on suspicion of spying for the United States. The employee is suspected of spying on the German Parliamentary Committee investigating the NSA spying scandal.[426]

Former NSA official and whistleblower William Binney spoke at a Centre for Investigative Journalism conference in London. According to Binney, “at least 80% of all audio calls, not just metadata, are recorded and stored in the US. The NSA lies about what it stores.” He also stated that the majority of fiber optic cables run through the U.S., which “is no accident and allows the US to view all communication coming in.”[427]

The Washington Post released a review of a cache provided by Snowden containing roughly 160,000 text messages and e-mails intercepted by the NSA between 2009 and 2012. The newspaper concluded that nine out of ten account holders whose conversations were recorded by the agency “were not the intended surveillance targets but were caught in a net the agency had cast for somebody else.” In its analysis, The Post also noted that many of the account holders were Americans.[428]

On July 9, a soldier working within Germany’s Federal Ministry of Defence (BMVg) fell under suspicion of spying for the United States.[429] As a result of the July 4 case and this one, the German government expelled the CIA station chief in Germany on July 17.[430]

On July 18, former State Department official John Tye released an editorial in The Washington Post, highlighting concerns over data collection under Executive Order 12333. Tye’s concerns are rooted in classified material he had access to through the State Department, though he has not publicly released any classified materials.[431]

August

The Intercept reported that the NSA is “secretly providing data to nearly two dozen U.S. government agencies with a ‘Google-like’ search engine” called ICREACH. The database, The Intercept reported, is accessible to domestic law enforcement agencies including the FBI and the Drug Enforcement Administration and was built to contain more than 850 billion metadata records about phone calls, emails, cellphone locations, and text messages.[432][433]

2015

February

Based on documents obtained from Snowden, The Intercept reported that the NSA and GCHQ had broken into the internal computer network of Gemalto and stolen the encryption keys that are used in SIM cards no later than 2010. As of 2015, the company is the world’s largest manufacturer of SIM cards, making about two billion cards a year. With the keys, the intelligence agencies could eavesdrop on cell phones without the knowledge of mobile phone operators or foreign governments.[434]

March

The New Zealand Herald, in partnership with The Intercept, revealed that the New Zealand government used XKeyscore to spy on candidates for the position of World Trade Organization director general[435] and also members of the Solomon Islands government.[436]

April

In January 2015, the DEA revealed that it had been collecting metadata records for all telephone calls made by Americans to 116 countries linked to drug trafficking. The DEA’s program was separate from the telephony metadata programs run by the NSA.[437] In April, USA Today reported that the DEA’s data collection program began in 1992 and included all telephone calls between the United States and from Canada and Mexico. Current and former DEA officials described the program as the precursor of the NSA’s similar programs.[438] The DEA said its program was suspended in September 2013, after a review of the NSA’s programs and that it was “ultimately terminated.”[437]

2016

January

August

Reaction

Reactions of citizens

The disclosure provided impetus for the creation of social movements against mass surveillance, such as Restore the Fourth, and actions like Stop Watching Us and The Day We Fight Back. On the legal front, the Electronic Frontier Foundation joined a coalition of diverse groups filing suit against the NSA. Several human rights organizations have urged the Obama administration not to prosecute, but protect, “whistleblower Snowden”: Amnesty International, Human Rights Watch, Transparency International, and the Index on Censorship, among others.[442][443][444][445] On the economic front, several consumer surveys registered a drop in online shopping and banking activity as a result of the Snowden revelations.[446]

Reactions of political leaders

United States

File:US President Barack Obama, surveillance activities, June 2013.ogv

On June 7, 2013, President Obama emphasized the importance of surveillance to prevent terrorist attacks

Domestically, President Barack Obama claimed that there is “no spying on Americans”,[447][448] and White House Press Secretary Jay Carney asserted that the surveillance programs revealed by Snowden have been authorized by Congress.[449]

On the international front, U.S. Attorney General Eric Holder stated that “we cannot target even foreign persons overseas without a valid foreign intelligence purpose.”[450]

United Kingdom

Prime Minister David Cameron warned journalists that “if they don’t demonstrate some social responsibility it will be very difficult for government to stand back and not to act.”[451]Deputy Prime MinisterNick Clegg emphasized that the media should “absolutely defend the principle of secrecy for the intelligence agencies”.[452]

Foreign Secretary William Hague claimed that “we take great care to balance individual privacy with our duty to safeguard the public and UK national security.”[453] Hague defended the Five Eyes alliance and reiterated that the British-U.S. intelligence relationship must not be endangered because it “saved many lives”.[454]

Australia

Former Prime Minister Tony Abbott stated that “every Australian governmental agency, every Australian official at home and abroad, operates in accordance with the law”.[455] Abbott criticized the Australian Broadcasting Corporation for being unpatriotic due to its reporting on the documents provided by Snowden, whom Abbott described as a “traitor”.[456][457] Foreign Minister Julie Bishop also denounced Snowden as a traitor and accused him of “unprecedented” treachery.[458] Bishop defended the Five Eyes alliance and reiterated that the Australian–U.S. intelligence relationship must not be endangered because it “saves lives”.[459]

Germany

Lawyers and judges protest boundless monitoring at PRISM debate in Germany, 18 November 2013

In July 2013, Chancellor Angela Merkel defended the surveillance practices of the NSA, and described the United States as “our truest ally throughout the decades”.[460][461] After the NSA’s surveillance on Merkel was revealed, however, the Chancellor compared the NSA with the Stasi.[462] According to The Guardian, Berlin is using the controversy over NSA spying as leverage to enter the exclusive Five Eyes alliance.[463]

Interior Minister Hans-Peter Friedrich stated that “the Americans take our data privacy concerns seriously.”[464] Testifying before the German Parliament, Friedrich defended the NSA’s surveillance, and cited five terrorist plots on German soil that were prevented because of the NSA.[465] However, in April 2014, another German interior minister criticized the United States for failing to provide sufficient assurances to Germany that it had reined in its spying tactics. Thomas de Maiziere, a close ally of Merkel, told Der Spiegel: “U.S. intelligence methods may be justified to a large extent by security needs, but the tactics are excessive and over-the-top.”[466]

Sweden

Minister for Foreign AffairsCarl Bildt, defended the FRA and described its surveillance practices as a “national necessity”.[467]Minister for DefenceKarin Enström said that Sweden’s intelligence exchange with other countries is “critical for our security” and that “intelligence operations occur within a framework with clear legislation, strict controls and under parliamentary oversight.”[468][469]

Netherlands

Interior Minister Ronald Plasterk apologized for incorrectly claiming that the NSA had collected 1.8 million records of metadata in the Netherlands. Plasterk acknowledged that it was in fact Dutch intelligence services who collected the records and transferred them to the NSA.[470][471]

Denmark

The Danish Prime Minister Helle Thorning-Schmidt has praised the American intelligence agencies, claiming they have prevented terrorist attacks in Denmark, and expressed her personal belief that the Danish people “should be grateful” for the Americans’ surveillance.[472] She has later claimed that the Danish authorities have no basis for assuming that American intelligence agencies have performed illegal spying activities towards Denmark or Danish interests.[473]

Review of intelligence agencies

Germany

In July 2013, the German government announced an extensive review of Germany’s intelligence services.[474][475]

United States

In August 2013, the U.S. government announced an extensive review of U.S. intelligence services.[476][477]

United Kingdom

In October 2013, the British government announced an extensive review of British intelligence services.[478]

Canada

In December 2013, the Canadian government announced an extensive review of Canada’s intelligence services.[479]

Criticism

In January 2014, U.S. President Barack Obama said that “the sensational way in which these disclosures have come out has often shed more heat than light”[23] and critics such as Sean Wilentz claimed that “the NSA has acted far more responsibly than the claims made by the leakers and publicized by the press.” In Wilentz’ view “The leakers have gone far beyond justifiably blowing the whistle on abusive programs. In addition to their alarmism about [U.S.] domestic surveillance, many of the Snowden documents released thus far have had nothing whatsoever to do with domestic surveillance.”[24]Edward Lucas, former Moscow bureau chief for The Economist, agreed, asserting that “Snowden’s revelations neatly and suspiciously fits the interests of one country: Russia” and citing Masha Gessen‘s statement that “The Russian propaganda machine has not gotten this much mileage out of a US citizen since Angela Davis‘s murder trial in 1971.”[480]

Bob Cesca objected to The New York Times failing to redact the name of an NSA employee and the specific location where an al Qaeda group was being targeted in a series of slides the paper made publicly available.[481]

Russian journalist Andrei Soldatov argued that Snowden’s revelations had had negative consequences for internet freedom in Russia, as Russian authorities increased their own surveillance and regulation on the pretext of protecting the privacy of Russian users. Snowden’s name was invoked by Russian legislators who supported measures forcing platforms such as Google, Facebook, Twitter and Gmail and YouTube to locate their servers on Russian soil or install SORM black boxes on their servers so that Russian authorities could control them.[482] Soldatov also contended that as a result of the disclosures, international support for having national governments take over the powers of the organizations involved in coordinating the Internet’s global architectures had grown, which could lead to a Balkanization of the Internet that restricted free access to information.[483] The Montevideo Statement on the Future of Internet Cooperation issued in October 2013, by ICANN and other organizations warned against “Internet fragmentation at a national level” and expressed “strong concern over the undermining of the trust and confidence of Internet users globally due to recent revelations”.[484]

In late 2014, Freedom House said “[s]ome states are using the revelations of widespread surveillance by the U.S. National Security Agency (NSA) as an excuse to augment their own monitoring capabilities, frequently with little or no oversight, and often aimed at the political opposition and human rights activists.”[485]

Gallery

Comparison with other leaks

Year Disclosure Size Main source(s) Major publisher(s)
2016 Panama Papers 11.5 million documents “John Doe” Süddeutsche Zeitung, International Consortium of Investigative Journalists, The Guardian, BBC, Le Monde, Tamedia, Falter, La Nación, NDR, WDR, ORF
2013 Global surveillance disclosure 1.5–1.77 million documents[486] Edward Snowden The Guardian, The New York Times, The Washington Post, Der Spiegel, El País, Le Monde, L’espresso, O Globo, ProPublica, Australian Broadcasting Corporation, Canadian Broadcasting Corporation, NRC Handelsblad, Sveriges Television
2010 U.S. Army and U.S. State Department documents 734,885 files Chelsea Manning The Guardian, The New York Times, Der Spiegel, Le Monde, El País, WikiLeaksThe material consisted of:

1971 Pentagon Papers 4,100 pages Daniel Ellsberg The New York Times

See also

https://en.wikipedia.org/wiki/Global_surveillance_disclosures_(2013%E2%80%93present)

Story 2: Lying Lunatic Left Democratic National Committee Chair Tom Perez Cracks up — Videos — 

New DNC chair Tom Perez hits out against Trump and does not recognize the results of elections

DNC Chair Tom Perez Rants That Donald Trump Didn’t Win The Election

Trump Worst President in US History – New Democrat Chairman

Michelle Malkin dishes the dirt on Thomas Perez.

Rachel Maddow Blaming Russia for Brock/Clinton Sabotage of Sanders Social Media, New low

Bernie Sanders Shilling of Russia Fairytale is Shameful Protectionism of Democratic Establishment

Enough with the Democratic Party Doesn’t Get It….They Totally Get It & Keep Playing Us as Fools

DNC Chair Debate Shows Why Party Political Graveyard for True People’s Movement

DNC chair Tom Perez: Literally hours into his presidency Trump proved he was a fraud

Bernie Sanders Speaks On New DNC Chair Tom Perez

Watch: DNC chair Tom Perez becomes unhinged, goes on profanity-laced anti-Trump rant

Newly elected chairman of the Democratic National Committee Tom Perez became unhinged during an event in New Jersey on Friday, where he claimed that President Donald Trump “didn’t win” last year’s presidential election.

During a short speech at an event hosted by the New Jersey Working Families Alliance in Newark on Friday, Perez hailed Democratic opposition to the Republican plan to replace Obamacare and declared that although Jan. 20 — the day Trump became president — was historic, Jan. 21 was even more important because that’s the day “the resistance took over,” while lauding protesters across the nation.

“They marched all over the world and said, “Donald Trump, you don’t stand for our values…Donald Trump you didn’t win the election,’” Perez claimed.

Later in his speech, Perez bashed Trump for “wanting his name on everything,” citing Trump Tower and “Trump steaks,” but noted that when it came to the GOP health care repeal plan, Trump didn’t want to put his name on it.

That’s when Perez made an unbelievable claim.

“Republicans don’t give a sh*t about people,” he said when talking about the GOP health care plan. “That’s what it’s about.”

Perez’s comment incited a thunderous applause and cheers from the crowd.

Prior to being elected DNC chairman earlier this year, Perez served as the labor secretary under former President Barack Obama.

TheBlaze has reached out to the DNC for comment and will update if we receive a response.

http://www.theblaze.com/news/2017/04/01/watch-dnc-chair-tom-perez-becomes-unhinged-goes-on-profanity-laced-anti-trump-rant/

Tom Perez won’t apologize for insulting Trump and GOP leaders. Here’s why.

April 2 at 6:17 PM

On Friday, Democratic National Committee Chairman Tom Perez told activists in New Jersey that their protests were hitting the Trump administration where it hurt. He pointed to Jan. 21, the day of the Women’s March, as the start of a resistance that had been more effective than critics ever expected.

“Women marched all over the world and said: Donald Trump, you don’t stand for our values!” Perez said. “That’s what they said. Donald Trump, you didn’t win this election!” If anyone didn’t want to hear this, Perez had an answer: “I don’t care, because they don’t give a s— about people.”

Hours later, the conservative Daily Caller posted clips of Perez’s remarks for a story that was shared on Facebook more than 18,000 times. Ronna Romney McDaniel, the new chair of the Republican National Committee, demanded an apology for the “dangerous” remarks, snarking that Perez “needs a lesson on how the electoral college works.”

But Perez did not apologize. On Saturday, in Texas, he said exactly the same thing. In an email, Perez spokeswoman Xochitl Hinojosa explained that the DNC chair was not going to stop belittling Trump’s victory.

“Tom has not only pointed out that the Russians interfered in this election to help Donald Trump get elected, but Hillary Clinton won the popular vote by nearly 3 million people,” Hinojosa said. “Since before Trump stepped foot in the Oval Office, his divisive and destructive views had already been rejected by a vast majority of the American people.”

Perez’s speeches, which made news on conservative websites all weekend, reflected the tonal shift — perhaps a permanent one — that Democrats have undergone since their 2016 defeat. Covering Perez’s campaign for DNC chair, I saw firsthand how the affable former labor secretary grew more and more aggressive in the ways he mocked and decried the Trump administration.

That sometimes involved four-letter words. At a speech in Detroit, Perez said Trump graduated from “Makin’ S— Up University,” and at several live-streamed candidate forums, he described the administration’s executive orders on labor rules as “bulls—t.” The New Jersey and Texas speeches were the latest in a string of fiery Perez open mics; they were just the first to cross the radar of conservative media.

Democrats don’t mind the attention. Their new, harsher tone came after Clinton and the entire Democratic Party tried, and failed, to brand Trump as too crude to serve in the White House. As a post-election study by the Wesleyan Media Project found, Clinton’s ad campaign was historically negative and light on policy, with 90 percent of its TV commercials focusing on Trump’s personality. The upshot of those ads was that a President Trump would embarrass Americans. In “Role Models,” viewers saw bewildered children watch Trump on TV as he shoots off insults.

In “Captain Khan,” a well-made ad that dazzled pundits, the father of a Muslim U.S. soldier who had been killed in action in Iraq reflected on how Trump’s insults and threat to ban Muslims from entering the United States made him feel unwelcome in a country he now calls home.

We can cut to the chase: These ads did not work. Compelling, and designed in part to keep educated suburbanites in Clinton’s camp, they were predicated on the theory that voters would see Trump as unacceptable and overcome doubts to vote for the Democrat. In key states, even though majorities of voters viewed Trump unfavorably, pluralities picked him anyway.

The long tail of that experience is that progressives stopped caring about the tone of politics. They felt that Clinton, by failing to strip the bark off Trump’s record and policies, had blown an advantage with voters who saw her as more qualified to be president. In the moment, Michelle Obama’s saying that “when they go low, we go high” mirrored what progressives felt about the campaign. As soon as Clinton lost, it felt like a giant strategic error. (And it never took into account the rumors, fed in conservative media for decades, that Clinton was a foul-mouthed tyrant when the cameras were off.)

Remember “When they go low we go high?”
Yeah, that’s super dead.

Clinton’s approach was summed up in the second presidential debate, which Trump entered at a serious disadvantage, bleeding support after the release of the “Access Hollywood” tape in which he bragged about sexually assaulting a woman. Trump’s solution: bring four women who had accused Bill Clinton of sexual assault to the debate and deflect a question about his own scandal by attacking his opponent’s husband.

Hillary Clinton responded by invoking Trump’s insults.

When I hear something like that, I am reminded of what my friend Michelle Obama advised us all. When they go low, you go high. And, look, if this were just about one video, maybe what he is saying tonight would be understandable. But everyone can draw their own conclusions at this point about whether or not the man in the video or the man on the stage respects women. But he never apologizes for anything to anyone. He never apologized to Mr. And Mrs. Khan, the Gold Star family whose son, Captain Khan, died in the line of duty in Iraq, and Donald insulted and attacked them for weeks over their religion. He never apologized to the distinguished federal judge who was born in Indiana, but Donald said he couldn’t be trusted to be a judge because his parents were “Mexican.” He never apologized to the reporter that he mimicked and mocked on national television and our children were watching. And he never apologized for the racist lie that President Obama was not born in the United States of America. He owes the president an apology and he owes our country an apology and he needs to take responsibility for his actions and his words.

Again, in the moment, this was exactly what Democrats wanted to hear — and what they thought voters wanted to hear. It was inconceivable that the man who perpetuated the “birther” lie could take the presidency. But since then, they’ve seen Trump get away with plenty more insults. More important, they’ve reflected on how Clinton made her response personal, instead of tying Trump to the Republican Party and its policies. And one result was watching Trump take the White House.

This has not just curdled political rhetoric in general; it has emboldened Democrats to make fun of the increasingly unpopular president, and to portray Republicans as dishonest and heartless. One might argue that they’ve always said that about Republicans, but again, the Clinton campaign tried to “go high” about this stuff. In her August 2016 speech condemning the “alt-right,” Clinton noted that House Speaker Paul D. Ryan (R-Wis.) had condemned Trump’s insult of the judge handling his university fraud case and attacked Stephen K. Bannon for his criticism of Ryan’s “social-justice Catholicism.”

Clinton’s reward? Ryan would demand that she fire Catholic staffers whose conversation criticizing right-wing elements in the church was stolen by hackers and released by WikiLeaks. In my coverage of the left, Clinton’s occasional attempts to separate Trump from the broader, “reasonable” Republican Party are remembered as massive strategic errors.

Perez, who endorsed Clinton for president, has more or less embraced that view. Asked whether he would apologize for the “give a s—” line, Hinojosa said Perez stood by his comment completely.

“Tom Perez has said repeatedly, including in New Jersey, that Republican leaders like Donald Trump, Paul Ryan and others in Congress have shown us that they don’t care about the American people, especially when it comes to providing families with affordable health insurance,” she said in the email. “The Republican health-care bill would have taken away coverage from 24 million people, imposed an age tax, and made Americans pay more money for less care. Republicans are making it harder to save for retirement, and one of the first acts under President Trump was to make it harder for homebuyers to afford a mortgage. These actions and many others are further proof that Republican leaders in Washington don’t care about the American people and are only looking out for their wealthy friends.”

There were fewer four-letter words in that statement, but it’s part of a continuum of Trump-era Democratic rhetoric. In 2016, the party learned that voters really did not mind if a candidate was rough or profane. It cost a few voters; to more, it came across as toughness. Democrats no longer shame voters for putting up with Trump’s rhetoric. They portray him as a phony who didn’t earn his victory and is betraying the voters who trusted him. They don’t know if this will work. But they’re sure as s— going to try.

https://www.washingtonpost.com/news/the-fix/wp/2017/04/02/tom-perez-wont-apologize-for-insulting-trump-and-gop-leaders-heres-why/?utm_term=.57211dd7332d

The Pronk Pops Show Podcasts Portfolio

Listen To Pronk Pops Podcast or Download Shows 864-866

Listen To Pronk Pops Podcast or Download Shows 857-863

Listen To Pronk Pops Podcast or Download Shows 850-856

Listen To Pronk Pops Podcast or Download Shows 845-849

Listen To Pronk Pops Podcast or Download Shows 840-844

Listen To Pronk Pops Podcast or Download Shows 833-839

Listen To Pronk Pops Podcast or Download Shows 827-832

Listen To Pronk Pops Podcast or Download Shows 821-826

Listen To Pronk Pops Podcast or Download Shows 815-820

Listen To Pronk Pops Podcast or Download Shows 806-814

Listen To Pronk Pops Podcast or Download Shows 800-805

Listen To Pronk Pops Podcast or Download Shows 793-799

Listen To Pronk Pops Podcast or Download Shows 785-792

Listen To Pronk Pops Podcast or Download Shows 777-784

Listen To Pronk Pops Podcast or Download Shows 769-776

Listen To Pronk Pops Podcast or Download Shows 759-768

Listen To Pronk Pops Podcast or Download Shows 751-758

Listen To Pronk Pops Podcast or Download Shows 745-750

Listen To Pronk Pops Podcast or Download Shows 738-744

Listen To Pronk Pops Podcast or Download Shows 732-737

Listen To Pronk Pops Podcast or Download Shows 727-731

Listen To Pronk Pops Podcast or Download Shows 720-726

Listen To Pronk Pops Podcast or DownloadShows 713-719

Listen To Pronk Pops Podcast or DownloadShows 705-712

Listen To Pronk Pops Podcast or Download Shows 695-704

Listen To Pronk Pops Podcast or Download Shows 685-694

Listen To Pronk Pops Podcast or Download Shows 675-684

Listen To Pronk Pops Podcast or Download Shows 668-674

Listen To Pronk Pops Podcast or Download Shows 660-667

Listen To Pronk Pops Podcast or Download Shows 651-659

Listen To Pronk Pops Podcast or Download Shows 644-650

Listen To Pronk Pops Podcast or Download Shows 637-643

Listen To Pronk Pops Podcast or Download Shows 629-636

Listen To Pronk Pops Podcast or Download Shows 617-628

Listen To Pronk Pops Podcast or Download Shows 608-616

Listen To Pronk Pops Podcast or Download Shows 599-607

Listen To Pronk Pops Podcast or Download Shows 590-598

Listen To Pronk Pops Podcast or Download Shows 585- 589

Listen To Pronk Pops Podcast or Download Shows 575-584

Listen To Pronk Pops Podcast or Download Shows 565-574

Listen To Pronk Pops Podcast or Download Shows 556-564

Listen To Pronk Pops Podcast or Download Shows 546-555

Listen To Pronk Pops Podcast or Download Shows 538-545

Listen To Pronk Pops Podcast or Download Shows 532-537

Listen To Pronk Pops Podcast or Download Shows 526-531

Listen To Pronk Pops Podcast or Download Shows 519-525

Listen To Pronk Pops Podcast or Download Shows 510-518

Listen To Pronk Pops Podcast or Download Shows 500-509

Listen To Pronk Pops Podcast or Download Shows 490-499

Listen To Pronk Pops Podcast or Download Shows 480-489

Listen To Pronk Pops Podcast or Download Shows 473-479

Listen To Pronk Pops Podcast or Download Shows 464-472

Listen To Pronk Pops Podcast or Download Shows 455-463

Listen To Pronk Pops Podcast or Download Shows 447-454

Listen To Pronk Pops Podcast or Download Shows 439-446

Listen To Pronk Pops Podcast or Download Shows 431-438

Listen To Pronk Pops Podcast or Download Shows 422-430

Listen To Pronk Pops Podcast or Download Shows 414-421

Listen To Pronk Pops Podcast or Download Shows 408-413

Listen To Pronk Pops Podcast or Download Shows 400-407

Listen To Pronk Pops Podcast or Download Shows 391-399

Listen To Pronk Pops Podcast or Download Shows 383-390

Listen To Pronk Pops Podcast or Download Shows 376-382

Listen To Pronk Pops Podcast or Download Shows 369-375

Listen To Pronk Pops Podcast or Download Shows 360-368

Listen To Pronk Pops Podcast or Download Shows 354-359

Listen To Pronk Pops Podcast or Download Shows 346-353

Listen To Pronk Pops Podcast or Download Shows 338-345

Listen To Pronk Pops Podcast or Download Shows 328-337

Listen To Pronk Pops Podcast or Download Shows 319-327

Listen To Pronk Pops Podcast or Download Shows 307-318

Listen To Pronk Pops Podcast or Download Shows 296-306

Listen To Pronk Pops Podcast or Download Shows 287-295

Listen To Pronk Pops Podcast or Download Shows 277-286

Listen To Pronk Pops Podcast or Download Shows 264-276

Listen To Pronk Pops Podcast or Download Shows 250-263

Listen To Pronk Pops Podcast or Download Shows 236-249

Listen To Pronk Pops Podcast or Download Shows 222-235

Listen To Pronk Pops Podcast or Download Shows 211-221

Listen To Pronk Pops Podcast or Download Shows 202-210

Listen To Pronk Pops Podcast or Download Shows 194-201

Listen To Pronk Pops Podcast or Download Shows 184-193

Listen To Pronk Pops Podcast or Download Shows 174-183

Listen To Pronk Pops Podcast or Download Shows 165-173

Listen To Pronk Pops Podcast or Download Shows 158-164

Listen To Pronk Pops Podcast or Download Shows151-157

Listen To Pronk Pops Podcast or Download Shows 143-150

Listen To Pronk Pops Podcast or Download Shows 135-142

Listen To Pronk Pops Podcast or Download Shows 131-134

Listen To Pronk Pops Podcast or Download Shows 124-130

Listen To Pronk Pops Podcast or Download Shows 121-123

Listen To Pronk Pops Podcast or Download Shows 118-120

Listen To Pronk Pops Podcast or Download Shows 113 -117

Listen To Pronk Pops Podcast or Download Show 112

Listen To Pronk Pops Podcast or Download Shows 108-111

Listen To Pronk Pops Podcast or Download Shows 106-108

Listen To Pronk Pops Podcast or Download Shows 104-105

Listen To Pronk Pops Podcast or Download Shows 101-103

Listen To Pronk Pops Podcast or Download Shows 98-100

Listen To Pronk Pops Podcast or Download Shows 94-97

Listen To Pronk Pops Podcast or Download Show 93

Listen To Pronk Pops Podcast or Download Show 92

Listen To Pronk Pops Podcast or Download Show 91

Listen To Pronk Pops Podcast or Download Shows 88-90

Listen To Pronk Pops Podcast or Download Shows 84-87

Listen To Pronk Pops Podcast or Download Shows 79-83

Listen To Pronk Pops Podcast or Download Shows 74-78

Listen To Pronk Pops Podcast or Download Shows 71-73

Listen To Pronk Pops Podcast or Download Shows 68-70

Listen To Pronk Pops Podcast or Download Shows 65-67

Listen To Pronk Pops Podcast or Download Shows 62-64

Listen To Pronk Pops Podcast or Download Shows 58-61

Listen To Pronk Pops Podcast or Download Shows 55-57

Listen To Pronk Pops Podcast or Download Shows 52-54

Listen To Pronk Pops Podcast or Download Shows 49-51

Listen To Pronk Pops Podcast or Download Shows 45-48

Listen To Pronk Pops Podcast or Download Shows 41-44

Listen To Pronk Pops Podcast or Download Shows 38-40

Listen To Pronk Pops Podcast or Download Shows 34-37

Listen To Pronk Pops Podcast or Download Shows 30-33

Listen To Pronk Pops Podcast or Download Shows 27-29

Listen To Pronk Pops Podcast or Download Shows 17-26

Listen To Pronk Pops Podcast or Download Shows 16-22

Listen To Pronk Pops Podcast or Download Shows 10-15

Listen To Pronk Pops Podcast or Download Shows 1-9

Read Full Post | Make a Comment ( None so far )

The Pronk Pops Show 854, March 8, 2017, Story 1: FBI Search For Vault 7 Leaker Who Gave Wikileaks The CIA Collection of Hacking and Malware Software Tools — Sources and Methods — Treason By The Lying Lunatic Left — Videos — Story 2: -Soros’ and Obama’s Seditious and Subversive War On Trump With Organizing For Action Applying Saul Alinsky’s Rules for Radicals — Videos

Posted on March 9, 2017. Filed under: American History, Blogroll, Breaking News, Congress, Corruption, Countries, Crime, Culture, Donald J. Trump, Donald J. Trump, Donald Trump, Donald Trump, Education, Empires, Employment, Foreign Policy, Fourth Amendment, Freedom of Speech, Government, Health, High Crimes, History, House of Representatives, News, Obama, Philosophy, Photos, Politics, Polls, President Trump, Progressives, Raymond Thomas Pronk, Rule of Law, Scandals, Second Amendment, Senate, Taxation, Taxes, Terror, Terrorism, Unemployment, United States Constitution, United States of America, United States Supreme Court, Videos, Violence, War, Wealth, Weather, Wisdom | Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , |

Project_1

The Pronk Pops Show Podcasts

Pronk Pops Show 854: March 9, 2017

Pronk Pops Show 853: March 8, 2017

Pronk Pops Show 852: March 6, 2017

Pronk Pops Show 851: March 3, 2017

Pronk Pops Show 850: March 2, 2017

Pronk Pops Show 849: March 1, 2017

Pronk Pops Show 848: February 28, 2017

Pronk Pops Show 847: February 27, 2017

Pronk Pops Show 846: February 24, 2017

Pronk Pops Show 845: February 23, 2017

Pronk Pops Show 844: February 22, 2017

Pronk Pops Show 843: February 21, 2017

Pronk Pops Show 842: February 20, 2017

Pronk Pops Show 841: February 17, 2017

Pronk Pops Show 840: February 16, 2017

Pronk Pops Show 839: February 15, 2017

Pronk Pops Show 838: February 14, 2017

Pronk Pops Show 837: February 13, 2017

Pronk Pops Show 836: February 10, 2017

Pronk Pops Show 835: February 9, 2017

Pronk Pops Show 834: February 8, 2017

Pronk Pops Show 833: February 7, 2017

Pronk Pops Show 832: February 6, 2017

Pronk Pops Show 831: February 3, 2017

Pronk Pops Show 830: February 2, 2017

Pronk Pops Show 829: February 1, 2017

Pronk Pops Show 828: January 31, 2017

Pronk Pops Show 827: January 30, 2017

Pronk Pops Show 826: January 27, 2017

Pronk Pops Show 825: January 26, 2017

Pronk Pops Show 824: January 25, 2017

Pronk Pops Show 823: January 24, 2017

Pronk Pops Show 822: January 23, 2017

Pronk Pops Show 821: January 20, 2017

Pronk Pops Show 820: January 19, 2017

Pronk Pops Show 819: January 18, 2017

Pronk Pops Show 818: January 17, 2017

Pronk Pops Show 817: January 13, 2017

Pronk Pops Show 816: January 12, 2017

Pronk Pops Show 815: January 11, 2017

Pronk Pops Show 814: January 10, 2017

Pronk Pops Show 813: January 9, 2017

Pronk Pops Show 812: December 12, 2016

Pronk Pops Show 811: December 9, 2016

Pronk Pops Show 810: December 8, 2016

Pronk Pops Show 809: December 7, 2016

Pronk Pops Show 808: December 6, 2016

Pronk Pops Show 807: December 5, 2016

Pronk Pops Show 806: December 2, 2016

Pronk Pops Show 805: December 1, 2016

 Story 1: FBI Search For Vault 7 Leaker Who Gave Wikileaks The CIA Collection of Hacking and Malware Software Tools — Treason By The Lying Lunatic Left — Videos —

 

Image result for cia wikileaks hacker tools

Image result for cia wikileaks hacker tools

Image result for cartoons cia hacker tools

Image result for cartoons cia hacker tools

Image result for intelligence communityImage result for cia wikileaks hacker tools

TREASON OR BETRAYAL? FBI SET TO LAUNCH CRIMINAL INVESTIGATION INTO WIKILEAKS OVER CIA HACK

Hannity : Former intelligence officials on surveillance tactics and document leaks : 3/8/2017

Treason is in the air

Investigating national security leaks

UK: Assange holds presser on CIA hacking leaks

WATCH: WikiLeaks Julian Assange Press Conference On CIA Hacking (3/9/2017)

Julian Assange Press Conference On The CIA Vault 7 Release | March 9th, 2017

Julian Assange Wikileaks Press Conference, Q&A on CIA Vault 7, Year Zero [03/09/2017]

WikiLeaks publishes apparent CIA hacking tools

WikiLeaks Dump Shows CIA Using Cell Phones And Smart TVs To Listen And WATCH “Everyday Americans”

Can the CIA control your phone? WikiLeaks claims explained

What Pisses Me Off About Wikileaks Vault 7 Release

WikiLeaks Vault 7: What You Should Know and Fear, CIA vs. NSA Turf Battles, How Trump Was Right

VAULT 7: CIA Staged Fake Russian Hacking to Set Up Trump — Russian Cyber-Attack M.O. As False Flag

Lionel “Wikileaks Vault 7 Shows That Trump Is Not Crazy. The CIA Spy On Everybody.”

Wikileaks Claims CIA Is Hacking Americans’ Electronics – Tucker Carlson Tonight – Fox News – 3/7/17

Silent Coup: Obama, FISA, NSA, Deep State vs. President Donald Trump

TUCKER CARLSON reacts to latest CIA scandal and the big story ‘OBAMA CARE LITE’

Former CIA Director: Wikileaks Dump Could Be ‘Very Damaging’ | Andrea Mitchell | MSNBC

CIA lost control of its hacking tools – Wikileaks Vault7 report finding

Fall Out of Wikileak’s Vault 7 Year Zero Release Has Begun. Investigations Initiated.

WikiLeaks Fallout: CIA Revelations Rock The Political Establishment

Bombshell: WikiLeaks Releases Trove Of CIA Documents

Whistleblower: NSA Collecting Data On Every U.S. Citizen

NSA Whistleblower William Binney: The Future of FREEDOM

NSA Surveillance and What To Do About It

Our Almost Orwellian State & NSA Surveillance Forum

How the Government Tracks You: NSA Surveillance

US Surveillance: An Analysis of EO 12333 and Its Global Implications

E.O: 12333 VS Kyle from Secular Talk, debunked again.

Executive Order 12333 (The President’s Inherent Article II Power to Conduct Foreign Intelligence)

Executive Order 12333 (Greatest Hits)

The Silent Order NSA Sees Everything Hears Everything Documentary HD

Judge Rules NSA Surveillance “Almost Orwellian” — Obama Prepares to Leave Spying Program Intact

Glenn Greenwald: The NSA Can “Literally Watch Every Keystroke You Make”

NSA has collected bulk data on Americans since Reagan

NSA surveillance program “almost Orwellian,” federal judge rules

Judgement NSA Violates Unconstitutional Patriot Act

ALGORITHM: The Hacker Movie

FBI prepares for new hunt for WikiLeaks’ source

March 7 at 6:55 PM
The FBI has begun preparing for a major mole hunt to determine how anti-secrecy group WikiLeaks got an alleged arsenal of hacking tools the CIA has used to spy on espionage targets, according to people familiar with the matter.

The leak rattled government and technology industry officials, who spent Tuesday scrambling to determine the accuracy and scope of the thousands of documents released by the group. They were also trying to assess the damage the revelations may cause, and what damage may come from future releases promised by WikiLeaks, these people said.

It was all a familiar scenario for a government that has repeatedly seen sensitive information compromised in recent years.

But cracks keep appearing in the system. Last year, the FBI arrested Harold T. Martin III, an NSA contractor who took home documents detailing some of the agency’s most sensitive offensive cyberweapons. Some of those files later appeared online, although investigators are still trying to determine Martin’s role, if any, in that part of the case.

WikiLeaks says it has a trove on the CIA’s hacking secrets. Washington Post national security reporter Greg Miller explains what these documents reveal. (Dalton Bennett, Greg Miller/The Washington Post)

He has pleaded not guilty to charges that he violated the Espionage Act. Officials call the Martin case the largest theft of classified information in U.S. history.

Now, less than a year after the Martin case, U.S. intelligence agencies are rushing to determine whether they again have suffered an embarrassing compromise at the hands of one of their own.

“Anybody who thinks that the Manning and Snowden problems were one-offs is just dead wrong,’’ said Joel Brenner, former head of U.S. counterintelligence at the office of the Director of National Intelligence. “Ben Franklin said three people can keep a secret if two of them are dead. If secrets are shared on systems in which thousands of people have access to them, that may really not be a secret anymore. This problem is not going away, and it’s a condition of our existence.’’

In Silicon Valley, industry figures said they received no heads-up from the government or the hacking community that such a move by WikiLeaks was in the works. By midday Tuesday, industry officials said they still had not heard from the FBI.

It wasn’t immediately clear if the CIA had sent a crimes report to the Justice Department — a formal mechanism alerting law enforcement of a potentially damaging and illegal national security leak. Such a report would offer the FBI a road map for where to begin investigating, and whom to question.

The FBI and CIA both declined to comment.

Once investigators verify the accuracy of the WikiLeaks documents, a key question to answer is who had access to the information, according to veterans of past leak probes. The FBI has spent years investigating WikiLeaks, and authorities are eager to figure out whether it has recruited a new, well-placed source from the U.S. government.

Anti-secrecy group Wikileaks on Tuesday said it had obtained a top-secret trove of hacking tools used by the CIA to break into phones, communication apps and other electronic devices, and published confidential documents on those programs. (Reuters)

In releasing thousands of pages of documents, WikiLeaks indicated that its source was a former government employee or contractor.

“This extraordinary collection, which amounts to more than several hundred million lines of code, gives its possessor the entire hacking capacity of the CIA,’’ WikiLeaks said in announcing the first release of documents. “The archive appears to have been circulated among former U.S. government hackers and contractors in an unauthorized manner, one of whom has provided WikiLeaks with portions of the archive.’’

One former intelligence official said if that claim is accurate, “there’s going to be another major mole hunt . . . If this is all correct, it’s a big deal.’’

A key distinction for investigators will be whether WikiLeaks reveals the actual computer code — or enough details about such code — that others can develop and deploy some of the hacking tools, according to current and former officials.

The security failures highlighted by damaging leaks from Snowden and Manning have proven difficult to address.

Manning was arrested in Iraq in May 2010 after transmitting documents to WikiLeaks that came to be known as the Iraq and Afghanistan “War Logs.’’ She also leaked a video showing a U.S. Apache helicopter in Baghdad opening fire on a group of people that the crew thought were insurgents. Among the dead were two journalists who worked for Reuters. She also leaked documents pertaining to Guantanamo Bay prisoners, as well as 250,000 State Department cables.

In response to the Manning case, the Obama administration created the National Insider Threat Task Force, designed to teach and train government workers and contractors to spot potential leakers.

Manning, formerly known as Bradley Manning, came out as transgender after her 2013 conviction. In the waning days of his presidency, Barack Obama commuted her 35-year prison sentence, and she is due to be released in coming months.

The post-Manning efforts did not stop Snowden from taking reams of data about sensitive bulk intelligence collection in 2013 and giving the material to reporters. Those revelations, including a court document showing how the government gathered Americans’ phone records, sparked years of political debate about privacy and government surveillance in the digital age.

Snowden has remained out of reach of the U.S. government, living in Russia.

Brenner, the former counterintelligence official, said the net effect of the new leaks could be “very dangerous to us, because they “accelerate the leveling of the playing field between the United States and its adversaries in cyberspace.’’

The bigger lesson of the newest leak, Brenner argued, is that U.S. pursuit of dominance in cyberspace may actually be destabilizing over the long run. “That is a very unsettling debate for our military and our intelligence services, but I think it’s coming,’’ he said.

Snowden also weighed in regarding the alleged CIA documents, tweeting: “What @Wikileaks has here is genuinely a big deal. Looks authentic.’’

https://www.washingtonpost.com/world/national-security/fbi-prepares-for-new-hunt-for-wikileaks-source/2017/03/07/28dcb9e0-0356-11e7-ad5b-d22680e18d10_story.html?utm_term=.0d9871aa3c4c

U.S. aware of CIA security breach in 2016; contractors suspected in leak

By John Walcott and Andrea Shalal | WASHINGTON/BERLIN

U.S. intelligence and law enforcement officials said on Wednesday they have been aware since the end of last year of a security breach at the CIA and were focusing on contractors as the likeliest source of documents being passed on to anti-secrecy group WikiLeaks detailing the agency’s hacking tools.

The officials, who spoke on condition of anonymity, told Reuters that they believed documents published by WikiLeaks on Tuesday about CIA techniques used between 2013 and 2016 were authentic.

The documents showed that CIA hackers could get into Apple Inc (AAPL.O) iPhones, Google Inc (GOOGL.O) Android devices and other gadgets in order to capture text and voice messages before they were encrypted with sophisticated software.

The White House said on Wednesday that President Donald Trump was “extremely concerned” about a CIA security breach that led to the Wikileaks release, and the administration would be tough on leakers.

“Anybody who leaks classified information will be held to the highest degree of law,” spokesman Sean Spicer told reporters.

One official with knowledge of the investigation said companies that are contractors for the CIA have been checking to see which of their employees had access to the material that Wikileaks published, and then going over their computer logs, emails and other communications for any evidence of who might be responsible.

One reason the investigation is focused on a potential leak by contractors rather than for example a hack by Russian intelligence, another official said, is that so far there is no evidence that Russian intelligence agencies tried to exploit any of the leaked material before it was published.

One European official, speaking on condition of anonymity, said the Wikileaks material could in fact lead to closer cooperation between European intelligence agencies and U.S. counterparts, which share concerns about Russian intelligence operations.

U.S. intelligence agencies have accused Russia of seeking to tilt last year’s U.S. presidential election in Trump’s favor, including by hacking into Democratic Party emails. Moscow has denied the allegation.

The lobby of the CIA Headquarters Building in Langley, Virginia, U.S. on August 14, 2008. REUTERS/Larry Downing/File Photo

One major security problem was that the number of contractors with access to information with the highest secrecy classification has “exploded” because of federal budget constraints, the first U.S. official said.

U.S. intelligence agencies have been unable to hire additional permanent staff needed to keep pace with technological advances such as the “Internet of Things” that connects cars, home security and heating systems and other devices to computer networks, or to pay salaries competitive with the private sector, the official said.

Reuters could not immediately verify the contents of the published documents. On Tuesday, several contractors and private cyber security experts said the materials appeared to be legitimate.

A person familiar with Wikileaks’ activities said Wikileaks has had the CIA hacking material for months, and that the release of the material was in the works “for a long time.”

A Congressional official said that the U.S. House of Representatives Intelligence Committee has begun asking questions about the WikiLeaks disclosures.

GERMAN CONCERN

In Germany on Wednesday, the chief federal prosecutor’s office said that it would review the Wikileaks documents because some suggested that the CIA ran a hacking hub from the U.S. consulate in Frankfurt.

“We’re looking at it very carefully,” a spokesman for the federal prosecutor’s office told Reuters. “We will initiate an investigation if we see evidence of concrete criminal acts or specific perpetrators.”

Chancellor Angela Merkel is scheduled to visit Washington on March 14 for her first meeting with Trump, who has sharply criticized Berlin for everything from its trade policy to what he considers inadequate levels of military spending.

The Wikileaks documents may also complicate bilateral intelligence ties that have just begun to recover after a series of scandals, including news in 2013 that the U.S. National Security Agency had bugged Merkel’s cellphone. The Frankfurt consulate was investigated by German lawmakers after that incident.

Merkel told lawmakers last month she did not know how closely Germany’s spies cooperated with their U.S. counterparts until 2015 when former NSA contractor Edward Snowden revealed the BND spy agency had for years passed on information to the NSA about European companies and politicians.

Germany scaled back the level of cooperation with the NSA after those revelations.

U.S. officials have acknowledged that the consulate in Frankfurt is home to a CIA base. A facility adjacent to the city’s airport and the Rhein-Main Air Base has for many years been home to the CIA’s “Tefran” station, a U.S. center for collecting intelligence on Iranian activities in Europe, maintaining surveillance on Iranian officials and targeting potential defectors working in Iran’s nuclear weapons program.

Foreign ministry spokesman Sebastian Fischer told a regular government news conference that Germany took the issue seriously, but more work needed to be done to verify the authenticity of the documents. Berlin was in close touch with Washington about the case and such matters generally, he said.

Government spokesman Steffen Seibert said Germany’s domestic intelligence agency had the job of uncovering espionage activities in Germany, and carried out its work comprehensively.

Wikileaks reported that CIA employees had been given diplomatic passports and State Department identities to carry out their work in Frankfurt, focused on targets in Europe, the Middle East and Africa. The documents included advice for CIA experts about life in Germany, noting that shops are closed on Sundays, and to have “your cover-for-action story down pat” when they were asked by German authorities when entering the country.

(Reporting by John Walcott, Mark Hosenball, Yara Bayoumy in Washington and Matthias Sobolewski and Andrea Shalal in Berlin; Writing by Grant McCool; Editing by Peter Graff, Grant McCool and Frances Kerry)

http://www.reuters.com/article/us-cia-wikileaks-idUSKBN16F2AP?il=0

Wikileaks to hand over alleged CIA spying tools to tech companies

Assange
Assange said he would give tech companies the details of hacks affecting their products  CREDIT: WIKILEAKS

Wikileaks will hand Central Intelligence Agency hacking tools to technology companies in order for them to defend their customers against spying.

Julian Assange, founder of the website, said he had decided to provide the classified information to giants such as Microsoft, Samsung and Apple whose products were implicated in the alleged CIA leaks.

The announcement comes after Wikileaks on Tuesday released a raft of documents that it claims detail tools the CIA used to hack into peoples computers, televisions and smartphones, among other internet-connected devices.

Wikileaks didn’t disclose details of how the tools worked, but basic information that allegedly proves the cyber weapons arsenal exists.

Samsung F8000
The CIA could have hacked Samsung’s F8000 smart TVs to turn them into spying toolsCREDIT: SAMSUNG

In the wake of the release, Assange said tech companies had asked Wikileaks to pass them details of the hacks that affect their products in order for them to fix them.

“After considering what we think is the best way to proceed and hearing calls from some of the manufacturers we have decided to work with them, to give them exclusive access to some of the technical details we have,” said Assange.

With the information Assange said the companies can “effectively disarm” the alleged CIA hacking tools.

It is not clear how long it will take for all of the vulnerabilities to be fixed or if they can all be solved. Some could be blocked in a couple of days, said Assange, while other more critical one could take weeks.

Assange warned that other hacks, such as the one used to turn on a “fake off” spying mode on Samsung smart TVs, may have to be manually blocked. This could prove difficult as it would require people to know their device had been infected in order for it to be fixed.

https://cf-particle-html.eip.telegraph.co.uk/25f7b704-4ac6-4678-a1a0-b3beeb494718.html?ref=http://www.telegraph.co.uk/technology/2017/03/09/wikileaks-hand-alleged-cia-spying-tools-tech-companies/&title=Wikileaks%20to%20hand%20over%20alleged%20CIA%20spying%20tools%20to%20tech%20companies

Apple has responded directly to the alleged CIA hacking tools mentioned in the documents. It says the security vulnerabilities that could have been used to access iPhones were fixed as of its latest security update. Samsung and Google meanwhile have said they are investigating the claims but it is unclear what action they have taken.

The CIA has not commented on the authenticity of the leaks.

http://www.telegraph.co.uk/technology/2017/03/09/wikileaks-hand-alleged-cia-spying-tools-tech-companies/

Assange: WikiLeaks Will Work With Tech Companies

 WikiLeaks has offered to help the likes of Google and Apple identify the software holes used by purported CIA hacking tools – and that puts the tech industry in something of a bind.

While companies have both a responsibility and financial incentive to fix problems in their software, accepting help from WikiLeaks raises legal and ethical questions. And it’s not even clear at this point exactly what kind of assistance WikiLeaks can offer.

THE PROMISE

WikiLeaks founder Julian Assange said Thursday that the anti-secrecy site will help technology companies find and fix software vulnerabilities in everyday gadgets such as phones and TVs. In an online news conference, Assange said some companies had asked for more details about the purported CIA cyberespionage toolkit that he revealed in a massive disclosure on Tuesday.

“We have decided to work with them, to give them some exclusive access to the additional technical details we have, so that fixes can be developed and pushed out,” Assange said. The digital blueprints for what he described as “cyberweapons” would be published to the world “once this material is effectively disarmed by us.”

Any conditions WikiLeaks might set for its cooperation weren’t immediately known. Nor was it clear if WikiLeaks holds additional details on specific vulnerabilities, or merely the tools designed to exploit them.

Apple declined comment on the WikiLeaks offer, and Google didn’t respond to requests for comment. Microsoft said it hopes that anyone with knowledge of software vulnerabilities would report them through the company’s usual channels.

LEGAL QUESTIONS

Tech companies could run into legal difficulties in accepting the offer, especially if they have government contracts or employees with security clearances.

“The unauthorized release of classified documents does not mean it’s unclassified,” said Stewart Baker, a former official at the Department of Homeland Security and former legal counsel for the National Security Agency. “Doing business with WikiLeaks and reviewing classified documents poses a real risk for at least their government contracting arms and their cleared employees.”

Other lawyers, however, are convinced that much of the information in the documents is so widely known that they are now part of the public domain. That means tech companies would be unlikely to face any legal liability for digging deeper with WikiLeaks.

Alternatively, suppose tech companies don’t accept WikiLeaks’ offer to help fix any security flaws – and are subsequently hacked. At that point, they could face charges of negligence, particularly in Europe where privacy laws are much stricter than in the U.S., said Michael Zweiback, a former assistant U.S. attorney and cybercrime adviser now in private practice.

GETTING TOO CLOSE TO WIKILEAKS

Public perception might be a bigger problem. “They don’t want to be seen as endorsing or supporting an organization with a tainted reputation and an unclear agenda,” said Robert Cattanach, a former U.S. Department of Justice attorney.

During the 2016 election, WikiLeaks published thousands of emails, some embarrassing, from breached Democratic Party computers and the account of a top aide to Hillary Clinton. U.S. intelligence agencies concluded those emails were stolen by hackers connected to the Russian government in an attempt to help Donald Trump win the presidency.

The CIA did not respond directly to Assange’s offer, but it appeared to take a dim view of it.

“Julian Assange is not exactly a bastion of truth and integrity,” CIA spokeswoman Heather Fritz Horniak said.

But most tech companies already have digital hotlines to receive tips about security weaknesses, even if they come from unsavory characters. So it wouldn’t break new ground for them to consult with a shadowy organization such as WikiLeaks.

A BETTER PATH

Ideally, the CIA would have shared such vulnerabilities directly with companies, as other government agencies have long done. In that case, companies would not only be dealing with a known entity in an aboveboard fashion, they might also obtain a more nuanced understanding of the problems than their engineers could glean from documents or lines of computer code.

And if companies could learn details about how the CIA found these vulnerabilities, they might also find additional holes using the same technique, said Johannes Ullrich, director of the Internet Storm Center at the SANS Institute.

And there are risks obtaining actual hacking tools from WikiLeaks. Some might have unadvertised features that could, for instance, start extracting data as soon as they launch. Ullrich said the CIA also might have left some traps to attack people running its exploits. If these aren’t detailed in the documents, only the CIA would be able to help tech companies avoid setting them off.

If all goes well, WikiLeaks could emerge looking better than some parts of the U.S. government.

“I am not a fan of WikiLeaks, but I don’t think it is fair to throw rocks at everything they do,” said Cindy Cohn, executive director of the Electronic Frontier Foundation, a group specializing in online privacy and other digital rights. “What WikiLeaks is demonstrating is that the CIA does not have the best interests of these companies at heart.”

BETTER THAN NOTHING

There’s one more unknown, which is just how much help WikiLeaks can actually provide. Apple, Google and Microsoft say they’ve already rendered many of the alleged CIA cyberespionage tools obsolete with earlier updates that patched related software holes.

Still, the companies will probably want to check out what WikiLeaks has, assuming that the organization hasn’t set unreasonable conditions on its cooperation. Some privacy and security experts believe the CIA’s own refusal to contact the affected companies about the vulnerabilities gives them little choice.

“We all should have better security, and certainly at this point, not trying to fixing them makes no sense,” Cohn said.

Liedtke reported from San Ramon, Calif. Raphael Satter in Paris, Paisley Dodds in London and Deb Riechmann in Washington contributed to this report.

This story has been corrected to reflect that purported CIA tools are not aimed at “defeating encryption” but at hijacking computers.

http://hosted.ap.org/dynamic/stories/U/US_WIKILEAKS_CIA?SITE=AP&SECTION=HOME&TEMPLATE=DEFAULT&CTIME=2017-03-09-17-09-24

Why Is Obama Expanding Surveillance Powers Right Before He Leaves Office?

It could be to prevent Trump from extending them even more.

Obama waves at the end of his farewell address in Chicago
The Obama administration made it easier for the NSA to share information with other intelligence agencies, just weeks before the inauguration.Jonathan Ernst / Reuters
On Thursday, the Obama administration finalized new rules that allow the National Security Agency to share information it gleans from its vast international surveillance apparatus with the 16 other agencies that make up the U.S. intelligence community.With the new changes, which were long in the works, those agencies can apply for access to various feeds of raw, undoctored NSA intelligence. Analysts will then be able to sift through the contents of those feeds as they see fit, before implementing required privacy protections. Previously, the NSA applied those privacy protections itself, before forwarding select pieces of information to agencies that might need to see them.The updated procedures will multiply the number of intelligence analysts who have access to NSA surveillance, which is captured in large quantities and often isn’t subject to warrant requirements. The changes rankled privacy advocates, who oppose a broadening of surveillance powers—especially on the cusp of Donald Trump’s inauguration. Trump and Mike Pompeo, the president-elect’s nominee for CIA director, have made it clear that they think overzealous civil-liberties protections should be cleared away in favor of stronger surveillance laws.
But while the changes may subject more Americans to warrantless surveillance, the last-minute timing of the announcement actually might have been designed to cut future privacy losses. Susan Hennessey, a Brookings fellow and the managing editor of Lawfare, says firming up the changes before Trump takes office makes it harder for the incoming president to encroach even further on civil liberties.I spoke with Hennessey, who was previously an attorney in the NSA general counsel’s office, about the lasting effects of the new intelligence-sharing procedures. A transcript of our conversation follows, lightly edited for clarity and concision.


Kaveh Waddell: First off, what do these changes mean for the intelligence community? Has a lack of information-sharing among agencies been holding back investigations?

Susan Hennessey: The origin of these changes dates back, honestly, to just after 9/11. There was this identified issue of “stovepiping”: Intelligence wasn’t being shared frequently or fast enough. Some modifications have already been made throughout the years.

Under Executive Order 12333 as it previously existed, NSA analysts had to make an initial determination and apply a set of privacy rules before sharing raw signals-intelligence information with other parts of the intelligence community. After this change, it doesn’t necessarily have to be an NSA analyst that makes that determination—that information can be shared with other parts of the intelligence community.

So it doesn’t change the substantive rules, it doesn’t change the scope of collection, it doesn’t change the types of protection, it doesn’t change the possible uses; it essentially just broadens the group of people who can apply those protections to the raw intelligence.

Waddell: And by extension, it broadens the group of people who get to see raw intelligence, before those rules are applied?

Hennessey: Yes. This is something that has been at the forefront of privacy and civil-liberties advocates’ minds when they’ve expressed concern with this type of collection. But it’s not accurate to say the rule change means it’s a raw signals-intelligence free-for-all, that anybody can get signals intelligence.

Intelligence agencies other than the NSA will have to provide justification for why they need access to that data. It can only be for foreign intelligence, or other enumerated purposes. So it’s not that those agencies will just be able to see whatever they want—it’s that they will be able to request, with particular justifications, access to more raw signals intelligence than they had before. Then, they will need to apply those minimization procedures for themselves.

The civil-liberties concern often surrounds the use of incidentally collected information. Under the new rule, the FBI could not obtain access to or search raw intelligence information for ordinary criminals in an ordinary criminal investigation against a U.S. person. However, if the FBI incidentally seized evidence of a crime, they are allowed to use that information. So that tends to be where the tension is for people who are concerned with the potential impacts that this change could have on U.S. persons.

Waddell: The fact that more Americans could potentially be subject to warrantless searches, just by virtue of being caught up in the raw signals intelligence that’s shared—is that something that concerns you?

Hennessey: No. Look, I think it’s important to understand that these minimization procedures are taken very seriously, and all other agencies that are handling raw signals intelligence are essentially going to have to import these very complex oversight and compliance mechanisms that currently exist at the NSA.

Within the NSA, those are extremely strong and protective mechanisms. I think people should feel reassured that the rules cannot be violated—certainly not without it coming to the attention of oversight and compliance bodies. I am confident that all of the agencies in the U.S. intelligence community will discharge those very same obligations with the same level of diligence and rigor, adhering to both the spirit and the letter of the law.

That said, there are potentially broader reforms that might be undertaken. I don’t think that they necessarily need to be linked to the sharing of data. But it’s reasonable to at least engage in a conversation about whether or not it’s appropriate to have particular post-collection reforms, like for example imposing an obligation for law enforcement to obtain a warrant in particular circumstances.

That’s a long way of saying that nothing about this particular rule change exposing Americans to additional privacy risks. However, that doesn’t mean that there are not still reasonable and responsible reforms which might take place.

Waddell: I found it interesting that you said the change could, in one way, actually be viewed as a “huge source of comfort.” I think you were referring to the timing of the change. Why is that?

Hennessey: These changes have actually been in process for eight or nine years. One of the things that I think individuals who had insight into intelligence activities and were concerned about the election of Donald Trump—specifically, some of the statements he’s made about adherence to the rule of law—a lot of those people’s minds went very quickly to these procedures.

It’s important to understand the distinction between Executive Order 12333 and the Foreign Intelligence Surveillance Act: One very oversimplified way to think about it is that FISA is a statute that governs collection that takes place within the United States, but that is aimed at a foreign target; 12333 collection is aimed at a foreign target, and takes place outside the United States. That’s shorthand that glosses over some technical and legal nuance, but those are the broad buckets people should be thinking about.

FISA is a statute, so you’d need congressional action to change those rules, and you have a built-in check there. But 12333 is not constrained by statute; it’s constrained by executive order. In theory, a president could change an executive order—that’s within his constitutional power. It’s not as easy as just a pen stroke, but it’s theoretically possible.

Executive Order 12333 requires that this series of protective procedures exist and are adhered to. The procedures are kind of where the rubber meets the road on privacy. They’re the details, the nitty-gritty: What can you actually see? What can you share? What do you have to minimize? So they’re really, really important in terms of what the relationship between U.S. citizens and the intelligence community looks like.

When they were in rewrites, they were sort of vulnerable. There was the possibility that an incoming administration would say, “Hey! While you’re in the process of rewriting, let’s go ahead and adjust some of the domestic protections.” And I think a reasonable observer might assume that while the protections the Obama administration was interested in putting into place increased privacy protections—or at the very least did not reduce them—that the incoming administration has indicated that they are less inclined to be less protective of privacy and civil liberties. So I think it is a good sign that these procedures have been finalized, in part because it’s so hard to change procedures once they’re finalized.

Waddell: Is that why we just went through an eight- or nine-year process to get here?

Hennessey: Exactly. For questions both of genuine complexity and just government bureaucracy, the time horizon here is longer than a single term of the presidency.

So I don’t think that it’s necessarily true that the intelligence community or the Department of Justice was rushing to get these procedures passed; if anything, they’re a little bit late. But I think the bottom line is that it’s comforting to a large national-security community that these are procedures that are signed off by Director of National Intelligence James Clapper and Attorney General Loretta Lynch, and not by the DNI and attorney general that will ultimately be confirmed under the Trump Administration.

Waddell: Is there anything else we should be thinking about with these new changes?

Hennessey: People sometimes focus on the top-line stuff and end up missing the things that aren’t necessarily the symbolic expressions of privacy—the things that make us feel good—but are the functional elements of privacy and civil liberties. What rules do people apply day-to-day and how? There’s going to be a need moving forward to have disciplined conversations about the legal protections that really matter.

If there is a silver lining to some of the anxieties that the incoming administration has produced, I think it’s the potential to move the conversation into a much more productive place. But that opportunity will end up being lost if the responses are the same old same. That’s my last shred of optimism, and I’m hanging on to it.

https://www.theatlantic.com/technology/archive/2017/01/obama-expanding-nsa-powers/513041/

Executive Orders

Executive Order 12333–United States intelligence activities

Source: The provisions of Executive Order 12333 of Dec. 4, 1981, appear at 46 FR 59941, 3 CFR, 1981 Comp., p. 200, unless otherwise noted.

Table of Contents

Preamble

Part 1.Goals, Direction, Duties, and Responsibilities With Respect to the National Intelligence Effort
1.1 Goals
1.2 The National Security Council
1.3 National Foreign Intelligence Advisory Groups
1.4 The Intelligence Community
1.5 Director of Central Intelligence
1.6 Duties and Responsibilities of the Heads of Executive Branch Departments and Agencies
1.7 Senior Officials of the Intelligence Community
1.8 The Central Intelligence Agency
1.9 The Department of State
1.10 The Department of the Treasury
1.11 The Department of Defense
1.12 Intelligence Components Utilized by the Secretary of Defense
1.13 The Department of Energy
1.14 The Federal Bureau of Investigation
Part 2.Conduct of Intelligence Activities
2.1 Need
2.2 Purpose
2.3 Collection of Information
2.4 Collection Techniques
2.5 Attorney General Approval
2.6 Assistance to Law Enforcement Authorities
2.7 Contracting
2.8 Consistency With Other Laws
2.9 Undisclosed Participation in Organizations Within the United States
2.10 Human Experimentation
2.11 Prohibition on Assassination
2.12 Indirect Participation
Part 3.General Provisions
3.1 Congressional Oversight
3.2 Implementation
3.3 Procedures
3.4 Definitions
3.5 Purpose and Effect
3.6 Revocation

Timely and accurate information about the activities, capabilities, plans, and intentions of foreign powers, organizations, and persons and their agents, is essential to the national security of the United States. All reasonable and lawful means must be used to ensure that the United States will receive the best intelligence available. For that purpose, by virtue of the authority vested in me by the Constitution and statutes of the United States of America, including the National Security Act of 1947, as amended, and as President of the United States of America, in order to provide for the effective conduct of United States intelligence activities and the protection of constitutional rights, it is hereby ordered as follows:

Part 1

Goals, Direction, Duties and Responsibilities With Respect to the National Intelligence Effort

1.1Goals. The United States intelligence effort shall provide the President and the National Security Council with the necessary information on which to base decisions concerning the conduct and development of foreign, defense and economic policy, and the protection of United States national interests from foreign security threats. All departments and agencies shall cooperate fully to fulfill this goal.
(a) Maximum emphasis should be given to fostering analytical competition among appropriate elements of the Intelligence Community.
(b) All means, consistent with applicable United States law and this Order, and with full consideration of the rights of United States persons, shall be used to develop intelligence information for the President and the National Security Council. A balanced approach between technical collection efforts and other means should be maintained and encouraged.
(c) Special emphasis should be given to detecting and countering espionage and other threats and activities directed by foreign intelligence services against the United States Government, or United States corporations, establishments, or persons.
(d) To the greatest extent possible consistent with applicable United States law and this Order, and with full consideration of the rights of United States persons, all agencies and departments should seek to ensure full and free exchange of information in order to derive maximum benefit from the United States intelligence effort.

1.2The National Security Council.
(a) Purpose. The National Security Council (NSC) was established by the National Security Act of 1947 to advise the President with respect to the integration of domestic, foreign and military policies relating to the national security. The NSC shall act as the highest Executive Branch entity that provides review of, guidance for and direction to the conduct of all national foreign intelligence, counterintelligence, and special activities, and attendant policies and programs.
(b) Committees. The NSC shall establish such committees as may be necessary to carry out its functions and responsibilities under this Order. The NSC, or a committee established by it, shall consider and submit to the President a policy recommendation, including all dissents, on each special activity and shall review proposals for other sensitive intelligence operations.

1.3National Foreign Intelligence Advisory Groups.
(a) Establishment and Duties. The Director of Central Intelligence shall establish such boards, councils, or groups as required for the purpose of obtaining advice from within the Intelligence Community concerning:
(1) Production, review and coordination of national foreign intelligence;
(2) Priorities for the National Foreign Intelligence Program budget;
(3) Interagency exchanges of foreign intelligence information;
(4) Arrangements with foreign governments on intelligence matters;
(5) Protection of intelligence sources and methods;
(6) Activities of common concern; and
(7) Such other matters as may be referred by the Director of Central Intelligence.
(b) Membership. Advisory groups established pursuant to this section shall be chaired by the Director of Central Intelligence or his designated representative and shall consist of senior representatives from organizations within the Intelligence Community and from departments or agencies containing such organizations, as designated by the Director of Central Intelligence. Groups for consideration of substantive intelligence matters will include representatives of organizations involved in the collection, processing and analysis of intelligence. A senior representative of the Secretary of Commerce, the Attorney General, the Assistant to the President for National Security Affairs, and the Office of the Secretary of Defense shall be invited to participate in any group which deals with other than substantive intelligence matters.

1.4The Intelligence Community. The agencies within the Intelligence Community shall, in accordance with applicable United States law and with the other provisions of this Order, conduct intelligence activities necessary for the conduct of foreign relations and the protection of the national security of the United States, including:
(a) Collection of information needed by the President, the National Security Council, the Secretaries of State and Defense, and other Executive Branch officials for the performance of their duties and responsibilities;
(b) Production and dissemination of intelligence;
(c) Collection of information concerning, and the conduct of activities to protect against, intelligence activities directed against the United States, international terrorist and international narcotics activities, and other hostile activities directed against the United States by foreign powers, organizations, persons, and their agents;
(d) Special activities;
(e) Administrative and support activities within the United States and abroad necessary for the performance of authorized activities; and
(f) Such other intelligence activities as the President may direct from time to time.

1.5Director of Central Intelligence. In order to discharge the duties and responsibilities prescribed by law, the Director of Central Intelligence shall be responsible directly to the President and the NSC and shall:
(a) Act as the primary adviser to the President and the NSC on national foreign intelligence and provide the President and other officials in the Executive Branch with national foreign intelligence;
(b) Develop such objectives and guidance for the Intelligence Community as will enhance capabilities for responding to expected future needs for national foreign intelligence;
(c) Promote the development and maintenance of services of common concern by designated intelligence organizations on behalf of the Intelligence Community;
(d) Ensure implementation of special activities;
(e) Formulate policies concerning foreign intelligence and counterintelligence arrangements with foreign governments, coordinate foreign intelligence and counterintelligence relationships between agencies of the Intelligence Community and the intelligence or internal security services of foreign governments, and establish procedures governing the conduct of liaison by any department or agency with such services on narcotics activities;
(f) Participate in the development of procedures approved by the Attorney General governing criminal narcotics intelligence activities abroad to ensure that these activities are consistent with foreign intelligence programs;
(g) Ensure the establishment by the Intelligence Community of common security and access standards for managing and handling foreign intelligence systems, information, and products;
(h) Ensure that programs are developed which protect intelligence sources, methods, and analytical procedures;
(i) Establish uniform criteria for the determination of relative priorities for the transmission of critical national foreign intelligence, and advise the Secretary of Defense concerning the communications requirements of the Intelligence Community for the transmission of such intelligence;
(j) Establish appropriate staffs, committees, or other advisory groups to assist in the execution of the Director’s responsibilities;
(k) Have full responsibility for production and dissemination of national foreign intelligence, and authority to levy analytic tasks on departmental intelligence production organizations, in consultation with those organizations, ensuring that appropriate mechanisms for competitive analysis are developed so that diverse points of view are considered fully and differences of judgment within the Intelligence Community are brought to the attention of national policymakers;
(l) Ensure the timely exploitation and dissemination of data gathered by national foreign intelligence collection means, and ensure that the resulting intelligence is disseminated immediately to appropriate government entities and military commands;
(m) Establish mechanisms which translate national foreign intelligence objectives and priorities approved by the NSC into specific guidance for the Intelligence Community, resolve conflicts in tasking priority, provide to departments and agencies having information collection capabilities that are not part of the National Foreign Intelligence Program advisory tasking concerning collection of national foreign intelligence, and provide for the development of plans and arrangements for transfer of required collection tasking authority to the Secretary of Defense when directed by the President;
(n) Develop, with the advice of the program managers and departments and agencies concerned, the consolidated National Foreign Intelligence Program budget, and present it to the President and the Congress;
(o) Review and approve all requests for reprogramming National Foreign Intelligence Program funds, in accordance with guidelines established by the Office of Management and Budget;
(p) Monitor National Foreign Intelligence Program implementation, and, as necessary, conduct program and performance audits and evaluations;
(q) Together with the Secretary of Defense, ensure that there is no unnecessary overlap between national foreign intelligence programs and Department of Defense intelligence programs consistent with the requirement to develop competitive analysis, and provide to and obtain from the Secretary of Defense all information necessary for this purpose;
(r) In accordance with law and relevant procedures approved by the Attorney General under this Order, give the heads of the departments and agencies access to all intelligence, developed by the CIA or the staff elements of the Director of Central Intelligence, relevant to the national intelligence needs of the departments and agencies; and
(s) Facilitate the use of national foreign intelligence products by Congress in a secure manner.

1.6Duties and Responsibilities of the Heads of Executive Branch Departments and Agencies.
(a) The heads of all Executive Branch departments and agencies shall, in accordance with law and relevant procedures approved by the Attorney General under this Order, give the Director of Central Intelligence access to all information relevant to the national intelligence needs of the United States, and shall give due consideration to the requests from the Director of Central Intelligence for appropriate support for Intelligence Community activities.
(b) The heads of departments and agencies involved in the National Foreign Intelligence Program shall ensure timely development and submission to the Director of Central Intelligence by the program managers and heads of component activities of proposed national programs and budgets in the format designated by the Director of Central Intelligence, and shall also ensure that the Director of Central Intelligence is provided, in a timely and responsive manner, all information necessary to perform the Director’s program and budget responsibilities.
(c) The heads of departments and agencies involved in the National Foreign Intelligence Program may appeal to the President decisions by the Director of Central Intelligence on budget or reprogramming matters of the National Foreign Intelligence Program.

1.7Senior Officials of the Intelligence Community. The heads of departments and agencies with organizations in the Intelligence Community or the heads of such organizations, as appropriate, shall:
(a) Report to the Attorney General possible violations of federal criminal laws by employees and of specified federal criminal laws by any other person as provided in procedures agreed upon by the Attorney General and the head of the department or agency concerned, in a manner consistent with the protection of intelligence sources and methods, as specified in those procedures;
(b) In any case involving serious or continuing breaches of security, recommend to the Attorney General that the case be referred to the FBI for further investigation;
(c) Furnish the Director of Central Intelligence and the NSC, in accordance with applicable law and procedures approved by the Attorney General under this Order, the information required for the performance of their respective duties;
(d) Report to the Intelligence Oversight Board, and keep the Director of Central Intelligence appropriately informed, concerning any intelligence activities of their organizations that they have reason to believe may be unlawful or contrary to Executive order or Presidential directive;
(e) Protect intelligence and intelligence sources and methods from unauthorized disclosure consistent with guidance from the Director of Central Intelligence;
(f) Disseminate intelligence to cooperating foreign governments under arrangements established or agreed to by the Director of Central Intelligence;
(g) Participate in the development of procedures approved by the Attorney General governing production and dissemination of intelligence resulting from criminal narcotics intelligence activities abroad if their departments, agencies, or organizations have intelligence responsibilities for foreign or domestic narcotics production and trafficking;
(h) Instruct their employees to cooperate fully with the Intelligence Oversight Board; and
(i) Ensure that the Inspectors General and General Counsels for their organizations have access to any information necessary to perform their duties assigned by this Order.

1.8The Central Intelligence Agency. All duties and responsibilities of the CIA shall be related to the intelligence functions set out below. As authorized by this Order; the National Security Act of 1947, as amended; the CIA Act of 1949, as amended; appropriate directives or other applicable law, the CIA shall:
(a) Collect, produce and disseminate foreign intelligence and counterintelligence, including information not otherwise obtainable. The collection of foreign intelligence or counterintelligence within the United States shall be coordinated with the FBI as required by procedures agreed upon by the Director of Central Intelligence and the Attorney General;
(b) Collect, produce and disseminate intelligence on foreign aspects of narcotics production and trafficking;
(c) Conduct counterintelligence activities outside the United States and, without assuming or performing any internal security functions, conduct counterintelligence activities within the United States in coordination with the FBI as required by procedures agreed upon by the Director of Central Intelligence and the Attorney General;
(d) Coordinate counterintelligence activities and the collection of information not otherwise obtainable when conducted outside the United States by other departments and agencies;
(e) Conduct special activities approved by the President. No agency except the CIA (or the Armed Forces of the United States in time of war declared by Congress or during any period covered by a report from the President to the Congress under the War Powers Resolution (87 Stat. 855)1) may conduct any special activity unless the President determines that another agency is more likely to achieve a particular objective;
(f) Conduct services of common concern for the Intelligence Community as directed by the NSC;
(g) Carry out or contract for research, development and procurement of technical systems and devices relating to authorized functions;
(h) Protect the security of its installations, activities, information, property, and employees by appropriate means, including such investigations of applicants, employees, contractors, and other persons with similar associations with the CIA as are necessary; and
(i) Conduct such administrative and technical support activities within and outside the United States as are necessary to perform the functions described in sections (a) through (h) above, including procurement and essential cover and proprietary arrangements.

1.9The Department of State. The Secretary of State shall:
(a) Overtly collect information relevant to United States foreign policy concerns;
(b) Produce and disseminate foreign intelligence relating to United States foreign policy as required for the execution of the Secretary’s responsibilities;
(c) Disseminate, as appropriate, reports received from United States diplomatic and consular posts;
(d) Transmit reporting requirements of the Intelligence Community to the Chiefs of United States Missions abroad; and
(e) Support Chiefs of Missions in discharging their statutory responsibilities for direction and coordination of mission activities.

1.10The Department of the Treasury. The Secretary of the Treasury shall:
(a) Overtly collect foreign financial and monetary information;
(b) Participate with the Department of State in the overt collection of general foreign economic information;
(c) Produce and disseminate foreign intelligence relating to United States economic policy as required for the execution of the Secretary’s responsibilities; and
(d) Conduct, through the United States Secret Service, activities to determine the existence and capability of surveillance equipment being used against the President of the United States, the Executive Office of the President, and, as authorized by the Secretary of the Treasury or the President, other Secret Service protectees and United States officials. No information shall be acquired intentionally through such activities except to protect against such surveillance, and those activities shall be conducted pursuant to procedures agreed upon by the Secretary of the Treasury and the Attorney General.

1.11The Department of Defense. The Secretary of Defense shall:
(a) Collect national foreign intelligence and be responsive to collection tasking by the Director of Central Intelligence;
(b) Collect, produce and disseminate military and military-related foreign intelligence and counterintelligence as required for execution of the Secretary’s responsibilities;
(c) Conduct programs and missions necessary to fulfill national, departmental and tactical foreign intelligence requirements;
(d) Conduct counterintelligence activities in support of Department of Defense components outside the United States in coordination with the CIA, and within the United States in coordination with the FBI pursuant to procedures agreed upon by the Secretary of Defense and the Attorney General;
(e) Conduct, as the executive agent of the United States Government, signals intelligence and communications security activities, except as otherwise directed by the NSC;
(f) Provide for the timely transmission of critical intelligence, as defined by the Director of Central Intelligence, within the United States Government;
(g) Carry out or contract for research, development and procurement of technical systems and devices relating to authorized intelligence functions;
(h) Protect the security of Department of Defense installations, activities, property, information, and employees by appropriate means, including such investigations of applicants, employees, contractors, and other persons with similar associations with the Department of Defense as are necessary;
(i) Establish and maintain military intelligence relationships and military intelligence exchange programs with selected cooperative foreign defense establishments and international organizations, and ensure that such relationships and programs are in accordance with policies formulated by the Director of Central Intelligence;
(j) Direct, operate, control and provide fiscal management for the National Security Agency and for defense and military intelligence and national reconnaissance entities; and
(k) Conduct such administrative and technical support activities within and outside the United States as are necessary to perform the functions described in sections (a) through (j) above.

1.12Intelligence Components Utilized by the Secretary of Defense. In carrying out the responsibilities assigned in section 1.11, the Secretary of Defense is authorized to utilize the following:
(a) Defense Intelligence Agency, whose responsibilities shall include;
(1) Collection, production, or, through tasking and coordination, provision of military and military-related intelligence for the Secretary of Defense, the Joint Chiefs of Staff, other Defense components, and, as appropriate, non-Defense agencies;
(2) Collection and provision of military intelligence for national foreign intelligence and counterintelligence products;
(3) Coordination of all Department of Defense intelligence collection requirements;
(4) Management of the Defense Attache system; and
(5) Provision of foreign intelligence and counterintelligence staff support as directed by the Joint Chiefs of Staff.
(b) National Security Agency, whose responsibilities shall include:
(1) Establishment and operation of an effective unified organization for signals intelligence activities, except for the delegation of operational control over certain operations that are conducted through other elements of the Intelligence Community. No other department or agency may engage in signals intelligence activities except pursuant to a delegation by the Secretary of Defense;
(2) Control of signals intelligence collection and processing activities, including assignment of resources to an appropriate agent for such periods and tasks as required for the direct support of military commanders;
(3) Collection of signals intelligence information for national foreign intelligence purposes in accordance with guidance from the Director of Central Intelligence;
(4) Processing of signals intelligence data for national foreign intelligence purposes in accordance with guidance from the Director of Central Intelligence;
(5) Dissemination of signals intelligence information for national foreign intelligence purposes to authorized elements of the Government, including the military services, in accordance with guidance from the Director of Central Intelligence;
(6) Collection, processing and dissemination of signals intelligence information for counterintelligence purposes;
(7) Provision of signals intelligence support for the conduct of military operations in accordance with tasking, priorities, and standards of timeliness assigned by the Secretary of Defense. If provision of such support requires use of national collection systems, these systems will be tasked within existing guidance from the Director of Central Intelligence;
(8) Executing the responsibilities of the Secretary of Defense as executive agent for the communications security of the United States Government;
(9) Conduct of research and development to meet the needs of the United States for signals intelligence and communications security;
(10) Protection of the security of its installations, activities, property, information, and employees by appropriate means, including such investigations of applicants, employees, contractors, and other persons with similar associations with the NSA as are necessary;
(11) Prescribing, within its field of authorized operations, security regulations covering operating practices, including the transmission, handling and distribution of signals intelligence and communications security material within and among the elements under control of the Director of the NSA, and exercising the necessary supervisory control to ensure compliance with the regulations;
(12) Conduct of foreign cryptologic liaison relationships, with liaison for intelligence purposes conducted in accordance with policies formulated by the Director of Central Intelligence; and
(13) Conduct of such administrative and technical support activities within and outside the United States as are necessary to perform the functions described in sections (1) through (12) above, including procurement.
(c) Offices for the collection of specialized intelligence through reconnaissance programs, whose responsibilities shall include:
(1) Carrying out consolidated reconnaissance programs for specialized intelligence;
(2) Responding to tasking in accordance with procedures established by the Director of Central Intelligence; and
(3) Delegating authority to the various departments and agencies for research, development, procurement, and operation of designated means of collection.

(d)

The foreign intelligence and counterintelligence elements of the Army, Navy, Air Force, and Marine Corps,

whose responsibilities shall include:

(1) Collection, production and dissemination of military and military-related foreign intelligence and counterintelligence, and information on the foreign aspects of narcotics production and trafficking. When collection is conducted in response to national foreign intelligence requirements, it will be conducted in accordance with guidance from the Director of Central Intelligence. Collection of national foreign intelligence, not otherwise obtainable, outside the United States shall be coordinated with the CIA, and such collection within the United States shall be coordinated with the FBI;
(2) Conduct of counterintelligence activities outside the United States in coordination with the CIA, and within the United States in coordination with the FBI; and
(3) Monitoring of the development, procurement and management of tactical intelligence systems and equipment and conducting related research, development, and test and evaluation activities.
(e) Other offices within the Department of Defense appropriate for conduct of the intelligence missions and responsibilities assigned to the Secretary of Defense. If such other offices are used for intelligence purposes, the provisions of Part 2 of this Order shall apply to those offices when used for those purposes.

1.13The Department of Energy. The Secretary of Energy shall:
(a) Participate with the Department of State in overtly collecting information with respect to foreign energy matters;
(b) Produce and disseminate foreign intelligence necessary for the Secretary’s responsibilities;
(c) Participate in formulating intelligence collection and analysis requirements where the special expert capability of the Department can contribute; and
(d) Provide expert technical, analytical and research capability to other agencies within the Intelligence Community.

1.14The Federal Bureau of Investigation. Under the supervision of the Attorney General and pursuant to such regulations as the Attorney General may establish, the Director of the FBI shall:
(a) Within the United States conduct counterintelligence and coordinate counterintelligence activities of other agencies within the Intelligence Community. When a counterintelligence activity of the FBI involves military or civilian personnel of the Department of Defense, the FBI shall coordinate with the Department of Defense;
(b) Conduct counterintelligence activities outside the United States in coordination with the CIA as required by procedures agreed upon by the Director of Central Intelligence and the Attorney General;
(c) Conduct within the United States, when requested by officials of the Intelligence Community designated by the President, activities undertaken to collect foreign intelligence or support foreign intelligence collection requirements of other agencies within the Intelligence Community, or, when requested by the Director of the National Security Agency, to support the communications security activities of the United States Government;
(d) Produce and disseminate foreign intelligence and counterintelligence; and
(e) Carry out or contract for research, development and procurement of technical systems and devices relating to the functions authorized above.

Part 2

Conduct of Intelligence Activities

2.1Need. Accurate and timely information about the capabilities, intentions and activities of foreign powers, organizations, or persons and their agents is essential to informed decisionmaking in the areas of national defense and foreign relations. Collection of such information is a priority objective and will be pursued in a vigorous, innovative and responsible manner that is consistent with the Constitution and applicable law and respectful of the principles upon which the United States was founded.

2.2Purpose. This Order is intended to enhance human and technical collection techniques, especially those undertaken abroad, and the acquisition of significant foreign intelligence, as well as the detection and countering of international terrorist activities and espionage conducted by foreign powers. Set forth below are certain general principles that, in addition to and consistent with applicable laws, are intended to achieve the proper balance between the acquisition of essential information and protection of individual interests. Nothing in this Order shall be construed to apply to or interfere with any authorized civil or criminal law enforcement responsibility of any department or agency.

2.3Collection of Information. Agencies within the Intelligence Community are authorized to collect, retain or disseminate information concerning United States persons only in accordance with procedures established by the head of the agency concerned and approved by the Attorney General, consistent with the authorities provided by Part 1 of this Order. Those procedures shall permit collection, retention and dissemination of the following types of information:
(a) Information that is publicly available or collected with the consent of the person concerned;
(b) Information constituting foreign intelligence or counterintelligence, including such information concerning corporations or other commercial organizations. Collection within the United States of foreign intelligence not otherwise obtainable shall be undertaken by the FBI or, when significant foreign intelligence is sought, by other authorized agencies of the Intelligence Community, provided that no foreign intelligence collection by such agencies may be undertaken for the purpose of acquiring information concerning the domestic activities of United States persons;
(c) Information obtained in the course of a lawful foreign intelligence, counterintelligence, international narcotics or international terrorism investigation;
(d) Information needed to protect the safety of any persons or organizations, including those who are targets, victims or hostages of international terrorist organizations;
(e) Information needed to protect foreign intelligence or counterintelligence sources or methods from unauthorized disclosure. Collection within the United States shall be undertaken by the FBI exceptthat other agencies of the Intelligence Community may also collect such information concerning present or former employees, present or former intelligence agency contractors or their present or former employees, or applicants for any such employment or contracting;
(f) Information concerning persons who are reasonably believed to be potential sources or contacts for the purpose of determining their suitability or credibility;
(g) Information arising out of a lawful personnel, physical or communications security investigation;
(h) Information acquired by overhead reconnaissance not directed at specific United States persons;
(i) Incidentally obtained information that may indicate involvement in activities that may violate federal, state, local or foreign laws; and
(j) Information necessary for administrative purposes.
In addition, agencies within the Intelligence Community may disseminate information, other than information derived from signals intelligence, to each appropriate agency within the Intelligence Community for purposes of allowing the recipient agency to determine whether the information is relevant to its responsibilities and can be retained by it.

2.4Collection Techniques. Agencies within the Intelligence Community shall use the least intrusive collection techniques feasible within the United States or directed against United States persons abroad. Agencies are not authorized to use such techniques as electronic surveillance, unconsented physical search, mail surveillance, physical surveillance, or monitoring devices unless they are in accordance with procedures established by the head of the agency concerned and approved by the Attorney General. Such procedures shall protect constitutional and other legal rights and limit use of such information to lawful governmental purposes. These procedures shall not authorize:
(a) The CIA to engage in electronic surveillance within the United States except for the purpose of training, testing, or conducting countermeasures to hostile electronic surveillance;
(b) Unconsented physical searches in the United States by agencies other than the FBI, except for:
(1) Searches by counterintelligence elements of the military services directed against military personnel within the United States or abroad for intelligence purposes, when authorized by a military commander empowered to approve physical searches for law enforcement purposes, based upon a finding of probable cause to believe that such persons are acting as agents of foreign powers; and
(2) Searches by CIA of personal property of non-United States persons lawfully in its possession.
(c) Physical surveillance of a United States person in the United States by agencies other than the FBI, except for:
(1) Physical surveillance of present or former employees, present or former intelligence agency contractors or their present of former employees, or applicants for any such employment or contracting; and
(2) Physical surveillance of a military person employed by a nonintelligence element of a military service.
(d) Physical surveillance of a United States person abroad to collect foreign intelligence, except to obtain significant information that cannot reasonably be acquired by other means.

2.5Attorney General Approval. The Attorney General hereby is delegated the power to approve the use for intelligence purposes, within the United States or against a United States person abroad, of any technique for which a warrant would be required if undertaken for law enforcement purposes, provided that such techniques shall not be undertaken unless the Attorney General has determined in each case that there is probable cause to believe that the technique is directed against a foreign power or an agent of a foreign power. Electronic surveillance, as defined in the Foreign Intelligence Surveillance Act of 1978, shall be conducted in accordance with that Act, as well as this Order.

2.6Assistance to Law Enforcement Authorities. Agencies within the Intelligence Community are authorized to:
(a) Cooperate with appropriate law enforcement agencies for the purpose of protecting the employees, information, property and facilities of any agency within the Intelligence Community;
(b) Unless otherwise precluded by law or this Order, participate in law enforcement activities to investigate or prevent clandestine intelligence activities by foreign powers, or international terrorist or narcotics activities;
(c) Provide specialized equipment, technical knowledge, or assistance of expert personnel for use by any department or agency, or, when lives are endangered, to support local law enforcement agencies. Provision of assistance by expert personnel shall be approved in each case by the General Counsel of the providing agency; and
(d) Render any other assistance and cooperation to law enforcement authorities not precluded by applicable law.

2.7Contracting. Agencies within the Intelligence Community are authorized to enter into contracts or arrangements for the provision of goods or services with private companies or institutions in the United States and need not reveal the sponsorship of such contracts or arrangements for authorized intelligence purposes. Contracts or arrangements with academic institutions may be undertaken only with the consent of appropriate officials of the institution.

2.8Consistency With Other Laws. Nothing in this Order shall be construed to authorize any activity in violation of the Constitution or statutes of the United States.

2.9Undisclosed Participation in Organizations Within the United States. No one acting on behalf of agencies within the Intelligence Community may join or otherwise participate in any organization in the United States on behalf of any agency within the Intelligence Community without disclosing his intelligence affiliation to appropriate officials of the organization, except in accordance with procedures established by the head of the agency concerned and approved by the Attorney General. Such participation shall be authorized only if it is essential to achieving lawful purposes as determined by the agency head or designee. No such participation may be undertaken for the purpose of influencing the activity of the organization or its members except in cases where:
(a) The participation is undertaken on behalf of the FBI in the course of a lawful investigation; or
(b) The organization concerned is composed primarily of individuals who are not United States persons and is reasonably believed to be acting on behalf of a foreign power.

2.10Human Experimentation. No agency within the Intelligence Community shall sponsor, contract for or conduct research on human subjects except in accordance with guidelines issued by the Department of Health and Human Services. The subject’s informed consent shall be documented as required by those guidelines.

2.11Prohibition on Assassination. No person employed by or acting on behalf of the United States Government shall engage in, or conspire to engage in, assassination.

2.12Indirect Participation. No agency of the Intelligence Community shall participate in or request any person to undertake activities forbidden by this Order.

Part 3

General Provisions

3.1Congressional Oversight. The duties and responsibilities of the Director of Central Intelligence and the heads of other departments, agencies, and entities engaged in intelligence activities to cooperate with the Congress in the conduct of its responsibilities for oversight of intelligence activities shall be as provided in title 50, United States Code, section 413. The requirements of section 662 of the Foreign Assistance Act of 1961, as amended (22 U.S.C. 2422), and section 501 of the National Security Act of 1947, as amended (50 U.S.C. 413), shall apply to all special activities as defined in this Order.

3.2Implementation. The NSC, the Secretary of Defense, the Attorney General, and the Director of Central Intelligence shall issue such appropriate directives and procedures as are necessary to implement this Order. Heads of agencies within the Intelligence Community shall issue appropriate supplementary directives and procedures consistent with this Order. The Attorney General shall provide a statement of reasons for not approving any procedures established by the head of an agency in the Intelligence Community other than the FBI. The National Security Council may establish procedures in instances where the agency head and the Attorney General are unable to reach agreement on other than constitutional or other legal grounds.

3.3Procedures. Until the procedures required by this Order have been established, the activities herein authorized which require procedures shall be conducted in accordance with existing procedures or requirements established under Executive Order No. 12036. Procedures required by this Order shall be established as expeditiously as possible. All procedures promulgated pursuant to this Order shall be made available to the congressional intelligence committees.

3.4Definitions. For the purposes of this Order, the following terms shall have these meanings:
(a) Counterintelligence means information gathered and activities conducted to protect against espionage, other intelligence activities, sabotage, or assassinations conducted for or on behalf of foreign powers, organizations or persons, or international terrorist activities, but not including personnel, physical, document or communications security programs.
(b) Electronic surveillance means acquisition of a nonpublic communication by electronic means without the consent of a person who is a party to an electronic communication or, in the case of a nonelectronic communication, without the consent of a person who is visibly present at the place of communication, but not including the use of radio direction-finding equipment solely to determine the location of a transmitter.
(c) Employee means a person employed by, assigned to or acting for an agency within the Intelligence Community.
(d) Foreign intelligence means information relating to the capabilities, intentions and activities of foreign powers, organizations or persons, but not including counterintelligence except for information on international terrorist activities.
(e) Intelligence activities means all activities that agencies within the Intelligence Community are authorized to conduct pursuant to this Order.
(f) Intelligence Community and agencies within the Intelligence Community refer to the following agencies or organizations:
(1) The Central Intelligence Agency (CIA);
(2) The National Security Agency (NSA);
(3) The Defense Intelligence Agency (DIA);
(4) The offices within the Department of Defense for the collection of specialized national foreign intelligence through reconnaissance programs;
(5) The Bureau of Intelligence and Research of the Department of State;
(6) The intelligence elements of the Army, Navy, Air Force, and Marine Corps, the Federal Bureau of Investigation (FBI), the Department of the Treasury, and the Department of Energy; and
(7) The staff elements of the Director of Central Intelligence.
(g) The National Foreign Intelligence Program includes the programs listed below, but its composition shall be subject to review by the National Security Council and modification by the President:
(1) The programs of the CIA;
(2) The Consolidated Cryptologic Program, the General Defense Intelligence Program, and the programs of the offices within the Department of Defense for the collection of specialized national foreign intelligence through reconnaissance, except such elements as the Director of Central Intelligence and the Secretary of Defense agree should be excluded;
(3) Other programs of agencies within the Intelligence Community designated jointly by the Director of Central Intelligence and the head of the department or by the President as national foreign intelligence or counterintelligence activities;
(4) Activities of the staff elements of the Director of Central Intelligence;
(5) Activities to acquire the intelligence required for the planning and conduct of tactical operations by the United States military forces are not included in the National Foreign Intelligence Program.
(h) Special activities means activities conducted in support of national foreign policy objectives abroad which are planned and executed so that the role of the United States Government is not apparent or acknowledged publicly, and functions in support of such activities, but which are not intended to influence United States political processes, public opinion, policies, or media and do not include diplomatic activities or the collection and production of intelligence or related support functions.
(i) United States person means a United States citizen, an alien known by the intelligence agency concerned to be a permanent resident alien, an unincorporated association substantially composed of United States citizens or permanent resident aliens, or a corporation incorporated in the United States, except for a corporation directed and controlled by a foreign government or governments.

3.5Purpose and Effect. This Order is intended to control and provide direction and guidance to the Intelligence Community. Nothing contained herein or in any procedures promulgated hereunder is intended to confer any substantive or procedural right or privilege on any person or organization.

3.6Revocation. Executive Order No. 12036 of January 24, 1978, as amended, entitled “United States Intelligence Activities,” is revoked.


1Editorial note: The correct citation is (87 Stat. 555).

https://www.archives.gov/federal-register/codification/executive-order/12333.html

 

Story 2: -Soros’ and Obama’s  Seditious and Subversive War On Trump With  Organizing For Action Applying Saul Alinsky’s Rules for Radicals — Videos

Judge Nap: If Obama Wiretapped Trump, It Would ‘Destroy Whatever Legacy’ He Has

SARA CARTER VS SEAN HANNITY (3/8/2017)

Laura Ingraham: New WikiLeaks Release Could Be ‘Really Damning’ For CIA

IS THIS THE END OF BARACK OBAMA? More proofs of illegal acts during Barack Obama’s administration

Gingrich talks ‘deep state’ bureaucrats’ attacks on Trump

On the Russia Lunacy & Wikileaks BOMBSHELL Leak of CIA Hacking Force

‘Everyday, a new piece falls into place’׃ Maddow spells out the Trump Russia connection 2

Former DOJ Lawyer: Lynch, Comey Could Have ‘Intimate Knowledge’ of Alleged Wiretapping

REAKING NEWS 03⁄08⁄2017 TRUMP: OBAMA “WEAK”

BREAKING NEWS March 8, 2017 WAR IN WHITE HOUSE, TRUMP vs OBAMA

ORGANIZING FOR ACTION OBAMA TEAM OF 80,000 PROTESTERS NATIONWIDE

Organizing for Action fights President Trump’s policies

Political Group “Organizing for Action” Relaunches For Trump Era

How Obama is Scheming to Sabotage Trump’s Presidency

Lou Dobbs: Obama Looking Very Close To Sedition

Monica Crowley: What happened to me was a political hit job

Tomi Lahren, Jessica Tarlov on attacks against the Trumps

Tomi Lahren – So you want me fired – Final Thoughts With Tomi Lahren

Tomi Lahren – Tantrums Against Trump (Final Thoughts)

Not My President’s Day Protests – Tomi Lahren Final Thoughts – The Blaze

Hannity With 3 Special Guest Uncover Obama’s Sedition Against The Republic For Which WE STAND!

HANNITY 3/7/17 – Ingraham – Crowley, ‘Deep State Plan to Imprison Trump.’

EXPOSED: Trump National Security Pick Monica Crowley Plagiarizes Book, Rewarded Title By President

Trump pick Monica Crowley has a plagiarism problem Viral news US

Lou Dobbs : Paul Sperry – Obama’s ‘shadow government’ is organizing to sabotage Trump : 2/15/2017

BREAKING Obama’s Plan to SABOTAGE Trump’s Presidency EXPOSED No Former President Has Ever Done This

Billionaire Soros linked to anti-Trump protests – WikiLeaks

Personal attacks on President Trump

Obama Moves to Bunker & Prepares To ‘Fight Trump’—30,000 Man Activist Army READY At His COMMAND

What is Organizing for Action?

Obama’s Organizing for Action Partners with Soros-Linked ‘Indivisible’ to Disrupt Trump’s Agenda

Organizing for Action, the activist group that morphed from Barack Obama’s first presidential campaign, has partnered with the newly-formed Indivisible Project for “online trainings” on how to protest President Donald Trump’s agenda.

Last week, Breitbart News extensively reported that Indivisible leaders are openly associated with groups financed by billionaire George Soros.

Politico earlier this month profiled Indivisible in an article titled, “Inside the protest movement that has Republicans reeling.”  The news agency not only left out the Soros links, but failed to note that the organizations cited in its article as helping to amplify Indivisible’s message are either financed directly by Soros or have close ties to groups funded by the billionaire, as Breitbart News documented.

Organizing for Action (OFA) is a so-called community organizing project that sprung from Obama’s 2012 campaign organization, Organizing for America, becoming a nonprofit described by the Washington Post as “advocate[ing] for the president’s policies.”

In a recent Facebook post titled, “Take a deep breath. Then take action,” OFA called on constituents to lobby particularly hard between now and February 26, when lawmakers will be in their home districts.

The post included a link to a guide released by Indivisible on how to organize against Trump. “Stay tuned for online trainings and invitations to calls with coalition partners like Indivisible Guide,” the OFA post states.

Paul Sperry, writing at the New York Post, relates:

The manual, published with OFA partner “Indivisible,” advises protesters to go into halls quietly so as not to raise alarms, and “grab seats at the front of the room but do not all sit together.” Rather, spread out in pairs to make it seem like the whole room opposes the Republican host’s positions. “This will help reinforce the impression of broad consensus.” It also urges them to ask “hostile” questions — while keeping “a firm hold on the mic” — and loudly boo the the GOP politician if he isn’t “giving you real answers.”

“Express your concern [to the event’s hosts] they are giving a platform to pro-Trump authoritarianism, racism, and corruption,” it says.

…“Even the safest [Republican] will be deeply alarmed by signs of organized opposition,” the document states, “because these actions create the impression that they’re not connected to their district and not listening to their constituents.”

Sperry reported OFA “plans to stage 400 rallies across 42 states this year to attack Trump and Republicans over ObamaCare’s repeal.”

Earlier this month, NBC News reported on OFA’s new actions and its partnership with Indivisible:

OFA has hired 14 field organizers in states home to key senators as part of its campaign to defend Obama’s signature healthcare law. To run that campaign, the group hired Saumya Narechania — the former national field director at Enroll America, which worked to sign people up for Obamacare — and a deputy campaign manager.

…OFA says more than 1,800 people have applied to its Spring Community Engagement Fellowship, a six-week training program, two-thirds of whom have not previously been involved with OFA.

And the group has teamed up with Indivisible, a buzzy newcomer to the progressive movement, to offer organizing training that began Thursday night with a video conference. A combined 25,000 people have registered to participate in those trainings, OFA said.

Indivisible’s DC branch was implicated in a scuffle last week that reportedly injured a 71-year-old staffer for Rep. Dana Rohrabacher (R-CA) as well as reportedly knocking a 2-year-old to the ground.  Protesters claimed they were only delivering Valentine’s Day cards.

Indivisible is a part of a coalition of activist groups slated to hold a massive anti-Trump Tax March in Washington and at least 60 other locations on April 15.

Unreported by the news media is that most of the listed partners and support organizers of the march are openly financed by Soros or have close links to Soros financing, as Breitbart News documented last week.

Meanwhile, earlier this month, Politico profiled Indivisible and reported that “conservatives” are “spreading unfounded rumors” that the group is “being driven by wealthy donors like George Soros.”

Politico, however, seemingly failed to do even the most minimal research on the Indivisible leaders cited in the news outlet’s own profile.  Some of those personalities are openly associated with groups financed by Soros.

Politico further failed to note that the organizations cited in its article as helping to amplify Indivisible’s message are either financed directly by Soros or have close ties to groups funded by the billionaire.

Citing Angel Padilla, a co-founder of the group, Politico reported:

Dubbed “Indivisible,” the group launched as a way for Padilla and a handful of fellow ex-Democratic aides to channel their post-election heartbreak into a manual for quashing President Donald Trump’s agenda. They drafted a 26-page protest guide for activists, full of pointers on how to bird dog their members of Congress in the language of Capitol insiders.

The manual has since been downloaded over one million times. Indivisible says on its website that over 4,500 local groups across the nation have “signed up to resist the Trump agenda in nearly every congressional district in the country.”

The manual has been utilized to form the basis of a protest movement. The group’s website states: “What’s more, you all are putting the guide into action—showing up en masse to congressional district offices and events, and flooding the congressional phone lines. You’re resisting—and it’s working.”

Politico reported on “unfounded” rumors being spread about Soros’s involvement with Indivisible (emphasis added by this reporter):

Its handful of senior leaders count about 100 contributors to their national organizing work but insist that all are working on a volunteer basis. They know conservatives are spreading unfounded rumors that their success is being driven by wealthy donors like George Soros, which they flatly deny.

That paragraph was followed by the following quote from co-founder Padilla (emphasis again added by this reporter):

“It doesn’t matter who we take money from — we’re always going to get blamed as a Soros group, even if we don’t take money from Soros,” said Padilla, now an analyst with the National Immigration Law Center. “That’s one of the attacks and that’s fine.”

While “Indivisible” has yet to disclose its donors, Politico failed to inform readers that the National Immigration Law Center where the news outlet reported Padilla serves as an analyst is financed by Soros’s Open Society Foundations. The Center has received numerous Open Society grants earmarked for general support.

Also unmentioned by Politico is that Padilla previously served as an immigration policy consultant at the radical National Council of La Raza. Soros is a major La Raza donor.

Politico went on to detail how Indivisible has been aided by MoveOn.org and the ACLU.  The news website failed to tell readers that MoveOn.org and the ACLU are both financed by Soros, a relevant tidbit given Politico’s claim about “unfounded rumors” that Indivisibles’ success was being driven by Soros . 

The news website reported:

In addition, MoveOn.org and the Working Families Party joined with Indivisible for its first nationwide call on Jan. 22. Nearly 60,000 people phoned in that day, according to Levin and MoveOn organizing director Victoria Kaplan. Indivisible estimates that its second national call, on the impact of Trump’s immigration order with assistance from the ACLU and Padilla’s group, drew 35,000 people.

Politico also missed that, according to its Twitter account, another organizer of the conference call with MoveOn.org was the International Refugee Assistance Project, a project of the Urban Justice Center, another recipient of an Open Society grant.

Taryn Higashi, executive director of the Center’s International Refugee Assistance Project, currently serves on the Advisory Board of the International Migration Initiative of Soros’s Open Society Foundations.

Politico further reported on Indivisible’s ties to the organizers of last month’s anti-Trump Women’s March while failing to mention that Soros reportedly has ties to more than 50 “partners” of that march. Also, this journalist first reported on the march leaders’ own close associations with Soros.

Regarding Indivisible and the Women’s March, Politico reported:

Indivisible is also embracing collaboration with other major anti-Trump protest outlets. Leaders of the group were in communication with Women’s March organizers before their main event on Jan. 21, and that partnership will become official when the March unveils the third in its series of 10 direct actions that attendees have been asked to pursue in their communities.

Another Indivisible leader mentioned in the Politico article is Jeremy Haile. Not reported by Politico is that is Haile served as federal advocacy counsel for the Sentencing Project.  The Sentencing Project is reportedly financed by Soros’s Open Society Foundations, which has also hosted the Project to promote its cause.

Aaron Klein is Breitbart’s Jerusalem bureau chief and senior investigative reporter. He is a New York Times bestselling author and hosts the popular weekend talk radio program, “Aaron Klein Investigative Radio.” Follow him on Twitter @AaronKleinShow. Follow him on Facebook.

http://www.breitbart.com/big-government/2017/02/19/obamas-organizing-action-partners-soros-linked-indivisible-disrupt-trumps-agenda/

Obama-linked activists have a ‘training manual’ for protesting Trump

An Obama-tied activist group training tens of thousands of agitators to protest President Trump’s policies plans to hit Republican lawmakers supporting those policies even harder this week, when they return home for the congressional recess and hold town hall meetings and other functions.

Organizing for Action, a group founded by former President Barack Obama and featured prominently on his new post-presidency website, is distributing a training manual to anti-Trump activists that advises them to bully GOP lawmakers into backing off support for repealing ObamaCare, curbing immigration from high-risk Islamic nations and building a border wall.

In a new Facebook post, OFA calls on activists to mobilize against Republicans from now until Feb. 26, when “representatives are going to be in their home districts.”

The protesters disrupted town halls earlier this month, including one held in Utah by House Oversight Committee Chairman Jason Chaffetz, who was confronted by hundreds of angry demonstrators claiming to be his constituents.

The manual, published with OFA partner “Indivisible,” advises protesters to go into halls quietly so as not to raise alarms, and “grab seats at the front of the room but do not all sit together.” Rather, spread out in pairs to make it seem like the whole room opposes the Republican host’s positions. “This will help reinforce the impression of broad consensus.” It also urges them to ask “hostile” questions — while keeping “a firm hold on the mic” — and loudly boo the GOP politician if he isn’t “giving you real answers.”

“Express your concern [to the event’s hosts] they are giving a platform to pro-Trump authoritarianism, racism, and corruption,” it says.

The goal is to make Republicans, even from safe districts, second-guess their support for the Trump agenda, and to prime “the ground for the 2018 midterms when Democrats retake power.”

The goal is to make Republicans, even from safe districts, second-guess their support for the Trump agenda.

“Even the safest [Republican] will be deeply alarmed by signs of organized opposition,” the document states, “because these actions create the impression that they’re not connected to their district and not listening to their constituents.”

After the event, protesters are advised to feed video footage to local and national media.

“Unfavorable exchanges caught on video can be devastating” for Republican lawmakers, it says, when “shared through social media and picked up by local and national media.” After protesters gave MSNBC, CNN and the networks footage of their dust-up with Chaffetz, for example, the outlets ran them continuously, forcing Chaffetz to issue statements defending himself.

The manual also advises protesters to flood “Trump-friendly” lawmakers’ Hill offices with angry phone calls and emails demanding the resignation of top White House adviser Steve Bannon.

A script advises callers to complain: “I’m honestly scared that a known racist and anti-Semite will be working just feet from the Oval Office … It is everyone’s business if a man who promoted white supremacy is serving as an adviser to the president.”

The document provides no evidence to support such accusations.

Protesters, who may or may not be affiliated with OFA, are also storming district offices. Last week, GOP Rep. Dana Rohrabacher blamed a “mob” of anti-Trump activists for knocking unconscious a 71-year-old female staffer at his Southern California office. A video of the incident, showing a small crowd around an opening door, was less conclusive.

Separately, OFA, which is run by ex-Obama officials and staffers, plans to stage 400 rallies across 42 states this year to attack Trump and Republicans over ObamaCare’s repeal.

“This is a fight we can win,” OFA recently told its foot soldiers. “They’re starting to waver.”

On Thursday, Trump insisted he’s moving ahead with plans to repeal and replace the Affordable Care Act, which has ballooned health insurance premiums and deductibles. “ObamaCare is a disaster, folks,” he said, adding that activists protesting its repeal are hijacking GOP town halls and other events.

“They fill up our rallies with people that you wonder how they get there,” the president said. “But they’re not the Republican people that our representatives are representing.”

As The Post reported, OFA boasts more than 250 offices nationwide and more than 32,000 organizers, with another 25,000 actively under training. Since November, it’s beefed up staff and fundraising, though as a “social welfare” nonprofit, it does not have to reveal its donors.

These aren’t typical Black Lives Matter or Occupy Wall Street marchers, but rather professionally trained organizers who go through a six-week training program similar to the training — steeped in Alinsky agitation tactics — Obama received in Chicago when he was a community organizer.

Chicago socialist Saul Alinsky, known by the left as “the father of community organizing,” taught radicals to “rub raw the sores of discontent” and create the conditions for a “revolution.” He dedicated his book, “Rules for Radicals,” to “Lucifer.” Michelle Obama quoted from the book when she helped launch OFA in 2013.

Obama appears to be behind the anti-Trump protests. He praised recent demonstrations against Trump’s travel ban. And last year, after Trump’s upset victory, he personally rallied OFA troops to “protect” his legacy in a conference call. “Now is the time for some organizing,” he said. “So don’t mope” over the election results.

He promised OFA activists he would soon join them in the fray.

“Understand that I’m going to be constrained in what I do with all of you until I am again a private citizen, but that’s not so far off,” he said. “You’re going to see me early next year, and we’re going to be in a position where we can start cooking up all kinds of great stuff.”

Added the ex-president: “I promise you that next year Michelle and I are going to be right there with you, and the clouds are going to start parting, and we’re going to be busy. I’ve got all kinds of thoughts and ideas about it, but this isn’t the best time to share them.

“Point is, I’m still fired up and ready to go, and I hope that all of you are, as well.”

http://nypost.com/2017/02/18/obama-linked-activists-have-a-training-manual-for-protesting-trump/

Obama’s Shadow Government Is Organizing To Undermine Trump

The leaks that led to Michael Flynn’s resignation are just the beginning. Obama and his loyalists in and outside government are working to undermine Trump.

By John Daniel Davidson

Once out of office, ex-presidents usually fade into private life and stay out of politics. They write memoirs, serve on corporate boards, and start charitable foundations. George W. Bush retired to his ranch in Texas and, most recently, painted portraits of veterans wounded in Iraq and Afghanistan. Bill Clinton was briefly thrust back into politics during Hillary’s two failed presidential campaigns, but most of his post-White House career consisted of flying around the world raising boatloads of money for his family’s now-defunct charity.

There are exceptions, of course. Jimmy Carter threw himself into international diplomacy, mediating an agreement in 1994 to return exiled President Jean-Bertrand Aristide to power in Haiti, and generally agitating for a Palestinian state.

Then there is Obama. Less than a month out of office, the broad contours of Obama’s post-presidency career are already taking shape. Obama and his loyalists, it seems, will remain in the center of the political fray, officially and unofficially, in an organized effort to undermine the Trump administration.

The bizarre scandal now unfolding over the resignation of national security advisor Michael Flynn is a case in point. Flynn’s resignation was prompted by a series of coordinated and anonymous leaks from current and former Obama administration officials in our domestic intelligence agencies.

Regardless of any valid criticism of Flynn, the leaks are part of a larger, loosely organized effort now underway to preserve Obama’s legacy. This effort involves Obama-era officials still inside the federal government, former Obama staffers working in the private sector, and Obama himself.

This isn’t some conspiracy theory. After the election, Obama indicated he intends to stay involved in the political fray. In an email to his supporters on his last day in office, Obama encouraged them to stay engaged, promising “I’ll be right there with you every step of the way.” Less than two weeks later, he issued a statement saying he was “heartened” by anti-Trump protests over the executive order on immigration.

Obama Is Jumping Back Into The Political Fray

But there’s more to all this than Obama issuing solidarity statements to Trump protestors. For one thing, the former president isn’t moving back to Chicago. The Obama family will remain in Washington DC, within a couple miles of the White House, for the next two years as Obama’s youngest daughter finishes high school.

From there, Obama will help direct his new foundation, which he has said will be a “startup for citizenship.” That could mean a lot things, but in light of his other plans it suggests the Obama Foundation will be a political grassroots organization designed to mobilize progressive activists.

Obama has also announced he’ll be working with former Attorney General Eric Holder on a political action group called the National Democratic Redistricting Committee. Its goal is to get Democrats elected at the state and local level ahead of the next redrawing of congressional districts. Last month, Obama reportedly met with Senate Minority Leader Chuck Schumer, House Minority Leader Nancy Pelosi, and Virginia Gov. Terry McAuliffe to strategize about redistricting.

In addition to these pursuits, the former president will likely play a prominent role in a network of progressive nonprofits, most notably Organizing for Action, the political group that grew out of Obama’s first campaign. OFA has kept a low profile in recent years, and if Clinton had won it likely would have shut down.

But last week, OFA officials told NBC News the organization was ramping up operations nationwide in an effort to preserve Obama’s signature achievements like the Affordable Care Act. As part of that effort, the group recently hired 14 field organizers in key states, adding to a growing infrastructure that boasts more than 250 offices nationwide and more than 32,000 volunteers.

Former Obama Staffers Are Speaking Out

Obama of course isn’t alone in all this. Trump’s victory has mobilized his top aides and staffers to take action, too. Former Obama staffer Tommy Vietor told the Daily Beast that, had Clinton won, “I would have been inclined to feel comfortable that Obama’s legacy and the things we worked on were safe.”

Instead, Vietor, along with former Obama administration staffers Jon Favreau and Jon Lovett, are launching a new podcast, Pod Save America, under their new joint media venture, Crooked Media.

The purpose of the company should be fairly obvious. “In the battle between Donald Trump and the media, we are firmly on the side of the media,” Favreau told the Daily Beast, adding that he’s not interested in “the veneer of objectivity.” “We’re always going to be Obama guys, we’re very open and honest about that.”

Favreau has also been helping create Obama’s new foundation, whose mission, he says, “is to get people involved in civic life and get people engaged in politics.” Of Crooked Media, Favreau says, “I think we would very much like to be the media company version of that. So it’s certainly inspired by a lot of what Obama has talked about in terms of the media over the last several months.”

A host of other former Obama staffers have simply taken to social media to voice their opposition to Trump. One former senior administration official told Yahoo News, “There are more than a few of us who believe deeply in holding this administration’s feet to the fire—especially when they offer falsehoods to the American people and distort our record. We have an email chain going where we share impressions, etc.”

As the leaks keep flowing from our intelligence agencies and the tweets keep flying from former Obama officials, keep in mind that although we haven’t heard much from Obama himself yet, the Trump administration is going to keep feeling the disruptions of what amounts to a shadow government.

Obama had eight years in the White House to secure his legacy. Any efforts on his part to undermine his successor aren’t just an affront to the principles of our democracy, they’re an admission that he and his acolytes never put much stock in democracy to begin with.

http://thefederalist.com/2017/02/16/obamas-shadow-government-organizing-undermine-trump/

The Pronk Pops Show Podcasts Portfolio

Listen To Pronk Pops Podcast or Download Shows 850-854

Listen To Pronk Pops Podcast or Download Shows 845-849

Listen To Pronk Pops Podcast or Download Shows 840-844

Listen To Pronk Pops Podcast or Download Shows 833-839

Listen To Pronk Pops Podcast or Download Shows 827-832

Listen To Pronk Pops Podcast or Download Shows 821-826

Listen To Pronk Pops Podcast or Download Shows 815-820

Listen To Pronk Pops Podcast or Download Shows 806-814

Listen To Pronk Pops Podcast or Download Shows 800-805

Listen To Pronk Pops Podcast or Download Shows 793-799

Listen To Pronk Pops Podcast or Download Shows 785-792

Listen To Pronk Pops Podcast or Download Shows 777-784

Listen To Pronk Pops Podcast or Download Shows 769-776

Listen To Pronk Pops Podcast or Download Shows 759-768

Listen To Pronk Pops Podcast or Download Shows 751-758

Listen To Pronk Pops Podcast or Download Shows 745-750

Listen To Pronk Pops Podcast or Download Shows 738-744

Listen To Pronk Pops Podcast or Download Shows 732-737

Listen To Pronk Pops Podcast or Download Shows 727-731

Listen To Pronk Pops Podcast or Download Shows 720-726

Listen To Pronk Pops Podcast or DownloadShows 713-719

Listen To Pronk Pops Podcast or DownloadShows 705-712

Listen To Pronk Pops Podcast or Download Shows 695-704

Listen To Pronk Pops Podcast or Download Shows 685-694

Listen To Pronk Pops Podcast or Download Shows 675-684

Listen To Pronk Pops Podcast or Download Shows 668-674

Listen To Pronk Pops Podcast or Download Shows 660-667

Listen To Pronk Pops Podcast or Download Shows 651-659

Listen To Pronk Pops Podcast or Download Shows 644-650

Listen To Pronk Pops Podcast or Download Shows 637-643

Listen To Pronk Pops Podcast or Download Shows 629-636

Listen To Pronk Pops Podcast or Download Shows 617-628

Listen To Pronk Pops Podcast or Download Shows 608-616

Listen To Pronk Pops Podcast or Download Shows 599-607

Listen To Pronk Pops Podcast or Download Shows 590-598

Listen To Pronk Pops Podcast or Download Shows 585- 589

Listen To Pronk Pops Podcast or Download Shows 575-584

Listen To Pronk Pops Podcast or Download Shows 565-574

Listen To Pronk Pops Podcast or Download Shows 556-564

Listen To Pronk Pops Podcast or Download Shows 546-555

Listen To Pronk Pops Podcast or Download Shows 538-545

Listen To Pronk Pops Podcast or Download Shows 532-537

Listen To Pronk Pops Podcast or Download Shows 526-531

Listen To Pronk Pops Podcast or Download Shows 519-525

Listen To Pronk Pops Podcast or Download Shows 510-518

Listen To Pronk Pops Podcast or Download Shows 500-509

Listen To Pronk Pops Podcast or Download Shows 490-499

Listen To Pronk Pops Podcast or Download Shows 480-489

Listen To Pronk Pops Podcast or Download Shows 473-479

Listen To Pronk Pops Podcast or Download Shows 464-472

Listen To Pronk Pops Podcast or Download Shows 455-463

Listen To Pronk Pops Podcast or Download Shows 447-454

Listen To Pronk Pops Podcast or Download Shows 439-446

Listen To Pronk Pops Podcast or Download Shows 431-438

Listen To Pronk Pops Podcast or Download Shows 422-430

Listen To Pronk Pops Podcast or Download Shows 414-421

Listen To Pronk Pops Podcast or Download Shows 408-413

Listen To Pronk Pops Podcast or Download Shows 400-407

Listen To Pronk Pops Podcast or Download Shows 391-399

Listen To Pronk Pops Podcast or Download Shows 383-390

Listen To Pronk Pops Podcast or Download Shows 376-382

Listen To Pronk Pops Podcast or Download Shows 369-375

Listen To Pronk Pops Podcast or Download Shows 360-368

Listen To Pronk Pops Podcast or Download Shows 354-359

Listen To Pronk Pops Podcast or Download Shows 346-353

Listen To Pronk Pops Podcast or Download Shows 338-345

Listen To Pronk Pops Podcast or Download Shows 328-337

Listen To Pronk Pops Podcast or Download Shows 319-327

Listen To Pronk Pops Podcast or Download Shows 307-318

Listen To Pronk Pops Podcast or Download Shows 296-306

Listen To Pronk Pops Podcast or Download Shows 287-295

Listen To Pronk Pops Podcast or Download Shows 277-286

Listen To Pronk Pops Podcast or Download Shows 264-276

Listen To Pronk Pops Podcast or Download Shows 250-263

Listen To Pronk Pops Podcast or Download Shows 236-249

Listen To Pronk Pops Podcast or Download Shows 222-235

Listen To Pronk Pops Podcast or Download Shows 211-221

Listen To Pronk Pops Podcast or Download Shows 202-210

Listen To Pronk Pops Podcast or Download Shows 194-201

Listen To Pronk Pops Podcast or Download Shows 184-193

Listen To Pronk Pops Podcast or Download Shows 174-183

Listen To Pronk Pops Podcast or Download Shows 165-173

Listen To Pronk Pops Podcast or Download Shows 158-164

Listen To Pronk Pops Podcast or Download Shows151-157

Listen To Pronk Pops Podcast or Download Shows 143-150

Listen To Pronk Pops Podcast or Download Shows 135-142

Listen To Pronk Pops Podcast or Download Shows 131-134

Listen To Pronk Pops Podcast or Download Shows 124-130

Listen To Pronk Pops Podcast or Download Shows 121-123

Listen To Pronk Pops Podcast or Download Shows 118-120

Listen To Pronk Pops Podcast or Download Shows 113 -117

Listen To Pronk Pops Podcast or Download Show 112

Listen To Pronk Pops Podcast or Download Shows 108-111

Listen To Pronk Pops Podcast or Download Shows 106-108

Listen To Pronk Pops Podcast or Download Shows 104-105

Listen To Pronk Pops Podcast or Download Shows 101-103

Listen To Pronk Pops Podcast or Download Shows 98-100

Listen To Pronk Pops Podcast or Download Shows 94-97

Listen To Pronk Pops Podcast or Download Show 93

Listen To Pronk Pops Podcast or Download Show 92

Listen To Pronk Pops Podcast or Download Show 91

Listen To Pronk Pops Podcast or Download Shows 88-90

Listen To Pronk Pops Podcast or Download Shows 84-87

Listen To Pronk Pops Podcast or Download Shows 79-83

Listen To Pronk Pops Podcast or Download Shows 74-78

Listen To Pronk Pops Podcast or Download Shows 71-73

Listen To Pronk Pops Podcast or Download Shows 68-70

Listen To Pronk Pops Podcast or Download Shows 65-67

Listen To Pronk Pops Podcast or Download Shows 62-64

Listen To Pronk Pops Podcast or Download Shows 58-61

Listen To Pronk Pops Podcast or Download Shows 55-57

Listen To Pronk Pops Podcast or Download Shows 52-54

Listen To Pronk Pops Podcast or Download Shows 49-51

Listen To Pronk Pops Podcast or Download Shows 45-48

Listen To Pronk Pops Podcast or Download Shows 41-44

Listen To Pronk Pops Podcast or Download Shows 38-40

Listen To Pronk Pops Podcast or Download Shows 34-37

Listen To Pronk Pops Podcast or Download Shows 30-33

Listen To Pronk Pops Podcast or Download Shows 27-29

Listen To Pronk Pops Podcast or Download Shows 17-26

Listen To Pronk Pops Podcast or Download Shows 16-22

Listen To Pronk Pops Podcast or Download Shows 10-15

Listen To Pronk Pops Podcast or Download Shows 1-9

Read Full Post | Make a Comment ( None so far )

The Pronk Pops Show 778, October 18, 2016, Breaking Stories — October Surprise — Surprise — Surprise — Story 1: Project Veritas Undercover Investigation Exposes Clinton Campaign and DNC Inciting Violence at Trump Rallies! — Dirty Democrat Deeds — Multiple Violations of The Law — Assault On Rule of Law — Videos — Story 2: The Sound of Silence of Big Lie Media — How The Democrats Rigged The Election — Videos — Story 3: Bill and Hillary Clinton Exposed By Hillary Hit Man –24 years of Cover-ups and Crimes — Read It In The National Enquirer — Videos

Posted on October 18, 2016. Filed under: 2016 Presidential Campaign, 2016 Presidential Candidates, Addiction, American History, Assault, Banking System, Blogroll, Breaking News, Bribery, Budgetary Policy, Business, College, Communications, Computers, Congress, Constitutional Law, Corruption, Countries, Crime, Culture, Donald J. Trump, Donald J. Trump, Donald Trump, Donald Trump, Drugs, Economics, Education, Empires, Employment, Federal Bureau of Investigation (FBI), Federal Communications Commission, Fiscal Policy, Foreign Policy, Fourth Amendment, Free Trade, Government, Government Dependency, Government Spending, Health Care, Health Care Insurance, High Crimes, Hillary Clinton, Hillary Clinton, History, House of Representatives, Human, Human Behavior, Illegal Drugs, Illegal Immigration, Immigration, Impeachment, Language, Law, Legal Drugs, Legal Immigration, Life, Lying, Media, Monetary Policy, News, Philosophy, Photos, Politics, Polls, President Barack Obama, Pro Abortion, Pro Life, Progressives, Radio, Raymond Thomas Pronk, Second Amendment, Senate, Social Networking, Tax Policy, Trade Policy, Unemployment, United States Constitution, United States of America, United States Supreme Court, Videos, Violence, Wall Street Journal, War, Wealth, Weapons, Wisdom | Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , |

Project_1

The Pronk Pops Show Podcasts

Pronk Pops Show 778: October 18, 2016

Pronk Pops Show 777: October 17, 2016

Pronk Pops Show 776: October 14, 2016

Pronk Pops Show 775: October 13, 2016

Pronk Pops Show 774: October 12, 2016

Pronk Pops Show 773: October 11, 2016

Pronk Pops Show 772: October 10, 2016

Pronk Pops Show 771: October 7, 2016

Pronk Pops Show 770: October 6, 2016

Pronk Pops Show 769: October 5, 2016 

Pronk Pops Show 768: October 3, 2016

Pronk Pops Show 767: September 30, 2016

Pronk Pops Show 766: September 29, 2016

Pronk Pops Show 765: September 28, 2016

Pronk Pops Show 764: September 27, 2016

Pronk Pops Show 763: September 26, 2016

Pronk Pops Show 762: September 23, 2016

Pronk Pops Show 761: September 22, 2016

Pronk Pops Show 760: September 21, 2016

Pronk Pops Show 759: September 20, 2016

Pronk Pops Show 758: September 19, 2016

Pronk Pops Show 757: September 16, 2016

Pronk Pops Show 756: September 15, 2016

Pronk Pops Show 755: September 14, 2016

Pronk Pops Show 754: September 13, 2016

Pronk Pops Show 753: September 12, 2016

Pronk Pops Show 752: September 9, 2016

Pronk Pops Show 751: September 8, 2016

Pronk Pops Show 750: September 7, 2016

Pronk Pops Show 749: September 2, 2016

Pronk Pops Show 748: September 1, 2016

Pronk Pops Show 747: August 31, 2016

Pronk Pops Show 746: August 30, 2016

Pronk Pops Show 745: August 29, 2016

Pronk Pops Show 744: August 26, 2016

Pronk Pops Show 743: August 25, 2016

Pronk Pops Show 742: August 24, 2016

Pronk Pops Show 741: August 23, 2016

Pronk Pops Show 740: August 22, 2016

Pronk Pops Show 739: August 18, 2016

Pronk Pops Show 738: August 17, 2016

Pronk Pops Show 737: August 16, 2016

Pronk Pops Show 736: August 15, 2016

Pronk Pops Show 735: August 12, 2016

Pronk Pops Show 734: August 11, 2016

Pronk Pops Show 733: August 9, 2016

Pronk Pops Show 732: August 8, 2016

Pronk Pops Show 731: August 4, 2016

Pronk Pops Show 730: August 3, 2016

Pronk Pops Show 729: August 1, 2016

Pronk Pops Show 728: July 29, 2016

Pronk Pops Show 727: July 28, 2016

Pronk Pops Show 726: July 27, 2016

Pronk Pops Show 725: July 26, 2016

Pronk Pops Show 724: July 25, 2016

Pronk Pops Show 723: July 22, 2016

Pronk Pops Show 722: July 21, 2016

Pronk Pops Show 721: July 20, 2016

Pronk Pops Show 720: July 19, 2016

Pronk Pops Show 719: July 18, 2016

Pronk Pops Show 718: July 15, 2016

Pronk Pops Show 717: July 14, 2016

Pronk Pops Show 716: July 13, 2016

Pronk Pops Show 715: July 12, 2016

Pronk Pops Show 714: July 7, 2016

Pronk Pops Show 713: July 6, 2016

Pronk Pops Show 712: July 5, 2016

Pronk Pops Show 711: July 1, 2016

Story 1: Project Veritas Undercover Investigation Exposes Clinton Campaign and DNC Inciting Violence at Trump Rallies! — Dirty Democrat Deeds — Multiple Violations of The Law — Assault On Rule of Law  — Videos —

Image result for project veritas

Image result for project veritas

Image result for project veritas

Image result for project veritas

Image result for project veritas

Image result for project veritas

Image result for project veritas

Image result for project veritas

Bob Cramer

Image result for project veritas

Scott Foval

Image result for project veritas

Image result for project veritas

Image result for project veritas

Image result for project veritas

Image result for project veritas

Rigging the Election – Video I: Clinton Campaign and DNC Incite Violence at Trump Rallies

Published on Oct 17, 2016

In this explosive new video from Project Veritas Action, a Democratic dirty tricks operative unwittingly provides a dark money trail to the DNC and Clinton campaign. The video documents violence at Trump rallies that is traced to the Clinton campaign and the DNC through a process called birddogging.

A shady coordinated communications chain between the DNC, Clinton Campaign, Hillary Clinton’s Super PAC (Priorities) and other organizations are revealed. A key Clinton operative is on camera saying, “It doesn’t matter what the friggin’ legal and ethics people say, we need to win this motherfucker.”

Rigging the Election – Video II: Mass Voter Fraud

The O’Reilly Factor 10/18/16 Rigging the Election – Mass Voter Fraud

James O’Keefe on Varney & Co Fox Business

UNDERCOVER VIDEO: DEMOCRATS CAUSED VIOLENCE AT TRUMP RALLIES

“Conflict engagement” means paying leftist agitators, the homeless and the mentally ill, to cause melees at Trump rallies.

The frequent outbursts of violence at Republican candidate Donald Trump’s campaign rallies have been orchestrated and paid for by Hillary Clinton’s campaign, a stunning new undercover video suggests.

Why isn’t the mainstream media apart from Fox News covering this new scandal? Perhaps because reporters overwhelmingly support Hillary Clinton in the election. In terms of dollars donated to the Clinton and Trump campaigns, journalists favor Clinton by a factor of 27 to 1. They’ve given more than $382,000 to Clinton’s campaign compared to just $14,000 to Trump’s campaign, according to the Center for Public Integrity.

This newly revealed Reichstag fire of a plot by Democrats at the highest levels is “a direct assault on democracy and the rule of law,” former House Speaker Newt Gingrich (R-Ga.) told Sean Hannity on Fox News Channel last night. “This is a hundred times bigger than Watergate.”

Gingrich may be on to something. Thanks to the video provided by Project Veritas Action, Americans will now be able to see that the Left has been running a clandestine operation against Trump for some time now.

The idea was to concoct evidence that Trump supporters were crazy, knuckle-dragging thugs in order to discredit the billionaire businessman’s campaign for president. Many left-wingers already call Trump a fascist or a Nazi so creating the appearance at Trump rallies that the candidate’s supporters are violent put some meat on the bone, so to speak. It’s the Big Lie American-style, a huge false-flag operation generated by a real-life vast left-wing conspiracy.

This, of course, is what the Left does. Its agenda-setters dislike stories that deviate from their preferred narrative. They will lie and distort in order to shoehorn events to support their worldview. This is why Americans were told over and over again that the Tea Party movement was violent and dangerous, while Black Lives Matter and Occupy Wall Street are gentle and benign. This is why we are told Republicans are greedy, heartless, and racist, while Democrats are selfless, compassionate, and color-blind.

In the video, Americans United for Change (AUfC) operative Scott Foval is shown on camera saying, “One of the things we do is we stage very authentic grassroots protests right in their faces at their own events. Like, we infiltrate.”

Ethics, shmethics, is Foval’s attitude. “It doesn’t matter what the friggin’ legal and ethics people say, we need to win this motherfucker.” He adds, “we’re starting anarchy here.”

The Clinton campaign “is fully in it,” veteran left-wing strategist Robert Creamer confirms on hidden camera. “Hillary knows through the chain of command what’s going on.”

In another clip, Creamer is shown saying, “I’m not suggesting we wait around. We need to start this shit right away on every one of these fronts.”

The new video also appears to unveil a carefully coordinated scheme to circumvent campaign finance laws involving what some call the “Brocktopus,” or the network of organizations created by Media Matters for America founder and Hillary Clinton ally David Brock to get Clinton elected.

In the footage released by ACORN slayer James O’Keefe III yesterday, Creamer and Foval were caught explaining in detail their devious plan to generate negative media coverage of Trump events.

Creamer, a practitioner of the agitation arts taught by Marxist community organizing guru Saul Alinsky, is the husband of Rep. Jan Schakowsky (D-Ill.), a socialist and advocate of single-payer health care. Creamer is considered by many to be the legislative architect of Obamacare. He also wrote a series of bad checks to cover his salary at a nonprofit and went to prison. Prosecutors wanted to send him up the river for 37 months but he received a mere five-month sentence and 11 months of home confinement from a friendly Democrat judge.

The information provided by Creamer and Foval is damning because it spells out the relationship between their various dirty tricks crews across the country and the leadership of the Democratic Party and how these people go about their illicit business.

But first let’s look at what Creamer said.

“Wherever Trump and Pence are gonna be we have events,” Creamer explains in the video. “We have a call with the campaign every day to go over the focuses that need to be undertaken.”

He continues:

And we have a whole team across the country that does that. Both consultants and people from the Democratic Party and the Democratic Party apparatus and people from the campaign, the Clinton campaign. And my role in the campaign is to manage all that.

Creamer founded Democracy Partners in 2011. He explains, “Just for a little orientation, Democracy Partners is kind of a group practice of a variety of consultants that do, essentially, a wide variety of different kinds of political consulting.”

Foval says that he works “with Bob Creamer one to one. I’m the white hat; Democracy Partners is kind of dark hat.” He adds, “Bob Creamer is diabolical and I love him for it.”

“We are contracted directly with the DNC and the campaign both,” Foval says. “I am contracted to him [Creamer], but I answer to the head of special events for the DNC and the head of the special events and political for the campaign.”

“The campaign pays DNC, DNC pays Democracy Partners, Democracy Partners pays the Foval Group, the Foval Group goes and executes the shit on the ground,” Foval says.

“We are the primary mechanism as a team. Democracy Partners is the tip of the spear on that stuff.”

Foval explains that his teams use “a script of engagement” to taunt and provoke Trump supporters. “Sometimes the crazies bite and sometimes the crazies don’t bite.”

The goal is to bring about a physical confrontation that will make it into media reports.

“If you’re there and you’re protesting and you do these actions, you will be attacked at Trump rallies,” he says. “That’s what we want.”

“The whole point of it is that we know Trump’s people will freak the fuck out, his security team will freak out, and his supporters will lose their shit.”

It is important to get the confrontation started in the lineup waiting to get in to the rally, Foval says.

Because once they’re inside the rally they’re under Secret Service’s control. When they’re outside the rally, the media will cover it no matter where it happens. The key is initiating the conflict by having leading conversations with people who are naturally psychotic. I mean honestly, it is not hard to get some of these assholes to pop off. It’s a matter of showing up, to want to get into the rally, in a Planned Parenthood t-shirt. Or, Trump is a Nazi, you know. You can message to draw them out, and draw them to punch you.”

Foval brags about the rent-a-mobs he keeps on standby across America.

We have to have people prepared to go wherever these events are, which means we have to have a central kind of agitator training. Now, we have a built-in group of people in New York who do this. We have a built-in group of people in D.C. who do this. We have a group of people in Vegas. We have a group of people in Colorado. We have a group of people in Minneapolis.

Foval says that “We have to be really careful because what we don’t need is for it to show up on CNN that the DNC paid for X people to, that’s not going to happen.” Events perceived as partisan by the media are far less likely to get worthwhile coverage, he says.

“It’s something that Bob and I obsess about is we’re not going to go to an effort to just do an event and not have anybody show up or not have it covered,” he says. “We have to get coverage.”

Foval continues:

You remember the Iowa State Fair thing where Scott Walker grabbed the sign out of the dude’s hand and then the dude gets kind of roughed up right in front of the stage right there on camera? That was all us. The guy that got roughed up is my counterpart who works for Bob.

Shirley Teeter, the 69-year-old lady who claimed to have been assaulted at a Trump rally in North Carolina, “was one of our activists,” Foval says. She “had been trained up to birddog.”

He explained what “birddogging” is.

So the term birddogging, you put people in the line at the front, which means they have to get there at six o’clock in the morning because they have to get in front of the rally, so what when Trump comes down the rope line they’re the ones asking him the question in front of the reporters, because they’re pre-placed there. To funnel that kind of operation, you have to start back with people two weeks ahead of time and train them how to ask questions. You have to train them to birddog.

Foval bragged about exploiting homeless people and people with psychiatric problems.

I’m saying we have mentally ill people that we pay to do shit, make no mistake. Over the last 20 years I’ve paid off a few homeless guys to do some crazy stuff, and I’ve also taken them for dinner, and I’ve also made sure they had a hotel, and a shower and I put them in a program. Like I’ve done that. But the reality is, a lot of people, especially our union guys, a lot of union guys, they’ll do whatever you want. They’re rock ’n roll.

Foval explained how the super PACs communicate with each other and how their information finds its way to the DNC, likely in violation of federal law.

And then there’s the DNC and the campaigns and Priorities [Clinton’s super PAC]. Priorities is a big part of this too. The campaigns and DNC cannot go near Priorities, but I guaran-damn-tee you that the people who run the super PACs all talk to each other and we and a few other people are the hubs of that communication.

“We’re consultants,” Foval says, “so we’re not the official entity and so those conversations can be had between consultants who are working for different parts.”

An undercover journalist asks, “So there’s like a Morse code between the DNC and the super PACs?”

“It’s less of a Morse code than it is a text conversation that never ends,” Foval says. “It’s like that. It’s kind of like an ongoing Pony Express.”

The process is “not as efficient as it could be but that’s because the law doesn’t allow it to.”

He adds:

The thing that we have to watch is making sure there is a double blind between the actual campaign and the actual DNC and what we’re doing. There’s a double blind there. So they can plausibly deny that they knew anything about it.

A group Foval works for and repeatedly references in the video is Americans United for Change, a 501(c)(4) nonprofit headquartered in Washington, D.C. It had a $4 million budget in the year ending June 30, 2015. Ploughshares Fund Inc., which was instrumental in the Iranian nuclear nonproliferation pact process, gave Americans United for Change $64,971 in grants in 2014.

From 2010 to the present, AUfC has paid one of Creamer’s firms, Chicago-based Strategic Consulting Group, $955,132 as a contractor, according to IRS filings.

The cast of characters involved in Americans United for Change is a who’s who of the nation’s Democrat power elite.

According to the most recent publicly available IRS Form 990 for the period ending June 30, 2015, the group’s board members and corporate officers are:

Lee Saunders, AUfC board chairman, is president of AFSCME (American Federation of State, County and Municipal Employees). He gave a keynote address at DNC 2016 in Philadelphia.

Brad Woodhouse, AUfC president, is president of two pro-Hillary super PACs, American Bridge 21st Centuryand Correct the Record. He is a former DNC communications director.

Mike Lux, AUfC secretary, is CEO of Progressive Strategies, and cofounder and CEO of Democracy Partners. His online bio states he serves on the boards of Arca Foundation, Netroots Nation, Progressive Congress, and USAction, that he founded and chairs American Family Voices, cofounded Ballot Initiative Strategy Center, Progressive Majority, Women’s Voice/Women Vote, and Center for Progressive Leadership. The bio states “he played a role in the early days of launching” the Center for American Progress, Air America, andMoveOn. He is aformer senior vice president for political action at People for the American Way (PfAW) andPfAW Foundation, and helped launch the PfAW PAC and the PfAW Voters Alliance. Lux was hired by the DNCon Sept. 27 as senior adviser for progressive outreach for the rest of the 2016 campaign.

Khalid Pitts, AUfC treasurer, is national political director for the Sierra Club, and a partner in Democracy Partners. He is an executive board member and secretary-treasurer for the DC Health Benefit Exchange Authority. Pitts is president USAction, a pressure group cofounded by professional Alinskyite and DNC trainerHeather Booth, who founded the community organizing school, the Midwest Academy. He was also director of strategic campaigns for SEIU and a member of the board of Coalition on Human Needs.

Mary Kay Henry is international president of SEIU (Service Employees International Union). She gave an address at DNC 2016.

Randi Weingarten ispresident of the American Federation of Teachers. Like Henry, shegave an address at DNC 2016.

Former Rep. David Obey (D-Wisc.) is a former chairman of the House Appropriations Committee.

Susan McCue is president of Message Global LLC. She co-chairs Senate Majority PAC and is a; former chief of staff to then-Senate Majority Leader Harry Reid (D-Nev.). She was deputy assistant secretary for public affairs under then-HUD Secretary Andrew Cuomo. McCue worked for the Associated Press, National Journal, and theNew York Times. Her online bio states in 2007 GQ magazine named her “one of the 50 most powerful people in Washington,” and in 2006 Washingtonian Magazine “named her one of the 100 most powerful women in Washington.” She helped organize the “Camden Uprising” concert during DNC 2016 which featured Lady Gaga, Lenny Kravity, and DC Jazzy Jeff.

Jim Messina was the Obama 2012 campaign manager and Obama White House deputy chief of staff for operations.

Chuck Loveless is a senior advisor at Nueva Vista Group LLC. He is a former director of federal government affairs for AFSCME and a past chairman of the International Foundation of Employee Benefit Plans’ Public Employees Committee. Loveless is a former chairman of Americans for Tax Fairness.

But that’s not all.

Prominent Democrat operatives have served on the board of Americans United for Change in the past.

Among them are: Roger Hickey and Robert Borosage of the Campaign for America’s Future; Karen Olick, managing director, SKDKnickerbocker; and Adam Luna, senior advisor, United We Dream Network Inc., who also served as policy director for America’s Voice and America’s Voice Education Fund.

Thomas McMahon once served as AUfC’s acting executive director. He is a partner in New Partners and was executive director of the DNC from February 2005 to July 2010, according to his LinkedIn profile. He was deputy campaign manager for Howard Dean’s presidential run in 2004 and deputy director of advance in Bill Clinton’s White House from 1995 to 1997.

Former AUfC executive Caren Benjamin is now vice president of West End Strategy. Benjamin was an adviser to Rep. Nancy Pelosi (D-Calif.), press secretary for Sen. Bob Graham (D-Fla.), and worked as a communications strategist at the AFL-CIO and Vanguard Communications. She also was a reporter with theLas Vegas Review-Journal and the Associated Press in Washington, New York, and Nevada, according to her online bio.

O’Keefe promises another bombshell video Tuesday.

“Tomorrow we release our next installment of this investigation where we expose a voter fraud scheme discussed at the highest levels,” O’Keefe said. “The Hillary Clinton campaign is leaving nothing to chance as we have seen and will continue reveal as our undercover investigation into the dark machine of the Hillary Clinton campaign continues,”

“Hillary, check your email,” O’Keefe added cheekily.

http://www.frontpagemag.com/fpm/264543/undercover-video-democrats-caused-violence-trump-matthew-vadum

Story 2: Big Lie Media — The Sound of Silence — How The Democrats Rigged The Election — Videos

James O’Keefe Demands The Corporate Media to Report Veritas

Hannity 10/17/16 | James O’Keefe video, Melania Trump interview, Clinton camp exposed

Story 3: Bill and Hillary Clinton Exposed By Hillary Hit Man –24 years of Cover-ups and Crimes — Read It In The National Enquirer — Videos —

Hillary Clinton in the National Enquirer on Wednesday

BREAKING: Hillary Hit Man Reveals Major BOMBSHELL SECRETS!

The Howie Carr Show | The New Project Veritas Video and the Hillary National Enquirer piece

John Edwards Admits Having Affair – National Enquirer Tells Truth!!

Rielle Hunter 20/20 Interview On John Edwards

BREAKING NEWS

Hillary Fixer Breaks Ranks: I Arranged Sex Trysts For Her — With Men & WOMEN

Stunning revelations of Clinton bag man!

hillary clinton lesbian sex claims scandals

Hillary Clinton is a secret sex freak who paid fixers to set up illicit romps with both men AND women!

That’s the blockbuster revelation from a former Clinton family operative who is sensationally breaking ranks with his one-time bosses to speak to The National ENQUIRER in a bombshell 9-page cover story — on newsstands Wednesday.

“I arranged a meeting for Hillary and a woman in an exclusive Beverly Hills hotel,” the man, who was hired by the Clintons, via a Hollywood executive, to cover up their scandals, told The ENQUIRER.

PHOTOS: Revenge! Donald Trump Fighting Back Against Hillary Clinton’s Smear Campaign

“She had come to the studio to see the filming of a movie in 1994.”

“While I was there, I helped her slip out of a back exit for a one-on-one session with the other woman. It was made to look casual, leaving quietly [rather] that being caught up in the melee … but really it was for something presumably more sordid.”

What’s more, it wasn’t just Hillary’s flings with women that the shadowy Mr. Fix It helped to orchestrate!

PHOTOS: Hillary’s Lies EXPOSED! Clinton’s Top 5 Debate Whoppers

Hillary’s former bagman finally confessed to The ENQUIRER just how he helped her to cover up her affair with married lover VinceFoster, too!

The shadowy figure — who provided PROOF of his employment for the Clintons — also revealed 12 fixes he covered-up, including:

+ How Hillary secretly plotted to a counter-attack on Bill’s mistress MonicaLewinsky — via a document buried for two decades!

PHOTOS: Leaked Emails Detail Hillary Clinton’s Desperate Health Crisis Cover-Ups

+ What crooked reporters were on the take from the Clinton camp!

+ How he covered up Bill’s seedy romp with hookers!

+ Which A-list celebrity had a secret affair with Bill during his presidency!

PHOTOS: Crooked Hillary’s Lies EXPOSED! Clinton’s 13 Most Infamous Scandals — So Far

In the bombshell exposé, The ENQUIRER will reveal the fixer’s dossier of smoking gun proof, including 24-years of documents, notes, and journals.

http://www.nationalenquirer.com/celebrity/hillary-clinton-lesbian-sex-claims-vince-foster-fixer/

Gomer Surprise

The Pronk Pops Show Podcasts Portfolio

Listen To Pronk Pops Podcast or Download Shows 777-778

Listen To Pronk Pops Podcast or Download Shows 769-776

Listen To Pronk Pops Podcast or Download Shows 759-768

Listen To Pronk Pops Podcast or Download Shows 751-758

Listen To Pronk Pops Podcast or Download Shows 745-750

Listen To Pronk Pops Podcast or Download Shows 738-744

Listen To Pronk Pops Podcast or Download Shows 732-737

Listen To Pronk Pops Podcast or Download Shows 727-731

Listen To Pronk Pops Podcast or Download Shows 720-726

Listen To Pronk Pops Podcast or Download Shows 713-719

Listen To Pronk Pops Podcast or Download Shows 705-712

Listen To Pronk Pops Podcast or Download Shows 695-704

Listen To Pronk Pops Podcast or Download Shows 685-694

Listen To Pronk Pops Podcast or Download Shows 675-684

Listen To Pronk Pops Podcast or Download Shows 668-674

Listen To Pronk Pops Podcast or Download Shows 660-667

Listen To Pronk Pops Podcast or Download Shows 651-659

Listen To Pronk Pops Podcast or Download Shows 644-650

Listen To Pronk Pops Podcast or Download Shows 637-643

Listen To Pronk Pops Podcast or Download Shows 629-636

Listen To Pronk Pops Podcast or Download Shows 617-628

Listen To Pronk Pops Podcast or Download Shows 608-616

Listen To Pronk Pops Podcast or Download Shows 599-607

Listen To Pronk Pops Podcast or Download Shows 590-598

Listen To Pronk Pops Podcast or Download Shows 585- 589

Listen To Pronk Pops Podcast or Download Shows 575-584

Listen To Pronk Pops Podcast or Download Shows 565-574

Listen To Pronk Pops Podcast or Download Shows 556-564

Listen To Pronk Pops Podcast or Download Shows 546-555

Listen To Pronk Pops Podcast or Download Shows 538-545

Listen To Pronk Pops Podcast or Download Shows 532-537

Listen To Pronk Pops Podcast or Download Shows 526-531

Listen To Pronk Pops Podcast or Download Shows 519-525

Listen To Pronk Pops Podcast or Download Shows 510-518

Listen To Pronk Pops Podcast or Download Shows 500-509

Listen To Pronk Pops Podcast or Download Shows 490-499

Listen To Pronk Pops Podcast or Download Shows 480-489

Listen To Pronk Pops Podcast or Download Shows 473-479

Listen To Pronk Pops Podcast or Download Shows 464-472

Listen To Pronk Pops Podcast or Download Shows 455-463

Listen To Pronk Pops Podcast or Download Shows 447-454

Listen To Pronk Pops Podcast or Download Shows 439-446

Listen To Pronk Pops Podcast or Download Shows 431-438

Listen To Pronk Pops Podcast or Download Shows 422-430

Listen To Pronk Pops Podcast or Download Shows 414-421

Listen To Pronk Pops Podcast or Download Shows 408-413

Listen To Pronk Pops Podcast or Download Shows 400-407

Listen To Pronk Pops Podcast or Download Shows 391-399

Listen To Pronk Pops Podcast or Download Shows 383-390

Listen To Pronk Pops Podcast or Download Shows 376-382

Listen To Pronk Pops Podcast or Download Shows 369-375

Listen To Pronk Pops Podcast or Download Shows 360-368

Listen To Pronk Pops Podcast or Download Shows 354-359

Listen To Pronk Pops Podcast or Download Shows 346-353

Listen To Pronk Pops Podcast or Download Shows 338-345

Listen To Pronk Pops Podcast or Download Shows 328-337

Listen To Pronk Pops Podcast or Download Shows 319-327

Listen To Pronk Pops Podcast or Download Shows 307-318

Listen To Pronk Pops Podcast or Download Shows 296-306

Listen To Pronk Pops Podcast or Download Shows 287-295

Listen To Pronk Pops Podcast or Download Shows 277-286

Listen To Pronk Pops Podcast or Download Shows 264-276

Listen To Pronk Pops Podcast or Download Shows 250-263

Listen To Pronk Pops Podcast or Download Shows 236-249

Listen To Pronk Pops Podcast or Download Shows 222-235

Listen To Pronk Pops Podcast or Download Shows 211-221

Listen To Pronk Pops Podcast or Download Shows 202-210

Listen To Pronk Pops Podcast or Download Shows 194-201

Listen To Pronk Pops Podcast or Download Shows 184-193

Listen To Pronk Pops Podcast or Download Shows 174-183

Listen To Pronk Pops Podcast or Download Shows 165-173

Listen To Pronk Pops Podcast or Download Shows 158-164

Listen To Pronk Pops Podcast or Download Shows151-157

Listen To Pronk Pops Podcast or Download Shows 143-150

Listen To Pronk Pops Podcast or Download Shows 135-142

Listen To Pronk Pops Podcast or Download Shows 131-134

Listen To Pronk Pops Podcast or Download Shows 124-130

Listen To Pronk Pops Podcast or Download Shows 121-123

Listen To Pronk Pops Podcast or Download Shows 118-120

Listen To Pronk Pops Podcast or Download Shows 113 -117

Listen To Pronk Pops Podcast or Download Show 112

Listen To Pronk Pops Podcast or Download Shows 108-111

Listen To Pronk Pops Podcast or Download Shows 106-108

Listen To Pronk Pops Podcast or Download Shows 104-105

Listen To Pronk Pops Podcast or Download Shows 101-103

Listen To Pronk Pops Podcast or Download Shows 98-100

Listen To Pronk Pops Podcast or Download Shows 94-97

Listen To Pronk Pops Podcast or Download Show 93

Listen To Pronk Pops Podcast or Download Show 92

Listen To Pronk Pops Podcast or Download Show 91

Listen To Pronk Pops Podcast or Download Shows 88-90

Listen To Pronk Pops Podcast or Download Shows 84-87

Listen To Pronk Pops Podcast or Download Shows 79-83

Listen To Pronk Pops Podcast or Download Shows 74-78

Listen To Pronk Pops Podcast or Download Shows 71-73

Listen To Pronk Pops Podcast or Download Shows 68-70

Listen To Pronk Pops Podcast or Download Shows 65-67

Listen To Pronk Pops Podcast or Download Shows 62-64

Listen To Pronk Pops Podcast or Download Shows 58-61

Listen To Pronk Pops Podcast or Download Shows 55-57

Listen To Pronk Pops Podcast or Download Shows 52-54

Listen To Pronk Pops Podcast or Download Shows 49-51

Listen To Pronk Pops Podcast or Download Shows 45-48

Listen To Pronk Pops Podcast or Download Shows 41-44

Listen To Pronk Pops Podcast or Download Shows 38-40

Listen To Pronk Pops Podcast or Download Shows 34-37

Listen To Pronk Pops Podcast or Download Shows 30-33

Listen To Pronk Pops Podcast or Download Shows 27-29

Listen To Pronk Pops Podcast or Download Shows 17-26

Listen To Pronk Pops Podcast or Download Shows 16-22

Listen To Pronk Pops Podcast or Download Shows 10-15

Listen To Pronk Pops Podcast or Download Shows 1-9

Read Full Post | Make a Comment ( None so far )

The Pronk Pops Show 723, July 22, 2016, Breaking News — Story 1: Mentally Depressed/Deranged Teenager Attack in Munich Germany — 9 Killed, Shooter Commits Suicide — 27 Injured – — Germany Borders Shut-Down — Videos — Story 2: Part 1 of 2, Jump On Trump Train/Plane — Videos

Posted on July 22, 2016. Filed under: 2016 Presidential Campaign, 2016 Presidential Candidates, American History, Benghazi, Blogroll, Breaking News, Business, Communications, Corruption, Countries, Crime, Donald J. Trump, Donald J. Trump, Donald Trump, Donald Trump, Economics, Elections, Employment, Fast and Furious, Foreign Policy, Gangs, Germany, Government, Hillary Clinton, Hillary Clinton, History, Homicide, Illegal Immigration, Illegal Immigration, Immigration, Iran Nuclear Weapons Deal, Legal Immigration, Media, News, Obama, Philosophy, Photos, Pistols, Politics, Radio, Raymond Thomas Pronk, Rifles, Scandals, Security, Taxation, Taxes, Terror, Terrorism, Unemployment, United States of America, Videos, Violence, War, Wealth, Weapons, Wisdom | Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , |

Project_1

The Pronk Pops Show Podcasts

Pronk Pops Show 723: July 22, 2016

Pronk Pops Show 722: July 21, 2016

Pronk Pops Show 721: July 20, 2016

Pronk Pops Show 720: July 19, 2016

Pronk Pops Show 719: July 18, 2016

Pronk Pops Show 718: July 15, 2016

Pronk Pops Show 717: July 14, 2016

Pronk Pops Show 716: July 13, 2016

Pronk Pops Show 715: July 12, 2016

Pronk Pops Show 714: July 7, 2016

Pronk Pops Show 713: July 6, 2016

Pronk Pops Show 712: July 5, 2016

Pronk Pops Show 711: July 1, 2016

Pronk Pops Show 710: June 30, 2016

Pronk Pops Show 709: June 29, 2016

Pronk Pops Show 708: June 28, 2016

Pronk Pops Show 707: June 27, 2016

Pronk Pops Show 706: June 24, 2016

Pronk Pops Show 705: June 23, 2016

Pronk Pops Show 704: June 22, 2016

Pronk Pops Show 703: June 21, 2016

Pronk Pops Show 702: June 20, 2016

Pronk Pops Show 701: June 17, 2016

Pronk Pops Show 700: June 16, 2016

Pronk Pops Show 699: June 15, 2016

Pronk Pops Show 698: June 14, 2016

Pronk Pops Show 697: June 13, 2016

Pronk Pops Show 696: June 10, 2016

Pronk Pops Show 695: June 9, 2016

Pronk Pops Show 694: June 8, 2016

Pronk Pops Show 693: June 6, 2016

Pronk Pops Show 692: June 3, 2016

Pronk Pops Show 691: June 2, 2016

Pronk Pops Show 690: June 1, 2016

Pronk Pops Show 689: May 31, 2016

Pronk Pops Show 688: May 27, 2016

Pronk Pops Show 687: May 26, 2016

Pronk Pops Show 686: May 25, 2016

Pronk Pops Show 685: May 24, 2016

Pronk Pops Show 684: May 23, 2016

Pronk Pops Show 683: May 20, 2016

Pronk Pops Show 682: May 19, 2016

Pronk Pops Show 681: May 17, 2016

Pronk Pops Show 680: May 16, 2016

Pronk Pops Show 679: May 13, 2016

Pronk Pops Show 678: May 12, 2016

Pronk Pops Show 677: May 11, 2016

Pronk Pops Show 676: May 10, 2016

Pronk Pops Show 675: May 9, 2016

Pronk Pops Show 674: May 6, 2016

Pronk Pops Show 673: May 5, 2016

Pronk Pops Show 672: May 4, 2016

Pronk Pops Show 671: May 3, 2016

Pronk Pops Show 670: May 2, 2016

Pronk Pops Show 669: April 29, 2016

Pronk Pops Show 668: April 28, 2016

Pronk Pops Show 667: April 27, 2016

Pronk Pops Show 666: April 26, 2016

Pronk Pops Show 665: April 25, 2016

Pronk Pops Show 664: April 24, 2016

Pronk Pops Show 663: April 21, 2016

Pronk Pops Show 662: April 20, 2016

Pronk Pops Show 661: April 19, 2016

Pronk Pops Show 660: April 18, 2016

Pronk Pops Show 659: April 15, 2016

Pronk Pops Show 658: April 14, 2016

Pronk Pops Show 657: April 13, 2016

Pronk Pops Show 656: April 12, 2016

Pronk Pops Show 655: April 11, 2016

Pronk Pops Show 654: April 8, 2016

Pronk Pops Show 653: April 7, 2016

Pronk Pops Show 652: April 6, 2016

Pronk Pops Show 651: April 4, 2016

Pronk Pops Show 650: April 1, 2016

Story 1: Mentally Depressed/Deranged Teenager Attack in Munich Germany — 9 Killed, Shooter Commits Suicide — 27 Injured – — Germany Borders Shut-Down — Videos 

HT_csm_Olympia_Einkaufszentrum_Muenchen_Aussenansich_hb_160722_4x3_992GTY_Munich_mall_shootingGermanyMunichShootingmunich police 2GTY_Munich_shooting_mall_peoplehgermany munich police GTY_Munich_shooting_mall munich (1)

MUNICH, GERMANY - JULY 22: Police officers respond to a shooting at the Olympia Einkaufzentrum (OEZ) at July 22, 2016 in Munich, Germany. According to reports, several people have been killed and an unknown number injured in a shooting at a shopping centre in the north-western Moosach district in Munich. Police are hunting the attacker or attackers who are thought to be still at large. (Photo by Joerg Koch/Getty Images)

MUNICH, GERMANY – JULY 22: Police officers respond to a shooting at the Olympia Einkaufzentrum (OEZ) at July 22, 2016 in Munich, Germany. According to reports, several people have been killed and an unknown number injured in a shooting at a shopping centre in the north-western Moosach district in Munich. Police are hunting the attacker or attackers who are thought to be still at large. (Photo by Joerg Koch/Getty Images)

MUNICH-SATURN police insidepolice enter garagepolice munichMunich-shopping-mall-shooting-msnbc-w-border- transit stopped

Munich Shooting; Link Between Gunman And Norway’s Breivik, Police Say

Munich shooting: Police say gunman ‘deranged,’ no links to IS

Munich shooting: More details of suspect emerge