The Pronk Pops Show 1144, September 20, 2018, Story 1: President Trump Rocks at Make America Great Again Rally in Las Vegas Nevada —  Build The Wall With $25 Billion in Funding and Balance The Budget — We Need More Republicans — Videos — Story 2: Dow Jones Industrial Average and S&P 500 Hits An All Time High — Videos — Story 3: Free U.S.-Led Uncensored Internet and Authoritarian Chinese-Led Censored Internet — Breaking Up Is Hard To Do — Videos — Story 4: American People’s Right To Privacy — National Privacy Law? — Videos

Posted on September 21, 2018. Filed under: Addiction, Addiction, American History, Applications, Banking System, Biology, Blogroll, Breaking News, Bribery, Bribes, Budgetary Policy, Business, Cartoons, Chemistry, Coal, Coal, Communications, Computers, Congress, Constitutional Law, Corruption, Countries, Crime, Culture, Defense Spending, Diet, Donald J. Trump, Donald J. Trump, Donald Trump, Drugs, Eating, Economics, Education, Elections, Empires, Employment, Energy, Environment, Exercise, Extortion, Federal Bureau of Investigation (FBI) and Department of Justice (DOJ), Federal Government, First Amendment, Foreign Policy, Free Trade, Freedom of Speech, Government, Government Dependency, Government Spending, Hardware, Health, Health Care, Health Care Insurance, High Crimes, Hillary Clinton, Hillary Clinton, History, House of Representatives, Housing, Human, Human Behavior, Illegal Drugs, Illegal Immigration, Illegal Immigration, Immigration, Independence, Insurance, Investments, IRS, Killing, Labor Economics, Language, Law, Legal Drugs, Legal Immigration, Life, Lying, Media, Medical, Medicine, Mexico, Monetary Policy, National Interest, Natural Gas, Natural Gas, News, Nuclear, Oil, Oil, People, Philosophy, Photos, Politics, Polls, Privacy, Private Sector Unions, Progressives, Public Corruption, Public Sector Unions, Radio, Raymond Thomas Pronk, Regulation, Resources, Rule of Law, Scandals, Science, Second Amendment, Security, Senate, Servers, Social Science, Software, Spying, Spying on American People, Success, Surveillance and Spying On American People, Surveillance/Spying, Tax Fraud, Tax Policy, Taxation, Taxes, Technology, Ted Cruz, Terror, Terrorism, Trade Policy, Trump Surveillance/Spying, Unemployment, Unions, United Kingdom, United States Constitution, United States of America, United States Supreme Court, Videos, Violence, War, Wealth, Weapons, Welfare Spending, Wisdom | Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , |

 Project_1

The Pronk Pops Show Podcasts

Pronk Pops Show 1144, September 20, 2018

Pronk Pops Show 1143, September 19, 2018

Pronk Pops Show 1142, September 18, 2018

Pronk Pops Show 1141, September 17, 2018

Pronk Pops Show 1140, September 14, 2018

Pronk Pops Show 1139, September 13, 2018

Pronk Pops Show 1138, September 12, 2018

Pronk Pops Show 1137, September 7, 2018

Pronk Pops Show 1136, September 6, 2018

Pronk Pops Show 1135, September 5, 2018

Pronk Pops Show 1134, September 4, 2018

Pronk Pops Show 1133, August 29, 2018

Pronk Pops Show 1132, August 28, 2018

Pronk Pops Show 1131, August 27, 2018

Pronk Pops Show 1130, August 22, 2018

Pronk Pops Show 1129, August 21, 2018

Pronk Pops Show 1128, August 20, 2018

Pronk Pops Show 1127, August 17, 2018

Pronk Pops Show 1126, August 16, 2018

Pronk Pops Show 1125, August 15, 2018

Pronk Pops Show 1124, August 14, 2018

Pronk Pops Show 1123, August 13, 2018

Pronk Pops Show 1122, August 9, 2018

Pronk Pops Show 1121, August 8, 2018

Pronk Pops Show 1120, August 6, 2018

Pronk Pops Show 1119, August 2, 2018

Pronk Pops Show 1118, August 1, 2018

Pronk Pops Show 1117, July 31, 2018

Pronk Pops Show 1116, July 30, 2018

Pronk Pops Show 1115, July 26, 2018

Pronk Pops Show 1114, July 25, 2018

Pronk Pops Show 1113, July 24, 2018

Pronk Pops Show 1112, July 23, 2018

Pronk Pops Show 1111, July 19, 2018

Pronk Pops Show 1110, July 18, 2018

Pronk Pops Show 1109, July 17, 2018

Pronk Pops Show 1108, July 16, 2018

Pronk Pops Show 1107, July 12, 2018

Pronk Pops Show 1106, July 11, 2018

Pronk Pops Show 1105, July 10, 2018

Pronk Pops Show 1104, July 9, 2018

Pronk Pops Show 1103, July 5, 2018

Pronk Pops Show 1102, JUly 3, 2018

Pronk Pops Show 1101, July 2, 2018

Pronk Pops Show 1100, June 28, 2018

Pronk Pops Show 1099, June 26, 2018

Pronk Pops Show 1098, June 25, 2018 

Pronk Pops Show 1097, June 21, 2018

Pronk Pops Show 1096, June 20, 2018

Pronk Pops Show 1095, June 19, 2018

Pronk Pops Show 1094, June 18, 2018

Pronk Pops Show 1093, June 14, 2018

Pronk Pops Show 1092, June 13, 2018

Pronk Pops Show 1091, June 12, 2018

Pronk Pops Show 1090, June 11, 2018

Pronk Pops Show 1089, June 7, 2018

See the source imageSee the source imageImage result for branco cartoons internet censorshipImage result for branco cartoons internet censorshipImage result for branco cartoons internet censorshipImage result for branco cartoons internet censorshipImage result for branco cartoons internet censorshipImage result for branco cartoons internet censorshipSee the source imageSee the source image

Story 1: President Trump Rocks at Make America Great Again Rally in Las Vegas Nevada —  Build The Wall With $25 Billion in Funding and Balance The Budget — We Need More Republicans — Videos —

President Trump EXPLOSIVE Speech at MASSIVE Rally in Las Vegas, Nevada – September 20, 2018

Watch Live! Trump Rally in Las Vegas, NV!

Trump pushes for border wall funding during rally in Las Vegas

Trump goes one-on-one with Hannity at Las Vegas rally

‘He’s been there’: Trump stumps for vulnerable Sen. Heller

His own political fortunes intrinsically linked to his party holding control of Congress, President Donald Trump on Thursday offered full-throated support for the most vulnerable incumbent Republican senator, while unleashing a torrent of grievances against Democrats and the news media and claiming they are sabotaging his administration.

Trump, appearing at a boisterous rally in Las Vegas, defended his embattled Supreme Court justice nominee, touted the booming stock market, cited progress in talks with North Korea and pledged to build his long-promised border wall, while also making the pitch for Nevada to re-elect Sen. Dean Heller. The president noted that he and Heller – who once said he “vehemently” opposed Trump – did not always get along.

“We started out, we weren’t friends. I didn’t like him, he didn’t like me!” said Trump to laughs. “But as we fought and fought and fought, believe it or not we started to respect each other, than we started to like each other, then we started to love each other.

President Donald Trump speaks during a campaign rally, Thursday, Sept. 20, 2018, in Las Vegas. (AP Photo/Evan Vucci)

“Ever since I won the election, he’s been there for us,” said Trump, who urged Heller’s re-election because the Republican majority in the Senate is so slim, 51-49, that the GOP would lose its advantage if “someone had a cold.” The president also bestowed one of his signature nicknames on Heller’s opponent, Democratic Rep. Jacky Rosen, dubbing her “Wacky Jacky.”

Heller returned the praise: “Mr. President, I think you just turned Nevada red today,” he said. Trump narrowly lost Nevada to Hillary Clinton in 2016 despite his deep ties to Las Vegas – he has a golden-hued hotel just off the famed Strip – and repeatedly campaigning in the state.

Trump in particular focused his pitch for Heller on the need to confirm more conservative judges, in particular his Supreme Court nominee Brett Kavanaugh, whose seat on the bench had been thrown into question by allegations that he sexually assaulted a young woman while in high school more than 30 years ago.

Kavanaugh has denied the allegations.

While negotiations continued over whether his accuser, Dr. Christine Blasey Ford, would testify next week, Trump, who has taken pains not to criticize Ford in recent days, appeared to break from that strategy in a pre-rally interview with Fox News host Sean Hannity on the convention center floor.

“I think it’s a very sad situation,” said Trump, asking: “Why didn’t somebody call the FBI 36 years ago? … What’s going on?” While he said Ford should “have her say,” he made clear he was done waiting: “I don’t think you can delay it any longer. They’ve delayed it a week already.”

Trump remained on message at the rally. He did not utter a critical word about Ford, but defended Kavanaugh, saying he was “a great intellect” and “a great gentleman with an impeccable reputation.”

“We have to let it play out but I have to tell you, he is a fine, fine person,” Trump said of the Senate confirmation process. “I think everything is going to be just fine.”

There was one local topic Trump avoided. The Las Vegas rally was held three miles from the Mandalay Bay hotel where a gunman opened fire just over a year ago, killing 58 people and leaving 851 injured.

Trump made no mention of the shooting, though he assured Heller would vote in favor of the Second Amendment.

The rest of the rally was red meat for the crowd, which repeatedly roared its approval for the president but did not quite fill the room at the Las Vegas Convention Center.

As usual, Trump went after the media and many who attended the rally followed his lead. One man stood behind the president’s traveling press corps, repeatedly yelling the word “traitors” at the journalists.

At one point reading from a list of his administration’s accomplishments, Trump spent much of the rally focused on what advisers believe is his – and his party’s – best issue, the strong economy. He took credit for the stock market’s gains and the nation’s low unemployment rate and bragged about boosting the military, while accusing Democrats of doing their best to foster division and stall the growth.

“They are lousy politicians and their policies are terrible,” said Trump, in only his second rally as president in a state he lost two years ago, “but they are good at sticking together and resisting, that’s what they do. You see the signs ‘Resist, Resist.'”

With the chances of Republicans keeping control of the House of Representatives looking increasingly dismal, the White House has fixated on keeping the Senate as a bulwark against any Democratic effort to impeach and then remove Trump from office. Though the Senate midterm map favors Republicans, a few states, including Tennessee and perhaps Texas, could slip away from the GOP.

But no Republican-held seat is considered more endangered than the one in Nevada. The only Republican running for re-election in a state Hillary Clinton carried in 2016, Heller has been locked in a tight race in an increasingly blue-leaning state.

Though he fervently tried to wrap his arms around the president Thursday, Heller’s relationship with Trump has been tumultuous. Weeks before the 2016 election, Heller infamously said that he was “100 percent against Clinton, 99 percent against Trump,” a remark the president has not forgotten.

Heller drew the president’s ire a year ago when he held up Republican efforts to repeal former President Barack Obama’s signature health care law. But Trump saved Heller from a costly and damaging primary battle earlier this year by persuading a very conservative primary challenger, Danny Tarkanian, to drop out of the Senate race and instead seek a House seat.

Heller is now in a close race with Rosen, a first-term congresswoman who stands to benefit from a wave of Democratic and female activism fueled by opposition to Trump. And the senator, at times, has struggled to strike a balancing act of praising the president, who remains popular among Republicans, while distancing himself from Trump’s scandals and provocative positions.

“Eighty percent of what this president has done has been very, very good, very positive,” Heller told reporters last week. “The other 20 percent … he has a reality show. I get it. It’s a reality show.”

___

Associated Press writer Michelle Price contributed to this report. Colvin reported from Washington.

___

This story has been corrected to show the Senate is divided 51-49, not 50-49.

President Donald Trump gives a thumbs-up as he arrives at McCarran International Airport for a campaign rally, Thursday, Sept. 20, 2018, in Las Vegas. (AP Photo/Evan Vucci)

President Donald Trump takes the stage during a campaign rally Thursday, Sept. 20, 2018, in Las Vegas. (AP Photo/John Locher)

President Donald Trump speaks during a campaign rally, Thursday, Sept. 20, 2018, in Las Vegas. (AP Photo/John Locher)

President Donald Trump meets with supporters during a campaign rally, Thursday, Sept. 20, 2018, in Las Vegas. (AP Photo/John Locher)

President Donald Trump meets with supporters during a campaign rally, Thursday, Sept. 20, 2018, in Las Vegas. (AP Photo/John Locher)

President Donald Trump speaks during a campaign rally Thursday, Sept. 20, 2018, in Las Vegas. (AP Photo/John Locher)

President Donald Trump speaks during a campaign rally, Thursday, Sept. 20, 2018, in Las Vegas. (AP Photo/Evan Vucci)

President Donald Trump waves as he arrives for a campaign rally, Thursday, Sept. 20, 2018, in Las Vegas. (AP Photo/Evan Vucci)

Story 2: Dow Jones Industrial Average and S&P 500 Hits An All Time High — Videos —

See the source image

Markets soar to new records under Trump

Nightly Business Report – September 20, 2018

Dow Jones And S&P Rally For New Record Highs

What Do “Points” On The Dow And S&P 500 Actually Mean?

Dow, S&P 500 close at record highs as bull shrugs off trade worries

Story 3: Free U.S.-Led Uncensored Internet and Authoritarian Chinese-Led Censored Internet — Breaking Up Is Hard To Do — Videos

Report: Google working on a censored search engine for China

Google employees revolt against China project

Could the Internet Split in Two?

Former Google CEO Eric Schmidt Predicts Internet Split: American vs. Chinese

Breakin’ Up Is Hard To Do – Neil Sedaka

 

Former Google CEO predicts the internet will split in two  — and one part will be led by China

  • Speaking at a private event hosted by Village Global VC yesterday night, tech luminary and former Google CEO Eric Schmidt predicted that the internet will bifurcate into Chinese-led and US-led versions within the next decade.
  • Under Sundar Pichai’s leadership, Google has explored the potential to launch a censored version of its search engine in China, stirring up controversy internally and outside the company.

Eric Schmidt, who has been the CEO of Google and executive chairman of its parent company, Alphabet, predicts that within the next decade there will be two distinct internets: one led by the U.S. and the other by China.

Schmidt shared his thoughts at a private event in San Francisco on Wednesday night convened by investment firm Village Global VC. The firm enlists tech luminaries — including Schmidt, Jeff Bezos, Bill Gates and Diane Green — as limited partners, then invests their money into early-stage tech ventures.

At the event, economist Tyler Cowen asked about the possibility of the internet fragmenting into different sub-internets with different regulations and limited access between them in coming years. “What’s the chance, say, 10 to 15 years, we have just three to four separate internets?”

Schmidt said:

“I think the most likely scenario now is not a splintering, but rather a bifurcation into a Chinese-led internet and a non-Chinese internet led by America.

If you look at China, and I was just there, the scale of the companies that are being built, the services being built, the wealth that is being created is phenomenal. Chinese Internet is a greater percentage of the GDP of China, which is a big number, than the same percentage of the US, which is also a big number.

If you think of China as like ‘Oh yeah, they’re good with the Internet,’ you’re missing the point. Globalization means that they get to play too. I think you’re going to see fantastic leadership in products and services from China. There’s a real danger that along with those products and services comes a different leadership regime from government, with censorship, controls, etc.

Look at the way BRI works – their Belt and Road Initiative, which involves 60-ish countries – it’s perfectly possible those countries will begin to take on the infrastructure that China has with some loss of freedom.”

The Belt and Road is a massive initiative by Beijing to increase China’s political and economic influence by connecting and facilitating all kinds of trade, including digital trade, between China and countries in Europe, Africa, the Middle East and Asia.

Schmidt’s predictions come at a time when his successor at Google, CEO Sundar Pichai, has stirred up controversy around the company’s strategy in China.

Reportedly, Google has been developing “Project Dragonfly,” a censored version of its search engine that could appease authorities in China. The project allegedly included a means to suppress some search results, booting them off the first page, and a means to fully block results for sensitive queries, for example, around “peaceful protests.”

n recent weeks, hundreds of Google employees lobbied Pichai for more transparency and signed a letter saying that the reported plans raised “urgent moral and ethical issues.”

Pichai has said that Google has been “very open about our desire to do more in China,” and that the team “has been in an exploration stage for quite a while now,” and considering “many options,” but is nowhere near launching in China.

In a separate discussion last night between Schmidt and several start-up founders, he lauded Chinese tech products, services and adoption, especially in mobile payments. He noted that Starbucks in China don’t feature a register. Customers order ahead online and pay with their phones before picking up their lattes.

Former Google CEO claims internet will split between U.S. & China  

Eric Schmidt, who has been the CEO of Google and executive chairman of its parent company, Alphabet, predicts that within the next decade there will be two distinct internets: one led by the U.S. and the other by China.

Schmidt shared his thoughts at a private event in San Francisco on Wednesday night convened by investment firm Village Global VC. The firm enlists tech luminaries — including Schmidt, Jeff Bezos, Bill Gates and Diane Green — as limited partners, then invests their money into early-stage tech ventures.

At the event, economist Tyler Cowen asked about the possibility of the internet fragmenting into different sub-internets with different regulations and limited access between them in coming years. “What’s the chance, say, 10 to 15 years, we have just three to four separate internets?”

Schmidt said:

“I think the most likely scenario now is not a splintering, but rather a bifurcation into a Chinese-led internet and a non-Chinese internet led by America.

If you look at China, and I was just there, the scale of the companies that are being built, the services being built, the wealth that is being created is phenomenal. Chinese Internet is a greater percentage of the GDP of China, which is a big number, than the same percentage of the US, which is also a big number.

If you think of China as like ‘Oh yeah, they’re good with the Internet,’ you’re missing the point. Globalization means that they get to play too. I think you’re going to see fantastic leadership in products and services from China. There’s a real danger that along with those products and services comes a different leadership regime from government, with censorship, controls, etc.

Look at the way BRI works – their Belt and Road Initiative, which involves 60-ish countries – it’s perfectly possible those countries will begin to take on the infrastructure that China has with some loss of freedom.”

The Belt and Road is a massive initiative by Beijing to increase China’s political and economic influence by connecting and facilitating all kinds of trade, including digital trade, between China and countries in Europe, Africa, the Middle East and Asia.

Schmidt’s predictions come at a time when his successor at Google, CEO Sundar Pichai, has stirred up controversy around the company’s strategy in China.

Reportedly, Google has been developing “Project Dragonfly,” a censored version of its search engine that could appease authorities in China. The project allegedly included a means to suppress some search results, booting them off the first page, and a means to fully block results for sensitive queries, for example, around “peaceful protests.”

What's next for Schmidt?

What’s next for Google’s Eric Schmidt? Sree Sreenivasan weighs in  

In recent weeks, hundreds of Google employees lobbied Pichai for more transparency and signed a letter saying that the reported plans raised “urgent moral and ethical issues.”

Pichai has said that Google has been “very open about our desire to do more in China,” and that the team “has been in an exploration stage for quite a while now,” and considering “many options,” but is nowhere near launching in China.

In a separate discussion last night between Schmidt and several start-up founders, he lauded Chinese tech products, services and adoption, especially in mobile payments. He noted that Starbucks in China don’t feature a register. Customers order ahead online and pay with their phones before picking up their lattes.

A business development leader with Facebook, Ime Archebong, asked Schmidt if large tech companies are doing enough good in the world.

Schmidt replied: “The judge of this is others, not us. Self-referential conversations about ‘Do I feel good about what I’m doing?’ are not very helpful. The judge is outside.”

At several points in the private discussion, Schmidt urged entrepreneurs to build products and services that are not merely addictive, but valuable. He also said not enough companies “measure the right things.” Too many focus on short-term revenue growth and satisfying shareholders, rather than what’s best for their users, society and the long-term health of their companies.

Schmidt was the CEO of Google from 2001, when he took over from co-founder Larry Page, through 2011, when Page reclaimed the reins. He remained as executive chairman of Google and then Alphabet until earlier this year.

Correction: Eric Schmidt did not specify a date by which he believed the internet would bifurcate. He was responding to a question from Tyler Cowen which specified “in the next 10 to 15 years.”

GOOGLE BOSSES HAVE forced employees to delete a confidential memo circulating inside the company that revealed explosive details about a plan to launch a censored search engine in China, The Intercept has learned.

The memo, authored by a Google engineer who was asked to work on the project, disclosed that the search system, codenamed Dragonfly, would require users to log in to perform searches, track their location — and share the resulting history with a Chinese partner who would have “unilateral access” to the data.

The memo was shared earlier this month among a group of Google employees who have been organizing internal protests over the censored search system, which has been designed to remove content that China’s authoritarian Communist Party regime views as sensitive, such as information about democracy, human rights, and peaceful protest.

According to three sources familiar with the incident, Google leadership discovered the memo and were furious that secret details about the China censorship were being passed between employees who were not supposed to have any knowledge about it. Subsequently, Google human resources personnel emailed employees who were believed to have accessed or saved copies of the memo and ordered them to immediately delete it from their computers. Emails demanding deletion of the memo contained “pixel trackers” that notified human resource managers when their messages had been read, recipients determined.

The Dragonfly memo reveals that a prototype of the censored search engine was being developed as an app for both Android and iOS devices, and would force users to sign in so they could use the service. The memo confirms, as The Intercept first reported last week, that users’ searches would be associated with their personal phone number. The memo adds that Chinese users’ movements would also be stored, along with the IP address of their device and links they clicked on. It accuses developers working on the project of creating “spying tools” for the Chinese government to monitor its citizens.

People’s search histories, location information, and other private data would be sent out of China to a database in Taiwan, the memo states. But the data would also be provided to employees of a Chinese company who would be granted “unilateral access” to the system.

To launch the censored search engine, Google set up a “joint venture” partnership with an unnamed Chinese company. The search engine will “blacklist sensitive queries” so that “no results will be shown” at all when people enter certain words or phrases, according to documents seen by The Intercept. Blacklisted search terms on a prototype of the search engine include “human rights,” “student protest,” and “Nobel Prize” in Mandarin, said sources familiar with the project.

According to the memo, aside from being able to access users’ search data, the Chinese partner company could add to the censorship blacklists: It would be able to “selectively edit search result pages … unilaterally, and with few controls seemingly in place.”

That a Chinese company would maintain a copy of users’ search data means that, by extension, the data would be accessible to Chinese authorities, who have broad powers to obtain information that is held or processed on the country’s mainland. A central concern human rights groups have expressed about Dragonfly is that it could place users at risk of Chinese government surveillance — and any person in China searching for blacklisted words or phrases could find themselves interrogated or detained. Chinese authorities are well-known for routinely targeting critics, activists, and journalists.

“It’s alarming to hear that such information will be stored and, potentially, easily shared with the Chinese authorities,” said Patrick Poon, a Hong Kong-based researcher with the human rights group Amnesty International. “It will completely put users’ privacy and safety at risk. Google needs to immediately explain if the app will involve such arrangements. It’s time to give the public full transparency of the project.”

ON AUGUST 16, two weeks after The Intercept revealed the Dragonfly plan, Google CEO Sundar Pichai told the company’s employees that the China plan was in its “early stages” and “exploratory.” However, employees working on the censored search engine were instructed in late July, days before the project was publicly exposed, that they should prepare to get it into a “launch-ready state” to roll out within weeks, pending approval from officials in Beijing.

“It will completely put users’ privacy and safety at risk.”

The memo raises new questions about Pichai’s claim that the project was not well-developed. Information stored on the company’s internal networks about Dragonfly “paints a very different picture,” it says. “The statement from our high-level leadership that Dragonfly is just an experiment seems wrong.”

The memo identifies at least 215 employees who appear to have been tasked with working full-time on Dragonfly, a number it says is “larger than many Google projects.” It says that source code associated with the project dates back to May 2017, and “many infrastructure parts predate” that. Moreover, screenshots of the app “show a project in a pretty advanced state,” the memo declares.

Most of the details about the project “have been secret from the start,” the memo says, adding that “after the existence of Dragonfly leaked, engineers working on the project were also quick to hide all of their code.”

The author of the memo said in the document that they were opposed to the China censorship. However, they added, “more than the project itself, I hate the culture of secrecy that has been built around it.”

The memo was first posted September 5 on an internal messaging list set up for Google employees to raise ethical concerns. But the memo was soon scrubbed from the list and individuals who had opened or saved the document were contacted by Google’s human resources department to discuss the matter. The employees were instructed not to share the memo.

Google reportedly maintains an aggressive security and investigation team known as “stopleaks,” which is dedicated to preventing unauthorized disclosures. The team is also said to monitor internal discussions.

“More than the project itself, I hate the culture of secrecy that has been built around it.”

Internal security efforts at Google have ramped up this year as employees have raised ethical concerns around a range of new company projects. Following the revelation by Gizmodoand The Intercept that Google had quietly begun work on a contract with the military last year, known as Project Maven, to develop automated image recognition systems for drone warfare, the communications team moved swiftly to monitor employee activity.

The “stopleaks” team, which coordinates with the internal Google communications department, even began monitoring an internal image board used to post messages based on internet memes, according to one former Google employee, for signs of employee sentiment around the Project Maven contract.

Google’s internal security team consists of a number of former military and law enforcement officials. For example, LinkedIn lists as Google’s head of global investigations Joseph Vincent, whose resume includes work as a high-ranking agent at the U.S. Immigration and Customs Enforcement agency’s Homeland Security Investigations unit. The head of security at Google is Chris Rackow, who has described himself as a former member of the Federal Bureau of Investigation’s hostage rescue team and as a former U.S. Navy SEAL.

For some Google employees, the culture of secrecy at the company clashes directly with the its public image around fostering transparency, creating an intolerable work environment.

“Leadership misled engineers working on [Dragonfly] about the nature of their work, depriving them of moral agency,” said a Google employee who read the memo.

Google did not respond to a request for comment on this story.

https://theintercept.com/2018/09/21/google-suppresses-memo-revealing-plans-to-closely-track-search-users-in-china/

Story 4: American People’s Right To Privacy — National Privacy Law? — Videos

Facebook and Google Attempting to End California Privacy Laws

California lawmakers pass data privacy bill

California Consumer Privacy Act of 2018

Salesforce CEO Marc Benioff calls for national privacy law

Fight looms over national privacy law

Fight looms over national privacy law

The tech industry and consumer groups are gearing up for a fight as lawmakers begin considering whether to draft a national privacy law.

The push to get Congress to enact federal privacy standards is gaining new urgency after California passed what is seen as the nation’s toughest privacy law this June. The measure forces businesses to be more transparent about what they do with consumer data and gives users unprecedented control over their personal information.

But the California law has sparked worries within the tech industry, which fears having to comply with a patchwork of varying state regulations.

Now industry groups are pushing Congress to pass a national privacy bill that would block states from implementing their own standards.

Privacy advocates are skeptical of the industry proposals and concerned that internet giants will co-opt the process in order to get protections that are weaker than the California standard implemented across the country.

“They do not want effective oversight. They do not want regulation of their business practices, which is really urgently needed,” Jeff Chester, the executive director of the Center for Digital Democracy (CDD), told The Hill. “They’re going to work behind the scenes to shape legislation that will not protect Americans from having all of their information regularly gathered and used by these digital giants.”

“They see federal law as an opportunity to preempt stronger rules,” he added.

Next week, executives from Google, Apple, AT&T and other major technology and telecommunications companies will testify before the Senate Commerce Committee as the panel’s Republican chairman, Sen. John Thune (S.D.), prepares to introduce a new privacy law.

Consumer groups are concerned that only industry voices will be heard at the hearing and that internet companies will have an outsized role in shaping the legislation. They are now demanding a seat at the table.

On Wednesday, a coalition of public interest groups including the CDD, the American Civil Liberties Union and the Electronic Privacy Information Center sent a letter to Thune asking him to ensure that consumers have a voice in the process.

“While we have no objection to the participation of business groups in Senate hearings on consumer privacy, the Senate’s first instinct should be to hear from the American public on these important issues,” the letter reads.

Frederick Hill, a spokesman for the committee, told The Hill in an email that the panel will hold more hearings on the issue.

“For the first hearing, the committee is bringing in companies most consumers recognize to make the discussion about privacy more relatable,” Hill said. “We expect there will be opportunities for other voices at future hearings on the subject.”

A source familiar with the committee’s plans told The Hill that it could hold a hearing for privacy advocates to testify in the coming weeks.

The stakes are high for all sides in the privacy debate after a year which saw Facebook rocked by a massive data scandal.

The company disclosed earlier this year that a data firm had accessed the personal data of over 80 million Facebook users. The revelation sparked a firestorm that saw CEO Mark Zuckerberg testifying before Congress in a pair of marathon hearings to address lawmakers’ concerns.

Overseas, Europe has already passed its own tough privacy law, which took effect this year.

Whether Congress can actually get behind a national privacy framework, though, is an open question. Lawmakers have tried before, unsuccessfully.

In 2012, the Obama White House unveiled a “Consumer Privacy Bill of Rights” that it hoped to enact into law. The debate dragged on for several years and the process was eventually derailed by contentious disagreements between business and consumer groups.

As Congress gears up to try again, industry groups in recent weeks have been pushing wish lists for what they hope to see in a federal privacy framework. Lobbying groups including the Chamber of Commerce, the Internet Association and BSA | The Software Alliance have all released their own sets of privacy principles.

The industry proposals include calls for codifying transparency rules that require businesses to disclose their collection practices and giving consumers the right to request copies of their data and request that some data be deleted.

Shaundra Watson, BSA’s policy director, said the group’s privacy principles were not a response to the new California law but the result of a discussion among their members, including companies like Apple and Microsoft, of how to codify the consumer protections they already offer.

“Our companies really are responsible for personal data, and so they not only want to continue to embrace those practices but look more broadly to see what protections should be in place across the board and concluded the best way to do that is a [federal] law,” Watson told The Hill.

But privacy advocates remain skeptical. After a series of data scandals, many tech critics believe that any effective privacy framework needs to restrict the data collection practices that companies like Facebook and Google rely on as a business model.

Chester, who says public interest groups are banding together to come up with their own legislative principles, believes the frameworks being pushed by industry lobbyists don’t go far enough.

“What has to happen is the basic business practices have to change,” he said. “We believe there need to be restrictions on how these companies engage in data collection.

“These so-called principles are really principles to undermine privacy, not to protect it,” he said.

https://thehill.com/policy/technology/407528-fight-looms-over-national-privacy-law

The Pronk Pops Show Podcasts Portfolio

Listen To Pronk Pops Podcast or Download Shows 1139-1144

Listen To Pronk Pops Podcast or Download Shows 1131-1138

Listen To Pronk Pops Podcast or Download Shows 1122-1130

Listen To Pronk Pops Podcast or Download Shows 1112-1121

Listen To Pronk Pops Podcast or Download Shows 1101-1111

Listen To Pronk Pops Podcast or Download Shows 1091-1100

Listen To Pronk Pops Podcast or Download Shows 1082-1090

Listen To Pronk Pops Podcast or Download Shows 1073-1081

Listen To Pronk Pops Podcast or Download Shows 1066-1073

Listen To Pronk Pops Podcast or Download Shows 1058-1065

Listen To Pronk Pops Podcast or Download Shows 1048-1057

Listen To Pronk Pops Podcast or Download Shows 1041-1047

Listen To Pronk Pops Podcast or Download Shows 1033-1040

Listen To Pronk Pops Podcast or Download Shows 1023-1032

Listen To Pronk Pops Podcast or Download Shows 1017-1022

Listen To Pronk Pops Podcast or Download Shows 1010-1016

Listen To Pronk Pops Podcast or Download Shows 1001-1009

Listen To Pronk Pops Podcast or Download Shows 993-1000

Listen To Pronk Pops Podcast or Download Shows 984-992

Listen To Pronk Pops Podcast or Download Shows 977-983

Listen To Pronk Pops Podcast or Download Shows 970-976

Listen To Pronk Pops Podcast or Download Shows 963-969

Listen To Pronk Pops Podcast or Download Shows 955-962

Listen To Pronk Pops Podcast or Download Shows 946-954

Listen To Pronk Pops Podcast or Download Shows 938-945

Listen To Pronk Pops Podcast or Download Shows 926-937

Listen To Pronk Pops Podcast or Download Shows 916-925

Listen To Pronk Pops Podcast or Download Shows 906-915

Listen To Pronk Pops Podcast or Download Shows 889-896

Listen To Pronk Pops Podcast or Download Shows 884-888

Listen To Pronk Pops Podcast or Download Shows 878-883

Listen To Pronk Pops Podcast or Download Shows 870-877

Listen To Pronk Pops Podcast or Download Shows 864-869

Listen To Pronk Pops Podcast or Download Shows 857-863

Listen To Pronk Pops Podcast or Download Shows 850-856

Listen To Pronk Pops Podcast or Download Shows 845-849

Listen To Pronk Pops Podcast or Download Shows 840-844

Listen To Pronk Pops Podcast or Download Shows 833-839

Listen To Pronk Pops Podcast or Download Shows 827-832

Listen To Pronk Pops Podcast or Download Shows 821-826

Listen To Pronk Pops Podcast or Download Shows 815-820

Listen To Pronk Pops Podcast or Download Shows 806-814

Listen To Pronk Pops Podcast or Download Shows 800-805

Listen To Pronk Pops Podcast or Download Shows 793-799

Listen To Pronk Pops Podcast or Download Shows 785-792

Listen To Pronk Pops Podcast or Download Shows 777-784

Listen To Pronk Pops Podcast or Download Shows 769-776

Listen To Pronk Pops Podcast or Download Shows 759-768

Listen To Pronk Pops Podcast or Download Shows 751-758

Listen To Pronk Pops Podcast or Download Shows 745-750

Listen To Pronk Pops Podcast or Download Shows 738-744

Listen To Pronk Pops Podcast or Download Shows 732-737

Listen To Pronk Pops Podcast or Download Shows 727-731

Listen To Pronk Pops Podcast or Download Shows 720-726

Listen To Pronk Pops Podcast or DownloadShows 713-719

Listen To Pronk Pops Podcast or DownloadShows 705-712

Listen To Pronk Pops Podcast or Download Shows 695-704

Listen To Pronk Pops Podcast or Download Shows 685-694

Listen To Pronk Pops Podcast or Download Shows 675-684

Listen To Pronk Pops Podcast or Download Shows 668-674

Listen To Pronk Pops Podcast or Download Shows 660-667

Listen To Pronk Pops Podcast or Download Shows 651-659

Listen To Pronk Pops Podcast or Download Shows 644-650

Listen To Pronk Pops Podcast or Download Shows 637-643

Listen To Pronk Pops Podcast or Download Shows 629-636

Listen To Pronk Pops Podcast or Download Shows 617-628

Listen To Pronk Pops Podcast or Download Shows 608-616

Listen To Pronk Pops Podcast or Download Shows 599-607

Listen To Pronk Pops Podcast or Download Shows 590-598

Listen To Pronk Pops Podcast or Download Shows 585- 589

Listen To Pronk Pops Podcast or Download Shows 575-584

Listen To Pronk Pops Podcast or Download Shows 565-574

Listen To Pronk Pops Podcast or Download Shows 556-564

Listen To Pronk Pops Podcast or Download Shows 546-555

Listen To Pronk Pops Podcast or Download Shows 538-545

Listen To Pronk Pops Podcast or Download Shows 532-537

Listen To Pronk Pops Podcast or Download Shows 526-531

Listen To Pronk Pops Podcast or Download Shows 519-525

Listen To Pronk Pops Podcast or Download Shows 510-518

Listen To Pronk Pops Podcast or Download Shows 500-509

Listen To Pronk Pops Podcast or Download Shows 490-499

Listen To Pronk Pops Podcast or Download Shows 480-489

Listen To Pronk Pops Podcast or Download Shows 473-479

Listen To Pronk Pops Podcast or Download Shows 464-472

Listen To Pronk Pops Podcast or Download Shows 455-463

Listen To Pronk Pops Podcast or Download Shows 447-454

Listen To Pronk Pops Podcast or Download Shows 439-446

Listen To Pronk Pops Podcast or Download Shows 431-438

Listen To Pronk Pops Podcast or Download Shows 422-430

Listen To Pronk Pops Podcast or Download Shows 414-421

Listen To Pronk Pops Podcast or Download Shows 408-413

Listen To Pronk Pops Podcast or Download Shows 400-407

Listen To Pronk Pops Podcast or Download Shows 391-399

Listen To Pronk Pops Podcast or Download Shows 383-390

Listen To Pronk Pops Podcast or Download Shows 376-382

Listen To Pronk Pops Podcast or Download Shows 369-375

Listen To Pronk Pops Podcast or Download Shows 360-368

Listen To Pronk Pops Podcast or Download Shows 354-359

Listen To Pronk Pops Podcast or Download Shows 346-353

Listen To Pronk Pops Podcast or Download Shows 338-345

Listen To Pronk Pops Podcast or Download Shows 328-337

Listen To Pronk Pops Podcast or Download Shows 319-327

Listen To Pronk Pops Podcast or Download Shows 307-318

Listen To Pronk Pops Podcast or Download Shows 296-306

Listen To Pronk Pops Podcast or Download Shows 287-295

Listen To Pronk Pops Podcast or Download Shows 277-286

Listen To Pronk Pops Podcast or Download Shows 264-276

Listen To Pronk Pops Podcast or Download Shows 250-263

Listen To Pronk Pops Podcast or Download Shows 236-249

Listen To Pronk Pops Podcast or Download Shows 222-235

Listen To Pronk Pops Podcast or Download Shows 211-221

Listen To Pronk Pops Podcast or Download Shows 202-210

Listen To Pronk Pops Podcast or Download Shows 194-201

Listen To Pronk Pops Podcast or Download Shows 184-193

Listen To Pronk Pops Podcast or Download Shows 174-183

Listen To Pronk Pops Podcast or Download Shows 165-173

Listen To Pronk Pops Podcast or Download Shows 158-164

Listen To Pronk Pops Podcast or Download Shows 151-157

Listen To Pronk Pops Podcast or Download Shows 143-150

Listen To Pronk Pops Podcast or Download Shows 135-142

Listen To Pronk Pops Podcast or Download Shows 131-134

Listen To Pronk Pops Podcast or Download Shows 124-130

Listen To Pronk Pops Podcast or Download Shows 121-123

Listen To Pronk Pops Podcast or Download Shows 118-120

Listen To Pronk Pops Podcast or Download Shows 113 -117

Listen To Pronk Pops Podcast or Download Show 112

Listen To Pronk Pops Podcast or Download Shows 108-111

Listen To Pronk Pops Podcast or Download Shows 106-108

Listen To Pronk Pops Podcast or Download Shows 104-105

Listen To Pronk Pops Podcast or Download Shows 101-103

Listen To Pronk Pops Podcast or Download Shows 98-100

Listen To Pronk Pops Podcast or Download Shows 94-97

Listen To Pronk Pops Podcast or Download Show 93

Listen To Pronk Pops Podcast or Download Show 92

Listen To Pronk Pops Podcast or Download Show 91

Listen To Pronk Pops Podcast or Download Shows 88-90

Listen To Pronk Pops Podcast or Download Shows 84-87

Listen To Pronk Pops Podcast or Download Shows 79-83

Listen To Pronk Pops Podcast or Download Shows 74-78

Listen To Pronk Pops Podcast or Download Shows 71-73

Listen To Pronk Pops Podcast or Download Shows 68-70

Listen To Pronk Pops Podcast or Download Shows 65-67

Listen To Pronk Pops Podcast or Download Shows 62-64

Listen To Pronk Pops Podcast or Download Shows 58-61

Listen To Pronk Pops Podcast or Download Shows 55-57

Listen To Pronk Pops Podcast or Download Shows 52-54

Listen To Pronk Pops Podcast or Download Shows 49-51

Listen To Pronk Pops Podcast or Download Shows 45-48

Listen To Pronk Pops Podcast or Download Shows 41-44

Listen To Pronk Pops Podcast or Download Shows 38-40

Listen To Pronk Pops Podcast or Download Shows 34-37

Listen To Pronk Pops Podcast or Download Shows 30-33

Listen To Pronk Pops Podcast or Download Shows 27-29

Listen To Pronk Pops Podcast or Download Shows 17-26

Listen To Pronk Pops Podcast or Download Shows 16-22

Listen To Pronk Pops Podcast or Download Shows 10-15

Listen To Pronk Pops Podcast or Download Shows 1-9

Advertisements
Read Full Post | Make a Comment ( None so far )

The Pronk Pops Show 1080, May 21, 2018, Story 1: Hillary Clinton and Barack Obama Compromised National Security By Emails To Clinton’s Emailer Server Account — Hacked By Several Countries Including Russia Providing Real Leverage or Blackmail of Clinton and Obama — Spy or Mole In Trump Campaign To Provide Early Warning That Russians Gave Trump The Compromising Leverage/Blackmail — None Sent Nor Received by Trump — Obama Knew Everything DOJ, FBI, CIA, and NSA Were Doing! — Videos — Story 2: President Trump Demands Investigation and Meets With Deputy Attorney General and FBI Director — Videos — Story 3: President Trump Participates in Swearing In of First Women C.I.A. Director, Gina Haspel — Videos — Story 4: Secretary of State Mike Pompeo Outlines Strategy with Strongest Sanctions Against Iran — Videos

Posted on May 22, 2018. Filed under: Addiction, American History, Assault, Barack H. Obama, Ben Carson, Blogroll, Breaking News, Bribery, Bribes, Cartoons, Central Intelligence Agency, Communications, Congress, Constitutional Law, Corruption, Countries, Crime, Culture, Deep State, Defense Spending, Donald J. Trump, Donald J. Trump, Donald Trump, Education, Empires, Employment, Federal Bureau of Investigation (FBI), Federal Government, First Amendment, Foreign Policy, Former President Barack Obama, Fourth Amendment, Gangs, Government, Government Dependency, Government Spending, Hate Speech, Health, High Crimes, Hillary Clinton, Hillary Clinton, History, House of Representatives, Human, Human Behavior, Illegal Immigration, Immigration, Impeachment, Independence, James Comey, Killing, Law, Legal Immigration, Life, Media, Mike Pompeo, National Interest, National Security Agency, Networking, News, Nuclear Weapons, Obama, People, Philosophy, Photos, Politics, Polls, Pro Life, Public Corruption, Radio, Raymond Thomas Pronk, Resources, Robert S. Mueller III, Rule of Law, Scandals, Second Amendment, Senate, Social Networking, Spying, Success, Surveillance and Spying On American People, Taxation, Taxes, Terror, Treason, United States Constitution, United States of America, United States Supreme Court, Videos, Wealth, Welfare Spending, Wisdom | Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , |

 Project_1

The Pronk Pops Show Podcasts

Pronk Pops Show 1080, May 21, 2018

Pronk Pops Show 1079, May 17, 2018

Pronk Pops Show 1078, May 16, 2018

Pronk Pops Show 1077, May 15, 2018

Pronk Pops Show 1076, May 14, 2018

Pronk Pops Show 1075, May 10, 2018

Pronk Pops Show 1073, May 8, 2018

Pronk Pops Show 1072, May 7, 2018

Pronk Pops Show 1071, May 4, 2018

Pronk Pops Show 1070, May 3, 2018

Pronk Pops Show 1069, May 2, 2018

Pronk Pops Show 1068, April 26, 2018

Pronk Pops Show 1067, April 25, 2018

Pronk Pops Show 1066, April 24, 2018

Pronk Pops Show 1065, April 23, 2018

Pronk Pops Show 1064, April 19, 2018

Pronk Pops Show 1063, April 18, 2018

Pronk Pops Show 1062, April 17, 2018

Pronk Pops Show 1061, April 16, 2018

Pronk Pops Show 1060, April 12, 2018

Pronk Pops Show 1059, April 11, 2018

Pronk Pops Show 1058, April 10, 2018

Pronk Pops Show 1057, April 9, 2018

Pronk Pops Show 1056, April 4, 2018

Pronk Pops Show 1055, April 2, 2018

Pronk Pops Show 1054, March 29, 2018

Pronk Pops Show 1053, March 28, 2018

Pronk Pops Show 1052, March 27, 2018

Pronk Pops Show 1051, March 26, 2018

Pronk Pops Show 1050, March 23, 2018

Pronk Pops Show 1049, March 22, 2018

Pronk Pops Show 1048, March 21, 2018

Pronk Pops Show 1047, March 20, 2018

Pronk Pops Show 1046, March 19, 2018

Pronk Pops Show 1045, March 8, 2018

Pronk Pops Show 1044, March 7, 2018

Pronk Pops Show 1043, March 6, 2018

Pronk Pops Show 1042, March 1, 2018

Pronk Pops Show 1041, February 28, 2018

Pronk Pops Show 1040, February 27, 2018

Pronk Pops Show 1039, February 26, 2018

Pronk Pops Show 1038, February 23, 2018

Pronk Pops Show 1037, February 22, 2018

Pronk Pops Show 1036, February 21, 2018

Pronk Pops Show 1035, February 16, 2018

Pronk Pops Show 1034, February 15, 2018  

Pronk Pops Show 1033, February 14, 2018  

Pronk Pops Show 1032, February 13, 2018

Pronk Pops Show 1031, February 12, 2018

Pronk Pops Show 1030, February 9, 2018

Pronk Pops Show 1028, February 7, 2018

Pronk Pops Show 1027, February 2, 2018

Pronk Pops Show 1026, February 1, 2018

See the source imageSee the source image

See the source image

See the source imageSee the source image

Story 1: Hillary Clinton and Barack Obama Compromised National Security By Emails To Clinton’s Emailer Server Account — Hacked By Several Countries Including Russia Providing Real Leverage or Blackmail of Clinton and Obama — Spy or Mole In Trump Campaign To Provide Early Warning That Russians Gave Trump The Compromising Leverage/Blackmail — None Sent Nor Received by Trump — Obama Knew Everything DOJ, FBI, CIA, and NSA Were Doing! — Videos

 

Trump questions where Obama was amid reports of FBI spying

5 Things You Need to Know About Hillary’s Email Server

Report: 99% chance Clinton email server hacked

Why Clinton’s private email use is deemed more serious than predecessors’

Was President Obama aware of Clinton’s private email server?

Did Obama lie about his knowledge of Clinton’s server?

Obama weighs in on Hillary Clinton’s emails

DOJ reportedly reopens Hillary Clinton email investigation

Why Congress won’t reopen the Clinton email investigation

State Department’s Report ‘Really Hurts’ Hillary Clinton | Morning Joe | MSNBC

Whistleblower: Clinton emails include classified info

Clinton campaign looked to fire intel watchdog over email scandal

Ex-watchdog: From start, pushback on Clinton email probe

Trump Hopes Russia Finds Clinton’s Deleted Emails

Inspector General Issues Scathing Report On Hillary’s Emails

Former DOJ official on reports of informant in Trump team

FBI and DOJ in turmoil over handling of Clinton emails

Clinton email scandal, Russia probe compromised by biased investigator

Ed Klein: Why Comey jumped at chance to reopen Clinton case

Clinton blames Comey, Russia for election loss

FBI investigation into Hillary Clinton’s email server

Is the presence of a spy in a presidential campaign lawful?

DOJ watchdog completes draft report on Clinton probe

FBI investigating drone emails in Clinton server probe

Morrell confirms at least one foreign country have what was on Hillary’s email server

Trey Gowdy GRILLS James Comey On Hillary Clinton Emails 7/7/16

Jason Chaffetz Digs in on Comey at Start of Capitol Hearing: ‘We Are Mystified and Confused’:

James Comey takes fire for Clinton email recommendation

FBI Director James Comey’s full statement on Clinton email investigation

FORMER CIA AND DEFENSE CHIEFS SAY CLINTON’S EMAIL SERVER HACKED: Iran, China, Russia Hacked Server

Russian-linked hackers tried to access Clinton emails

Former CIA Director: Foreign Spies Had Access to Clinton Emails

Obama creating a ‘shadow government?’

Obama’s shadowing of Trump is appalling: Dobbs

What happens if Obama was involved in illegal surveillance?

Story 2: President Trump Demands Investigation and Meets With Deputy Attorney General and FBI Director — Videos —

Trump demands that the DOJ look into reports of informant

 

Trump demands DOJ probe into FBI surveillance allegations

 

Story 3: President Trump Attends Swearing In of First Women C.I.A. Director, Gina Haspel — Videos

Gina Haspel sworn-in as first female CIA director

President Donald Trump: Gina Haspel Will Never Back Down | CNBC

President Donald Trump Attends Swearing-In Of New CIA Director Gina Haspel | NBC News

Trump CIA pick tells lawmakers: ‘My moral compass is strong’

Trump Swears In Gina Haspel as C.I.A. Director, Praising Agency as the ‘Most Elite’ in the World

Image
Gina Haspel was sworn in on Monday as the director of the Central Intelligence Agency.CreditDoug Mills/The New York Times

WASHINGTON — President Trump praised Gina Haspel on Monday as she was sworn in as the director of the Central Intelligence Agency, congratulating her on becoming the first woman to lead what he called “the most elite intelligence professionals on the planet.”

But even as Ms. Haspel took over as C.I.A. director, conservatives and some Trump allies were accusing her of being part of the “deep state” conspiracy that the president repeatedly claims has been conducting a “witch hunt” against him.

Publicly and privately, Trump supporters have been raising questions about Ms. Haspel’s loyalty to the president, and urging — without providing any evidence — an examination of what she knew about the intelligence community’s efforts to connect Trump to Russia.

In particular, they have questioned whether Ms. Haspel, a 33-year veteran of the spy agency who was the C.I.A.’s station chief in London, knew of the F.B.I.’s highly secretive interview of an Australian diplomat in London, and was aware that the bureau used an informant to gather information there from Trump associates about possible Russian coordination with Mr. Trump’s presidential campaign.

“Who was the CIA London Station Chief in 2016?”Jack Posobiec, a pro-Trump conspiracy theorist with a large Twitter following, asked in a tweet last week. “Gina Haspel.”

In a letter last week, Senator Rand Paul, Republican of Kentucky, asked Ms. Haspel if the C.I.A. had been involved in spying on Mr. Trump or if the agency had cooperated with foreign intelligence services to monitor Mr. Trump in the years before he officially became a candidate.

It is unclear how much Ms. Haspel knew about the F.B.I.’s activities, which were part of a counterintelligence operation that the bureau called “Crossfire Hurricane,” or when she was made aware of them. But it is standard procedure for the station chief in a major city to be briefed on any major bureau activities in her territory.

“Anything that affects the intelligence community, you would first get the agency’s concurrence through the chief of station,” said Eugene Casey, a former agent who spent more than five years overseas for the F.B.I.

An American official said on Monday that Ms. Haspel was not fully briefed at the time on the F.B.I.’s use of an informant in London to gather information about Trump associates or on its plan to interview the Australian diplomat. The existence of the bureau’s Russia investigation was one of the most closely held secrets in the F.B.I. and the Justice Department.

But just the possibility that Ms. Haspel knew of the informant in the Russia inquiry is enough for some conspiracy theorists to accuse Ms. Haspel of being part of the anti-Trump intelligence bureaucracy they believe is arrayed against the president and his agenda.

Frank Gaffney Jr., of the Center for Security Policy, was particularly angry at the comments Ms. Haspel made during her confirmation hearing about whether she would follow a presidential order she considered immoral (she said she would not).

He also complained that Ms. Haspel, whose nomination was supported by a cross-section of former intelligence officials, was “being strongly recommended for that job by men who have used the C.I.A. and/or other elements of the intelligence community as deep state weapons to try to destroy him, his campaign and his administration.”

For Mr. Trump, the conspiracy theories connected to Ms. Haspel underscore an awkward reality: If the deep state Russia allegations are true, then many of the president’s own intelligence officials are in the same position as her.

In addition to Ms. Haspel, who served in senior C.I.A. positions under former Presidents George W. Bush and Barack Obama, many of Mr. Trump’s other senior intelligence officials have played roles in parts of the Russia investigation.

Rod J. Rosenstein, the deputy attorney general who is overseeing the Russia investigation, appointed the special counsel in the case and has defended the investigation. Dana Boente, whom Mr. Trump appointed to be the top lawyer at the F.B.I., signed one of the secret warrants for a wiretap on a Trump associate. And Christopher A. Wray, the F.B.I. director, has fought to maintain the independence of the Russia investigation and has said it is not a witch hunt.

Just hours before his visit to the C.I.A. on Monday, Mr. Trump lashed out against Mr. Brennan, quoting a Fox News contributor who says Mr. Brennan “is largely responsible for the destruction of American’s faith in the Intelligence Community.”

Donald J. Trump

@realDonaldTrump

“John Brennan is panicking. He has disgraced himself, he has disgraced the Country, he has disgraced the entire Intelligence Community. He is the one man who is largely responsible for the destruction of American’s faith in the Intelligence Community and in some people at the….

Mr. Trump used the power of his Twitter account to amplify remarks from Dan Bongino, a conservative commentator, who alleged on Fox that Mr. Brennan used an intelligence dossier to begin an illegitimate investigation of the Trump campaign.

“This guy is the genesis of this whole Debacle. This was a Political hit job, this was not an Intelligence Investigation,” the president tweeted to his 52 million followers, quoting Mr. Bongino’s television appearance.

The Monday morning tweets by the president followed a weekend in which he angrily complained about reports that the investigation into his campaign’s contacts with Russia relied in part on confidential informants. Mr. Trump again assailed the investigation as a “Witch Hunt” and demanded that the F.B.I. or the Justice Department investigate whether his campaign was subject to improper surveillance.

“I hereby demand, and will do so officially tomorrow, that the Department of Justice look into whether or not the FBI/DOJ infiltrated or surveilled the Trump Campaign for Political Purposes — and if any such demands or requests were made by people within the Obama Administration!” Mr. Trump wrote on Sunday.

The president repeated that demand on Monday in an email from his re-election campaign, urging his political supporters to sign a petition calling for a Justice Department investigation.

THIS COULD BE THE GREATEST POLITICAL SCANDAL IN AMERICAN HISTORY,” Mr. Trump wrote in the email from the Trump Make America Great Again campaign committee. “I need you to sign your name right this second to join me in demanding this abuse of power gets investigated.”

Mr. Rosenstein said on Sunday that the department’s inspector general would look into the questions raised by the president. But it is unclear whether that will satisfy Mr. Trump, who has said it was “disgraceful” to hand investigation of the Russia inquiry to an inspector general who was “Obama’s guy.”

The president is scheduled to meet with Mr. Rosenstein, Mr. Wray and Dan Coats, the director of national intelligence, at the White House on Monday afternoon, officials said.

Despite the president’s relentless assault on what he perceives as the intelligence community’s improper actions as part of the investigations into his presidential campaign, Mr. Trump praised Ms. Haspel and the agency she is about to lead.

Mr. Trump’s brief remarks were strikingly different from those he delivered on his first visit to the agency the day after his inauguration, when he stood in front of a memorial to fallen intelligence officers and delivered a political diatribe against the news media, Democrats and others who questioned the size of his inaugural crowd.

On Monday, Mr. Trump lauded the “exceptional men and women of this agency,” adding: “I see what you do. I understand what you do and it’s incredible.”

https://www.nytimes.com/2018/05/21/us/politics/trump-haspel-cia.html

 

Story 4: Secretary of State Mike Pompeo Outlines Strategy with Strongest Sanctions Against Iran — Videos

Pompeo: Iran to face “strongest sanctions in history”

Pompeo outlines new Iran strategy after US exit from deal

WATCH: Secy. of State Pompeo discusses Iran at Heritage Foundation

Pompeo adviser: US requirements for Iran are realistic

 

 

Mike Pompeo threatens Iran with ‘strongest sanctions in history’ after nuclear deal withdrawal

Secretary of State Mike Pompeo has issued a steep list of demands that he said should be included in a nuclear treaty with Iran to replace the Obama-era deal, threatening “the strongest sanctions in history” if Iran doesn’t change course.

Key points:

  • Mike Pompeo gives first major speech as Secretary of State and threatens “toughest sanctions in history” on Iran
  • Submits 12 demands to the Middle East nation which would ensure it “has no possible path to a nuclear weapon”
  • Mr Pompeo warns punishment against European businesses which continue to trade with Iran

Following President Donald Trump’s withdrawal from the deal, the United States will ensure “Iran has no possible path to a nuclear weapon, ever,” Mr Pompeo said.

As he called for a better agreement to constrain Iran’s activities, he said the US would “apply unprecedented financial pressure” to bring Tehran back to the table.

“These will end up being the strongest sanctions in history by the time we are complete,” Mr Pompeo said at the conservative Heritage Foundation, his first major policy speech since taking over as top diplomat.

The Secretary of State’s list of 12 requirements included many that Iran is highly unlikely to consider.

He said Iran must “stop enrichment” of uranium, which was allowed within strict limitations under the 2015 deal. Iran must also allow nuclear “unqualified access to all sites throughout the country,” Mr Pompeo said, alluding to military sites that were off-limits under the 2015 deal except under specific circumstances.

To that end, he also said Iran must declare all previous efforts to build a nuclear weapon, reopening an issue that the UN’s International Atomic Energy Agency has already deemed a closed matter.

Mr Pompeo also demanded that Iran cease from a range of activities throughout the Middle East that have long drawn the ire of the US and its allies. He said Iran must end support for Shiite Houthi rebels in Yemen, “withdraw all forces” from Syria, halt support for its ally Hezbollah and stop threatening Israel.

Iran must also “release all US citizens” missing in Iran or being held on “spurious charges,” he said.

At the same time, Mr Pompeo offered Iran a series of dramatic potential US concessions if it agrees to make “major changes.”

Under a new agreement, the US would be willing to lift all sanctions, restore full diplomatic and commercial ties with Iran, and even support the modernization of its economy, Mr Pompeo said.

“It is America’s hope that our labours toward peace and security will bear fruit for the long-suffering people of Iran,” he said.

Media player: “Space” to play, “M” to mute, “left” and “right” to seek.

Mr Pompeo’s speech came after Mr Trump earlier this month infuriated US allies in Europe by withdrawing from the 2015 deal brokered by President Barack Obama, Iran and world powers. Europeans allies had pleaded with Mr Trump not to scuttle that deal and are now scrambling to keep the deal alive even without the US.

Mr Pompeo called that 2015 agreement a “loser deal”.

But the Trump administration has held out hope that those same allies will put aside that frustration and work with the US to ramp pressure back up on Iran through sanctions in a bid to bring Tehran back to the negotiating table for a stronger deal.

Pompeo said he understood that Trump’s decision “will pose financial and economic difficulties for a number of our friends.” But he warned them that the US planned to follow through with threats to punish European companies that continue doing business with Iran that is allowed under the deal but will violate reimposed US sanctions.

“I know our allies in Europe may try to keep the old nuclear deal going with Tehran. That is their decision to make,” Pompeo said. “They know where we stand.”

http://www.abc.net.au/news/2018-05-22/mike-pompeo-threatens-iran-with-tough-sanctions/9784784

The Pronk Pops Show Podcasts Portfolio

Listen To Pronk Pops Podcast or Download Shows 1073-1080

Listen To Pronk Pops Podcast or Download Shows 1066-1073

Listen To Pronk Pops Podcast or Download Shows 1058-1065

Listen To Pronk Pops Podcast or Download Shows 1048-1057

Listen To Pronk Pops Podcast or Download Shows 1041-1047

Listen To Pronk Pops Podcast or Download Shows 1033-1040

Listen To Pronk Pops Podcast or Download Shows 1023-1032

Listen To Pronk Pops Podcast or Download Shows 1017-1022

Listen To Pronk Pops Podcast or Download Shows 1010-1016

Listen To Pronk Pops Podcast or Download Shows 1001-1009

Listen To Pronk Pops Podcast or Download Shows 993-1000

Listen To Pronk Pops Podcast or Download Shows 984-992

Listen To Pronk Pops Podcast or Download Shows 977-983

Listen To Pronk Pops Podcast or Download Shows 970-976

Listen To Pronk Pops Podcast or Download Shows 963-969

Listen To Pronk Pops Podcast or Download Shows 955-962

Listen To Pronk Pops Podcast or Download Shows 946-954

Listen To Pronk Pops Podcast or Download Shows 938-945

Listen To Pronk Pops Podcast or Download Shows 926-937

Listen To Pronk Pops Podcast or Download Shows 916-925

Listen To Pronk Pops Podcast or Download Shows 906-915

Listen To Pronk Pops Podcast or Download Shows 889-896

Listen To Pronk Pops Podcast or Download Shows 884-888

Listen To Pronk Pops Podcast or Download Shows 878-883

Listen To Pronk Pops Podcast or Download Shows 870-877

Listen To Pronk Pops Podcast or Download Shows 864-869

Listen To Pronk Pops Podcast or Download Shows 857-863

Listen To Pronk Pops Podcast or Download Shows 850-856

Listen To Pronk Pops Podcast or Download Shows 845-849

Listen To Pronk Pops Podcast or Download Shows 840-844

Listen To Pronk Pops Podcast or Download Shows 833-839

Listen To Pronk Pops Podcast or Download Shows 827-832

Listen To Pronk Pops Podcast or Download Shows 821-826

Listen To Pronk Pops Podcast or Download Shows 815-820

Listen To Pronk Pops Podcast or Download Shows 806-814

Listen To Pronk Pops Podcast or Download Shows 800-805

Listen To Pronk Pops Podcast or Download Shows 793-799

Listen To Pronk Pops Podcast or Download Shows 785-792

Listen To Pronk Pops Podcast or Download Shows 777-784

Listen To Pronk Pops Podcast or Download Shows 769-776

Listen To Pronk Pops Podcast or Download Shows 759-768

Listen To Pronk Pops Podcast or Download Shows 751-758

Listen To Pronk Pops Podcast or Download Shows 745-750

Listen To Pronk Pops Podcast or Download Shows 738-744

Listen To Pronk Pops Podcast or Download Shows 732-737

Listen To Pronk Pops Podcast or Download Shows 727-731

Listen To Pronk Pops Podcast or Download Shows 720-726

Listen To Pronk Pops Podcast or DownloadShows 713-719

Listen To Pronk Pops Podcast or DownloadShows 705-712

Listen To Pronk Pops Podcast or Download Shows 695-704

Listen To Pronk Pops Podcast or Download Shows 685-694

Listen To Pronk Pops Podcast or Download Shows 675-684

Listen To Pronk Pops Podcast or Download Shows 668-674

Listen To Pronk Pops Podcast or Download Shows 660-667

Listen To Pronk Pops Podcast or Download Shows 651-659

Listen To Pronk Pops Podcast or Download Shows 644-650

Listen To Pronk Pops Podcast or Download Shows 637-643

Listen To Pronk Pops Podcast or Download Shows 629-636

Listen To Pronk Pops Podcast or Download Shows 617-628

Listen To Pronk Pops Podcast or Download Shows 608-616

Listen To Pronk Pops Podcast or Download Shows 599-607

Listen To Pronk Pops Podcast or Download Shows 590-598

Listen To Pronk Pops Podcast or Download Shows 585- 589

Listen To Pronk Pops Podcast or Download Shows 575-584

Listen To Pronk Pops Podcast or Download Shows 565-574

Listen To Pronk Pops Podcast or Download Shows 556-564

Listen To Pronk Pops Podcast or Download Shows 546-555

Listen To Pronk Pops Podcast or Download Shows 538-545

Listen To Pronk Pops Podcast or Download Shows 532-537

Listen To Pronk Pops Podcast or Download Shows 526-531

Listen To Pronk Pops Podcast or Download Shows 519-525

Listen To Pronk Pops Podcast or Download Shows 510-518

Listen To Pronk Pops Podcast or Download Shows 500-509

Listen To Pronk Pops Podcast or Download Shows 490-499

Listen To Pronk Pops Podcast or Download Shows 480-489

Listen To Pronk Pops Podcast or Download Shows 473-479

Listen To Pronk Pops Podcast or Download Shows 464-472

Listen To Pronk Pops Podcast or Download Shows 455-463

Listen To Pronk Pops Podcast or Download Shows 447-454

Listen To Pronk Pops Podcast or Download Shows 439-446

Listen To Pronk Pops Podcast or Download Shows 431-438

Listen To Pronk Pops Podcast or Download Shows 422-430

Listen To Pronk Pops Podcast or Download Shows 414-421

Listen To Pronk Pops Podcast or Download Shows 408-413

Listen To Pronk Pops Podcast or Download Shows 400-407

Listen To Pronk Pops Podcast or Download Shows 391-399

Listen To Pronk Pops Podcast or Download Shows 383-390

Listen To Pronk Pops Podcast or Download Shows 376-382

Listen To Pronk Pops Podcast or Download Shows 369-375

Listen To Pronk Pops Podcast or Download Shows 360-368

Listen To Pronk Pops Podcast or Download Shows 354-359

Listen To Pronk Pops Podcast or Download Shows 346-353

Listen To Pronk Pops Podcast or Download Shows 338-345

Listen To Pronk Pops Podcast or Download Shows 328-337

Listen To Pronk Pops Podcast or Download Shows 319-327

Listen To Pronk Pops Podcast or Download Shows 307-318

Listen To Pronk Pops Podcast or Download Shows 296-306

Listen To Pronk Pops Podcast or Download Shows 287-295

Listen To Pronk Pops Podcast or Download Shows 277-286

Listen To Pronk Pops Podcast or Download Shows 264-276

Listen To Pronk Pops Podcast or Download Shows 250-263

Listen To Pronk Pops Podcast or Download Shows 236-249

Listen To Pronk Pops Podcast or Download Shows 222-235

Listen To Pronk Pops Podcast or Download Shows 211-221

Listen To Pronk Pops Podcast or Download Shows 202-210

Listen To Pronk Pops Podcast or Download Shows 194-201

Listen To Pronk Pops Podcast or Download Shows 184-193

Listen To Pronk Pops Podcast or Download Shows 174-183

Listen To Pronk Pops Podcast or Download Shows 165-173

Listen To Pronk Pops Podcast or Download Shows 158-164

Listen To Pronk Pops Podcast or Download Shows 151-157

Listen To Pronk Pops Podcast or Download Shows 143-150

Listen To Pronk Pops Podcast or Download Shows 135-142

Listen To Pronk Pops Podcast or Download Shows 131-134

Listen To Pronk Pops Podcast or Download Shows 124-130

Listen To Pronk Pops Podcast or Download Shows 121-123

Listen To Pronk Pops Podcast or Download Shows 118-120

Listen To Pronk Pops Podcast or Download Shows 113 -117

Listen To Pronk Pops Podcast or Download Show 112

Listen To Pronk Pops Podcast or Download Shows 108-111

Listen To Pronk Pops Podcast or Download Shows 106-108

Listen To Pronk Pops Podcast or Download Shows 104-105

Listen To Pronk Pops Podcast or Download Shows 101-103

Listen To Pronk Pops Podcast or Download Shows 98-100

Listen To Pronk Pops Podcast or Download Shows 94-97

Listen To Pronk Pops Podcast or Download Show 93

Listen To Pronk Pops Podcast or Download Show 92

Listen To Pronk Pops Podcast or Download Show 91

Listen To Pronk Pops Podcast or Download Shows 88-90

Listen To Pronk Pops Podcast or Download Shows 84-87

Listen To Pronk Pops Podcast or Download Shows 79-83

Listen To Pronk Pops Podcast or Download Shows 74-78

Listen To Pronk Pops Podcast or Download Shows 71-73

Listen To Pronk Pops Podcast or Download Shows 68-70

Listen To Pronk Pops Podcast or Download Shows 65-67

Listen To Pronk Pops Podcast or Download Shows 62-64

Listen To Pronk Pops Podcast or Download Shows 58-61

Listen To Pronk Pops Podcast or Download Shows 55-57

Listen To Pronk Pops Podcast or Download Shows 52-54

Listen To Pronk Pops Podcast or Download Shows 49-51

Listen To Pronk Pops Podcast or Download Shows 45-48

Listen To Pronk Pops Podcast or Download Shows 41-44

Listen To Pronk Pops Podcast or Download Shows 38-40

Listen To Pronk Pops Podcast or Download Shows 34-37

Listen To Pronk Pops Podcast or Download Shows 30-33

Listen To Pronk Pops Podcast or Download Shows 27-29

Listen To Pronk Pops Podcast or Download Shows 17-26

Listen To Pronk Pops Podcast or Download Shows 16-22

Listen To Pronk Pops Podcast or Download Shows 10-15

Listen To Pronk Pops Podcast or Download Shows 1-9

Read Full Post | Make a Comment ( None so far )

The Pronk Pops Show 1079, May 17, 2018, Story 1: Investigate, Indict, Arrest, and Prosecute The Clinton Obama Democratic Criminal Conspirators To Subvert Trump Presidency: Clinton, Obama, Jarrett, Rice, Rhodes, Power, Clapper, Brennan, Lynch, Yates, Carlin, Comey, McCabe, Preistap, Strzok, Page and Accomplices — Betrayed Their Oath of Office To Preserve, Protect and Defend The United States Constitution, The American People and Election Process — Videos — Story 2: Secret Surveillance Spying Security State (S5) Abolishes Fourth Amendment With  National Security Agency and National Security Letters — Congress Does Nothing Fearing Secret Surveillance Spying Security State Disclosures By United States Intelligence Community (IC) — Videos — Story 3: President Trump Attacks MS-13 As Animals — Lying Lunatic Leftist Losers Defend MS -13 — All Humans Are Animals — MS-16 Members Are Violent Thugs — Videos

Posted on May 18, 2018. Filed under: Addiction, Addiction, American History, Applications, Barack H. Obama, Bill Clinton, Blogroll, Breaking News, Bribery, Bribes, Budgetary Policy, Cartoons, Central Intelligence Agency, Communications, Computers, Constitutional Law, Corruption, Countries, Crime, Cruise Missiles, Culture, Deep State, Defense Spending, Desertion, Donald J. Trump, Donald J. Trump, Donald J. Trump, Donald Trump, Drones, Economics, Education, Elections, Empires, Employment, Federal Bureau of Investigation (FBI), Federal Bureau of Investigation (FBI) and Department of Justice (DOJ), Fiscal Policy, Free Trade, Freedom of Speech, Government, Government Dependency, Government Spending, Hardware, High Crimes, Hillary Clinton, Hillary Clinton, Hillary Clinton, Hillary Clinton, Hillary Clinton, History, Human, Human Behavior, Illegal Immigration, Immigration, Impeachment, Independence, Investments, Iran Nuclear Weapons Deal, Islam, Israel, James Comey, Killing, Labor Economics, Language, Law, Legal Immigration, Life, Lying, Media, Mental Illness, Middle East, Mike Pence, Movies, National Interest, National Security Agency, Natural Gas, News, Nuclear Weapons, Obama, Oil, People, Philosophy, Photos, Politics, Polls, President Barack Obama, President Trump, Presidential Appointments, Public Corruption, Radio, Raymond Thomas Pronk, Religion, Republican Candidates For President 2016, Resources, Robert S. Mueller III, Rule of Law, Scandals, Science, Security, Senator Jeff Sessions, Servers, Sexual Harrasment, Social Networking, Social Science, Software, Spying, Success, Surveillance and Spying On American People, Tax Policy, Taxation, Taxes, Technology, Terrorism, Unemployment, United Kingdom, United States of America, Videos, Violence, Wall Street Journal, War, Wealth, Weapons, Wisdom | Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , |

 Project_1

The Pronk Pops Show Podcasts

Pronk Pops Show 1079, May 17, 2018

Pronk Pops Show 1078, May 16, 2018

Pronk Pops Show 1077, May 15, 2018

Pronk Pops Show 1076, May 14, 2018

Pronk Pops Show 1075, May 10, 2018

Pronk Pops Show 1073, May 8, 2018

Pronk Pops Show 1072, May 7, 2018

Pronk Pops Show 1071, May 4, 2018

Pronk Pops Show 1070, May 3, 2018

Pronk Pops Show 1069, May 2, 2018

Pronk Pops Show 1068, April 26, 2018

Pronk Pops Show 1067, April 25, 2018

Pronk Pops Show 1066, April 24, 2018

Pronk Pops Show 1065, April 23, 2018

Pronk Pops Show 1064, April 19, 2018

Pronk Pops Show 1063, April 18, 2018

Pronk Pops Show 1062, April 17, 2018

Pronk Pops Show 1061, April 16, 2018

Pronk Pops Show 1060, April 12, 2018

Pronk Pops Show 1059, April 11, 2018

Pronk Pops Show 1058, April 10, 2018

Pronk Pops Show 1057, April 9, 2018

Pronk Pops Show 1056, April 4, 2018

Pronk Pops Show 1055, April 2, 2018

Pronk Pops Show 1054, March 29, 2018

Pronk Pops Show 1053, March 28, 2018

Pronk Pops Show 1052, March 27, 2018

Pronk Pops Show 1051, March 26, 2018

Pronk Pops Show 1050, March 23, 2018

Pronk Pops Show 1049, March 22, 2018

Pronk Pops Show 1048, March 21, 2018

Pronk Pops Show 1047, March 20, 2018

Pronk Pops Show 1046, March 19, 2018

Pronk Pops Show 1045, March 8, 2018

Pronk Pops Show 1044, March 7, 2018

Pronk Pops Show 1043, March 6, 2018

Pronk Pops Show 1042, March 1, 2018

Pronk Pops Show 1041, February 28, 2018

Pronk Pops Show 1040, February 27, 2018

Pronk Pops Show 1039, February 26, 2018

Pronk Pops Show 1038, February 23, 2018

Pronk Pops Show 1037, February 22, 2018

Pronk Pops Show 1036, February 21, 2018

Pronk Pops Show 1035, February 16, 2018

Pronk Pops Show 1034, February 15, 2018  

Pronk Pops Show 1033, February 14, 2018  

Pronk Pops Show 1032, February 13, 2018

Pronk Pops Show 1031, February 12, 2018

Pronk Pops Show 1030, February 9, 2018

Pronk Pops Show 1028, February 7, 2018

Pronk Pops Show 1027, February 2, 2018

Pronk Pops Show 1026, February 1, 2018

See the source imageSee the source imageImage result for branco cartoons ms-13 mediaSee the source imageImage result for branco cartoons ms-13 media

See the source image

See the source image

See the source imageSee the source imageSee the source imageSee the source image

Story 1: Investigate, Indict, Arrest, and Prosecute The Clinton Obama Democratic Criminal Conspirators To Subvert Trump Presidency: Clinton, Obama, Jarrett, Rice, Rhodes, Power, Clapper, Brennan, Holder, Lynch, Yates, Comey, McCabe, Strzok, Page and Accomplices — Betrayed Their Oath of Office To Preserve, Protect and Defend The United States Constitution, The American People and Election Process — Videos —

CIA Director Brennan set up Trump

FBI and DOJ in turmoil over handling of Clinton emails

Did John Brennan lie about the Trump-Russia dossier?

Brennan’s own people contradict his “galactically stupid” statements about the dossier

DiGenova: John Brennan should get a good lawyer

John Brennan: ‘A Lot The Public Doesn’t Know’ About Trump Tower Meeting | MTP Daily | MSNBC

Tucker Carlson & Kim Strassel Destroy Lies & Spies Of The Deep Dark State

Joe DiGenova – John Brennan Headed to Grand Jury, 2229

CONFIRMED!! Rosenstein is a SELL OUT, He’s UNDER a HUGE HEAT

FBI and DOJ in turmoil over handling of Clinton emails

DOJ watchdog completes draft report on Clinton probe

Corey Lewandowski on allegations Obama FBI spied on Trump campaign

Drive-By Media At DEFCON 1 Hysteria

DiGenova on Obama’s FBI Placing a Spy Inside Trump Campaign

Rush Limbaugh Podcast Thursday – May 17, 2018

NYT: Russia probe code name inspired by Rolling Stones song

The New York Times reports that FBI agents started an investigation into Russian election interference and President Donald Trump’s 2016 campaign called “Crossfire Hurricane” just 100 days before Election Day.

NYT: How FBI’s Russia probe began

FBI Kept 2016 Investigation Into President Donald Trump Campaign Secret | Morning Joe | MSNBC

Roger Stone Exposes The FBI Mole Inside Trump Campaign

More Details Emerge On Deep State Mole Secretly Spying on President Trump Campaign

BREAKING: New York Times CONFIRMS FBI Conducted SPY OPERATION On President Trump! SPREAD THIS!

Former acting CIA director on Russia hacking report, Trump’s reaction

BREAKING: EX-OBAMA CIA DIR. JUST WENT ROGUE, SAYS THE 1 THING OBAMA DIDN’T WANT YOU TO KNOW

#Trump Will Strike Down With Great Vengeance and Furious Anger Those Who Seek to Poison Our Republic

Why Mueller’s Witch Hunt Is Illegal, Unconstitutional and Crosses the Line

 

Trump: Report that Obama FBI spied on campaign could be ‘bigger than Watergate’

President Trump on Thursday touted a report saying the FBI under former President Obama spied on the Trump campaign during the 2016 presidential race, saying that the revelation could be “bigger than Watergate.”

“Wow, word seems to be coming out that the Obama FBI ‘SPIED ON THE TRUMP CAMPAIGN WITH AN IMBEDDED INFORMANT,'” the president tweeted in reference to a National Review report published last week.

“Andrew McCarthy says, ‘There’s probably no doubt that they had at least one confidential informant in the campaign.’ If so, this is bigger than Watergate!”

The report alleges that Obama-led agencies used their surveillance powers to monitor the Trump campaign.

This is not the first time that the Obama administration has been accused of spying on the Trump campaign.

Last year, Trump accused the former president of wiretapping Trump Tower shortly before the 2016 election.

“Terrible! Just found out that Obama had my ‘wires tapped,’ in Trump Tower just before victory. Nothing found. This is McCarthyism!” the president tweeted in March 2017.

Former White House press secretary Sean Spicer later walked back the president’s claim, saying he did not mean that Obama literally wiretapped Trump Tower.

“The president used the word ‘wiretap’ in quotes to mean broadly surveillance and other activities during that,” Spicer said. “There is no question that the Obama administration, that there were actions about surveillance and other activities that occurred in the 2016 elections.”

http://thehill.com/homenews/administration/388101-trump-report-that-obama-fbi-spied-on-campaign-could-be-bigger-than

10 Key Takeaways From The New York Times’ Error-Ridden Defense Of FBI Spying On Trump Campaign

It’s reasonable to assume that much of the new information in the New York Times report relates to leakers’ fears about information that will be coming out in the inspector general report.
Mollie Hemingway

By 

The New York Times published an article yesterday confirming the United States’ intelligence apparatus was used to spy on Donald Trump’s presidential campaign in 2016.

Here are a few quick takeaways.

1. FBI Officials Admit They Spied On Trump Campaign

The New York Times‘ story, headlined “Code Name Crossfire Hurricane: The Secret Origins of the Trump Investigation,” is a dry and gentle account of the FBI’s launch of extensive surveillance of affiliates of the Trump campaign. Whereas FBI officials and media enablers had previously downplayed claims that the Trump campaign had been surveiled, in this story we learn that it was more widespread than previously acknowledged:

The F.B.I. investigated four unidentified Trump campaign aides in those early months, congressional investigators revealed in February. The four men were Michael T. Flynn, Paul Manafort, Carter Page and Mr. Papadopoulos, current and former officials said…

The F.B.I. obtained phone records and other documents using national security letters — a secret type of subpoena — officials said. And at least one government informant met several times with Mr. Page and Mr. Papadopoulos, current and former officials said.

This is a stunning admission for those Americans worried that federal law enforcement and intelligence agencies might use their powers to surveil, leak against, and target Americans simply for their political views or affiliations. As Sean Davis wrote, “The most amazing aspect about this article is how blasé it is about the fact that the Obama admin was actively spying on four affiliates of a rival political campaign weeks before an election.”

The story says the FBI was worried that if it came out they were spying on Trump campaign it would “only reinforce his claims that the election was being rigged against him.” It is easy to understand how learning that the FBI was spying on one’s presidential campaign might reinforce claims of election-rigging.

2. Terrified About Looming Inspector General Report

People leak for a variety of reasons, including to inoculate themselves as much as they can. For example, only when the secret funders of Fusion GPS’s Russia-Trump-collusion dossier were about to be revealed was their identity leaked to friendly reporters in the Washington Post. In October of 2017 it was finally reported that the Clinton campaign and Democratic National Committee secretly paid for the Russia dossier, hiding the arrangement by funneling the money through a law firm.

The friendly reporters at the Washington Postwrote the story gently, full of reassuring quotes to downplay its significance. The information only came about because House Permanent Select Committee on Intelligence Chairman Devin Nunes subpoenaed the bank records of Fusion GPS, over the objections of Democrats on the committee. Even in this Times story, Clinton’s secret funding was not mentioned.

Likewise, the admissions in this New York Times story are coming out now, years after selective leaks to compliant reporters, just before an inspector general report detailing some of these actions is slated to be released this month. In fact, the Wall Street Journalreported that people mentioned in the report are beginning to get previews of what it alleges. It’s reasonable to assume that much of the new information in the New York Times report relates to information that will be coming out in the inspector general report.

By working with friendly reporters, these leaking FBI officials can ensure the first story about their unprecedented spying on political opponents will downplay that spying and even attempt to justify it. Of note is the story’s claim that very few people even knew about the spying on the Trump campaign in 2016, which means the leakers for this story come from a relatively small pool of people.

3. Still No Evidence of Collusion With Russia

In paragraph 69 of the lengthy story, The New York Times takes itself to task for burying the lede in its October 31, 2016, story about the FBI not finding any proof of involvement with Russian election meddling.

The key fact of the article — that the F.B.I. had opened a broad investigation into possible links between the Russian government and the Trump campaign — was published in the 10th paragraph.

It is somewhat funny, then, to read what The New York Times buries in paragraph 70 of the story:

A year and a half later, no public evidence has surfaced connecting Mr. Trump’s advisers to the hacking or linking Mr. Trump himself to the Russian government’s disruptive efforts.

No evidence of collusion after two years of investigation with unlimited resources? You don’t say! What could that mean?

4. Four Trump Affiliates Spied On

Thanks to the work of the House Permanent Select Committee on Intelligence and the Senate Judiciary Committee, Americans already learned that the FBI had secured a wiretap on Carter Page, a former Trump campaign official. That wiretap, which was renewed three times, was already controversial because it was secured in part through using the secretly funded opposition research document created by the Hillary Clinton campaign and Democratic National Committee. The secret court that grants the wiretap was not told about Hillary Clinton or the DNC when the government applied for the wiretap or its renewals.

Now we learn that it wasn’t just Page, but that the government was going after four campaign affiliates including the former campaign manager, the top foreign policy advisor, and a low-level advisor whose drunken claim supposedly launched the investigation into the campaign. The bureau says Trump’s top foreign policy advisor and future national security advisor — a published critic of Russia — was surveiled because he spoke at an event in Russia sponsored by Russia Today, a government-sponsored media outlet.

5. Wiretaps, National Security Letters, and At Least One Spy

The surveillance didn’t just include wiretaps, but also national security letters and at least one government informant to spy on the campaign.:

The F.B.I. obtained phone records and other documents using national security letters — a secret type of subpoena — officials said. And at least one government informant met several times with Mr. Page and Mr. Papadopoulos, current and former officials said. That has become a politically contentious point, with Mr. Trump’s allies questioning whether the F.B.I. was spying on the Trump campaign or trying to entrap campaign officials.

This paragraph is noteworthy for the way it describes spying on the campaign — “at least one government informant met several times with Mr. Page and Mr. Papadopoulos” — before suggesting that might not be spying. The definition of spying is to secretly collect information, so it’s not really in dispute whether a government informant fits the bill.

Despite two years of investigation and surveillance, none of these men have been charged with anything even approaching treasonous collusion with Russia to steal a U.S. election.

6. More Leaks About a Top-Secret Government Informant

The House Permanent Select Committee on Intelligence recently subpoenaed information from the FBI and Department of Justice. They did not publicly reveal what information they sought, but the Department of Justice responded by claiming that they were being extorted by congressional oversight. Then they leaked that they couldn’t share the information because it would jeopardize the life of a government informant. They also waged a public relations battle against HPSCI Chairman Nunes and committee staff.

But far from holding the information close to the vest, the government has repeatedly leaked information about this informant, and even that it was information about an informant that was being sought by Congress. From leaks of personally identifying information to the Washington Post, we’ve learned that this source works with the FBI and CIA, and is a U.S. citizen.

In The New York Times, additional information about a government informant leaked, including that the source met with Papadopoulos and Page to collect information. The information on an alleged source in the Trump campaign is so sensitive they can’t give it to Congress, but they can leak it to friendly press outlets like the Post and Times. It’s an odd posture for the Justice Department to take.

It is unknown at this point whether the informants were specifically sent by a U.S. agency or global partner, or whether the sources voluntarily provided information to the U.S. government.

7. Ignorance of Basic Facts

One thing that is surprising about the story is how many errors it contains. The problems begin in the second sentence, which claims Peter Strzok and another FBI agent were sent to London. The New York Times reports that “[t]heir assignment, which has not been previously reported, was to meet the Australian ambassador, who had evidence that one of Donald J. Trump’s advisers knew in advance about Russian election meddling.”

Of course, it was previously reported that Strzok had a meeting with the Australian ambassador. He describes the embassy where the meeting took place as the longest continually staffed embassy in London. The ambassador was previously reported to have had some information about a Trump advisor saying he’d heard that Russia had Clinton’s emails.

Another New York Times error was the claim, repeated twice, that Page ‘had previously been recruited by Russian spies.’

It’s also inaccurate to say this was “election meddling,” necessarily. Clinton had deleted 30,000 emails that were housed on her private server even though she was being investigated for mishandling classified information. This could be viewed as destruction of evidence. She claimed the emails had to do with yoga.

FBI Director James Comey specifically downplayed for the public the bureau’s belief that foreign countries had access to these emails. There is no evidence that Russia or any other country had these emails, and they were not released during the campaign. To describe this legitimate national security threat as “election meddling” is insufficient to the very problem for which Clinton was being investigated.

The story claims, “News organizations did not publish Mr. Steele’s reports or reveal the F.B.I.’s interest in them until after Election Day.” That’s demonstrably untrue. Here’s an October 31, 2016, story headlined “A Veteran Spy Has Given the FBI Information Alleging a Russian Operation to Cultivate Donald Trump.” It is sourced entirely to Steele. In September, Yahoo News’ Michael Isikoff took a meeting with Steele then published “U.S. intel officials probe ties between Trump adviser and Kremlin” on September 23, 2016. That story was even used in the Foreign Intelligence Service Act application against Page.

The New York Times writes, “Crossfire Hurricane began exactly 100 days before the presidential election, but if agents were eager to investigate Mr. Trump’s campaign, as the president has suggested, the messages do not reveal it. ‘I cannot believe we are seriously looking at these allegations and the pervasive connections,’ Mr. Strzok wrote soon after returning from London.”

There are multiple problems with this claim. For one, Strzok wrote that text in all caps with obvious eagerness. As the Wall Street Journal noted months ago, “Mr. Strzok emphasized the seriousness with which he viewed the allegations in a message to Ms. Page on Aug. 11, just a few days before the ‘insurance’ text. ‘OMG I CANNOT BELIEVE WE ARE SERIOUSLY LOOKING AT THESE ALLEGATIONS AND THE PERVASIVE CONNECTIONS,’ he texted.”

For another, Strzok repeatedly talked about how important and time-sensitive he felt the investigation was. As Andrew McCarthy highlighted in his deep look at some of these texts, as Strzok prepared for his morning flight to London, he compared the investigations of Clinton and Trump by writing, “And damn this feels momentous. Because this matters. The other one did, too, but that was to ensure that we didn’t F something up. This matters because this MATTERS.”

Another New York Times error was the claim, repeated twice, that Page “had previously been recruited by Russian spies.” In fact, while Russian agents had tried to recruit him, they failed to do so, and Page spoke at length with the FBI about the attempt before the agents were arrested or kicked out of the country.

The New York Times falsely reported that “Mr. Comey met with Mr. Trump privately, revealing the Steele reports and warning that journalists had obtained them.” Comey has told multiple journalists that he specifically did not brief Trump on the Steele reports. He didn’t tell Trump there were reports, or who funded them. He didn’t tell him about the claims in the reports that the campaign was compromised. He only told him that there was a rumor Trump had paid prostitutes to urinate on a Moscow hotel bed that the Obamas had once slept in.

The story also repeats long-debunked claims about the Republican platform and Ukraine.

8. Insurance: How Does It Work?

The story reminds readers that Strzok once texted Page “I want to believe the path you threw out for consideration in Andy’s office — that there’s no way he gets elected, but I’m afraid we can’t take that risk. It’s like an insurance policy in the unlikely event you die before you’re 40.” The article says Trump thought this “insurance policy” referred to a plan to respond to the unlikely event of a Trump victory. It goes on:

But officials have told the inspector general something quite different. They said Ms. Page and others advocated a slower, circumspect pace, especially because polls predicted Mr. Trump’s defeat. They said that anything the F.B.I. did publicly would only give fodder to Mr. Trump’s claims on the campaign trail that the election was rigged.

Mr. Strzok countered that even if Mr. Trump’s chances of victory were low — like dying before 40 — the stakes were too high to justify inaction.

It’s worth asking whether reporters understand how insurance works. As reader Matt noted, “The fundament intent of Insurance is ‘Indemnification.’ Restoring back to original condition prior to loss. Trump was the peril, MSM the adjuster & his impeachment, the policy limits.”

The article’s repeated claims that the FBI didn’t think Trump would win do not counter the notion that an “insurance policy” investigation was in the extremely rare case he might win. People don’t insure their property against fire damage because they expect it to happen so much as they can’t afford to fix things if it does happen.

9. Eavesdropping, Not Spying, And Other Friendly Claims

The story could not be friendlier to the FBI sources who are admitting what they did against the Trump campaign. A few examples:

“[P]rosecutors obtained court approval to eavesdrop on Mr. Page,” The New York Timeswrites, making the wiretapped spying on an American citizen sound almost downright pleasant. When Comey briefs Trump only on the rumor about the prostitutes and urination, we’re told “he feared making this conversation a ‘J. Edgar Hoover-type situation,’ with the F.B.I. presenting embarrassing information to lord over a president-elect.” Reporters don’t ask, much less answer, why someone fearing a J. Edgar Hoover-type situation would go out of his way to create an extreme caricature of a J. Edgar Hoover situation.

The story also claimed, “they kept details from political appointees across the street at the Justice Department,” before using controversial political appointee Sally Yates to claim that there was nothing worrisome. In fact, the subtext of the entire story is that the FBI showed good judgment in its handling of the spying in 2016. Unfortunately, the on-the-record source used to substantiate this claim is Yates.

Yates, who was in the news for claiming with a straight face that she thought Flynn had committed a Logan Act violation, is quoted as saying, “Folks are very, very careful and serious about that [FISA] process. I don’t know of anything that gives me any concerns.” If Yates, who had to be fired for refusing to do her job under Trump, tells you things are on the up and up, apparently you can take it to the bank.

10. Affirms Fears of Politicized Intelligence

This New York Times story may have been designed to inoculate the FBI against revelations coming out of the inspector general report, but the net result was to affirm the fears of many Americans who are worried that the U.S. government’s law enforcement and intelligence agencies abused their powers to surveil and target Americans simply for their political views and affiliations. The gathered information has been leaked to media for years, leading to damaged reputations, and the launch of limitless probes, but not any reason to believe that Trump colluded with Russia to steal an election.

Mollie Ziegler Hemingway is a senior editor at The Federalist. Follow her on Twitter at @mzhemingway

Code Name Crossfire Hurricane: The Secret Origins of the Trump Investigation

Image
Days after the F.B.I. closed its investigation into Hillary Clinton in 2016, agents began scrutinizing the presidential campaign of her Republican rival, Donald J. Trump.CreditAl Drago for The New York Times

WASHINGTON — Within hours of opening an investigation into the Trump campaign’s ties to Russia in the summer of 2016, the F.B.I. dispatched a pair of agents to London on a mission so secretive that all but a handful of officials were kept in the dark.

Their assignment, which has not been previously reported, was to meet the Australian ambassador, who had evidence that one of Donald J. Trump’s advisers knew in advance about Russian election meddling. After tense deliberations between Washington and Canberra, top Australian officials broke with diplomatic protocol and allowed the ambassador, Alexander Downer, to sit for an F.B.I. interview to describe his meeting with the campaign adviser, George Papadopoulos.

The agents summarized their highly unusual interview and sent word to Washington on Aug. 2, 2016, two days after the investigation was opened. Their report helped provide the foundation for a case that, a year ago Thursday, became the special counsel investigation. But at the time, a small group of F.B.I. officials knew it by its code name: Crossfire Hurricane.

The name, a reference to the Rolling Stones lyric “I was born in a crossfire hurricane,” was an apt prediction of a political storm that continues to tear shingles off the bureau. Days after they closed their investigation into Hillary Clinton’s use of a private email server, agents began scrutinizing the campaign of her Republican rival. The two cases have become inextricably linked in one of the most consequential periods in the history of the F.B.I.

 

[Read our briefing on secret government code names]

This month, the Justice Department inspector general is expected to release the findings of its lengthy review of the F.B.I.’s conduct in the Clinton case. The results are certain to renew debate over decisions by the F.B.I. director at the time, James B. Comey, to publicly chastise Mrs. Clinton in a news conference, and then announce the reopening of the investigation days before Election Day. Mrs. Clinton has said those actions buried her presidential hopes.

Those decisions stand in contrast to the F.B.I.’s handling of Crossfire Hurricane. Not only did agents in that case fall back to their typical policy of silence, but interviews with a dozen current and former government officials and a review of documents show that the F.B.I. was even more circumspect in that case than has been previously known. Many of the officials spoke on condition of anonymity because they were not authorized to discuss the investigation publicly.

Agents considered, then rejected, interviewing key Trump associates, which might have sped up the investigation but risked revealing the existence of the case. Top officials quickly became convinced that they would not solve the case before Election Day, which made them only more hesitant to act. When agents did take bold investigative steps, like interviewing the ambassador, they were shrouded in secrecy.

Fearful of leaks, they kept details from political appointees across the street at the Justice Department. Peter Strzok, a senior F.B.I. agent, explained in a text that Justice Department officials would find it too “tasty” to resist sharing. “I’m not worried about our side,” he wrote.

Only about five Justice Department officials knew the full scope of the case, officials said, not the dozen or more who might normally be briefed on a major national security case.

The facts, had they surfaced, might have devastated the Trump campaign: Mr. Trump’s future national security adviser was under investigation, as was his campaign chairman. One adviser appeared to have Russian intelligence contacts. Another was suspected of being a Russian agent himself.

In the Clinton case, Mr. Comey has said he erred on the side of transparency. But in the face of questions from Congress about the Trump campaign, the F.B.I. declined to tip its hand. And when The New York Times tried to assess the state of the investigation in October 2016, law enforcement officials cautioned against drawing any conclusions, resulting in a story that significantly played down the case.

Mr. Comey has said it is unfair to compare the Clinton case, which was winding down in the summer of 2016, with the Russia case, which was in its earliest stages. He said he did not make political considerations about who would benefit from each decision.

But underpinning both cases was one political calculation: that Mrs. Clinton would win and Mr. Trump would lose. Agents feared being seen as withholding information or going too easy on her. And they worried that any overt actions against Mr. Trump’s campaign would only reinforce his claims that the election was being rigged against him.

The F.B.I. now faces those very criticisms and more. Mr. Trump says he is the victim of a politicized F.B.I. He says senior agents tried to rig the election by declining to prosecute Mrs. Clinton, then drummed up the Russia investigation to undermine his presidency. He has declared that a deeply rooted cabal — including his own appointees — is working against him.

That argument is the heart of Mr. Trump’s grievances with the federal investigation. In the face of bipartisan support for the special counsel, Robert S. Mueller III, Mr. Trump and his allies have made a priority of questioning how the investigation was conducted in late 2016 and trying to discredit it.

“It’s a witch hunt,” Mr. Trump said last month on Fox News. “And they know that, and I’ve been able to message it.”

Congressional Republicans, led by Representative Devin Nunes of California, have begun to dig into F.B.I. files, looking for evidence that could undermine the investigation. Much remains unknown and classified. But those who saw the investigation up close, and many of those who have reviewed case files in the past year, say that far from gunning for Mr. Trump, the F.B.I. could actually have done more in the final months of 2016 to scrutinize his campaign’s Russia ties.

“I never saw anything that resembled a witch hunt or suggested that the bureau’s approach to the investigation was politically driven,” said Mary McCord, a 20-year Justice Department veteran and the top national security prosecutor during much of the investigation’s first nine months.

Crossfire Hurricane spawned a case that has brought charges against former Trump campaign officials and more than a dozen Russians. But in the final months of 2016, agents faced great uncertainty — about the facts, and how to respond.

Image
A Trump campaign rally in August 2016 in Texas. Crossfire Hurricane began exactly 100 days before the presidential election.CreditDamon Winter/The New York Times

Anxiety at the Bureau

Crossfire Hurricane began exactly 100 days before the presidential election, but if agents were eager to investigate Mr. Trump’s campaign, as the president has suggested, the messages do not reveal it. “I cannot believe we are seriously looking at these allegations and the pervasive connections,” Mr. Strzok wrote soon after returning from London.

The mood in early meetings was anxious, former officials recalled. Agents had just closed the Clinton investigation, and they braced for months of Republican-led hearings over why she was not charged. Crossfire Hurricane was built around the same core of agents and analysts who had investigated Mrs. Clinton. None was eager to re-enter presidential politics, former officials said, especially when agents did not know what would come of the Australian information.

The question they confronted still persists: Was anyone in the Trump campaign tied to Russian efforts to undermine the election?

The F.B.I. investigated four unidentified Trump campaign aides in those early months, congressional investigators revealed in February. The four men were Michael T. Flynn, Paul Manafort, Carter Page and Mr. Papadopoulos, current and former officials said. Each was scrutinized because of his obvious or suspected Russian ties.

 

[Here are the key themes, dates and characters in the Russia investigation]

Mr. Flynn, a top adviser, was paid $45,000 by the Russian government’s media arm for a 2015 speech and dined at the arm of the Russian president, Vladimir V. Putin. Mr. Manafort, the campaign chairman, had lobbied for pro-Russia interests in Ukraine and worked with an associate who has been identified as having connections to Russian intelligence.

Mr. Page, a foreign policy adviser, was well known to the F.B.I. He had previously been recruited by Russian spies and was suspected of meeting one in Moscow during the campaign.

Lastly, there was Mr. Papadopoulos, the young and inexperienced campaign aide whose wine-fueled conversation with the Australian ambassador set off the investigation. Before hacked Democratic emails appeared online, he had seemed to know that Russia had political dirt on Mrs. Clinton. But even if the F.B.I. had wanted to read his emails or intercept his calls, that evidence was not enough to allow it. Many months passed, former officials said, before the F.B.I. uncovered emails linking Mr. Papadopoulos to a Russian intelligence operation.

Mr. Trump was not under investigation, but his actions perplexed the agents. Days after the stolen Democratic emails became public, he called on Russia to uncover more. Then news broke that Mr. Trump’s campaign had pushed to change the Republican platform’s stance on Ukraine in ways favorable to Russia.

The F.B.I.’s thinking crystallized by mid-August, after the C.I.A. director at the time, John O. Brennan, shared intelligence with Mr. Comey showing that the Russian government was behind an attack on the 2016 presidential election. Intelligence agencies began collaborating to investigate that operation. The Crossfire Hurricane team was part of that group but largely operated independently, three officials said.

Senator Marco Rubio, Republican of Florida, said that after studying the investigation as a member of the Senate Intelligence Committee, he saw no evidence of political motivation in the opening of the investigation.

“There was a growing body of evidence that a foreign government was attempting to interfere in both the process and the debate surrounding our elections, and their job is to investigate counterintelligence,” he said in an interview. “That’s what they did.”

Andrew G. McCabe in December in Washington. Mr. McCabe, the former deputy F.B.I. director, was cited by internal investigators for dishonesty, giving ammunition for Mr. Trump’s claims that the F.B.I. cannot be trusted.CreditChip Somodevilla/Getty Images

Abounding Criticism

Looking back, some inside the F.B.I. and the Justice Department say that Mr. Comey should have seen the political storm coming and better sheltered the bureau. They question why he consolidated the Clinton and Trump investigations at headquarters, rather than in a field office. And they say he should not have relied on the same team for both cases. That put a bull’s-eye on the heart of the F.B.I. Any misstep in either investigation made both cases, and the entire bureau, vulnerable to criticism.

And there were missteps. Andrew G. McCabe, the former deputy F.B.I. director, was cited by internal investigators for dishonesty about his conversations with reporters about Mrs. Clinton. That gave ammunition for Mr. Trump’s claims that the F.B.I. cannot be trusted. And Mr. Strzok and Lisa Page, an F.B.I. lawyer, exchanged texts criticizing Mr. Trump, allowing the president to point to evidence of bias when they became public.

The messages were unsparing. They questioned Mr. Trump’s intelligence, believed he promoted intolerance and feared he would damage the bureau.

The inspector general’s upcoming report is expected to criticize those messages for giving the appearance of bias. It is not clear, however, whether inspectors found evidence supporting Mr. Trump’s assertion that agents tried to protect Mrs. Clinton, a claim the F.B.I. has adamantly denied.

Mr. Rubio, who has reviewed many of the texts and case files, said he saw no signs that the F.B.I. wanted to undermine Mr. Trump. “There might have been individual agents that had views that, in hindsight, have been problematic for those agents,” Mr. Rubio said. “But whether that was a systemic effort, I’ve seen no evidence of it.”

Mr. Trump’s daily Twitter posts, though, offer sound-bite-sized accusations — witch hunt, hoax, deep state, rigged system — that fan the flames of conspiracy. Capitol Hill allies reliably echo those comments.

“It’s like the deep state all got together to try to orchestrate a palace coup,” Representative Matt Gaetz, Republican of Florida, said in January on Fox Business Network.

The Kremlin in Moscow. Two weeks before Mr. Trump’s inauguration, senior American intelligence officials told him that Russia had tried to sow chaos in the election, undermine Mrs. Clinton and ultimately help Mr. Trump win.CreditMladen Antonov/Agence France-Presse — Getty Images

Cautious Intelligence Gathering

Counterintelligence investigations can take years, but if the Russian government had influence over the Trump campaign, the F.B.I. wanted to know quickly. One option was the most direct: interview the campaign officials about their Russian contacts.

That was discussed but not acted on, two former officials said, because interviewing witnesses or subpoenaing documents might thrust the investigation into public view, exactly what F.B.I. officials were trying to avoid during the heat of the presidential race.

“You do not take actions that will unnecessarily impact an election,” Sally Q. Yates, the former deputy attorney general, said in an interview. She would not discuss details, but added, “Folks were very careful to make sure that actions that were being taken in connection with that investigation did not become public.”

Mr. Comey was briefed regularly on the Russia investigation, but one official said those briefings focused mostly on hacking and election interference. The Crossfire Hurricane team did not present many crucial decisions for Mr. Comey to make.

Top officials became convinced that there was almost no chance they would answer the question of collusion before Election Day. And that made agents even more cautious.

The F.B.I. obtained phone records and other documents using national security letters — a secret type of subpoena — officials said. And at least one government informant met several times with Mr. Page and Mr. Papadopoulos, current and former officials said. That has become a politically contentious point, with Mr. Trump’s allies questioning whether the F.B.I. was spying on the Trump campaign or trying to entrap campaign officials.

Looking back, some at the Justice Department and the F.B.I. now believe that agents could have been more aggressive. They ultimately interviewed Mr. Papadopoulos in January 2017 and managed to keep it a secret, suggesting they could have done so much earlier.

“There is always a high degree of caution before taking overt steps in a counterintelligence investigation,” said Ms. McCord, who would not discuss details of the case. “And that could have worked to the president’s benefit here.”

Such tactical discussions are reflected in one of Mr. Strzok’s most controversial texts, sent on Aug. 15, 2016, after a meeting in Mr. McCabe’s office.

“I want to believe the path you threw out for consideration in Andy’s office — that there’s no way he gets elected,” Mr. Strzok wrote, “but I’m afraid we can’t take that risk. It’s like an insurance policy in the unlikely event you die before you’re 40.”

Mr. Trump says that message revealed a secret F.B.I. plan to respond to his election. “‘We’ll go to Phase 2 and we’ll get this guy out of office,’” he told The Wall Street Journal. “This is the F.B.I. we’re talking about — that is treason.”

But officials have told the inspector general something quite different. They said Ms. Page and others advocated a slower, circumspect pace, especially because polls predicted Mr. Trump’s defeat. They said that anything the F.B.I. did publicly would only give fodder to Mr. Trump’s claims on the campaign trail that the election was rigged.

Mr. Strzok countered that even if Mr. Trump’s chances of victory were low — like dying before 40 — the stakes were too high to justify inaction.

Mr. Strzok had similarly argued for a more aggressive path during the Clinton investigation, according to four current and former officials. He opposed the Justice Department’s decision to offer Mrs. Clinton’s lawyers immunity and negotiate access to her hard drives, the officials said. Mr. Strzok favored using search warrants or subpoenas instead.

In both cases, his argument lost.

As agents tried to corroborate information from the retired British spy Christopher Steele, reporters began calling the F.B.I., asking whether the accusations in his reports were accurate.CreditAl Drago for The New York Times

Policy and Tradition

The F.B.I. bureaucracy did agents no favors. In July, a retired British spy named Christopher Steele approached a friend in the F.B.I. overseas and provided reports linking Trump campaign officials to Russia. But the documents meandered around the F.B.I. organizational chart, former officials said. Only in mid-September, congressional investigators say, did the records reach the Crossfire Hurricane team.

Mr. Steele was gathering information about Mr. Trump as a private investigator for Fusion GPS, a firm paid by Democrats. But he was also considered highly credible, having helped agents unravel complicated cases.

In October, agents flew to Europe to interview him. But Mr. Steele had become frustrated by the F.B.I.’s slow response. He began sharing his findings in September and October with journalists at The New York Times, The Washington Post, The New Yorker and elsewhere, according to congressional testimony.

So as agents tried to corroborate Mr. Steele’s information, reporters began calling the bureau, asking about his findings. If the F.B.I. was working against Mr. Trump, as he asserts, this was an opportunity to push embarrassing information into the news media shortly before the election.

That did not happen. Most news organizations did not publish Mr. Steele’s reports or reveal the F.B.I.’s interest in them until after Election Day.

Congress was also increasingly asking questions. Mr. Brennan, the C.I.A. director, had briefed top lawmakers that summer about Russian election interference and intelligence that Moscow supported the Trump campaign — a finding that would not become public for months. Lawmakers clamored for information from Mr. Comey, who refused to answer public questions.

Many Democrats see rueful irony in this moment. Mr. Comey, after all, broke with policy and twice publicly discussed the Clinton investigation. Yet he refused repeated requests to discuss the Trump investigation.

Mr. Comey has said he regrets his decision to chastise Mrs. Clinton as “extremely careless,” even as he announced that she should not be charged. But he stands by his decision to alert Congress, days before the election, that the F.B.I. was reopening the Clinton inquiry.

The result, though, is that Mr. Comey broke with both policy and tradition in Mrs. Clinton’s case, but hewed closely to the rules for Mr. Trump. Representative Adam B. Schiff of California, the top Democrat on the House Intelligence Committee, said that alone proves Mr. Trump’s claims of unfairness to be “both deeply at odds with the facts, and damaging to our democracy.”

Carter Page in December 2016. He had previously been recruited by Russian spies and was suspected of meeting one in Moscow during the 2016 presidential campaign.CreditPavel Golovkin/Associated Press

Spying in Question

Crossfire Hurricane began with a focus on four campaign officials. But by mid-fall 2016, Mr. Page’s inquiry had progressed the furthest. Agents had known Mr. Page for years. Russian spies tried to recruit him in 2013, and he was dismissive when agents warned him about it, a half-dozen current and former officials said. That warning even made its way back to Russian intelligence, leaving agents suspecting that Mr. Page had reported their efforts to Moscow.

Relying on F.B.I. information and Mr. Steele’s, prosecutors obtained court approval to eavesdrop on Mr. Page, who was no longer with the Trump campaign.

That warrant has become deeply contentious and is crucial to Republican arguments that intelligence agencies improperly used Democratic research to help justify spying on the Trump campaign. The inspector general is reviewing that claim.

Ms. Yates, the deputy attorney general under President Barack Obama, signed the first warrant application. But subsequent filings were approved by members of Mr. Trump’s own administration: the acting attorney general, Dana J. Boente, and then Rod J. Rosenstein, the deputy attorney general.

“Folks are very, very careful and serious about that process,” Ms. Yates said. “I don’t know of anything that gives me any concerns.”

After months of investigation, Mr. Papadopoulos remained largely a puzzle. And agents were nearly ready to close their investigation of Mr. Flynn, according to three current and former officials. (Mr. Flynn rekindled the F.B.I.’s interest in November 2016 by signing an op-ed article that appeared to be written on behalf of the Turkish government, and then making phone calls to the Russian ambassador that December.)

In late October, in response to questions from The Times, law enforcement officials acknowledged the investigation but urged restraint. They said they had scrutinized some of Mr. Trump’s advisers but had found no proof of any involvement with Russian hacking. The resulting article, on Oct. 31, reflected that caution and said that agents had uncovered no “conclusive or direct link between Mr. Trump and the Russian government.”

The key fact of the article — that the F.B.I. had opened a broad investigation into possible links between the Russian government and the Trump campaign — was published in the 10th paragraph.

A year and a half later, no public evidence has surfaced connecting Mr. Trump’s advisers to the hacking or linking Mr. Trump himself to the Russian government’s disruptive efforts. But the article’s tone and headline — “Investigating Donald Trump, F.B.I. Sees No Clear Link to Russia” — gave an air of finality to an investigation that was just beginning.

Democrats say that article pre-emptively exonerated Mr. Trump, dousing chances to raise questions about the campaign’s Russian ties before Election Day.

Just as the F.B.I. has been criticized for its handling of the Trump investigation, so too has The Times.

For Mr. Steele, it dashed his confidence in American law enforcement. “He didn’t know what was happening inside the F.B.I.,” Glenn R. Simpson, the founder of Fusion GPS, testified this year. “And there was a concern that the F.B.I. was being manipulated for political ends by the Trump people.”

James B. Comey, the former F.B.I. director, in January 2017. He assured Mr. Trump, who at the time was the president-elect, that the bureau intended to protect him as Mr. Steele’s reports were about to be published by news outlets.CreditAl Drago/The New York Times

Assurances Amid Doubt

Two weeks before Mr. Trump’s inauguration, senior American intelligence officials briefed him at Trump Tower in Manhattan on Russian hacking and deception. They reported that Mr. Putin had tried to sow chaos in the election, undermine Mrs. Clinton and ultimately help Mr. Trump win.

Then Mr. Comey met with Mr. Trump privately, revealing the Steele reports and warning that journalists had obtained them. Mr. Comey has said he feared making this conversation a “J. Edgar Hoover-type situation,” with the F.B.I. presenting embarrassing information to lord over a president-elect.

In a contemporaneous memo, Mr. Comey wrote that he assured Mr. Trump that the F.B.I. intended to protect him on this point. “I said media like CNN had them and were looking for a news hook,” Mr. Comey wrote of Mr. Steele’s documents. “I said it was important that we not give them the excuse to write that the F.B.I. had the material.”

Mr. Trump was not convinced — either by the Russia briefing or by Mr. Comey’s assurances. He made up his mind before Mr. Comey even walked in the door. Hours earlier, Mr. Trump told The Times that stories about Russian election interference were being pushed by his adversaries to distract from his victory.

And he debuted what would quickly become a favorite phrase: “This is a political witch hunt.”

Correction: 

An earlier version of this article misstated that news organizations did not report on the findings of the retired British spy Christopher Steele about links between Trump campaign officials and Russia. While most news organizations whose reporters met with Mr. Steele did not publish such reports before the 2016 election, Mother Jones magazine did.

Reporting was contributed by Michael S. Schmidt, Sharon LaFraniere, Mark Mazzetti and Matthew Rosenberg.

Follow Adam Goldman and Nicholas Fandos on Twitter: @adamgoldmanNYT and @npfandos.

A version of this art

The Russia Investigation Is Complicated. Here’s What It All Means.

The special counsel is investigating events that span years and cross international borders.

Image
Robert S. Mueller III, the special counsel overseeing the Russia investigation.CreditDoug Mills/The New York Times

THE BASICS

  • Russia carried out a campaign to influence the outcome of the 2016 American presidential election, denigrating Hillary Clinton and boosting Donald J. Trump, according to American intelligence agencies. President Vladimir V. Putin of Russia personally ordered it.

  • The F.B.I., citing four Trump campaign aides’ ties to Russia, opened a counterintelligence investigation in the summer of 2016 to determine whether Trump associates aided Russia’s election interference.

  • Robert S. Mueller III, the former F.B.I. director, was appointed the special counsel in May 2017 to take over the investigation. The inquiry has expanded to examine whether President Trump tried to obstruct the investigation itself.

  • Nineteen people — including four Trump associates — and three companies have been indicted in the case. Five have pleaded guilty; 13 are Russians accused of meddling in the election. [See a breakdown of the charges here.]


THE MAJOR FOCUSES OF THE INVESTIGATION

Interference

Mr. Mueller is investigating Russia’s efforts to influence the presidential race and sow discord by spreading inflammatory messages on social media and stealing emails from Mrs. Clinton’s campaign chairman and the Democratic National Committee, which were then strategically released to undermine the Clinton campaign.

Coordination

Investigators are examining what Mr. Trump’s aides and associates knew about Russia’s meddling, particularly the release of thousands of stolen Democratic emails, and whether any of them aided Moscow’s effort.

Obstruction

Mr. Mueller is investigating an array of the president’s actions — including the firing of the former F.B.I. director, James B. Comey — to determine whether Mr. Trump sought to impede the investigation into Russia’s actions.

Foreign Influence

Mr. Mueller is investigating whether Trump associates ran afoul of American lobbying or anti-corruption laws. Two aides to the Trump campaign, including its onetime chairman, were charged with financial crimes related to their work as advisers to a pro-Russia former president of Ukraine.

https://www.nytimes.com/2018/05/16/us/politics/russia-investigation-guide.html

National security letter

From Wikipedia, the free encyclopedia
Green herb with a few tiny yellow-white flowers
Three small white and yellow flowers before green-leaf background
A National security letter issued to the Internet Archive demanding information about a user

A national security letter (NSL) is an administrative subpoena issued by the United States government to gather information for national security purposes.[citation needed] NSLs do not require prior approval from a judge. The Stored Communications ActFair Credit Reporting Act, and Right to Financial Privacy Act authorize the United States government to seek such information that is “relevant” to authorized national security investigations. By law, NSLs can request only non-content information, for example, transactional records and phone numbers dialed, but never the content of telephone calls or e-mails.[1]

NSLs typically contain a nondisclosure requirement forbidding the recipient of an NSL from disclosing that the FBI had requested the information.[2] The nondisclosure provision must be authorized by the Director of the FBI, and only after he or she certifies “that otherwise there may result a danger to the national security of the United States, interference with a criminal, counterterrorism, or counterintelligence investigation, interference with diplomatic relations, or danger to the life or physical safety of any person.”[3] Even then, the recipient of the NSL may still challenge the nondisclosure provision in federal court.[4]

The constitutionality of such nondisclosure provisions has been repeatedly challenged. The requirement was initially ruled to be unconstitutional as an infringement of free speech in the Doe v. Gonzales case, but that decision was later vacated in 2008 by the Second Circuit Court of Appeals after it held the USA PATRIOT Improvement and Reauthorization Act gave the recipient of an NSL that included a nondisclosure provision the right to challenge the nondisclosure provision in federal court. In March 2013, a judge in the Northern District of California held the nondisclosure provision in an NSL was unconstitutional. But on August 24, 2015, the Ninth Circuit Court of Appeals vacated the district court’s decision and remanded the case to the district court for further proceedings. On remand, the district court held the “NSLs were issued in full compliance with the procedural and substantive requirements suggested by the Second Circuit in John Doe, Inc. v. Mukasey, 549 F.3d 861 (2d Cir. 2008), which had held that the 2006 NSL law could be constitutionally applied” … and “the NSL law, as amended [by the USA FREEDOM ACT of 2015], was constitutional.” The two petitioners then appealed. On appeal, the Ninth Circuit Court of Appeals upheld the district court ruling, holding that NSLs are constitutional, and stated, “the nondisclosure requirement does not run afoul of the First Amendment.” Under Seal v. Jefferson B. Sessions, III, Attorney General, Nos. 16-16067, 16-16081, and 16-16082, July 17, 2017.

History

The oldest NSL provisions were created in 1978 as a little-used investigative tool in terrorism and espionage investigations to obtain financial records. Under the Right to Financial Privacy Act (RFPA), part of the Financial Institutions Regulatory and Interest Rate Control Act of 1978), the FBI could obtain the records only if the FBI could first demonstrate the person was a foreign power or an agent of a foreign power. Compliance by the recipient of the NSL was voluntary, and states’ consumer privacy laws often allowed financial institutions to reject the requests.[5] In 1986, Congress amended RFPA to allow the government to request disclosure of the requested information. In 1986, Congress passed the Electronic Communications Privacy Act (ECPA), part of the Stored Communications Act), which created provisions similar to the RFPA that allowed the FBI to issue NSLs. Still, neither RFPA or ECPA act included penalties for not complying with the NSL. A 1993 amendment removed the restriction regarding “foreign powers” and allowed the use of NSLs to request information concerning persons who are not the direct subject of the investigation.

In 2001, section 505 of the USA PATRIOT Act expanded the use of the NSLs. In March 2006, the USA PATRIOT Improvement and Reauthorization Act allowed for judicial review of an NSL. A federal judge could repeal or modify an NSL if the court found the request for information was “unreasonable, oppressive, or otherwise unlawful.” The nondisclosure provision the government could include in an NSL was also weakened. The court could repeal the nondisclosure provision if it found it had been made in bad faith. Other amendments allowed the recipient of an NSL to inform their attorney about the request and the government had to rely on the courts to enforce compliance with an NSL.

Patriot Act

Section 505 of the USA PATRIOT Act (2001) allowed the use of the NSLs when seeking information “relevant” in authorized national security investigations to protect against international terrorism or clandestine intelligence activities. The act also provided the Department of Defense when conducting a law enforcement investigation, counterintelligence inquiry, or security determination. The Central Intelligence Agency has also allegedly issued NSLs.[6] The Patriot Act reauthorization statutes passed during the 109th Congress added potential penalties for failure to comply with an NSL or disclosing an NSL if the NSL included a nondisclosure provision.

Contentious aspects

Two contentious aspects of NSLs are the nondisclosure provision and judicial oversight when the FBI issues an NSL. When the Director of the FBI (or his designee) authorizes the inclusion of a nondisclosure provision in an NSL, the recipient may face criminal prosecution if it reveals the contents of the NSL or that it was received. The purpose of a nondisclosure provision is to prevent the recipient of an NSL from compromising both the current FBI investigation involving a specific person and future investigations as well (see 18 U.S.C. 2709), which could fetter the Government’s efforts to address national security threats.[7] An NSL recipient (later revealed to be Nicholas Merrill[8][9]) writing in The Washington Post said,

“[L]iving under the gag order has been stressful and surreal. Under the threat of criminal prosecution, I must hide all aspects of my involvement in the case…from my colleagues, my family and my friends. When I meet with my attorneys I cannot tell my girlfriend where I am going or where I have been.”[7]

Like other administrative subpoenas, NSLs do not require judicial approval. For NSLs, that is because the U.S. Supreme Court has held the types of information the FBI obtains with NSLs provide no constitutionally protected reasonable expectation of privacy. Because a person has already provided the information to a third party, e.g., their telephone company, they no longer have a reasonable expectation of privacy to the information, and therefore there is no Fourth Amendment requirement to obtain a judge’s approval to obtain the information.[10] Nonetheless, the recipient of the NSL may still challenge the nondisclosure provision in federal court.[11]

The media reported in 2007 that a government audit found the FBI had violated the rules more than 1,000 times in an audit of 10% of its national investigations between 2002 and 2007.[12] Twenty such incidents involved requests by agents for information not permitted under the law. A subsequent report in 2014 by the Justice Department Office of Inspector General concluded the FBI had corrected its practices and that NSLs complied federal statutes.

According to 2,500 pages of documents the FBI provided to the Electronic Frontier Foundation in response to a Freedom of Information Act lawsuit, the FBI had used NSLs to obtain information about individuals who were the subject of an FBI terrorism or counterintelligence investigation and information from telecommunications companies about individuals with whom the subject of the investigation had communicated. According to a September 9, 2007, New York Times report,

“In many cases, the target of a[n FBI] national security letter whose records are being sought is not necessarily the actual subject of a terrorism investigation. Under the USA PATRIOT Act, the FBI must assert only that the records gathered through the letter are considered relevant to a terrorism [or counterintelligence] investigation.”[13]

In April 2008, the American Civil Liberties Union alleged that the military was using the FBI to skirt legal restrictions on domestic surveillance to obtain private records of Americans’ Internet service providers, financial institutions, and telephone companies. The ACLU based its allegation on a review of more than 1,000 documents provided by the Defense Department. The Department of Justice Office of Inspector General later determined the Department of Defense (not the FBI) had lawfully obtained the information under the National Security Act of 1947, not through NSLs.

Doe v. Ashcroft

Letter in Doe v. Ashcroft case

The lack of judicial oversight and the Supreme Court ruling in Smith v. Maryland was the core of Doe v. Ashcroft, a test case brought by the ACLU concerning the use of NSLs. The lawsuit was file on behalf of “John Doe” plaintiff Nicholas Merrill, founder of Calyx Internet Access,[14] who had received an NSL. The action challenged the constitutionality of NSLs, specifically the nondisclosure provision. At the district court, Judge of the Southern District of New York held in September 2004 that NSLs violated the Fourth Amendment (“it has the effect of authorizing coercive searches effectively immune from any judicial process”) and First Amendment. However, Judge Marrero stayed his ruling while the case proceeded to the court of appeals.

Because of the New York district court ruling, while the case was still on appeal, Congress amended the USA PATRIOT Act to provide for more judicial review of NSLs and clarified the NSL nondisclosure provision.[15] Based on the U.S. Supreme Court rulings, there is still no requirement to seek judicial approval for the FBI issuing an NSL.

The government appealed Judge Marrero’s decision to the Second Circuit Court of Appeals, which heard arguments in May 2006. In March 2008, the Second Circuit ruled that nondisclosure provisions were permissible only when the FBI certified that disclosure may result in certain statutorily enumerated harms (see, e.g., 18 U.S.C. 2709), and held the nondisclosure provision to a strict scrutiny standard. The Second Circuit then returned the case to the district court based on amendments to the USA PATRIOT Act that Congress had enacted while the case had been on appeal.

Letter in the Doe v. Gonzales case

Another effect of Doe v. Ashcroft was increased congressional oversight. The amendments to the USA PATRIOT Act mentioned above included requirements for semiannual reporting to Congress. Although the reports are classified, a nonclassified accounting of how many NSLs are issued is also required. On April 28, 2006, the Department of Justice reported to the House and Senate that in calendar year 2005, “The Government made requests for certain information concerning 3,501 United States persons pursuant to NSLs. During this period, the total number of NSL requests … for information concerning U.S. persons totaled 9,254.”[16]

In 2010, the FBI agreed to lift partially the nondisclosure provision to allow Merrill to reveal his identity.[17] Merrill has since created a corporation for the purposes of educating and researching privacy issues.[18]

On August 28, 2015, Judge Marrero rescinded the nondisclosure provision associated with the NSL Merrill had received, thereby allowing him to speak about the contents of the NSL. On November 30, 2015, the unredacted court ruling was published in full.[19]

See also

References

  1. Jump up^ USA PATRIOT Improvement and Reauthorization Act of 2005: A Legal AnalysisCongressional Research Service‘s report for Congress, Brian T. Yeh, Charles Doyle, December 21, 2006.
  2. Jump up^ Bustillos, Maria (June 27, 2013). “What It’s Like to Get a National-Security Letter”The New Yorker.
  3. Jump up^ 18 U.S.C.§ 2709(c)
  4. Jump up^ 18 U.S.C.§ 3511
  5. Jump up^ Andrew E. Nieland, National Security Letters and the Amended Patriot Act, 92 Cornell L. Rev. 1201, 1207 (2007) [1]
  6. Jump up^ Lichtblau, Eric; Mezzetti, Mark (January 14, 2007). Military Expands Intelligence Role in U.S. “Military Expands Intelligence Role in U.S.”Check |url= value (help)The New York Times.
  7. Jump up to:ab My National Security LetterThe Washington Post, 2007 Mar 23
  8. Jump up^ John Doe’ Who Fought FBI Spying Freed From Gag Order After 6 YearsKim Zetter, Wired.com, 2010 8 10
  9. Jump up^ “Doe v. Holder (Challenging Patriot Act’s National Security Letter provision and associated gag provision)”S.D.N.Y. 04 Civ. 2614 (VM) (direct). NYCLU (New York Civil Liberties Union). Archived from the original on 2010-11-13.
  10. Jump up^ Smith v. Maryland, 442 U.S. 735 (1979); Fourth Amendment, U.S. Const.
  11. Jump up^ 18 U.S.C. § 3511
  12. Jump up^ “FBI agents broke the rules 1,000 times”RTÉ News Online. 2007-06-14. Retrieved 2007-06-14.
  13. Jump up^ Lichtblau, Eric (2007-09-08). “F.B.I. Data Mining Reached Beyond Target Suspects”. The New York Times.
  14. Jump up^ “ACLU Sues Over Internet Privacy”cbsnews.com.
  15. Jump up^ “Congress.gov – Library of Congress”thomas.loc.gov.
  16. Jump up^ Report of Foreign Intelligence Surveillance ActArchived 2006-06-29 at the Wayback Machine., United States Department of Justice
  17. Jump up^ McLaughlin, Jenna (14 September 2015). “Federal Court Lifts National Security Letter Gag Order; First Time in 14 Years”. The Intercept. Retrieved 16 September 2015.
  18. Jump up^ “National Security Letters and Gag Orders: Transcript”. On the Media. January 21, 2011. Although you’re allowed to challenge the gag every year now under the new [amended] law, the last time I did it, the government presented secret evidence that only they and the judge could see, and my attorneys could not see, and therefore could not challenge. It does kind of add up to a lot of responsibility, and that’s part of what motivated me to start my nonprofit organization, the Calyx Institute. Part of it is to defend people who are gagged. Part of it is also to promote best practices among telecommunications companies in regards to the privacy of customer data.
  19. Jump up^ “Nicholas Merrill able to reveal the national security letter previously undisclosed”Information Society Project. Yale University. Retrieved 2015-11-30.

External links

https://en.wikipedia.org/wiki/National_security_letter

 

Indictment

From Wikipedia, the free encyclopedia

An indictment (/ɪnˈdtmənt/ in-DYT-mənt) is a formal accusation that a person has committed a crime. In jurisdictions that use the concept of felonies, the most serious criminal offence is a felony; jurisdictions that do not use the concept of felonies often use that of an indictable offence—an offence that requires an indictment.

Historically, in most common law jurisdictions, an indictment was handed up by a grand jury, which returned a “true bill” if it found cause to make the charge, or “no bill” if it did not find cause.

Indictments by country

India

The criminal law in India[1] is derived from the colonial-era British system, does not use a jury system and is codified in the Criminal Procedure Code (CrPC). Criminal offenses are divided into two broad categories: cognisable offenses and non-cognisable offenses. The police are empowered to start investigating a cognisable offense. The complaint is considered merely an accusation. However, in both cognisable and non-cognisable offenses, the trial starts only with the “Framing of Charges” similar to the concept of indictment. The trial court does not proceed with the trial if the evidence is insufficient to make out a charge.

United Kingdom

England and Wales

In England and Wales (except in private prosecutions by individuals) an indictment is issued by the public prosecutor (in most cases this will be the Crown Prosecution Service) on behalf of the Crown, which is the nominal plaintiff in all public prosecutions under English law. This is why a public prosecution of a person whose surname is Smith would be referred to in writing as “R v Smith” (or alternatively as “Regina v Smith” or “Rex v Smith” depending on the gender of the Sovereign, Regina and Rex being Latin for “Queen” and “King” and in either case may informally be pronounced as such) and when cited orally in court would be pronounced “the Crown against Smith”.[2][3]

All proceedings on indictment must be brought before the Crown Court.[4] By virtue of practice directions issued under section 75(1) of the Supreme Court Act 1981, an indictment must be tried by a High Court judge, a Circuit judge or a recorder (which of these it is depends on the offence).

As to the form of an indictment, see the Indictments Act 1915 and the Indictment Rules 1971 made thereunder.

The Indictment Rules 1971 were revoked by the Criminal Procedure (Amendment) Rules 2007[5] (on the whole) incorporated into the Criminal Procedure Rules 2010.[6] The form and content and the service of an indictment are governed by Rule 14 of the CPR 2012.[7]Additional guidance is contained in the Consolidated Criminal Practice Direction Part IV.34.[8]

As to the preferring of a bill of indictment and the signing of an indictment, see section 2 of the Administration of Justice (Miscellaneous Provisions) Act 1933 and the Indictments (Procedure) Rules 1971 (S.I. 1971/2084) made thereunder, as amended and modified by the Indictments (Procedure) (Amendment) Rules 1983 (S.I. 1983/284), the Indictments (Procedure) (Amendment) Rules 1988 (S.I. 1988/1783), the Indictments (Procedure) (Amendment) Rules 1992 (S.I. 1992/284), the Indictments (Procedure) (Amendment) Rules 1997 (S.I. 1997/711), the Indictments (Procedure) (Modification) Rules 1998 (S.I. 1998/3045) and the Indictments (Procedure) (Amendment) Rules 2000 (S.I. 2000/3360).

Northern Ireland[

See the Indictments Act (Northern Ireland) 1945.[9]

Scotland

In Scotland, all of these cases brought in the High Court of Justiciary are brought in the name of the Lord Advocate and will be tried on Indictment. In the Sheriff Court where trials proceed using the Solemn procedure they will also be tried on indictment and are brought in the name of the Procurator Fiscal.

United States

The Fifth Amendment to the Constitution of the United States states in part: “No person shall be held to answer for a capital, or otherwise infamous crime, unless on a presentment or indictment of a Grand Jury, except in cases arising in the land or naval forces, or in the Militia when in actual service in time of War or public danger”. The requirement of an indictment has not been incorporated against the states; therefore, although the federal government uses grand juries and indictments, not all U.S. states do.[10]

In many, but not all, United States jurisdictions that use grand juries, prosecutors often have a choice between seeking an indictment from a grand jury and filing a charging document directly with the court. Such a document is usually called an informationaccusation, or complaint, to distinguish it from a grand-jury indictment. To protect the suspect’s due-process rights in felony cases (where the suspect’s interest in liberty is at stake), there is usually a preliminary hearing, at which a judge determines whether there was probable cause to arrest the suspect who is in custody. If the judge finds such probable cause, he or she binds, or holds over, the suspect for trial.

The substance of an indictment or other charging instrument is usually the same, regardless of the jurisdiction: it consists of a short and plain statement of where, when, and how the defendant allegedly committed the offense. Each offense usually is set out in a separate count. Indictments for complex crimes, particularly those involving conspiracy or numerous counts, may run to hundreds of pages. However, in other cases an indictment for a crime as serious as murder, may consist of a single sheet of paper.

Indictable offenses are normally tried by jury, unless the accused waives the right to a jury trial. Although the Sixth Amendment mandates the right to a jury trial in any criminal prosecution, the vast majority of criminal cases in the United States are resolved by the plea-bargaining process.

Direct indictment (Canada)

A direct indictment is one in which the case is sent directly to trial before a preliminary inquiry is completed or when the accused has been discharged by a preliminary inquiry.[11][12] It is meant to be an extraordinary, rarely used power to ensure that those who should be brought to trial are in a timely manner or where an error of judgment is seen to have been made in the preliminary inquiry.[13]

Sealed indictment

An indictment can be sealed so that it stays non-public until it is unsealed. This can be done for a number of reasons. It may be unsealed, for example, once the named person is arrested or has been notified by police.[14]

See also

References

https://en.wikipedia.org/wiki/Indictment

Did the FBI Have a Spy in the Trump Campaign?

Republican presidential nominee Donald Trump speaks at a campaign rally in Grand Rapids, Mich., October 31, 2016. (Carlo Allegri/Reuters)

The Steele-dossier author told Fusion GPS’s Glenn Simpson about a ‘human source.’Something tells me Glenn Simpson did not make a mistake. Something tells me the co-founder of Fusion GPS was dead-on accurate when he testified that Christopher Steele told him the FBI had a “human source” — i.e., a spy — inside the Trump campaign as the 2016 presidential race headed into its stretch run.

When he realized how explosive this revelation was, Simpson walked it back: He had, perhaps, “mischaracterized” what he’d been told by Steele, the former British spy and principal author of the anti-Trump dossier he and Simpson compiled for the Clinton campaign.

Simpson gave his testimony about the FBI’s human source at a closed Senate Judiciary Committee hearing on August 22, 2017. He did not try to retract it until the uproar that followed the publication of his testimony on January 9, 2018. The latter date is significant for reasons we’ll come to.

A Spy and a Stonewall
Simpson’s testimony on this point is worth revisiting because of a pitched battle between the House Intelligence Committee and the Justice Department. Essential reporting on the controversy has been done by the Wall Street Journal’s Kim Strassel (see here and here). On Thursday, she related that, yet again, Congress had faced down a DOJ/FBI attempt to stonewall the committee’s probe of investigative irregularities during the 2016 election season — particularly, abuse of government surveillance powers, which the Obama-led agencies used to monitor the Trump campaign.

Unable to get voluntary cooperation, committee chairman Devin Nunes (R., Calif.) issued a subpoena demanding that the Justice Department disclose information about a top-secret intelligence source who is said to have assisted the Russia investigation. That investigation is now being run by Special Counsel Robert Mueller. But more interesting is how it got started.

On that question, officials have been suspiciously fuzzy in their explanations, and hilariously inconsistent in their leaks: initially settling on an origination story that hinged on the Steele dossier and a trip to Moscow by the obscure Trump-campaign adviser Carter Page; later pivoting to a tale of boozy blathering by an even more obscure Trump-campaign adviser, George Papadopoulos, when the first story proved embarrassing — the dossier allegations having been unverified when the Justice Department included them in warrant applications to the FISA court.

The Justice Department’s inability, or at least unwillingness, to reveal exactly how, when, and why the FBI opened a counterintelligence investigation has fueled suspicions that a spy who worked for both the FBI and the CIA was deployed against the Trump campaign, probably in Britain — where Papadopoulos had met with suspected agents of the Kremlin, and where Steele compiled the dossier via reports from his unidentified sources.

From painstaking research, Nunes and committee staff believe they have identified such a spy. When they demanded information about this person — whose name remains unknown to the public — the Justice Department’s response was not “No, you’re wrong, there was no spying.” It was first to bloviate that the department would not be “extorted” (Deputy Attorney General Rod Rosenstein’s unusual understanding of what is more commonly known as congressional oversight) and then to claim that providing the information sought by the committee would risk “potential loss of human lives, damage to relationships with valued international partners, compromise of ongoing criminal investigations, and interference with intelligence activities.”

By now, Nunes has learned that if he is catching flak, he is over the target.

Simpson’s Senate Testimony about the FBI’s ‘Human Source’
This brings us back to Glenn Simpson, co-founder of Fusion GPS, which was retained by the Clinton campaign (through its lawyers at Perkins Coie) to generate the Steele dossier, opposition research that focused on Donald Trump and Russia.

In his Senate testimony on August 22, 2017, Simpson explained that Steele had met with at least one FBI agent in Rome in mid to late September 2016. The former British spy had provided the unverified allegations he had compiled to that point (i.e., his private “intelligence reports,” later assembled into the “dossier”). Steele had developed a close working relationship with the FBI when he was a British agent. It is not surprising, then, that the Bureau did not just take his information; it reciprocated, imparting some sensitive information to him. Simpson explained to the Senate committee (my italics):

Essentially, what [Christopher Steele] told me was [the FBI] had other intelligence about this matter from an internal Trump campaign source, and that — that they — my understanding was that they believed Chris at this point — that they believed Chris’s information might be credible because they had other intelligence that indicated the same thing, and one of those pieces of intelligence was a human source from inside the Trump campaign.

Simpson declined to answer more questions about this unidentified “human source.” But when the media treated his revelation as a bombshell, he realized it would cause a feeding frenzy: Congress, the media, and the public would demand to know what would cause the FBI, in the stretch run of a presidential race, to use an informant against one candidate’s campaign.

On a dime, Simpson backpedaled. Fusion GPS explained to friendly media that he believed he had “mischaracterized” the source. He must have been talking about George Papadopoulos — not a “human source” in the sense of willing informant or spy, but a person attached to the campaign whose statements to an Australian diplomat had been passed to the FBI (through channels that, we shall see, have still not been explained).

On further review, I don’t buy this explanation (although I uncritically accepted it in a column about Simpson’s testimony early this year).

The Timing Doesn’t Compute
Simpson’s testimony was released to the public on January 9, 2018. That was just a few days after the New York Times had published its big New Year’s weekend story claiming, based on anonymous intelligence officials, that the Russia investigation had been opened sometime in July 2016. The catalyzing event, we were told, was a report to the FBI that Papadopoulos, a young Trump-campaign adviser, had alleged that Russia possessed thousands of stolen Hillary Clinton emails. According to the story, Papadopoulos had been informed of this by Joseph Mifsud, a London-based academic who professed to have Kremlin connections. A few weeks later, while drinking in a London bar in May 2016, Papadopoulos blabbed the news to Alexander Downer, an Australian diplomat.

According to the Times, when hacked Democratic National Committee emails started being published in July 2016, Australian officials surmised that this development could be related to Papadopoulos’s boozy claim; therefore, the paper suggests, they routed the information to their American counterparts. But when we peruse the story, we find that the Times is drawing an inference that the FBI must have gotten the information from the Australian government; there is no solid confirmation that this happened. Indeed, the story evinces bewilderment that two months supposedly elapsed between the Papadopoulos–Downer meeting and the FBI’s learning about it. There is no attempt to describe how this assumed transmission occurred, and the Aussies refused to comment on the matter.

Though the Papadopoulos–Downer story is rickety, it nevertheless served Simpson’s purpose of backing away from his “human source” testimony. Alas, his story does not add up, either.

To repeat, while Simpson’s testimony became public in January 2018, he actually gave the testimony five months earlier, in August 2017. Papadopoulos’s name is not uttered in the 312-page transcript, just as it goes unmentioned in the Steele dossier.

Papadopoulos was virtually unheard of until October 30, 2017, when Special Counsel Mueller announced his guilty plea and filed a factual recitation of his offense conduct. Two weeks after that information became public, Simpson was asked about Papadopoulos in a fleeting exchange during testimony before the House Intelligence Committee (see November 14, 2017transcript, page 163.) Interestingly, the subject came up in the context of Trump-related research Simpson had done separate and apart from his collaboration with Steele. Simpson claimed that he had been looking at Papadopoulos “for a while” and regarded him as “a clone of Carter Page”; but he admitted that he actually knew nothing significant about Papadopoulos beyond what Mueller had included in the information filed in court at the time of the guilty plea.

The information Mueller had filed in October said nothing about either Papadopoulos’s meeting with Downer or the subsequent purported transmission of Papadopoulos’s claims from Australian authorities to the FBI. That story did not come out until the Times article on December 30.

When Simpson testified that Steele told him the FBI had a human source, I think Simpson meant exactly what that testimony implied.

Only after that, and in the uproar over the January 9 release of Simpson’s five-month-old Senate testimony, did Fusion suggest that Simpson must have been referring to Downer, the Australian diplomat, when he told the Senate that the FBI had a “human source” inside the Trump campaign. That, however, is not credible. When Simpson gave the “human source” testimony in August 2017, there is no indication that he knew anything about Downer. Even if we buy his House testimony in November that he had heard of Papadopoulos before the latter’s October plea, Simpson conceded then that he knew nothing more than what Mueller had disclosed — which did not include the Papadopoulos–Downer meeting and the communication of it to the FBI.

Simpson is a smart guy, an accomplished investigative journalist, and now a full-time professional researcher, whose attention to detail is impressive. Steele is an experienced intelligence officer. The two are longtime friends and collaborators who understand each other well. Informants are central to both of their professions. By their telling, Steele’s decision to bring their research to the FBI and his subsequent dealings with the Bureau were a matter of extensive discussion and great concern.

Consequently, I do not believe that Steele gave his friend Simpson a cryptic account of his meeting in Rome with the FBI; nor do I believe that Simpson got confused and “mischaracterized” what he was told. When Simpson testified that Steele told him the FBI had a human source, I think Simpson meant exactly what that testimony implied: that someone from the FBI told Steele in August 2016 — while the investigation was heating up, while the FBI was ramping up its efforts in preparation for seeking surveillance warrants from the FISA court — that the Bureau had an informant.

A Human Source . . . in Britain, Not Australia
Three other things to consider:

1. For months, the House Intelligence Committee sought disclosure of the “electronic communication” (EC) by which the FBI opened its counterintelligence-investigation file on Papadopoulos, reportedly in July 2016. Counterintelligence involves national-security powers, and it is a weighty matter to apply these powers — as opposed to criminal-investigative authorities — to American citizens. The committee therefore wanted to know what foreign intelligence had spurred the probe, particularly in light of intelligence leaks that an Australian government report about Papadopoulos was the cause.

Yet, when Nunes was finally allowed to look at the EC, only after threatening contempt proceedings against Justice Department officials, he learned that the FBI did not set forth any foreign intelligence — there was no Australian report, no “Five Eyes intelligence product” at all, Nunes told Fox News’s Maria Bartiromo.

Did the FBI’s British operation involve using a spy to interact with Trump-campaign figures, such as Papadopoulos, on British soil?

If the FBI was not explicitly relying on intelligence from a foreign ally, on what was it relying to open a counterintelligence investigation focusing on an American political campaign? According to what the New York Times reported in April 2017, “current and former law enforcement and intelligence officials” said the investigation was triggered by Carter Page’s trip to Moscow. That would implicate the Clinton-campaign-generated Steele dossier, which claimed that Page’s trip furthered a Trump–Russia conspiracy. I’ve detailed how, as reliance on the unverified dossier has become more controversial, the media and intelligence agencies have tried to minimize its importance to the opening of the investigation.

Did the dossier instigate not only FISA surveillance but human spying against the Trump campaign?

2. As Larry O’Connor has recounted in the Washington Times, Obama’s former CIA director John Brennan was asked, by NBC’s Chuck Todd, whether the FBI’s investigation was triggered by intelligence from the Five Eyes (i.e., the U.S., Great Britain, Canada, New Zealand, and Australia — five Anglosphere governments that have longstanding, unusually close intelligence-sharing arrangements). Brennan would not answer the question directly, but he emphasized U.S. ties not with Australia but with Britain:

The F.B.I. has [a] very close relationship with its British counterparts. And so, the F.B.I. had visibility into a number of things that were going on involving some individuals who may have had some affiliation with the Trump campaign. And so, the intelligence that we collected was pulsed against that. And I thought it would have been derelict if the F.B.I. did not pull the threads, investigative threads, on American persons who might have been involved with Russia and working on their behalf either wittingly or unwittingly.

Sounds like the FBI, with support from the CIA, had some cooperative intelligence venture with British authorities that enabled the Bureau to monitor Trump-campaign figures. That is significant because Papadopoulos has acknowledged meeting in Britain with people who claimed Kremlin ties and who told him Russia had thousands of Clinton’s emails. Did the FBI’s British operation involve using a spy to interact with Trump-campaign figures, such as Papadopoulos, on British soil? Brennan didn’t say.

3. In December 2017, McCabe testified in a closed hearing before the House Intelligence Committee. The Washington Examiner’s Byron York reported that McCabe “said on more than one occasion that the FBI had worked hard to verify the dossier, telling lawmakers that the FBI had at one point sent investigators to London as part of that effort” (emphasis added).

Did the FBI’s work to verify the dossier in London involve a human source? Did it involve other human sources in other places?

Christopher Steele, the former British spy with extensive British intelligence and FBI connections, told his friend Glenn Simpson that the FBI had penetrated the Trump campaign with a “human source” who was helping corroborate the dossier. There seems to be more corroboration for this assertion than for the sensational allegations in Steele’s dossier.

Story 2: Secret Surveillance Spying Security State (S5) Abolishes Fourth Amendment With  National Security Agency and National Security Letters — Congress Does Nothing Fearing Secret Surveillance Spying Security State Disclosures By United States Intelligence Community (IC) — Videos

See the source image

America’s intelligence community, explained

History… The Origins of the U.S. Intelligence Community & Why It Spies on Americans

NSA Whistleblower William Binney: The Future of FREEDOM

History… Interview with G. Edward Griffin “The Individual vs. The Collective”

Tragedy and Hope: Professor Carroll Quigley and the “Article that Said Too Little” by Kevin Cole

Carroll Quigley on Tragedy And Hope

The Quigley Formula – G. Edward Griffin lecture

‘Russian election hack impossible’: NSA veteran & whistleblower

Tom Drake — Full Interview

NSA Whistleblower Thomas Drake speaks at National Press Club 15, 2017 – The Best Documentary Ever

Tom Drake: US Largest Surveillance State in History (FULL)

NSA Whistleblower – Jesselyn Radack & Thomas Drake | London Real

President Obama’s Full NSA Speech

President Obama Defends N.S.A. Surveillance Programs | The New York Times

National Geographic Inside the NSA America’s Cyber Secrets

United States Intelligence Community

From Wikipedia, the free encyclopedia
United States Intelligence Community
United States Intelligence Community Seal.svg

Seal of the United States Intelligence Community
Agency overview
Formed December 4, 1981
Agency executive

The United States Intelligence Community (IC)[1] is a federation of 16 separate United States government agencies that work separately and together to conduct intelligence activities to support the foreign policy and national security of the United States. Member organizations of the IC include intelligence agenciesmilitary intelligence, and civilian intelligence and analysis offices within federal executive departments. The IC is overseen by the Office of the Director of National Intelligence (ODNI), which itself is headed by the Director of National Intelligence (DNI), who reports to the President of the United States.

Among their varied responsibilities, the members of the Community collect and produce foreign and domestic intelligence, contribute to military planning, and perform espionage. The IC was established by Executive Order 12333, signed on December 4, 1981, by U.S. President Ronald Reagan.[2]

The Washington Post reported in 2010 that there were 1,271 government organizations and 1,931 private companies in 10,000 locations in the United States that were working on counterterrorism, homeland security, and intelligence, and that the intelligence community as a whole includes 854,000 people holding top-secret clearances.[3] According to a 2008 study by the Office of the Director of National Intelligence, private contractors make up 29% of the workforce in the U.S. intelligence community and account for 49% of their personnel budgets.[4]

Etymology

The term “Intelligence Community” was first used during Lt. Gen. Walter Bedell Smith‘s tenure as Director of Central Intelligence (1950–1953).[5]

History[

Intelligence is information that agencies collect, analyze, and distribute in response to government leaders’ questions and requirements. Intelligence is a broad term that entails:

Collection, analysis, and production of sensitive information to support national security leaders, including policymakers, military commanders, and Members of Congress. Safeguarding these processes and this information through counterintelligence activities. Execution of covert operations approved by the President. The IC strives to provide valuable insight on important issues by gathering raw intelligence, analyzing that data in context, and producing timely and relevant products for customers at all levels of national security—from the war-fighter on the ground to the President in Washington.[6]

Executive Order 12333 charged the IC with six primary objectives:[7]

  • Collection of information needed by the President, the National Security Council, the Secretary of State, the Secretary of Defense, and other executive branch officials for the performance of their duties and responsibilities;
  • Production and dissemination of intelligence;
  • Collection of information concerning, and the conduct of activities to protect against, intelligence activities directed against the U.S., international terrorist and/or narcotics activities, and other hostile activities directed against the U.S. by foreign powers, organizations, persons and their agents;
  • Special activities (defined as activities conducted in support of U.S. foreign policy objectives abroad which are planned and executed so that the “role of the United States Government is not apparent or acknowledged publicly”, and functions in support of such activities, but which are not intended to influence United States political processes, public opinion, policies, or media and do not include diplomatic activities or the collection and production of intelligence or related support functions);
  • Administrative and support activities within the United States and abroad necessary for the performance of authorized activities and
  • Such other intelligence activities as the President may direct from time to time.

Organization

Members

The IC is headed by the Director of National Intelligence (DNI), whose statutory leadership is exercised through the Office of the Director of National Intelligence (ODNI). The 16 members of the IC are:[8]

The official seals of U.S. Intelligence Community members.

Agency Parent Agency Federal Department Date est.
Twenty-Fifth Air Force United States Air Force Defense 1948
Intelligence and Security Command United States Army Defense 1977
Central Intelligence Agency none Independent agency 1947
Coast Guard Intelligence United States Coast Guard Homeland Security 1915
Defense Intelligence Agency none Defense 1961
Office of Intelligence and Counterintelligence none Energy 1977
Office of Intelligence and Analysis none Homeland Security 2007
Bureau of Intelligence and Research none State 1945
Office of Terrorism and Financial Intelligence none Treasury 2004
Office of National Security Intelligence Drug Enforcement Administration Justice 2006
Intelligence Branch Federal Bureau of Investigation Justice 2005
Marine Corps Intelligence Activity United States Marine Corps Defense 1978
National Geospatial-Intelligence Agency none Defense 1996
National Reconnaissance Office none Defense 1961
National Security Agency/Central Security Service none Defense 1952
Office of Naval Intelligence United States Navy Defense 1882

Programs

The IC performs under two separate programs:

  • The National Intelligence Program (NIP), formerly known as the National Foreign Intelligence Program as defined by the National Security Act of 1947 (as amended), “refers to all programs, projects, and activities of the intelligence community, as well as any other programs of the intelligence community designated jointly by the Director of National Intelligence (DNI) and the head of a United States department or agency or by the President. Such term does not include programs, projects, or activities of the military departments to acquire intelligence solely for the planning and conduct of tactical military operations by the United States Armed Forces”. Under the law, the DNI is responsible for directing and overseeing the NIP, though the ability to do so is limited (see the Organization structure and leadership section).
  • The Military Intelligence Program (MIP) refers to the programs, projects, or activities of the military departments to acquire intelligence solely for the planning and conduct of tactical military operations by the United States Armed Forces. The MIP is directed and controlled by the Under Secretary of Defense for Intelligence. In 2005 the Department of Defense combined the Joint Military Intelligence Program and the Tactical Intelligence and Related Activities program to form the MIP.

Since the definitions of the NIP and MIP overlap when they address military intelligence, assignment of intelligence activities to the NIP and MIP sometimes proves problematic.

Organizational structure and leadership

IC Circle.jpg

The overall organization of the IC is primarily governed by the National Security Act of 1947 (as amended) and Executive Order 12333. The statutory organizational relationships were substantially revised with the 2004 Intelligence Reform and Terrorism Prevention Act (IRTPA) amendments to the 1947 National Security Act.

Though the IC characterizes itself as a federation of its member elements, its overall structure is better characterized as a confederation due to its lack of a well-defined, unified leadership and governance structure. Prior to 2004, the Director of Central Intelligence (DCI) was the head of the IC, in addition to being the director of the CIA. A major criticism of this arrangement was that the DCI had little or no actual authority over the budgetary authorities of the other IC agencies and therefore had limited influence over their operations.

Following the passage of IRTPA in 2004, the head of the IC is the Director of National Intelligence (DNI). The DNI exerts leadership of the IC primarily through statutory authorities under which he or she:

  • controls the “National Intelligence Program” budget;
  • establishes objectives, priorities, and guidance for the IC; and
  • manages and directs the tasking of, collection, analysis, production, and dissemination of national intelligence by elements of the IC.

However, the DNI has no authority to direct and control any element of the IC except his own staff—the Office of the DNI—neither does the DNI have the authority to hire or fire personnel in the IC except those on his own staff. The member elements in the executive branch are directed and controlled by their respective department heads, all cabinet-level officials reporting to the President. By law, only the Director of the Central Intelligence Agency reports to the DNI.

In light of major intelligence failures in recent years that called into question how well Intelligence Community ensures U.S. national security, particularly those identified by the 9/11 Commission (National Commission on Terrorist Attacks Upon the United States), and the “WMD Commission” (Commission on the Intelligence Capabilities of the United States Regarding Weapons of Mass Destruction), the authorities and powers of the DNI and the overall organizational structure of the IC have become subject of intense debate in the United States.

Interagency cooperation

Previously, interagency cooperation and the flow of information among the member agencies was hindered by policies that sought to limit the pooling of information out of privacy and security concerns. Attempts to modernize and facilitate interagency cooperation within the IC include technological, structural, procedural, and cultural dimensions. Examples include the Intellipedia wiki of encyclopedic security-related information; the creation of the Office of the Director of National IntelligenceNational Intelligence CentersProgram Manager Information Sharing Environment, and Information Sharing Council; legal and policy frameworks set by the Intelligence Reform and Terrorism Prevention Act of 2004, information sharing Executive Orders 13354 and Executive Order 13388, and the 2005 National Intelligence Strategy.

Budget[edit]

Data visualization of U.S. intelligence black budget (2013)

The U.S. intelligence budget (excluding the Military Intelligence Program) in fiscal year 2013 was appropriated as $52.7 billion, and reduced by the amount sequestered to $49.0 billion.[9] In fiscal year 2012 it peaked at $53.9 billion, according to a disclosure required under a recent law implementing recommendations of the 9/11 Commission.[10] The 2012 figure was up from $53.1 billion in 2010,[11] $49.8 billion in 2009,[12] $47.5 billion in 2008,[13] $43.5 billion in 2007,[14] and $40.9 billion in 2006.[15]

About 70 percent of the intelligence budget went to contractors for the procurement of technology and services (including analysis), according to the May 2007 chart from the ODNI. Intelligence spending has increased by a third over ten years ago, in inflation-adjusted dollars, according to the Center for Strategic and Budgetary Assessments.[citation needed]

In a statement on the release of new declassified figures, DNI Mike McConnell said[when?] there would be no additional disclosures of classified budget information beyond the overall spending figure because “such disclosures could harm national security”. How the money is divided among the 16 intelligence agencies and what it is spent on is classified. It includes salaries for about 100,000 people, multibillion-dollar satellite programsaircraftweapons, electronic sensors, intelligence analysisspiescomputers, and software.

On August 29, 2013 the Washington Post published the summary of the Office of the Director of National Intelligence’s multivolume FY 2013 Congressional Budget Justification, the U.S. intelligence community’s top-secret “black budget.”[16][17][18] The IC’s FY 2013 budget details, how the 16 spy agencies use the money and how it performs against the goals set by the president and Congress. Experts said that access to such details about U.S. spy programs is without precedent. Steven Aftergood, Federation of American Scientists, which provides analyses of national security issues stated that “It was a titanic struggle just to get the top-line budget number disclosed, and that has only been done consistently since 2007 … but a real grasp of the structure and operations of the intelligence bureaucracy has been totally beyond public reach. This kind of material, even on a historical basis, has simply not been available.”[19] Access to budget details will enable an informed public debate on intelligence spending for the first time said the co-chair of the 9/11 Commission Lee H. Hamilton. He added that Americans should not be excluded from the budget process because the intelligence community has a profound impact on the life of ordinary Americans.[19]

Oversight

Intelligence Community Oversight duties are distributed to both the Executive and Legislative branches. Primary Executive oversight is performed by the President’s Foreign Intelligence Advisory Board, the Joint Intelligence Community Council, the Office of the Inspector General, and the Office of Management and Budget. Primary congressional oversight jurisdiction over the IC is assigned to two committees: the United States House Permanent Select Committee on Intelligence and the United States Senate Select Committee on Intelligence. The House Armed Services Committee and Senate Armed Services Committee draft bills to annually authorize the budgets of DoD intelligence activities, and both the House and Senate appropriations committees annually draft bills to appropriate the budgets of the IC. The Senate Committee on Homeland Security and Governmental Affairs took a leading role in formulating the intelligence reform legislation in the 108th Congress.

See also

References

  1. Jump up^ Agrawal, Nina. “There’s more than the CIA and FBI: The 17 agencies that make up the U.S. intelligence community”Los Angeles Times. Retrieved 2017-01-30.
  2. Jump up^ “Executive Order 12333”. Cia.gov. Retrieved 2013-01-23.
  3. Jump up^ Dana Priest & William M Arkin (19 July 2010). “A hidden world, growing beyond control”The Washington Post.
  4. Jump up^ Priest, Dana (2011). Top Secret America: The Rise of the New American Security State. Little, Brown and Company. p. 320. ISBN0-316-18221-4.
  5. Jump up^ Michael Warner; Kenneth McDonald. “US Intelligence Community Reform Studies Since 1947” (PDF). CIA. p. 4. Retrieved 28 June 2013.
  6. Jump up^ Rosenbach, Eric & Aki J. Peritz (12 June 2009). “Confrontation or Collaboration? Congress and the Intelligence Community” (PDF). Belfer Center for Science and International Affairs, Harvard Kennedy School. Retrieved 21 July 2009.
  7. Jump up^ Executive Order 12333 text
  8. Jump up^ User, Super. “Members of the IC”.
  9. Jump up^ “DNI Releases Budget Figure for 2013 National Intelligence Program”. Office of the Director of National Intelligence. 30 October 2013. Retrieved 2 August 2014.
  10. Jump up^ DNI Releases FY 2012 Appropriated Budget Figure. Dni.gov (2012-10-30). Retrieved on 2013-08-16.
  11. Jump up^ “DNI Releases Budget Figure for 2010 National Intelligence Program” (PDF). Office of the Director of National Intelligence. 2010-10-28. Retrieved 15 June 2013.
  12. Jump up^ “DNI Releases Budget Figure for 2009 National Intelligence Program” (PDF). Retrieved 15 June 2013.
  13. Jump up^ “DNI Releases Budget Figure for 2008 National Intelligence Program” (PDF). Retrieved 15 June 2013.
  14. Jump up^ “DNI Releases Budget Figure for 2007 National Intelligence Program” (PDF). Retrieved 15 June 2013.
  15. Jump up^ Hacket, John F. (2010-10-28). “FY2006 National Intelligence Program Budget, 10-28-10” (PDF). Office of the Director of National Intelligence. Retrieved 15 June 2013.
  16. Jump up^ Matt DeLong (29 August 2013). “Inside the 2013 U.S. intelligence ‘black budget'”The Washington Post. Retrieved 31 August 2013.
  17. Jump up^ Matthews, Dylan (29 August 2013). “America’s secret intelligence budget, in 11 (nay, 13) charts”The Washington Post. Retrieved 31 August 2013.
  18. Jump up^ DeLong, Matt (29 August 2013). “2013 U.S. intelligence budget: Additional resources”The Washington Post. Retrieved 31 August 2013.
  19. Jump up to:ab Barton Gellman & Greg Miller (29 August 2013). “U.S. spy network’s successes, failures and objectives detailed in ‘black budget’ summary”The Washington Post. Retrieved 31 August 2013.

Further reading

External links

https://en.wikipedia.org/wiki/United_States_Intelligence_Community

 

he Foreign Intelligence Surveillance Act of 1978 (FISA)

50 U.S.C. §§ 1801-11, 1821-29, 1841-46, 1861-62, 1871.

Background. Like Title III of the Omnibus Crime Control and Safe Streets Act of 1968 (the “Wiretap Act“), the FISA legislation was the result of congressional investigations into Federal surveillance activities conducted in the name of national security. Through FISA, Congress sought to provide judicial and congressional oversight of foreign intelligence surveillance activities while maintaining the secrecy necessary to effectively monitor national security threats. FISA was initially enacted in 1978 and sets out procedures for physical and electronic surveillance and collection of foreign intelligence information. Initially, FISA addressed only electronic surveillance but has been significantly amended to address the use of pen registers and trap and trace devices, physical searches, and business records.

FISA also established the United States Foreign Intelligence Surveillance Court (FISC), a special U.S. Federal court that holds nonpublic sessions to consider issuing search warrants under FISA. Proceedings before the FISC are ex parte, meaning the government is the only party present.

General Provisions. FISA, as amended, establishes procedures for the authorization of electronic surveillance, use of pen registers and trap and trace devices, physical searches, and business records for the purpose of gathering foreign intelligence.

Electronic Surveillance Procedures – Subchapter I of FISA established procedures for the conduct of foreign intelligence surveillance and created the Foreign Intelligence Surveillance Court (FISC). The Department of Justice must apply to the FISC to obtain a warrant authorizing electronic surveillance of foreign agents. For targets that are U.S. persons (U.S. citizens, permanent resident aliens, and U.S. corporations), FISA requires heightened requirements in some instances.

  • Unlike domestic criminal surveillance warrants issued under Title III of the Omnibus Crime Control and Safe Streets Act of 1968 (the “Wiretap Act“) , agents need to demonstrate probable cause to believe that the “target of the surveillance is a foreign power or agent of a foreign power,” that “a significant purpose” of the surveillance is to obtain “foreign intelligence information,” and that appropriate “minimization procedures” are in place. 50 U.S.C. § 1804.
  • Agents do not need to demonstrate that commission of a crime is imminent.
  • For purposes of FISA, agents of foreign powers include agents of foreign political organizations and groups engaged in international terrorism, as well as agents of foreign nations. 50 U.S.C. § 1801

Record Destruction: Where the government has accidentally intercepted communications that “under circumstances in which a person has a reasonable expectation of privacy and a warrant would be required for law enforcement purposes, and if both the sender and all intended recipients are located within the United States,” the government is required to destroy those records, “unless the Attorney General determines that the contents indicate a threat of death or serious bodily harm to any person.” 50 U.S.C. § 1806.

Exception to Court Order Requirement: The President may authorize electronic surveillance to acquire foreign intelligence information for periods of up to one year without a FISC court order where the Attorney General certifies that there is “no substantial likelihood that the surveillance will acquire the contents of any communication to which a U.S. person is a party,” provided the surveillance is directed solely at communications among or between foreign powers, or “the acquisition of technical intelligence … from property or premises under the open and exclusive control of a foreign power.” 50 U.S.C. § 1802.

Physical Searches – Subchapter II of FISA establishes procedures for the physical search of “premises or property … owned, used, possessed by, or … in transit to or from a foreign power or an agent of a foreign power.” The procedures are substantially similar to the procedures established for electronic foreign intelligence surveillance.

Pen Registers and Trap & Trace Devices for Foreign Intelligence Purposes – Subchapter III of FISA establishes procedures for the use of pen registers and trap and trace devices for conducting telephone or e-mail surveillance.

Access to Certain Business Records for Foreign Intelligence Purposes – Subchapter IV of FISA establishes procedures for obtaining a FISC order for third-party production of business records to acquire foreign intelligence information.

Amendments.  FISA has been significantly amended by the Intelligence Authorization Act of 1995 (Pub. L. 103-359; 10/14/94), by the Intelligence Authorization Act of 1999, (Pub. L. 105-272; 10/5/98), by the USA PATRIOT Act (Pub. L. 107-56; 10/26/01), by the USA PATRIOT Additional Reauthorization Amendments Act of 2006 (Pub. L. 109-178; (3/9/06), the FISA (Foreign Intelligence Surveillance Act) Amendments Act of 2008 (Pub. L.110-261; 7/10/2008), and by the FISA Sunsets Extension Act (Pub. L. 112-3; 2/25/11).  It also “eas[ed] the restrictions on foreign intelligence gathering within the United States and afford[ed] the U.S. intelligence community greater access to information unearthed during a criminal investigation.” CRS Report RS21203, USA PATRIOT Act: A Sketch. Also see the other analyses of the PATRIOT Act for more on FISA changes as the result of passage of the PATRIOT Act. The FISA Amendments Act of 2008 also amended the ECPA.

Civil Rights and Civil Liberties Implications. FISA prohibits surveillance of or production of business records regarding a U.S. person based solely on First Amendment activities. 50 U.S.C. §§ 180518421861. Section 1806 provides guidance on the sharing of foreign intelligence information among Federal agencies and with State and local partners, as well as guidance as to disclosure of foreign intelligence information in criminal proceedings. Section 1825 provides similar guidance regarding the use and disclosure of foreign intelligence gathered via a physical search, while section 1845 provides similar guidance for the use and disclosure of information acquired through pen registers and trap and trace devices gathered under Subchapter III. Note that “agents of foreign powers” may include U.S. citizens and permanent residents suspected of being engaged in espionage and violating U.S. law on territory under United States control. Section 1801(b).

The Intelligence Reform and Terrorism Prevention Act of 2004, P.L. 108-458, amended the definition of “agent of a foreign power” in FISA (50 U.S.C. § 1801(b)(1)), to add a new category of covered individuals called the “lone wolf” provision. Under the “lone wolf” provision, a non-United States person who engages in international terrorism or activities in preparation for international terrorism is deemed to be an “agent of a foreign power” under FISA.

Further Information. The Federation of American Scientists, a non-profit organization that describes itself as providing “nonpartisan technical analysis on complex global issues that hinge on science and technology,” offers a compilation of links to FISA-related resources including annual FISA reports to Congress, various court cases, and Department of Justice memoranda.

 

Story 3: President Trump Attacks MS-13 As Animals — Lying Lunatic Leftist Losers Defend MS -13 — All Humans Are Animals — MS-16 Members Are Violent Thugs — Videos

See the source image

See the source image

See the source image

 

See the source image

The left turns Trump’s ‘animals’ comment into a controversy

President Donald Trump Says ‘Animals’ Remark Referred To MS-13 Gang Members | NBC News

Nancy Pelosi Defends Violent MS-13 Gang Members In Response To Trump, Says They’re Not Animals

Trump calls MS-13 gang members ‘animals’

Sanders: Trump referred to gang as ‘animals’ not immigrants

Trump says ‘animals’ remark referred to MS-13 members

Media take Trump’s ‘animals’ remark out of context

MS-13 gang members: Trump makes us stronger

A look inside the world of MS-13 gangs

True roots of MS-13

MS-13: Violent gang targeting US suburbia

ICE Chasing Down MS-13 Gang (Compilation)

El Salvador declares war on gangs

Trump calls some illegal immigrants “animals” in meeting with sheriffs

Tucker: There’s no defending MS-13, but the Left is

‘Hunting MS-13’: What we learned

MS-13 ‘Amercanizing’ with female members

National Geographic – MS13 [Mara Salvatrucha ] : America’s Deadliest Gang – full Documentary HD

Brit snaps MS-13 gang at jail guards won’t step in

ICE Chasing Down MS-13 Gang (Compilation)

Washington DC MS 13 Documentary

Inside Long Island’s war with MS-13

MS 13 Murder Documentary

MS-13’s Active Members Are Laughing At Trump’s Crackdown (HBO)

National Geographic – MS13 [Mara Salvatrucha ] : America’s Deadliest Gang – full Documentary HD

MS-13’s biggest rival: Barrio 18

5 Most Dangerous Gangs In The World!

CNN Took Trump’s ‘Animals’ Remark About Immigrants ‘Out of Context,’ Network Admits

 

“Trump’s remarks late Wednesday were in response to comments about members of MS-13 and other undocumented immigrants,” network now says

Last Updated: May 18, 2018 @ 8:01 AM

CNN has officially clarified its reporting suggesting that President Donald Trump had referred to undocumented immigrants as “animals.”

In a Thursday piece, media reporter Oliver Darcy conceded that CNN — like many other news organizations, including the New York Times and the Associated Press — had taken Trump’s remarks “out of context” and that the president had only been referring to members of the violent MS-13 gang, many of whom come from Central America, and not to all immigrants in the U.S. without proper documentation.

“Other outlets did not directly accuse the President of calling immigrants ‘animals,’ but failed to include in tweets the entire context for Trump’s remark. Those outlets included CNN, CBS News, and NBC News,” wrote Darcy.

“Trump’s remarks late Wednesday were in response to comments about members of MS-13 and other undocumented immigrants who are deported for committing crimes,” the network added in a thread response to its own (considerably more viral) original tweet that included the president’s quote without context.

CNN

@CNN

“We’re taking people out of the country. You wouldn’t believe how bad these people are. These aren’t people — these are animals.” During a meeting with public officials who oppose California’s sanctuary policies, Pres. Trump criticized US immigration laws https://trib.al/jDvH1Vx  pic.twitter.com/SsmCdaofHb

CNN

@CNN

As reported in the article above, Trump’s remarks late Wednesday were in response to comments about members of MS-13 and other undocumented immigrants who are deported for committing crimes.

Also Thursday, the Associated Press went even further than CNN, deleting an earlier tweet about the president’s remarks.

“AP has deleted a tweet from late Wednesday on Trump’s ‘animals’ comment about immigrants because it wasn’t made clear that he was speaking after a comment about gang members,” the news organization offered in an explanation.

The Associated Press

@AP

AP has deleted a tweet from late Wednesday on Trump’s “animals” comment about immigrants because it wasn’t made clear that he was speaking after a comment about gang members.

The false narrative spread through the media this week after Trump made the tough remarks from the Cabinet Room of the White House.

“We have people coming into the country, or trying to come in — we’re stopping a lot of them,”said the president. “You wouldn’t believe how bad these people are. These aren’t people, these are animals, and we’re taking them out of the country at a level and at a rate that’s never happened before.”

On Wednesday, the White House press briefing had an animated moment when Press Secretary Sarah Sanders laced into media companies for falsely reporting this story.

“If the media and liberals want to defend MS-13, they’re more than welcome to,” said Sanders. “It took an animal to stab a man 100 times and decapitate him and rip his heart out … Frankly, I think that the term ‘animal’ doesn’t go far enough.”

“The president was very clearly referring to MS-13 gang members who enter the country illegally and whose deportations are hamstrung by our laws,” she added. “This is one of the most vicious and deadly gangs that operates by the motto of rape, control and kill.”

https://www.thewrap.com/cnn-took-trumps-animals-remark-immigrants-context-network-admits/

MS-13

From Wikipedia, the free encyclopedia
Mara Salvatrucha
Marasalvatrucha13.png

Mara Salvatrucha gang member with gang’s name tattooed on his back
Founding location Los Angeles, California, U.S.
Years active 1980s–present
Territory United StatesCompton, CaliforniaLos Angeles, CaliforniaBoston, MassachusettsFresno, CaliforniaSanta Cruz, California
Ethnicity Mostly SalvadoransHondurans, and Guatemalans
Membership 8,000–10,000 (US)

30,000–50,000 (Worldwide)[1]

Criminal activities Drug trafficking, illegal immigration, people smuggling, robbery, larceny, human traffickingextortion, murder, money laundering, prostitution (including child prostitution), racketeering, battery, kidnapping, and arms trafficking
Allies SureñosSinaloa CartelGulf CartelLa Familia MichoacanaMexican MafiaLos Zetas[2]
Rivals 18th Street gangJuarez CartelLos NegrosSombra NegraTijuana CartelBeltrán-Leyva Cartel, The Rascals, Tiny Rascal GangBloodsCripsPirusFresno Bulldogs, Hoover Boyz, Hoover Criminals,[3] Latin Kings[4]

MS-13 (Mara Salvatrucha; also known as simply MS or Mara) is an international criminal gang that originated in Los Angeles, California, US in the 1980s. The gang later spread to many parts of the continental United States, Canada, Mexico, and Central America, and is active in urban and suburban areas. Most members are of Central American origin, principally El Salvador.

In the U.S., MS-13 has an especially heavy presence in California, the Washington, D.C. metropolitan area, New York City and New JerseyBostonCharlotte, North Carolina, and Houston. There is also a presence of MS-13 in TorontoOntario.

Members of MS are characterised by tattoos covering the body, previously including the face, and by the use of their own sign language. They are notorious for their violence and a subcultural moral code based on merciless retribution. This cruelty of the distinguished members of the “Maras” or “Mareros” earned them a path to be recruited by the Sinaloa Cartel battling against Los Zetas in an ongoing drug war in Mexico.[5][6][7] Their wide-ranging activities have drawn the attention of the FBI and Immigration and Customs Enforcement, who have initiated wide-scale raids against known and suspected gang members, arresting hundreds across the country.[8]

Etymology

There is some dispute about the etymology of the name. Some sources state the gang is named for La Mara, a street gang in San Salvador, and the Salvatrucha guerrillas who fought in the Salvadoran Civil War.[9]Additionally, the word mara means gang in Caliche slang and is taken from marabunta, the name of a fierce type of ant. “Salvatrucha” may be a combination of the words Salvadoran and trucha, a Caliche word for being alert. The term “Salvatruchas” has been explained as a reference to Salvadorian peasants trained to become guerrilla fighters, referred to as “Farabundo Martí National Liberation Front.”[10]

Aspirants are beaten for 13 seconds in order to join the gang, a ritual known as a “beat-in”.[11][12][13][14][15][16]

Physical appearance

An MS gang sign and tattoos

Minors make up the majority of suspects arrested for killings attributed to MS-13. Many school districts were reluctant to admit unaccompanied teenagers when they initially arrived from Central America, which left them home alone and vulnerable to gang recruitment.[17]

Many Mara Salvatrucha members cover themselves in tattoos. Common markings include “MS”, “Salvatrucha”, the “Devil Horns”, the name of their clique, and other symbols.[18] A December 2007 CNN internet news article stated that the gang was moving away from face tattoos so as to be able to commit crimes without being noticed.[19]

Members of Mara Salvatrucha, like members of most modern American gangs, utilize a system of hand signs for purposes of identification and communication. One of the most commonly displayed is the “devil’s head” which forms an ‘M’ when displayed upside down. This hand sign is similar to the same symbol commonly seen displayed by heavy metal musicians and their fans. Founders of Mara Salvatrucha borrowed the hand sign after attending concerts of heavy metal bands.[20]

Presence

MS-13 presence     territories with a weaker presence     territories with a stronger presence

In the U.S., MS-13 has an especially heavy presence in Los Angeles County and the San Francisco Bay Area in California; the Washington, D.C. metropolitan areas of Fairfax County, VirginiaMontgomery County, Maryland,[21] and Prince George’s County, MarylandQueensNew YorkLong Island, New York; Newark, New JerseyPlainfield, New JerseyJersey City, New JerseyElizabeth, New Jersey; the BostonMassachusetts area; Charlotte, North Carolina; and HoustonTexas. There is also a presence of MS-13 in Toronto, Ontario, Canada.

MS-13 appears to use Texas as a stopping point for travel from Los Angeles to the East Coast and for the trafficking of drugs, humans, and weapons between Mexico and the United States. The largest concentration of MS-13 in Texas is in Houston.[22]

History

The Mara Salvatrucha gang originated in Los Angeles, set up in the 1980s by Salvadoran immigrants in the city’s Pico-Union neighborhood who immigrated to the United States after the Central American civil wars of the 1980s.[23]

Originally the gang’s main purpose was to protect Salvadoran immigrants from other, more established gangs of Los Angeles, who were predominantly composed of Mexicans and African-Americans.[24]

Many Mara Salvatrucha gang members from the Los Angeles area have been deported after being arrested.[25] For example, Jose Abrego, a high-ranking member, was deported four times.[26] As a result of these deportations, members of MS-13 have recruited more members in their home countries.[27] The Los Angeles Times contends that deportation policies have contributed to the size and influence of the gang both in the United States and in Central America.[25] According to the 2009 National Gang Threat Assessment, “The gang is estimated to have 30,000 to 50,000 members and associate members worldwide, 8,000 to 10,000 of whom reside in the United States.[1]

Since the first decade of the twenty-first century the gang has expanded into the Washington, D.C. area, in particular the areas of Langley Park and Takoma Park, Maryland.[28]

In 2004 the US FBI started the MS-13 National Gang Task Force. The FBI also began teaming with law enforcement in El Salvador, Honduras, Guatemala, and Mexico.[29]

In 2005 the office of U.S. Immigration and Customs Enforcement started Operation Community Shield. By 2011 this operation had made over 20,000 arrests, including more than 3,000 arrests of alleged MS-13 members.[30]

NYPD said that MS-13 were responsible for 17 murders between January 2016 and April 2016 in Long Island.[31]

On July 28, 2017, one day after 113 suspected MS-13 gang members were arrested by Salvadoran authorities,[32] President Donald Trump declared his goal of “eradicating” MS-13, calling them “animals” whose victims “die slowly because that way it’s more painful.”[33]

In an interview with Bill Ritter in late 2017, Nassau County, New York District Attorney Madeline Singas, referring to crimes committed by MS-13 gang members, stated: “The crimes that we’re talking about are brutal. Their weapon of choice is a machete. We end up seeing people with injuries that I’ve never seen before. You know, limbs hacked off. And that’s what the bodies look like that we’re recovering. So they’re brutal. They’re ruthless, and we’re gonna be relentless in our attacks against them.”[34]

Illegal immigration and human smuggling

According to The Washington Times, MS-13 “is thought to have established a major smuggling center” in Mexico.[35] There were reports by the Minuteman Project that MS members were ordered to Arizona to target U.S. Border Patrol agents and Minuteman Projectvolunteers.[36]

Robert Morales, a prosecutor for Guatemala, indicated to The Globe and Mail that some Central American gang members seek refugee status in Canada. Superintendent of the Royal Canadian Mounted Police integrated gang task force, John Robin, said in an interview that “I think [gang members] have a feeling that police here won’t treat them in the harsh manner they get down there.”[37] Robin noted that Canadian authorities “want to avoid ending up like the U.S., which is dealing with the problem of Central American gangsters on a much bigger scale”.[37]

The gang is violent to migrants on the southern border of Mexico.[38]

False Al-Qaeda connection

In 2005 Honduran Security Minister Oscar Álvarez and the President of El Salvador raised alarm by claiming that terrorist organisation Al-Qaeda was meeting with Mara Salvatrucha and other Central American gangs to help them infiltrate the United States. FBI agents said that the U.S. intelligence community and governments of several Central American countries found that there was no basis to believe that MS-13 was connected to Al-Qaeda or other Islamic radicals, although the head of the FBI task force on MS-13 did visit Central America to discuss the issue.[39]

Publicized crimes

The Central American population in North America is the primary victim of MS-13.[27] Many of the victims are minors.[17]

On July 13, 2003, Brenda Paz, a 17-year-old former MS-13 member turned informant was found stabbed to death on the banks of the Shenandoah River in Virginia. She was killed for informing the FBI about Mara Salvatrucha’s criminal activities; two of her former friends were later convicted of the murder.[40]

In 2004 the FBI created the MS-13 National Gang Task Force.[41] In 2005 the FBI helped create a National Gang Information Center (NGIC), and outlined a National Gang Strategy for Congress.[42]

On December 23, 2004, one of the most widely publicized MS-13 crimes in Central America occurred in Chamelecón, Honduras when an intercity bus was intercepted and sprayed with automatic gunfire from assault rifles,[43] killing 28 and wounding 14 civilian passengers, most of whom were women and children.[44] MS-13 organized the massacre as a protest against the Honduran government for proposing a restoration of the death penalty in Honduras. Six gunmen raked the bus with gunfire. As passengers screamed and ducked, another gunman climbed aboard and methodically executed passengers.[45] In February 2007 Juan Carlos Miranda Bueso and Darwin Alexis Ramírez were found guilty of several crimes including murder and attempted murder. Ebert Anibal Rivera was arrested over the attack after fleeing to Texas.[46] Juan Bautista Jimenez, accused of masterminding the massacre, was killed in prison; according to the authorities, fellow MS-13 inmates hanged him.[47] There was insufficient evidence to convict Óscar Fernando Mendoza and Wilson Geovany Gómez.[46]

An MS-13 suspect bearing gang tattoos is handcuffed.

On May 13, 2006, Ernesto “Smokey” Miranda, a former high-ranking soldier and one of the founders of Mara Salvatrucha, was murdered at his home in El Salvador a few hours after declining to attend a party for a gang member who had just been released from prison. He had begun studying law and working to keep children out of gangs.[48]

On June 6, 2006,[49] a teenage MS-13 gang member named Gabriel Granillo was stabbed to death at Ervan Chew Park, in the Neartown district in Houston, Texas.[50] Chris Vogel of the Houston Press wrote that the trial of the girl who stabbed Granillo, Ashley Paige Benton,[51] gave attention to MS-13.[52]

In 2007 Julio Chavez, a Long Island MS-13 member, allegedly murdered a man because he was wearing a red sweatshirt and mistaken for a member of the Bloods gang.[53]

On June 4, 2008, in Toronto, Ontario, police executed search warrants, made 21 arrests and laid dozens of charges following a five-month investigation.[54]

On June 22, 2008, in San Francisco, California, a 21-year-old MS-13 gang member, Edwin Ramos, shot and killed a father, Anthony Bologna, 48, and his two sons Michael, 20, and Matthew, 16 as they were returning home from a family barbecue. Their car had briefly blocked Ramos from completing a left turn down a narrow street .[55]

On November 26, 2008, Jonathan Retana was convicted of the murder of Miguel Angel Deras, which the authorities linked to an MS-13 initiation.[56]

Gang graffiti

In 2008 the MS-13 task force coordinated a series of arrests and crackdowns in the U.S. and Central America that involved more than 6,000 police officers in five countries. Seventy-three suspects were arrested in the U.S.; in all, more than 650 were taken into custody.[citation needed]

In February 2009 authorities in Colorado and California arrested 20 members of MS-13 and seized 10 pounds of methamphetamine, 2.3 kilograms (5 pounds) of cocaine, a small amount of heroin, 12 firearms, and $3,300 in cash.[57]

In June 2009 Edwin Ortiz, Jose Gomez Amaya and Alexander Aguilar, MS-13 gang members from Long Island who had mistaken bystanders for rival gang members, shot two innocent civilians. Edgar Villalobos, a laborer, was killed.[58]

On November 4, 2009, El Salvadoran leaders of the MS-13 gang allegedly put out a contract on the federal agent responsible for a crackdown on its New York factions, the Daily News learned. The plot to assassinate the unidentified Immigration and Customs Enforcement agent was revealed in an arrest warrant for reputed gang member Walter (Duke) Torres. Torres tipped authorities to the plan after he and four MS-13 members were stopped by NYPD detectives for hassling passersby on Northern Boulevard. in Queens, New York. He told police he had information to pass on; he was debriefed on October 22 at Rikers Island, where he was being held on a warrant issued in Virginia, according to court papers. Torres said “the order for the murder came from gang leadership in El Salvador”, ICE agent Sean Sweeney wrote in an affidavit for a new warrant charging Torres with conspiracy. Torres, who belonged to an MS-13 “clique” in Virginia, said he was put in charge, and traveled to New York in August “for the specific purpose of participating in the planning and execution of the murder plot”, Sweeney wrote. Gang members were trying to obtain a high-powered rifle to penetrate the agent’s bulletproof vest. Another MS-13 informant told authorities the agent was marked for death because the gang was “exceedingly angry” at him for arresting many members in the past three years, the affidavit states. The murder was supposed to be carried out by the Flushing clique, according to the informant. Federal prosecutors have indicted numerous MS-13 gang members on racketeering, extortion, prostitution, kidnapping, illegal immigration, money laundering, murder, people smuggling, arms trafficking, human trafficking and drug trafficking charges; the targeted special agent was the lead federal investigator on many of the federal cases.[59]

Sinaloa Cartel hierarchy in early 2008

In 2010 Rene Mejia allegedly murdered a Long Island 2-year-old baby and his mother.[53]

In August 2011 six San Francisco MS-13 members were convicted of racketeering and conspiracy, including three murders, in what was the city’s largest-scope gang trial in many years. Another 18 defendants reported to have ties to the gang pleaded guilty before trial.[60]

In 2011 the Vietnam Veterans Memorial in New Haven, Connecticut was vandalized several times with the “MS-13 tag” and “kill whites” in orange spray paint.[61]

In February 2012 a Federal judge convicted three MS-13 gang members of murder. Danilo Velasquez, the former leader of the San Francisco branch of MS-13, was sentenced to life imprisonment plus 10 years, and is incarcerated at USP Hazelton.[62]

In January 2016, over 400 Boston police officers were involved in the arrests of 37 MS-13 members, 56 were charged altogether. Guns, knives and money were also seized at the homes of the gang members. Massachusetts State Police Lt. Col. Frank Hughes commented in a public conference “in my 30 years of law enforcement, I’ve never seen a more violent gang out there. These are very very violent individuals. The violence is unspeakable.” The charges included immigration violations, racketeering, firearm and drug trafficking.[63]

In August 2017, two undisclosed members were charged with the January murder of civilian 19-year-old Julio Cesar Gonzales-Espantzay who was lured to a forest in Long Island where he was attacked with machetes and stabbed with knives. Nassau County police also said the two members were responsible for 21 murders in New York just short of 2 years. Authorities said the motive was to gain reputation.[64]

On 13/14 of August 2017, MS-13 New Jersey faction member Walter Yovany Gomez who was added to the FBI most wanted list in April 2017,[65] was apprehended and charged with the 2011 brutal murder of his friend Julio Matute for associating with another gang. After a night of drinking, Gomez and another MS-13 member smacked Matute on the head with a baseball bat, sliced his throat with a knife and stabbed him in the back with a screwdriver 17 times. Gomez managed to evade arrest but was later captured in Virginia where he was hiding out with other MS-13 gang members.[66]

The Washington, DC think tank Center for Immigration Studies released a report that listed 506 cases of MS-13 criminal acts in the United States between 2012 and 2018.[67]

In 2017, two MS-13 members, Miguel Alvarez-Flores and Diego Hernandez-Rivera, were arrested for kidnapping, raping, torturing, and drugging a 14-year-old girl for over 2 weeks. According to the 14-year-old, the members also held another victim, “Genesis”, hostage in the same apartment.[68]

The East Coast kingpin of the MS-13, Miguel Angel Corea Diaz, was arraigned April 19, 2018 in Nassau County Court in Mineola, New YorkLong Island, New York on charges including conspiracy to commit murder. He could be sentenced to life in prison if he is convicted. He was one of seventeen defendants in a 21 count indictment in January that charged him with several counts of conspiracy to commit murder and operating as a high level drug tracker of controlled substances. He was extradited on the week of April 23, 2018 from Prince George’s County, Maryland, where he was held since October. That earlier jailing was in lieu of $125,000 bail.[69]

Child prostitution

In 2011 Alonso “Casper” Bruno Cornejo Ormeno, an associate of MS-13 from Fairfax, Virginia was sentenced to 292 months in prison for child prostitution. Ormeno recruited juvenile females into a prostitution ring by locating runaway children.[70]

Rances Ulices Amaya, a leader of MS-13, of Springfield, Virginia was convicted in February 2012 for trafficking girls as young as 14 into a prostitution ring. He was sentenced in June 2012 to 50 years in prison for child prostitution. The girls were lured from middle schools, high schools, and public shelters. Once acquired by Amaya, they were required to have sex with as many as ten men per day.[71]

In September 2012 Yimmy Anthony Pineda Penado, also known as “Critico” and “Spike”, of Maryland was a former “clique leader” of MS-13. Penado became the eleventh MS-13 gang member to be convicted of child prostitution since 2011.[72]

Charlotte, North Carolina cases

In the first decade of the twenty-first century US authorities investigated MS-13 in Charlotte, North Carolina. Eventually the work led to charges against 26 MS-13 members, including 7 trial convictions in January 2010, 18 guilty pleas, and 11 multi-year prison sentences.[73]

This included the alleged first federal death-penalty conviction for an MS-13 member, Alejandro Enrique Ramirez Umaña, aka “Wizard” (age 25).[73]

In 2005, in Los Angeles, according to a jury in a later sentencing phase, Umaña murdered Jose Herrera and Gustavo Porras on July 27, and participated in and aided and abetted the killing of Andy Abarca on September 28. He later came to Charlotte, North Carolina, according to witnesses, as a veteran member of MS-13, to reorganize the Charlotte cell of the gang.[73]

According to witnesses at his trial on December 8, 2007, while in the Las Jarochitas, a family-run restaurant in Greensboro, North Carolina, Umaña shot Ruben Garcia Salinas fatally in the chest and Manuel Garcia Salinas in the head. Witnesses testified that the shootings took place after the Garcia Salinas brothers had “disrespected” Umaña’s gang signs by calling them “fake”. Firing three more shots in the restaurant, according to trial testimony, Umaña injured another person with his gunfire. Trial testimony and evidence showed that Umaña later fled back to Charlotte with MS-13 assistance. Umaña was arrested five days later in possession of the murder weapon. Additional evidence and testimony from the trial revealed that while Umaña was incarcerated awaiting trial he coordinated attempts to kill witnesses and informants.[73]

Umaña was indicted by a federal grand jury on June 23, 2008. During trial, he attempted to bring a knife with him to the courtroom, which was discovered by U.S. Marshals before he was transported to the courthouse. Thousands of hours were spent on the case over several years. International work was also involved.[73]

The case was investigated by the Charlotte Safe Streets Task Force. The case was prosecuted by Chief Criminal Assistant U.S. Attorney Jill Westmoreland Rose of the U.S. Attorney’s Office for the Western District of North Carolina, and Trial Attorney Sam Nazzaro from the Criminal Division’s Gang Unit. Assistant U.S. Attorneys Don Gast and Adam Morris of the U.S. Attorney’s Office for the Western District of North Carolina were also members of the government’s trial team.[73]

Charges included:[73]

  • Murder in aid of the racketeering enterprise known as MS-13, two counts
  • Murder resulting from the use of a gun in a violent crime, two counts
  • Conspiracy to participate in racketeering
  • Witness tampering or intimidation, two counts
  • Possession of a firearm by an illegal alien
  • Extortion

On April 19, 2010, the jury convicted Umaña of all charges, and additionally found him responsible for the 2005 murders during the sentencing phase. On April 28 a 12-person federal jury in Charlotte voted unanimously to impose the death penalty. On July 27, 2010, Chief U.S. District Judge Robert J. Conrad, Jr., of Charlotte, NC, formally imposed the federal death penalty sentence. Also commenting on the decision in the government press release were Assistant Attorney General Lanny A. Breuer, of the Criminal Division, U.S. Attorney Anne M. Tompkins of the Western District of North Carolina, Owen D Harris, Special Agent in charge of the Charlotte Division of the FBI, and Rodney Monreo, Charlotte-Mecklenburg Police Chief.[73]

The case was automatically appealed under Federal Rules of Criminal Procedure.[73]

Sanctions

In October 2012 the US Treasury Department announced a freeze on American-owned assets controlled by the organization and listed MS-13 as a Transnational Criminal Organization.[74] While the three leaders (José Luís Mendoza Figueroa, Eduardo Erazo Nolasco, and Élmer Canales Rivera) were imprisoned in El Salvador, they continued to give orders. As a result, the US Treasury Department imposed further sanctions in 2015, allowing the government to seize all assets controlled by these men and any business with these leaders would no longer be allowed.[75]

On November 16, 2017 the U.S. Department of Homeland Security (DHS), U.S. Department of Justice (DOJ), and Immigration and Customs Enforcement (ICE), officials announced that they arrested a total of 267 alleged MS-13 gang members and associates in Operation Raging Bull, which was carried out in two phases. The first phase was in September 2017, and resulted in 53 arrests in El Salvador. The second phases was between October 8 and November 11, 2017, and resulted in 214 arrests in the U.S. Charges included drug traffickingchild prostitutionhuman smugglingracketingconspiracy to commit murder.[76][77][78][79]

In film

  • Principal characters of the feature movie Sin Nombre (2009) are members of MS in ChiapasMexico and many of the traditions and practices of MS are depicted accurately (killings, tattoos, initiation, exploitation of migrants, etc.).
  • Violence by MS-13 against immigrants at Guatemala–Mexico border is pictured in the feature movie La vida precoz y breve de Sabina Rivas (2012).
  • National Geographic created a documentary in 2005 titled World’s Most Dangerous Gang,[80][81] portraying MS-13.
  • In the debut season of The History Channel’s television series Gangland released two full episodes covering MS-13:
  1. 2007 season 1 episode 2, titled “You Rat, You Die” – Former gang member turned informant Brenda Paz had been supplying the authorities with first-hand accounts of MS-13’s operations, later she was found dead.[82]
  2. 2008 season 1 episode 13, titled “Root of All Evil” – Reports on the drugs and prostitution rackets run by MS-13.[83][84]

See also

References

https://en.wikipedia.org/wiki/MS-13

In reference to ‘animals,’ Trump evokes an ugly history of dehumanization

 May 16 

President Trump on Thursday pointedly referred to undocumented immigrants as “animals” in a statement his critics say betrays a gross misunderstanding of the plight of people who came to the United States illegally, and beyond that, little sympathy for them.

During an immigration roundtable at the White House with administration aides, political leaders and California law enforcement officials, Trump said his administration was deporting undocumented immigrants who commit violent crimes.

Here’s the transcript:

Fresno County Sheriff Margaret Mims: Thank you. There could be an MS-13 member I know about — if they don’t reach a certain threshold, I cannot tell ICE about it.

President Trump: We have people coming into the country, or trying to come in — and we’re stopping a lot of them — but we’re taking people out of the country. You wouldn’t believe how bad these people are. These aren’t people. These are animals. And we’re taking them out of the country at a level and at a rate that’s never happened before. And because of the weak laws, they come in fast, we get them, we release them, we get them again, we bring them out. It’s crazy.

When it comes to undocumented immigrants, you don’t always know which Trump you are going to get. The same president who encourages attendees at his rally to chant “build that wall” also pledged to approach those who illegally immigrated to the United States as children with “great heart.”

The Post’s Robert Costa points out this isn’t the first time he’s used the term in an illegal immigration context.

Robert Costa

@costareports

President Trump has used the “animal” phrase going back, at least, to 2015. https://www.washingtonpost.com/news/post-politics/wp/2015/07/12/listening-to-donald-trump-swear-and-talk-politics-on-his-private-plane/  https://twitter.com/cspan/status/996845374819192833 

Listening to Donald Trump swear and talk politics on his private plane

The real estate mogul says, ‘I’ll keep doing my thing.’

washingtonpost.com

More recently, during a March news conference for the signing of a spending bill, Trump said, “I can tell you this, and I say this to DACA recipients, that the Republicans are with you. They want to get your situation taken care of. The Democrats fought us. But I do want the Hispanic community to know and DACA recipients to know that Republicans are much more on your side than the Democrats, who are using you for their own purposes.”

And that comment came about two months after Trump reportedly expressed his frustration with staffers while discussing the protection of immigrants from Haiti, El Salvador and African countries as part of a bipartisan immigration deal.

“Why are we having all these people from s—hole countries come here?” Trump asked, according to several people at the meeting, referring to countries mentioned by the lawmakers.

Since Trump launched his presidential campaign calling Mexican immigrants “rapists” and “murderers,” he has attracted scorn and praise for his hard-line immigration policies.

But while his critics previously called his policy proposals inhumane, these recent words caught on tape display how lowly Trump views those who commit crimes after arriving in the United States illegally.

This would not likely be a problem for much of Trump’s base. The president campaigned on a law-and-order platform, regularly providing examples of undocumented immigrants committing horrific crimes. To many of his supporters, honoring the humanity of individuals who behaved so inhumanely is not a priority.

But those who want to see the president take a more compassionate approach on immigration see statements like this as conflating the minority of undocumented immigrants who get involved with criminal activity with the “dreamers” and other law-abiding immigrants.

There’s important historical context here, too, that many social media users pointed out: Referring to marginalized groups as subhuman has been a way dictators have justified the abuse of those groups. This happened with the Jewish people during the Holocaust. It happen with the Tutsis during the Rwandan genocide. And it is happening with the Rohingya people in Burma.

Clint Smith

@ClintSmithIII

Before enslavement Africans were called “apes”

Before the Holocaust Jewish people were called “rats”

Before the Rwandan genocide Tutsis were called “cockroaches”

Calling undocumented people “animals” as the president just did is gravely serious. It’s not just an offensive word

Clint Smith

@ClintSmithIII

It’s easy to dismiss what Trump said as nonsense & it’s easy to see discussion about its potential impact as hyperbolic, but there is a long tradition of entire groups of people being likened to animals before & during periods of mass violence against them. pic.twitter.com/Ap943mO8x7

View image on TwitterView image on TwitterView image on Twitter

Generalizations and stereotypes led many citizens of those countries to view entire ethnic groups of people so negatively that respecting their lives was of little priority. This empowered people to discriminate against or even physically harm and kill them.

That’s a scary evocation, but more practically in the near term, Trump’s rhetoric will be fodder for his opponents as his party hurtles toward a midterm in which many of its endangered members will be saddled with Trump’s words.

This post has been updated.

https://www.washingtonpost.com/news/the-fix/wp/2018/05/16/trumps-animals-comment-on-undocumented-immigrants-earn-backlash-historical-comparisons/?noredirect=on&utm_term=.79eed67d784c

 

 

The Pronk Pops Show Podcasts Portfolio

Listen To Pronk Pops Podcast or Download Shows 1073-1079

Listen To Pronk Pops Podcast or Download Shows 1066-1073

Listen To Pronk Pops Podcast or Download Shows 1058-1065

Listen To Pronk Pops Podcast or Download Shows 1048-1057

Listen To Pronk Pops Podcast or Download Shows 1041-1047

Listen To Pronk Pops Podcast or Download Shows 1033-1040

Listen To Pronk Pops Podcast or Download Shows 1023-1032

Listen To Pronk Pops Podcast or Download Shows 1017-1022

Listen To Pronk Pops Podcast or Download Shows 1010-1016

Listen To Pronk Pops Podcast or Download Shows 1001-1009

Listen To Pronk Pops Podcast or Download Shows 993-1000

Listen To Pronk Pops Podcast or Download Shows 984-992

Listen To Pronk Pops Podcast or Download Shows 977-983

Listen To Pronk Pops Podcast or Download Shows 970-976

Listen To Pronk Pops Podcast or Download Shows 963-969

Listen To Pronk Pops Podcast or Download Shows 955-962

Listen To Pronk Pops Podcast or Download Shows 946-954

Listen To Pronk Pops Podcast or Download Shows 938-945

Listen To Pronk Pops Podcast or Download Shows 926-937

Listen To Pronk Pops Podcast or Download Shows 916-925

Listen To Pronk Pops Podcast or Download Shows 906-915

Listen To Pronk Pops Podcast or Download Shows 889-896

Listen To Pronk Pops Podcast or Download Shows 884-888

Listen To Pronk Pops Podcast or Download Shows 878-883

Listen To Pronk Pops Podcast or Download Shows 870-877

Listen To Pronk Pops Podcast or Download Shows 864-869

Listen To Pronk Pops Podcast or Download Shows 857-863

Listen To Pronk Pops Podcast or Download Shows 850-856

Listen To Pronk Pops Podcast or Download Shows 845-849

Listen To Pronk Pops Podcast or Download Shows 840-844

Listen To Pronk Pops Podcast or Download Shows 833-839

Listen To Pronk Pops Podcast or Download Shows 827-832

Listen To Pronk Pops Podcast or Download Shows 821-826

Listen To Pronk Pops Podcast or Download Shows 815-820

Listen To Pronk Pops Podcast or Download Shows 806-814

Listen To Pronk Pops Podcast or Download Shows 800-805

Listen To Pronk Pops Podcast or Download Shows 793-799

Listen To Pronk Pops Podcast or Download Shows 785-792

Listen To Pronk Pops Podcast or Download Shows 777-784

Listen To Pronk Pops Podcast or Download Shows 769-776

Listen To Pronk Pops Podcast or Download Shows 759-768

Listen To Pronk Pops Podcast or Download Shows 751-758

Listen To Pronk Pops Podcast or Download Shows 745-750

Listen To Pronk Pops Podcast or Download Shows 738-744

Listen To Pronk Pops Podcast or Download Shows 732-737

Listen To Pronk Pops Podcast or Download Shows 727-731

Listen To Pronk Pops Podcast or Download Shows 720-726

Listen To Pronk Pops Podcast or DownloadShows 713-719

Listen To Pronk Pops Podcast or DownloadShows 705-712

Listen To Pronk Pops Podcast or Download Shows 695-704

Listen To Pronk Pops Podcast or Download Shows 685-694

Listen To Pronk Pops Podcast or Download Shows 675-684

Listen To Pronk Pops Podcast or Download Shows 668-674

Listen To Pronk Pops Podcast or Download Shows 660-667

Listen To Pronk Pops Podcast or Download Shows 651-659

Listen To Pronk Pops Podcast or Download Shows 644-650

Listen To Pronk Pops Podcast or Download Shows 637-643

Listen To Pronk Pops Podcast or Download Shows 629-636

Listen To Pronk Pops Podcast or Download Shows 617-628

Listen To Pronk Pops Podcast or Download Shows 608-616

Listen To Pronk Pops Podcast or Download Shows 599-607

Listen To Pronk Pops Podcast or Download Shows 590-598

Listen To Pronk Pops Podcast or Download Shows 585- 589

Listen To Pronk Pops Podcast or Download Shows 575-584

Listen To Pronk Pops Podcast or Download Shows 565-574

Listen To Pronk Pops Podcast or Download Shows 556-564

Listen To Pronk Pops Podcast or Download Shows 546-555

Listen To Pronk Pops Podcast or Download Shows 538-545

Listen To Pronk Pops Podcast or Download Shows 532-537

Listen To Pronk Pops Podcast or Download Shows 526-531

Listen To Pronk Pops Podcast or Download Shows 519-525

Listen To Pronk Pops Podcast or Download Shows 510-518

Listen To Pronk Pops Podcast or Download Shows 500-509

Listen To Pronk Pops Podcast or Download Shows 490-499

Listen To Pronk Pops Podcast or Download Shows 480-489

Listen To Pronk Pops Podcast or Download Shows 473-479

Listen To Pronk Pops Podcast or Download Shows 464-472

Listen To Pronk Pops Podcast or Download Shows 455-463

Listen To Pronk Pops Podcast or Download Shows 447-454

Listen To Pronk Pops Podcast or Download Shows 439-446

Listen To Pronk Pops Podcast or Download Shows 431-438

Listen To Pronk Pops Podcast or Download Shows 422-430

Listen To Pronk Pops Podcast or Download Shows 414-421

Listen To Pronk Pops Podcast or Download Shows 408-413

Listen To Pronk Pops Podcast or Download Shows 400-407

Listen To Pronk Pops Podcast or Download Shows 391-399

Listen To Pronk Pops Podcast or Download Shows 383-390

Listen To Pronk Pops Podcast or Download Shows 376-382

Listen To Pronk Pops Podcast or Download Shows 369-375

Listen To Pronk Pops Podcast or Download Shows 360-368

Listen To Pronk Pops Podcast or Download Shows 354-359

Listen To Pronk Pops Podcast or Download Shows 346-353

Listen To Pronk Pops Podcast or Download Shows 338-345

Listen To Pronk Pops Podcast or Download Shows 328-337

Listen To Pronk Pops Podcast or Download Shows 319-327

Listen To Pronk Pops Podcast or Download Shows 307-318

Listen To Pronk Pops Podcast or Download Shows 296-306

Listen To Pronk Pops Podcast or Download Shows 287-295

Listen To Pronk Pops Podcast or Download Shows 277-286

Listen To Pronk Pops Podcast or Download Shows 264-276

Listen To Pronk Pops Podcast or Download Shows 250-263

Listen To Pronk Pops Podcast or Download Shows 236-249

Listen To Pronk Pops Podcast or Download Shows 222-235

Listen To Pronk Pops Podcast or Download Shows 211-221

Listen To Pronk Pops Podcast or Download Shows 202-210

Listen To Pronk Pops Podcast or Download Shows 194-201

Listen To Pronk Pops Podcast or Download Shows 184-193

Listen To Pronk Pops Podcast or Download Shows 174-183

Listen To Pronk Pops Podcast or Download Shows 165-173

Listen To Pronk Pops Podcast or Download Shows 158-164

Listen To Pronk Pops Podcast or Download Shows 151-157

Listen To Pronk Pops Podcast or Download Shows 143-150

Listen To Pronk Pops Podcast or Download Shows 135-142

Listen To Pronk Pops Podcast or Download Shows 131-134

Listen To Pronk Pops Podcast or Download Shows 124-130

Listen To Pronk Pops Podcast or Download Shows 121-123

Listen To Pronk Pops Podcast or Download Shows 118-120

Listen To Pronk Pops Podcast or Download Shows 113 -117

Listen To Pronk Pops Podcast or Download Show 112

Listen To Pronk Pops Podcast or Download Shows 108-111

Listen To Pronk Pops Podcast or Download Shows 106-108

Listen To Pronk Pops Podcast or Download Shows 104-105

Listen To Pronk Pops Podcast or Download Shows 101-103

Listen To Pronk Pops Podcast or Download Shows 98-100

Listen To Pronk Pops Podcast or Download Shows 94-97

Listen To Pronk Pops Podcast or Download Show 93

Listen To Pronk Pops Podcast or Download Show 92

Listen To Pronk Pops Podcast or Download Show 91

Listen To Pronk Pops Podcast or Download Shows 88-90

Listen To Pronk Pops Podcast or Download Shows 84-87

Listen To Pronk Pops Podcast or Download Shows 79-83

Listen To Pronk Pops Podcast or Download Shows 74-78

Listen To Pronk Pops Podcast or Download Shows 71-73

Listen To Pronk Pops Podcast or Download Shows 68-70

Listen To Pronk Pops Podcast or Download Shows 65-67

Listen To Pronk Pops Podcast or Download Shows 62-64

Listen To Pronk Pops Podcast or Download Shows 58-61

Listen To Pronk Pops Podcast or Download Shows 55-57

Listen To Pronk Pops Podcast or Download Shows 52-54

Listen To Pronk Pops Podcast or Download Shows 49-51

Listen To Pronk Pops Podcast or Download Shows 45-48

Listen To Pronk Pops Podcast or Download Shows 41-44

Listen To Pronk Pops Podcast or Download Shows 38-40

Listen To Pronk Pops Podcast or Download Shows 34-37

Listen To Pronk Pops Podcast or Download Shows 30-33

Listen To Pronk Pops Podcast or Download Shows 27-29

Listen To Pronk Pops Podcast or Download Shows 17-26

Listen To Pronk Pops Podcast or Download Shows 16-22

Listen To Pronk Pops Podcast or Download Shows 10-15

Listen To Pronk Pops Podcast or Download Shows 1-9

Read Full Post | Make a Comment ( None so far )

The Pronk Pops Show 1070, May 3, 2018, Story 1: White House National Day of Prayer — Faith, Family, Friends, Freedom ~ First — President Trump’s Address — “I’m praying for you.” — Videos — Story 2: The Great One Mark Levin Tells It Like It Is — Is Anyone In White House and Trump Legal Team Listening? — Videos — Story 3: National Security Agency (NSA) Continues Spying On American People — Secret Surveillance Spying Security State (S5) — Turnkey Tyranny — Videos

Posted on May 5, 2018. Filed under: Addiction, Addiction, American History, Applications, Assault, Barack H. Obama, Benghazi, Blogroll, Breaking News, Bribes, Business, Cartoons, Central Intelligence Agency, College, Communications, Computers, Congress, Constitutional Law, Corruption, Countries, Crime, Culture, Deep State, Defense Spending, Donald J. Trump, Donald J. Trump, Donald Trump, Drugs, Elections, European History, Extortion, Fast and Furious, Federal Bureau of Investigation (FBI), Federal Bureau of Investigation (FBI) and Department of Justice (DOJ), Fiscal Policy, Foreign Policy, Former President Barack Obama, Free Trade, Freedom of Speech, Government, Government Dependency, Government Spending, Great Britain, Hardware, Health, Health Care Insurance, High Crimes, Hillary Clinton, Hillary Clinton, Hillary Clinton, History, House of Representatives, Human, Human Behavior, Illegal Drugs, Illegal Immigration, Immigration, Impeachment, Independence, Israel, Killing, Law, Legal Immigration, Life, Lying, Media, Medicare, Mental Illness, Middle East, MIssiles, National Interest, National Security Agency, News, Nuclear, Obama, People, Philosophy, Photos, Politics, Polls, President Barack Obama, Progressives, Public Corruption, Radio, Raymond Thomas Pronk, Regulation, Rule of Law, Scandals, Security, Senate, Servers, Social Networking, Social Security, Spying, Spying on American People, Success, Surveillance and Spying On American People, Surveillance/Spying, Taxation, Taxes, Technology, Terror, Terrorism, Treason, Trump Surveillance/Spying, United Kingdom, United States of America, Videos, Violence, War, Wealth, Weapons of Mass Destruction, Welfare Spending, Wisdom | Tags: , , , , , , , , , , , , , , , , , , , , , , , , , |

 Project_1

The Pronk Pops Show Podcasts

Pronk Pops Show 1070, May 3, 2018

Pronk Pops Show 1069, May 2, 2018

Pronk Pops Show 1068, April 26, 2018

Pronk Pops Show 1067, April 25, 2018

Pronk Pops Show 1066, April 24, 2018

Pronk Pops Show 1065, April 23, 2018

Pronk Pops Show 1064, April 19, 2018

Pronk Pops Show 1063, April 18, 2018

Pronk Pops Show 1062, April 17, 2018

Pronk Pops Show 1061, April 16, 2018

Pronk Pops Show 1060, April 12, 2018

Pronk Pops Show 1059, April 11, 2018

Pronk Pops Show 1058, April 10, 2018

Pronk Pops Show 1057, April 9, 2018

Pronk Pops Show 1056, April 4, 2018

Pronk Pops Show 1055, April 2, 2018

Pronk Pops Show 1054, March 29, 2018

Pronk Pops Show 1053, March 28, 2018

Pronk Pops Show 1052, March 27, 2018

Pronk Pops Show 1051, March 26, 2018

Pronk Pops Show 1050, March 23, 2018

Pronk Pops Show 1049, March 22, 2018

Pronk Pops Show 1048, March 21, 2018

Pronk Pops Show 1047, March 20, 2018

Pronk Pops Show 1046, March 19, 2018

Pronk Pops Show 1045, March 8, 2018

Pronk Pops Show 1044, March 7, 2018

Pronk Pops Show 1043, March 6, 2018

Pronk Pops Show 1042, March 1, 2018

Pronk Pops Show 1041, February 28, 2018

Pronk Pops Show 1040, February 27, 2018

Pronk Pops Show 1039, February 26, 2018

Pronk Pops Show 1038, February 23, 2018

Pronk Pops Show 1037, February 22, 2018

Pronk Pops Show 1036, February 21, 2018

Pronk Pops Show 1035, February 16, 2018

Pronk Pops Show 1034, February 15, 2018  

Pronk Pops Show 1033, February 14, 2018  

Pronk Pops Show 1032, February 13, 2018

Pronk Pops Show 1031, February 12, 2018

Pronk Pops Show 1030, February 9, 2018

Pronk Pops Show 1028, February 7, 2018

Pronk Pops Show 1027, February 2, 2018

Pronk Pops Show 1026, February 1, 2018

Pronk Pops Show 1025, January 31, 2018

Pronk Pops Show 1024, January 30, 2018

Pronk Pops Show 1023, January 29, 2018

Pronk Pops Show 1022, January 26, 2018

Pronk Pops Show 1021, January 25, 2018

Pronk Pops Show 1020, January 24, 2018

Pronk Pops Show 1019, January 18, 2018

Pronk Pops Show 1018, January 17, 2018

Pronk Pops Show 1017, January 16, 2018

Pronk Pops Show 1016, January 10, 2018

Pronk Pops Show 1015, January 9, 2018

 

See the source imageSee the source image

See the source image

Image result for NSA FBI spied on american people without warrant

See the source image

 

 

Story 1: National Day of Prayer — Faith, Family, Friends, Freedom ~ First — President Trump’s Address — Videos

See the source image

President Trump Speaks at White House’s National Day of Prayer Event – May 3, 2018

President Trump Attends the National Day of Prayer

5/3/18: White House Press Briefing

2018 – Proclamation

NATIONAL DAY OF PRAYER, 2018

– – – – – – –

BY THE PRESIDENT OF THE UNITED STATES OF AMERICA

A PROCLAMATION

On this National Day of Prayer, we join together to offer gratitude for our many blessings and to acknowledge our need for divine wisdom, guidance, and protection.  Prayer, by which we affirm our dependence on God, has long been fundamental to our pursuit of freedom, peace, unity, and prosperity.  Prayer sustains us and brings us comfort, hope, peace, and strength.  Therefore, we must cherish our spiritual foundation and uphold our legacy of faith.

Prayer has been a source of guidance, strength, and wisdom since the founding of our Republic.  When the Continental Congress gathered in Philadelphia to contemplate freedom from Great Britain, the delegates prayed daily for guidance.  Their efforts produced the Declaration of Independence and its enumeration of the self-evident truths that we all cherish today.  We believe that all men and women are created equal and endowed by their Creator with certain inalienable rights, including life, liberty, and the pursuit of happiness.  Prayer sustained us and gave us the strength to endure the sacrifices and suffering of the American Revolution and to temper the triumph of victory with humility and gratitude.  Notably, as one of its first acts, our newly formed Congress appointed chaplains of the House of Representatives and Senate so that all proceedings would begin with prayer.

As a Nation, we have continued to seek God in prayer, including in times of conflict and darkness.  At the height of World War II, President Franklin D. Roosevelt called for prayer “for the vision to see our way clearly ‑‑ to see the way that leads to a better life for ourselves and for all our fellow men ‑‑ and to the achievement of His will to peace on earth.”  Decades later, following one of the darkest days in our Nation’s history, President George W. Bush offered this prayer for our heartbroken country, mourning the precious souls who perished in the terrorist attacks on September 11, 2001:  “We ask Almighty God to watch over our Nation, and grant us patience and resolve in all that is to come.  We pray that He will comfort and console those who now walk in sorrow.  We thank Him for each life we now must mourn, and the promise of a life to come.”

America has known peace, prosperity, war, and depression ‑‑ and prayer has sustained us through it all.  May our Nation and our people never forget the love, grace, and goodness of our Maker, and may our praise and gratitude never cease.  On this National Day of Prayer, let us come together, all according to their faiths, to thank God for His many blessings and ask for His continued guidance and strength.

In 1988, the Congress, by Public Law 100-307, as amended, called on the President to issue each year a proclamation designating the first Thursday in May as a National Day of Prayer, “on which the people of the United States may turn to God in prayer and meditation at churches, in groups, and as individuals.”

NOW, THEREFORE, I, DONALD J. TRUMP, President of the United States of America, do hereby proclaim May 3 as a National Day of Prayer.  I encourage all Americans to observe this day, reflecting on the blessings our Nation has received and the importance of prayer, with appropriate programs, ceremonies, and activities in their houses of worship, communities, and places of work, schools, and homes.

IN WITNESS WHEREOF, I have hereunto set my hand this third day of May, in the year of our Lord two thousand eighteen, and of the Independence of the United States of America the two hundred and forty-second.

DONALD J. TRUMP

http://www.nationaldayofprayer.org/2018_proclamation

Story 2: The Great One Mark Levin Tells It Like It Is — Is Anyone In White House and Trump Legal Team Listening? — Videos —

Mark Levin: Legal precedent is on Trump’s side

Judge Napolitano: Trump can’t be indicted while president

Can a sitting president be prosecuted? Might Donald Trump, or any president, face the prospect of jail?

A memorandum of law, written in 1998 but released last week, concludes that the answer is a qualified “yes.” The memorandum was written by Chapman University law professor Ronald Rotunda, who was then at the University of Illinois, for Kenneth Starr, the independent counsel appointed to investigate President Bill Clinton.

Rotunda’s memorandum is learned, illuminating and impressively detailed. The issue is both tough and unsettled. But there’s a better answer: an unqualified “no.”

The drafters of the Constitution spent a lot of time on the question of how to respond to presidential wrongdoing. Their remedy was impeachment (by the House of Representatives) and then conviction (by the Senate), which could occur for “Treason, Bribery, or other high Crimes and Misdemeanors.”

But what happens if the president is convicted by the Senate? Here’s the constitutional answer:

Judgment in Cases of Impeachment shall not extend further than to removal from office, and disqualification to hold and enjoy any Office of honor, Trust or Profit under the United States: but the Party convicted shall nevertheless be liable and subject to Indictment, Trial, Judgment and Punishment, according to Law.

A reasonable interpretation of this provision is that it sets out a temporal sequence: Impeachment, then conviction and removal from office — and only after that, indictment, trial, judgment and punishment.

Alexander Hamilton seemed to read the provision exactly that way: “The President of the United States would be liable to be impeached, tried, and, upon conviction of treason, bribery, or other high crimes or misdemeanors, removed from office; and would afterwards be liable to prosecution and punishment in the ordinary course of law.”

That means you can’t indict and try a sitting president. He has to be removed first.

True, this interpretation isn’t inevitable. You could read the text to mean only that the consequence of conviction is removal from office, and that a convicted president can be prosecuted — but to be silent on, and so not to resolve, the question whether a president can be prosecuted for crimes while in office. On that interpretation, nothing in the Constitution rules out a prosecution of the president for (say) obstruction of justice or for perjury.

Rotunda also emphasizes that a president might commit crimes, such as battery, shoplifting and document destruction, that may not be “high” in the constitutional sense, and so not a legitimate basis for impeachment. If he’s immune from prosecution, does the president get a free ride? Since the founders believed no one should be above the law, Rotunda doesn’t think that makes a lot of sense.

Importantly, though, he does not contend that the president can be prosecuted for actions he undertakes in his official capacity. His conclusion that a sitting president can be prosecuted is strictly limited to actions committed before becoming president, and actions that a president does not undertake in his role as president, such as Clinton’s alleged perjury. (True, the line between the official and unofficial acts can be thin.)

The problem with Rotunda’s argument is that presidential immunity from criminal prosecution — while in office — is a pretty reasonable inference from the constitutional design. Whether or not you like the current occupant of the Oval Office, he has an awesome array of responsibilities. Even on a slow day, numerous decisions reach his desk. They might involve potential terrorist attacks, a looming epidemic, immigration or air pollution. Facing a criminal prosecution seems fatally incompatible with the president’s constitutional role.

Aware of this argument, Rotunda notes that the Supreme Court allowed Paula Jones’s sexual harassment suit to go forward against Bill Clinton, notwithstanding Clinton’s argument that to do his job, a sitting president needs to have immunity against such lawsuits. Among other things, the Supreme Court answered that trial judges could find ways to accommodate the president’s schedule. Why isn’t the same thing true for a criminal prosecution?

That’s a fair question, but a criminal proceeding is unique, and the problem isn’t really about scheduling. Realistically speaking, any White House would be pretty well disabled if the president is under a criminal indictment and faces the prospect of trial and imprisonment.

Rotunda is aware of the risk, and leaves open the possibility that imprisonment itself might be delayed, so that the prosecution would not compete with the impeachment mechanism. But that’s hardly sufficient. The question is whether the president’s ability to perform his constitutional functions would be impaired by the prosecution itself. There’s little doubt that it would.

Does this mean that the president is above the law? Not at all. In cases of serious wrongdoing, and breaches of public trust, the Constitution provides a remedy: impeachment.

Story 3: National Security Agency (NSA) Continues Spying On American People — Secret Surveillance Spying Security State (S5) — Turnkey Tyranny — Videos

See the source image

See the source image

 

See the source image

See the source image

See the source image

See the source image

See the source image

See the source image

See the source image

See the source image

See the source image

See the source image

See the source imageSee the source image

See the source image

See the source image

See the source image

See the source image

See the source image

See the source image

See the source image

See the source image

See the source image

See the source image

See the source imageSee the source imageSee the source image

See the source image

See the source image

See the source image

See the source imageSee the source image

NSA collected 500 million U.S. call records in 2017

America’s Most Secret Agency Documentary | National Security Agency NSA History Documentary

NSA ‘spying’ on Americans with little impact on bad guys?

NSA Whistleblower: Everyone in US under virtual surveillance, all info stored, no matter the post

NSA violating the constitution, public trust by spying on citizens – veteran intel. officer

Why the US Government thinks spying on Americans without a warrant is OK

10 Ways You’re Being Watched by the Government

10 Surprising Ways the Government is Spying on You

Turnkey Tyranny

NSA whistleblower Edward Snowden “My Greatest Fear … is turnkey tyranny”

You’re Being Watched”: Edward Snowden Emerges as Source Behind Explosive Revelations of NSA Spying

Is Snowden The Real Deal

NBC Censors Edward Snowden’s 9/11 Comments

Obama: Spying on Americans

How the NSA Spies on Americans (Jim Harper)

America’s Most Secret Agency Documentary | National Security Agency NSA History Documentary

Bill Binney: U.S. press and CIA are interlinked

Bill Binney: ThinThread dismantled weeks after 9/11

Bill Binney: Impossible to protect ourselves against NSA

Bill Binney: Trump was spied on before taking office

Bill Binney: NSA “drum up a new cold war”

Bill Binney: The constitution is being violated

NSA WHISTLEBLOWER BILL BINNEY: WE HAVE HILLARY’S EMAILS

NSA Whistleblower William Binney: The Future of FREEDOM

William Binney – The Government is Profiling You (The NSA is Spying on You)

Spy agency NSA triples collection of U.S. phone records: official report

WASHINGTON (Reuters) – The U.S. National Security Agency collected 534 million records of phone calls and text messages of Americans last year, more than triple gathered in 2016, a U.S. intelligence agency report released on Friday said.

 

FILE PHOTO: The National Security Agency (NSA) headquarters is seen in Fort Meade, Maryland, U.S. February 14, 2018. REUTERS/Sait Serkan Gurbuz

The sharp increase from 151 million occurred during the second full year of a new surveillance system established at the spy agency after U.S. lawmakers passed a law in 2015 that sought to limit its ability to collect such records in bulk.

The spike in collection of call records coincided with an increase reported on Friday across other surveillance methods, raising questions from some privacy advocates who are concerned about potential government overreach and intrusion into the lives of U.S. citizens.

The 2017 call records tally remained far less than an estimated billions of records collected per day under the NSA’s old bulk surveillance system, which was exposed by former U.S. intelligence contractor Edward Snowden in 2013.

The records collected by the NSA include the numbers and time of a call or text message, but not their content.

Overall increases in surveillance hauls were both mystifying and alarming coming years after Snowden’s leaks, privacy advocates said.

“The intelligence community’s transparency has yet to extend to explaining dramatic increases in their collection,” said Robyn Greene, policy counsel at the Washington-based Open Technology Institute that focuses on digital issues.

The government “has not altered the manner in which it uses its authority to obtain call detail records,” Timothy Barrett, a spokesman at the Office of the Director of National Intelligence, which released the annual report, said in a statement.

The NSA has found that a number of factors may influence the amount of records collected, Barrett said. These included the number of court-approved selection terms, which could be a phone number of someone who is potentially the subject of an investigation, or the amount of historical information retained by phone service providers, Barrett said.

“We expect this number to fluctuate from year to year,” he said.

U.S. intelligence officials have said the number of records collected would include multiple calls made to or from the same phone numbers and involved a level of duplication when obtaining the same record of a call from two different companies.

Friday’s report also showed a rise in the number of foreigners living outside the United States who were targeted under a warrantless internet surveillance program, known as Section 702 of the Foreign Intelligence Surveillance Act, that Congress renewed earlier this year.

That figure increased to 129,080 in 2017 from 106,469 in 2016, the report said, and is up from 89,138 targets in 2013, or a cumulative rise over five years of about 45 percent.

U.S. intelligence agencies consider Section 702 a vital tool to protect national security but privacy advocates say the program incidentally collects an unknown number of communications belonging to Americans.

 

 

The Pronk Pops Show Podcasts Portfolio

Listen To Pronk Pops Podcast or Download Shows 1066-1070

Listen To Pronk Pops Podcast or Download Shows 1058-1065

Listen To Pronk Pops Podcast or Download Shows 1048-1057

Listen To Pronk Pops Podcast or Download Shows 1041-1047

Listen To Pronk Pops Podcast or Download Shows 1033-1040

Listen To Pronk Pops Podcast or Download Shows 1023-1032

Listen To Pronk Pops Podcast or Download Shows 1017-1022

Listen To Pronk Pops Podcast or Download Shows 1010-1016

Listen To Pronk Pops Podcast or Download Shows 1001-1009

Listen To Pronk Pops Podcast or Download Shows 993-1000

Listen To Pronk Pops Podcast or Download Shows 984-992

Listen To Pronk Pops Podcast or Download Shows 977-983

Listen To Pronk Pops Podcast or Download Shows 970-976

Listen To Pronk Pops Podcast or Download Shows 963-969

Listen To Pronk Pops Podcast or Download Shows 955-962

Listen To Pronk Pops Podcast or Download Shows 946-954

Listen To Pronk Pops Podcast or Download Shows 938-945

Listen To Pronk Pops Podcast or Download Shows 926-937

Listen To Pronk Pops Podcast or Download Shows 916-925

Listen To Pronk Pops Podcast or Download Shows 906-915

Listen To Pronk Pops Podcast or Download Shows 889-896

Listen To Pronk Pops Podcast or Download Shows 884-888

Listen To Pronk Pops Podcast or Download Shows 878-883

Listen To Pronk Pops Podcast or Download Shows 870-877

Listen To Pronk Pops Podcast or Download Shows 864-869

Listen To Pronk Pops Podcast or Download Shows 857-863

Listen To Pronk Pops Podcast or Download Shows 850-856

Listen To Pronk Pops Podcast or Download Shows 845-849

Listen To Pronk Pops Podcast or Download Shows 840-844

Listen To Pronk Pops Podcast or Download Shows 833-839

Listen To Pronk Pops Podcast or Download Shows 827-832

Listen To Pronk Pops Podcast or Download Shows 821-826

Listen To Pronk Pops Podcast or Download Shows 815-820

Listen To Pronk Pops Podcast or Download Shows 806-814

Listen To Pronk Pops Podcast or Download Shows 800-805

Listen To Pronk Pops Podcast or Download Shows 793-799

Listen To Pronk Pops Podcast or Download Shows 785-792

Listen To Pronk Pops Podcast or Download Shows 777-784

Listen To Pronk Pops Podcast or Download Shows 769-776

Listen To Pronk Pops Podcast or Download Shows 759-768

Listen To Pronk Pops Podcast or Download Shows 751-758

Listen To Pronk Pops Podcast or Download Shows 745-750

Listen To Pronk Pops Podcast or Download Shows 738-744

Listen To Pronk Pops Podcast or Download Shows 732-737

Listen To Pronk Pops Podcast or Download Shows 727-731

Listen To Pronk Pops Podcast or Download Shows 720-726

Listen To Pronk Pops Podcast or DownloadShows 713-719

Listen To Pronk Pops Podcast or DownloadShows 705-712

Listen To Pronk Pops Podcast or Download Shows 695-704

Listen To Pronk Pops Podcast or Download Shows 685-694

Listen To Pronk Pops Podcast or Download Shows 675-684

Listen To Pronk Pops Podcast or Download Shows 668-674

Listen To Pronk Pops Podcast or Download Shows 660-667

Listen To Pronk Pops Podcast or Download Shows 651-659

Listen To Pronk Pops Podcast or Download Shows 644-650

Listen To Pronk Pops Podcast or Download Shows 637-643

Listen To Pronk Pops Podcast or Download Shows 629-636

Listen To Pronk Pops Podcast or Download Shows 617-628

Listen To Pronk Pops Podcast or Download Shows 608-616

Listen To Pronk Pops Podcast or Download Shows 599-607

Listen To Pronk Pops Podcast or Download Shows 590-598

Listen To Pronk Pops Podcast or Download Shows 585- 589

Listen To Pronk Pops Podcast or Download Shows 575-584

Listen To Pronk Pops Podcast or Download Shows 565-574

Listen To Pronk Pops Podcast or Download Shows 556-564

Listen To Pronk Pops Podcast or Download Shows 546-555

Listen To Pronk Pops Podcast or Download Shows 538-545

Listen To Pronk Pops Podcast or Download Shows 532-537

Listen To Pronk Pops Podcast or Download Shows 526-531

Listen To Pronk Pops Podcast or Download Shows 519-525

Listen To Pronk Pops Podcast or Download Shows 510-518

Listen To Pronk Pops Podcast or Download Shows 500-509

Listen To Pronk Pops Podcast or Download Shows 490-499

Listen To Pronk Pops Podcast or Download Shows 480-489

Listen To Pronk Pops Podcast or Download Shows 473-479

Listen To Pronk Pops Podcast or Download Shows 464-472

Listen To Pronk Pops Podcast or Download Shows 455-463

Listen To Pronk Pops Podcast or Download Shows 447-454

Listen To Pronk Pops Podcast or Download Shows 439-446

Listen To Pronk Pops Podcast or Download Shows 431-438

Listen To Pronk Pops Podcast or Download Shows 422-430

Listen To Pronk Pops Podcast or Download Shows 414-421

Listen To Pronk Pops Podcast or Download Shows 408-413

Listen To Pronk Pops Podcast or Download Shows 400-407

Listen To Pronk Pops Podcast or Download Shows 391-399

Listen To Pronk Pops Podcast or Download Shows 383-390

Listen To Pronk Pops Podcast or Download Shows 376-382

Listen To Pronk Pops Podcast or Download Shows 369-375

Listen To Pronk Pops Podcast or Download Shows 360-368

Listen To Pronk Pops Podcast or Download Shows 354-359

Listen To Pronk Pops Podcast or Download Shows 346-353

Listen To Pronk Pops Podcast or Download Shows 338-345

Listen To Pronk Pops Podcast or Download Shows 328-337

Listen To Pronk Pops Podcast or Download Shows 319-327

Listen To Pronk Pops Podcast or Download Shows 307-318

Listen To Pronk Pops Podcast or Download Shows 296-306

Listen To Pronk Pops Podcast or Download Shows 287-295

Listen To Pronk Pops Podcast or Download Shows 277-286

Listen To Pronk Pops Podcast or Download Shows 264-276

Listen To Pronk Pops Podcast or Download Shows 250-263

Listen To Pronk Pops Podcast or Download Shows 236-249

Listen To Pronk Pops Podcast or Download Shows 222-235

Listen To Pronk Pops Podcast or Download Shows 211-221

Listen To Pronk Pops Podcast or Download Shows 202-210

Listen To Pronk Pops Podcast or Download Shows 194-201

Listen To Pronk Pops Podcast or Download Shows 184-193

Listen To Pronk Pops Podcast or Download Shows 174-183

Listen To Pronk Pops Podcast or Download Shows 165-173

Listen To Pronk Pops Podcast or Download Shows 158-164

Listen To Pronk Pops Podcast or Download Shows 151-157

Listen To Pronk Pops Podcast or Download Shows 143-150

Listen To Pronk Pops Podcast or Download Shows 135-142

Listen To Pronk Pops Podcast or Download Shows 131-134

Listen To Pronk Pops Podcast or Download Shows 124-130

Listen To Pronk Pops Podcast or Download Shows 121-123

Listen To Pronk Pops Podcast or Download Shows 118-120

Listen To Pronk Pops Podcast or Download Shows 113 -117

Listen To Pronk Pops Podcast or Download Show 112

Listen To Pronk Pops Podcast or Download Shows 108-111

Listen To Pronk Pops Podcast or Download Shows 106-108

Listen To Pronk Pops Podcast or Download Shows 104-105

Listen To Pronk Pops Podcast or Download Shows 101-103

Listen To Pronk Pops Podcast or Download Shows 98-100

Listen To Pronk Pops Podcast or Download Shows 94-97

Listen To Pronk Pops Podcast or Download Show 93

Listen To Pronk Pops Podcast or Download Show 92

Listen To Pronk Pops Podcast or Download Show 91

Listen To Pronk Pops Podcast or Download Shows 88-90

Listen To Pronk Pops Podcast or Download Shows 84-87

Listen To Pronk Pops Podcast or Download Shows 79-83

Listen To Pronk Pops Podcast or Download Shows 74-78

Listen To Pronk Pops Podcast or Download Shows 71-73

Listen To Pronk Pops Podcast or Download Shows 68-70

Listen To Pronk Pops Podcast or Download Shows 65-67

Listen To Pronk Pops Podcast or Download Shows 62-64

Listen To Pronk Pops Podcast or Download Shows 58-61

Listen To Pronk Pops Podcast or Download Shows 55-57

Listen To Pronk Pops Podcast or Download Shows 52-54

Listen To Pronk Pops Podcast or Download Shows 49-51

Listen To Pronk Pops Podcast or Download Shows 45-48

Listen To Pronk Pops Podcast or Download Shows 41-44

Listen To Pronk Pops Podcast or Download Shows 38-40

Listen To Pronk Pops Podcast or Download Shows 34-37

Listen To Pronk Pops Podcast or Download Shows 30-33

Listen To Pronk Pops Podcast or Download Shows 27-29

Listen To Pronk Pops Podcast or Download Shows 17-26

Listen To Pronk Pops Podcast or Download Shows 16-22

Listen To Pronk Pops Podcast or Download Shows 10-15

Listen To Pronk Pops Podcast or Download Shows 1-9

Read Full Post | Make a Comment ( None so far )

The Pronk Pops Show 1065, April 23, 2018, Story 1: No Official Intelligence From Five Eyes (Australia, Canada, New Zealand, United Kingdom and United States Intelligence Services) For Commencing DOJ/FBI Investigation/Surveillance of Trump — Prosecute The Clinton Obama Democratic Criminal Conspiracy Cabal With Obama DOJ, FBI and CIA Leadership and Employees Based on Democrat National Committee and Clinton Campaign Paid For Fabricated/Fraudulent Opposition Research From Paid Russian Government Agents — Appoint Second Special Counsel Now! — Videos — Story 2: Democratic National Committee Sues Trump campaign, Wikileaks, Russia over 2016 election — Videos — Story 3: Senate Foreign Relations Committee Vote Advances CIA Director Mike Pompeo To Secretary of State Full Vote In Senate — Videos

Posted on April 26, 2018. Filed under: Addiction, American History, Blogroll, Bribery, Bribes, Cartoons, Central Intelligence Agency, Climate Change, Coal, Communications, Congress, Constitutional Law, Corruption, Countries, Culture, Deep State, Donald J. Trump, Donald J. Trump, Donald Trump, Education, Elections, Empires, Employment, Federal Bureau of Investigation (FBI), Government, Government Dependency, Government Spending, Hate Speech, High Crimes, Hillary Clinton, Hillary Clinton, History, House of Representatives, Human Behavior, Illegal Immigration, Illegal Immigration, Immigration, Impeachment, Independence, Iran Nuclear Weapons Deal, James Comey, Killing, Law, Legal Immigration, Life, Lying, Media, Mental Illness, Middle East, Mike Pompeo, National Interest, National Security Agency, Natural Gas, News, North Korea, Nuclear Weapons, Oil, People, Philosophy, Photos, Politics, Polls, Public Corruption, Radio, Rand Paul, Raymond Thomas Pronk, Regulation, Resources, Robert S. Mueller III, Rule of Law, Scandals, Security, Senate, Social Networking, South Korea, Spying, Success, Surveillance and Spying On American People, Surveillance/Spying, Terror, Terrorism, Treason, Trump Surveillance/Spying, Unemployment, United States of America, United States Supreme Court, Videos, Violence, War, Wealth, Weapons, Weapons of Mass Destruction, Wisdom | Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , |

 Project_1

The Pronk Pops Show Podcasts

Pronk Pops Show 1065, April 23, 2018

Pronk Pops Show 1064, April 19, 2018

Pronk Pops Show 1063, April 18, 2018

Pronk Pops Show 1062, April 17, 2018

Pronk Pops Show 1061, April 16, 2018

Pronk Pops Show 1060, April 12, 2018

Pronk Pops Show 1059, April 11, 2018

Pronk Pops Show 1058, April 10, 2018

Pronk Pops Show 1057, April 9, 2018

Pronk Pops Show 1056, April 4, 2018

Pronk Pops Show 1055, April 2, 2018

Pronk Pops Show 1054, March 29, 2018

Pronk Pops Show 1053, March 28, 2018

Pronk Pops Show 1052, March 27, 2018

Pronk Pops Show 1051, March 26, 2018

Pronk Pops Show 1050, March 23, 2018

Pronk Pops Show 1049, March 22, 2018

Pronk Pops Show 1048, March 21, 2018

Pronk Pops Show 1047, March 20, 2018

Pronk Pops Show 1046, March 19, 2018

Pronk Pops Show 1045, March 8, 2018

Pronk Pops Show 1044, March 7, 2018

Pronk Pops Show 1043, March 6, 2018

Pronk Pops Show 1042, March 1, 2018

Pronk Pops Show 1041, February 28, 2018

Pronk Pops Show 1040, February 27, 2018

Pronk Pops Show 1039, February 26, 2018

Pronk Pops Show 1038, February 23, 2018

Pronk Pops Show 1037, February 22, 2018

Pronk Pops Show 1036, February 21, 2018

Pronk Pops Show 1035, February 16, 2018

Pronk Pops Show 1034, February 15, 2018  

Pronk Pops Show 1033, February 14, 2018  

Pronk Pops Show 1032, February 13, 2018

Pronk Pops Show 1031, February 12, 2018

Pronk Pops Show 1030, February 9, 2018

Pronk Pops Show 1028, February 7, 2018

Pronk Pops Show 1027, February 2, 2018

Pronk Pops Show 1026, February 1, 2018

Pronk Pops Show 1025, January 31, 2018

Pronk Pops Show 1024, January 30, 2018

Pronk Pops Show 1023, January 29, 2018

Pronk Pops Show 1022, January 26, 2018

Pronk Pops Show 1021, January 25, 2018

Pronk Pops Show 1020, January 24, 2018

Pronk Pops Show 1019, January 18, 2018

Pronk Pops Show 1018, January 17, 2018

Pronk Pops Show 1017, January 16, 2018

Pronk Pops Show 1016, January 10, 2018

Pronk Pops Show 1015, January 9, 2018

Pronk Pops Show 1014, January 8, 2018

See the source imageImage result for dnc chairman annuonced law suit agains trump campaign and russianSee the source image

Story 1: No Official Intelligence From Five Eyes (Australia, Canada, New Zealand, United Kingdom and United States Intelligence Services) For Commencing DOJ/FBI Investigation/Surveillance of Trump — Prosecute The Clinton Obama Democratic Criminal Conspiracy Cabal With Obama DOJ, FBI and CIA Leadership and Employees Based on Democrat National Committee and Clinton Campaign Paid For Fabricated/Fraudulent Opposition Research From Paid Russian Government Agents — Appoint Second Special Counsel Now! — Videos —

Devin Nunes FULL interview with Maria Bartiromo – Excellent – 4/22/18

Nunes claim sparks new questions about anti-Trump dossier

FBI started Russia probe without ‘official intelligence,’ Nunes claims

Allegations of corruption at top of FBI, DOJ

Hannity: Devin Nunes drops bombshell on Russia probe

[youyube=https://www.youtube.com/watch?v=Bl5x9Yh90X0]

Rep. Devin Nunes Claims There Was No Intelligence To Start Russia Probe

Five Eyes: How the multinational spy network has grown since 9/11

Is The Five Eyes Alliance watching you? – Truthloader

Jim Jordan: Why did DOJ hide Strzok’s link to federal judge?

Rep. Jordan: FBI texts about Obama raise lots of concerns

Former US attorney: FBI officials will likely face charges

Judge Jeanine DROPS The Hammer On FBI And Leaker James Comey Now He Is Scared

Was Obama in on surveillance of team Trump?

New FBI text messages draw a possible connection to Obama

Judge Jeanine: Outing the FBI crime family

 

Five Eyes

From Wikipedia, the free encyclopedia
Five Eyes
UKUSA Map.svg
Official languages English(de facto)
Type Intelligence alliance
Contributors  Australia
 Canada
 New Zealand
 United Kingdom
 United States
Establishment
14 August 1941
17 May 1943

The Five Eyes, often abbreviated as FVEY, is an intelligence alliance comprising AustraliaCanadaNew Zealand, the United Kingdom and the United States. These countries are parties to the multilateral UKUSA Agreement, a treaty for joint cooperation in signals intelligence.[1][2][3]

The origins of the FVEY can be traced back to the post-World War II period, when the Atlantic Charter was issued by the Allies to lay out their goals for a post-war world. During the course of the Cold War, the ECHELONsurveillance system was initially developed by the FVEY to monitor the communications of the former Soviet Union and the Eastern Bloc, although it is now used to monitor billions of private communications worldwide.[4][5]

In the late 1990s, the existence of ECHELON was disclosed to the public, triggering a major debate in the European Parliament and, to a lesser extent, the United States Congress. As part of efforts in the ongoing War on Terror since 2001, the FVEY further expanded their surveillance capabilities, with much emphasis placed on monitoring the World Wide Web. The former NSA contractor Edward Snowden described the Five Eyes as a “supra-national intelligence organisation that doesn’t answer to the known laws of its own countries”.[6] Documents leaked by Snowden in 2013 revealed that the FVEY have been spying on one another’s citizens and sharing the collected information with each other in order to circumvent restrictive domestic regulations on surveillance of citizens.[7][8][9][10]

In spite of continued controversy over its methods, the Five Eyes relationship remains one of the most comprehensive known espionage alliances in history.[11]

Overview

NSA Headquarters, Fort Meade, Maryland, United States

GCHQ, Cheltenham, Gloucestershire, United Kingdom

CSE, Ottawa, Ontario, Canada

Since processed intelligence is gathered from multiple sources, the intelligence shared is not restricted to signals intelligence (SIGINT) and often involves defence intelligence as well as human intelligence (HUMINT) and geospatial intelligence (GEOINT). The following table provides an overview of most of the FVEY agencies involved in such forms of data sharing.[1]

Country Agency Abbr Role[1]
 Australia Australian Secret Intelligence Service ASIS HUMINT
Australian Signals Directorate ASD SIGINT
Australian Security Intelligence Organisation ASIO Security intelligence
Australian Geospatial-Intelligence Organisation AGO GEOINT
Defence Intelligence Organisation DIO Defence intelligence
 Canada Canadian Forces Intelligence Command CFINTCOM Defence intelligence
Communications Security Establishment CSE SIGINT
Canadian Security Intelligence Service CSIS HUMINT, Security intelligence
Canadian Forces Intelligence Command CFINTCOM GEOINT
 New Zealand Directorate of Defence Intelligence and Security DDIS Defence intelligence
Government Communications Security Bureau GCSB SIGINT
New Zealand Security Intelligence Service NZSIS HUMINT
 United Kingdom Defence Intelligence DI Defence intelligence
Government Communications Headquarters GCHQ SIGINT
Security Service MI5 Security intelligence
Secret Intelligence Service MI6, SIS HUMINT
 United States Central Intelligence Agency CIA HUMINT
Defense Intelligence Agency DIA Defense intelligence
Federal Bureau of Investigation FBI Security intelligence
National Geospatial-Intelligence Agency NGA GEOINT
National Security Agency NSA SIGINT

History

Origins (1940s–1950s)

The cover page of the first version of the secret UKUSA Agreement in 1946, which was disclosed to the public in 2011.

The origins of the Five Eyes alliance can be traced back to the Atlantic Charter, which was issued in August 1941 to lay out the Allied goals for the post-war world. On 17 May 1943, the British–U.S. Communication Intelligence Agreement, also known as the BRUSA Agreement, was signed by the UK and U.S. governments to facilitate co-operation between the U.S. War Department and the British Government Code and Cypher School (GC&CS). On 5 March 1946, the secret treaty was formalized as the UKUSA Agreement, which forms the basis for all signal intelligence cooperation between the NSA and the GCHQ to this day.[12][13]

In 1948, the treaty was extended to include Canada, followed by Norway (1952), Denmark (1954), West Germany (1955), Australia (1956), and New Zealand (1956).[13] These countries participated in the alliance as “third parties”. By 1955, the formal status of the remaining Five Eyes countries was officially acknowledged in a newer version of the UKUSA Agreement that contained the following statement:

At this time only CanadaAustralia and New Zealand will be regarded as UKUSA-collaborating Commonwealth countries.[13]

The “Five Eyes” term has its origins as a shorthand for a “AUS/CAN/NZ/UK/US EYES ONLY” (AUSCANNZUKUS) classification level.[14]

Cold War (1950s–1990s)

During the Cold War, the GCHQ and the NSA shared intelligence on the Soviet Union, the People’s Republic of China, and several eastern European countries (known as Exotics).[15] Over the course of several decades, the ECHELON surveillance network was developed to monitor the military and diplomatic communications of the Soviet Union and its Eastern Bloc allies.[16]

During the Vietnam War, Australian and New Zealand operators in the Asia-Pacific region worked directly to support the United States, while GCHQ operators stationed in the (then) British colony of Hong Kong were tasked with monitoring North Vietnamese air defence networks.[17][18] During the Falklands War, the British received intelligence data from its FVEY allies such as Australia, as well as from third parties such as Norway and France.[19][20][21] In the aftermath of the Gulf War, a technician of the ASIS was used by SIS to bug Kuwaiti government offices.[20]

In the 1950s, SIS and the CIA jointly orchestrated the overthrow of Iran’s Prime Minister Mohammad Mosaddegh.[22][23][24][25] In the 1960s, SIS and the CIA jointly orchestrated the assassination of the Congolese independence leader Patrice Lumumba.[26][27][28] In the 1970s, the ASIS and the CIA jointly orchestrated the overthrow of Chile’s President Salvador Allende.[29][30][31][32] During the Tiananmen Square protests of 1989SIS and the CIA took part in Operation Yellowbird to rescue dissidents from the Chinese regime.[33]

ECHELON network disclosures (1988–2000)

By the end of the 20th century, the ECHELON surveillance network had evolved into a global system capable of sweeping up massive amounts of private and commercial communications, including telephone calls, fax, e-mail and other data traffic. This was done through the interception of communication bearers such as satellite transmission and public switched telephone networks.[34]

The Five Eyes has two types of information collection methods: the PRISM program and the Upstream collection system. The PRISM program gathers user information from technology firms such as Google, Apple and Microsoft, while the Upstream system gathers information directly from the communications of civilians via fiber cables and infrastructure as data flows past.[citation needed] In 1988, Duncan Campbell revealed in the New Statesman the existence of ECHELON, an extension of the UKUSA Agreement on global signals intelligence [Sigint]. The story, ‘Somebody’s listening,’ detailed how the eavesdropping operations were not only being employed in the interests of ‘national security,’ but were regularly abused for corporate espionage in the service of US business interests. The piece passed largely unnoticed outside of journalism circles.[35] In 1996, a detailed description of ECHELON was provided by New Zealand journalist Nicky Hager in a book titled “Secret Power – New Zealand’s Role in the International Spy Network“, which was cited by the European Parliament in a 1998 report titled “An Appraisal of the Technology of Political Control” (PE 168.184).[36] On 16 March 2000, the Parliament called for a resolution on the Five Eyes and their ECHELON surveillance network, which, if passed, would have called for the “complete dismantling of ECHELON”.[37]

Three months later, the Temporary Committee on ECHELON was set up by the European Parliament to investigate the ECHELON surveillance network. However, according to a number of European politicians such as Esko Seppänen of Finland, these investigations were hindered by the European Commission.[38]

In the United States, congressionallegislators warned that the ECHELON system could be used to monitor U.S. citizens.[39] On 14 May 2001, the U.S. government cancelled all meetings with the Temporary Committee on ECHELON.[40]

According to a BBC report in May 2001, “the US Government still refuses to admit that Echelon even exists”.[16]

War on Terror (2001–present)

In the aftermath of the September 11 attacks on the World Trade Center and the Pentagon, the surveillance capabilities of the Five Eyes were greatly increased as part of the global War on Terror.

During the run-up to the Iraq War, the communications of UN weapons inspector Hans Blix were monitored by the Five Eyes.[41][42] The office of UN Secretary-General Kofi Annan was bugged by British agents.[43][44] An NSA memo detailed plans of the Five Eyes to boost eavesdropping on UN delegations of six countries as part of a “dirty tricks” campaign to apply pressure on these six countries to vote in favour of using force against Iraq.[43][45][46]

SIS and the CIA forged a surveillance partnership with Libya’s ruler Muammar Gaddafi to spy on Libyan dissidents in the West, in exchange for permission to use Libya as a base for extraordinary renditions.[47][48][49][50][51]

As of 2010, the Five Eyes also have access to SIPRNet, the U.S. government’s classified version of the Internet.[52]

In 2013, documents leaked by the former NSA contractor Edward Snowden revealed the existence of numerous surveillance programs jointly operated by the Five Eyes. The following list includes several notable examples reported in the media:

  • PRISM – Operated by the NSA together with the GCHQ and the ASD[53][54]
  • XKeyscore – Operated by the NSA with contributions from the ASD and the GCSB[55]
  • Tempora – Operated by the GCHQ with contributions from the NSA[56][57]
  • MUSCULAR – Operated by the GCHQ and the NSA[58]
  • STATEROOM – Operated by the ASD, CIA, CSE, GCHQ, and NSA[59]

In March 2014, the International Court of Justice (ICJ) ordered Australia to stop spying on East Timor. This marks the first time that such restrictions are imposed on a member of the FVEY.[60]

Domestic espionage sharing controversy

The Five Eyes alliance is sort of an artifact of the post World War II era where the Anglophone countries are the major powers banded together to sort of co-operate and share the costs of intelligence gathering infrastructure. … The result of this was over decades and decades some sort of a supra-national intelligence organisation that doesn’t answer to the laws of its own countries.

Edward Snowden[6]

In recent years, documents of the FVEY have shown that they are intentionally spying on one another’s citizens and sharing the collected information with each other in order to circumvent restrictive domestic regulations on spying. [7][8][9][10][61]Shami Chakrabarti, the director of the advocacy group Liberty, claimed that the FVEY alliance increases the ability of member states to “subcontract their dirty work” to each other.[62] The former NSA contractor Edward Snowden described the FVEY as a “supra-national intelligence organisation that doesn’t answer to the laws of its own countries”.[6]

As a result of Snowden’s disclosures, the FVEY alliance has become the subject of a growing amount of controversy in parts of the world:

  •  Canada: In late 2013, Canadian federal judge Richard Mosley strongly rebuked the CSIS for outsourcing its surveillance of Canadians to overseas partner agencies. A 51-page court ruling asserts that the CSIS and other Canadian federal agencies have been illegally enlisting FVEY allies in global surveillance dragnets, while keeping domestic federal courts in the dark.[63][64][65]
  •  New Zealand: In 2014, the NZSIS and the GCSB of New Zealand were asked by the New Zealand Parliament to clarify if they had received any monetary contributions from members of the FVEY alliance. Both agencies withheld relevant information and refused to disclose any possible monetary contributions from the FVEY.[66]David Cunliffe, leader of the Labour Party, asserted that the public is entitled to be informed.[66]
  •  European Union: In early 2014, the European Parliament’s Committee on Civil Liberties, Justice and Home Affairs released a draft report which confirmed that the intelligence agencies of New Zealand and Canadahave cooperated with the NSA under the Five Eyes programme and may have been actively sharing the personal data of EU citizens.[67][68]

Other international cooperatives

Since the addition of two members in 1956, the specific Five Eyes consist of Australia (accepted 1956), Canada (accepted 1948), New Zealand (accepted 1956), the United Kingdom (co-creator 1946), and the United States (co-creator 1946).[69][70] Further, there is a group of nations termed ‘3rd Party Partners’, which share their intelligence with the 5 Eyes.

While the Five Eyes is a very specific agreement with specific operations amongst the five nations, other non-FVEY sharing agreements have been set up independently and for specific purposes. For example, according to Edward Snowden, the NSA has a “massive body” called the Foreign Affairs Directorate that is responsible for partnering with foreign countries.[71]

Six Eyes

According to the news magazineL’Obs, in 2009, the United States proposed to France to join the Five Eyes, that would then have become the “Six Eyes”. Nicolas Sarkozy however made the requirement to be granted the same status as other allies, including the signing of a “no-spy agreement”. This requirement was approved by the director of the NSA, but not by the director of the CIA, and furthermore not by President Barack Obama, resulting in a refusal from France.[72]

In 2013 it was reported that Germany was interested in joining the Five Eyes alliance.[73][74] At that time, several members of the United States Congress, including Tim Ryan and Charles Dent, were pushing for Germany’s entrance to the Five Eyes alliance.[75]

Israel is, reportedly, an observer in Five Eyes.[76]

Singapore is reported to have partnered with the Five Eyes.[77]

Nine Eyes

A map of the Nine Eyes countries

The Nine Eyes is a different arrangement that consists of the same members of Five Eyes working with DenmarkFrancethe Netherlands and Norway.[69][70] A fictionalized Nine Eyes, with a different list of member states (including South Africa and China), was a key plot device in the 2015 film Spectre.

Fourteen Eyes

A map of the Fourteen Eyes countries

According to a document leaked by Edward Snowden, there is another working agreement amongst 14 nations officially known as SIGINT Seniors Europe, or “SSEUR“.[78] These “14 Eyes” consist of the same members of 9 Eyes plus GermanyBelgiumItalySpain and Sweden.[69][70]

Further intelligence sharing collaborations

As spelled out by Privacy International, there are a number of issue-specific intelligence agreements that include some or all the above nations and numerous others, such as:[79][80]

  • An area specific sharing amongst the 41 nations that formed the allied coalition in Afghanistan;
  • A shared effort of the Five Eyes nations in “focused cooperation” on computer network exploitation with Austria, Belgium, Czech Republic, Denmark, Germany, Greece, Hungary, Iceland, Italy, Japan, Luxembourg, the Netherlands, Norway, Poland, Portugal, South Korea, Spain, Sweden, Switzerland and Turkey;
  • Club of Berne: 17 members including primarily European States; the US is not a member;
  • The Counterterrorist Group: a wider membership than the 17 European States that make up the Club of Berne, and includes the US;
  • NATO Special Committee: made up of the heads of the security services of NATO‘s 28 member countries;

List of FVEY surveillance targets

Notable individuals

As the surveillance capabilities of the FVEY continue to increase to keep up to pace with technological advancements, a global surveillance system has been gradually developed to capture the communications of entire populations across national borders.[81] The following list contains a handful of targets of the FVEY who are public figures in various fields. In order for a person to be included in the list, there must be well-documented evidence based on reliable sources, such as leaked or declassified documents or whistleblower accounts, which demonstrate that the person involved is, or was, intentionally targeted for FVEY surveillance.

Picture Name Lifetime Surveillance agencies Notes Ref.
Charlie Chaplin portrait.jpg Charlie Chaplin 1889–1977
  • MI5
  • FBI
A British comedian, filmmaker, and composer who rose to fame in the silent era, Charlie Chaplin became one of the most important figures in the film industry through his screen persona “the Tramp“. Due to his alleged ties to communism, he was placed under surveillance in the early 1950s by MI5 agents, who acted on behalf of the FBI as part of a campaign to banish him from the United States. [82][83][84]
Strom Thurmond.jpg Strom Thurmond 1902–2003
  • Various
Dixiecrat candidate in the 1948 U.S. presidential election, Strom Thurmond represented South Carolina in the United States Senate from 1954 until 2003, when he became 100 years old and was recognized at that time as the longest-serving senator in U.S. history. In 1988, Margaret Newsham, a Lockheed employee, told a closed-door session of the United States Congress that Thurmond’s telephone calls were being intercepted by the FVEY via their ECHELON surveillance system. [85][86][87]
Nelson Mandela-2008 (edit).jpg Nelson Mandela 1918–2013
  • CIA
  • SIS
A South African activist, lawyer, and philanthropist who served as President of South Africa from 1994 to 1999, Nelson Mandela was denounced as a terrorist by critics and was placed under surveillance by British SIS agents. In 1962, Mandela was arrested after details of his terrorist activities were picked up by the CIA and handed over to local authorities. [88][89][90][91]
Jane Fonda Cannes nineties.jpg Jane Fonda 1937–
  • GCHQ
  • NSA
An American actress, writer, political activist and former fashion model. Due to her political activism, her communications as well as those of her husband, Tom Hayden, were intercepted by the GCHQ and handed over to the NSA. [92][93]
Seyyed Ali Khamenei.jpg Ali Khamenei 1939–
  • GCHQ
  • NSA
Shiacleric and a former President of Iran, Ali Khamenei is the current Supreme Leader of Iran. During a rare visit to Iranian Kurdistan in 2009, he and his entourage were targeted for surveillance under a high-tech espionage mission involving the analysis and processing of satellite imagery. The operation was jointly conducted by the GCHQ and the NSA. [94]
JohnLennonpeace.jpg John Lennon 1940–1980
  • FBI
  • MI5
A British musician, songwriter, and a lead singer of The Beatles, John Lennon engaged in anti-war activism through several iconic songs such as “Give Peace a Chance” and “Happy Xmas (War Is Over)“. In 1971, he moved to New York City to join activists in the United States to protest against the Vietnam War. Over the next 12 months, the U.S. government launched an extensive surveillance operation to monitor his activities and to deport him back to Britain. The operation was conducted by the FBI with the help of MI5. [95][96][97][98]
Olmert.jpg Ehud Olmert 1949–
  • GCHQ
  • NSA
An Israeli politician, lawyer, and a former Mayor of Jerusalem, Ehud Olmert is the 12th Prime Minister of Israel. He and the Israeli Minister of DefenseEhud Barak, were included in a list of surveillance targets used by the GCHQ and the NSA. [99]
SusiloBambangYudhoyono.jpg Susilo Bambang Yudhoyono 1949–
  • ASD
  • NSA
A former chief military observer of the United Nation Peacekeeping Force in Bosnia and the former President of Indonesia, Susilo Bambang Yudhoyono and his wife were placed under surveillance by the ASD, which shared details of the operation with the NSA. [100][101][102]
Angela Merkel (August 2012) cropped.jpg Angela Merkel 1954–
  • Various
A German politician, former research scientist, and the Chancellor of Germany since 2005, Angela Merkel’s phone communications were monitored by the Special Collection Service, which is part of the STATEROOM surveillance program of the FVEY. [103][104][105]
Diana, Princess of Wales.jpg Diana, Princess of Wales 1961–1997
  • GCHQ
  • NSA
A firm opponent of the international usage of land mines, the Princess of Wales was placed under surveillance by the GCHQ and the NSA, which kept a top secret file on her containing more than 1,000 pages. The contents of Diana’s NSA file cannot be disclosed because of national security concerns. [106][107][108]
Kim Schmitz cropped and edited.jpg Kim Dotcom 1974–
  • FBI
  • GCSB
A German-Finnish Internet entrepreneur, businessman, and hacktivist, Kim Dotcom (born Kim Schmitz) is the founder of the file hosting service Megaupload. On behalf of the FBI, the GCSB of New Zealand conducted illegal surveillance on Dotcom. Prime Minister John Keylater issued an apology for the GCSB’s illegal surveillance. [109][110][111][112]

Notable organisations

Airlines
Broadcasting networks
Financial institutions
Multinational corporations
Oil corporations
Search engines
Telecom operators
United Nations
Universities

See also

References

https://en.wikipedia.org/wiki/Five_Eyes

Story 2: DNC Files Fantasy Lawsuit and Sends Out Fund Raising Letters — Desperate Delusion Democrats Worried About Massive Loss in November Elections — Videos

Story 2: Democratic National Committee Sues Trump campaign, Wikileaks, Russia over 2016 election — Videos —

Democratic Party sues Trump campaign, Russia and WikiLeaks

Politics of the DNC’s election interference lawsuit

Shields and Salam on DNC’s Russia lawsuit, James Comey’s memos

Perez Interview: DNC’s Trump-Russia Lawsuit ‘To Deter Future Behavior’ | Meet The Press | NBC News

DNC sues Trump campaign, Wikileaks, Russia over 2016 election

DNC lawsuit is going to get thrown out: Jonah Goldberg

Jonah Goldberg on Nationalism, Populism, and Identity Politics

See the source image

Story 3: Senate Foreign Relations Committee Vote Advances CIA Director Mike Pompeo To Secretary of State Full Vote In Senate — Videos

Sen. Rand Paul on backing Pompeo nomination as Secretary of State

Coons vote switch sends Pompeo nomination out of committee

Huckabee on Mike Pompeo: This was a dumb fight for Dems to pick

Senate Foreign Relations Committee endorses Pompeo for secretary of state

Sen. Rand Paul reverses stance in last-minute drama over Mike Pompeo

The Pronk Pops Show Podcasts Portfolio

Listen To Pronk Pops Podcast or Download Shows 1058-1065

Listen To Pronk Pops Podcast or Download Shows 1048-1057

Listen To Pronk Pops Podcast or Download Shows 1041-1047

Listen To Pronk Pops Podcast or Download Shows 1033-1040

Listen To Pronk Pops Podcast or Download Shows 1023-1032

Listen To Pronk Pops Podcast or Download Shows 1017-1022

Listen To Pronk Pops Podcast or Download Shows 1010-1016

Listen To Pronk Pops Podcast or Download Shows 1001-1009

Listen To Pronk Pops Podcast or Download Shows 993-1000

Listen To Pronk Pops Podcast or Download Shows 984-992

Listen To Pronk Pops Podcast or Download Shows 977-983

Listen To Pronk Pops Podcast or Download Shows 970-976

Listen To Pronk Pops Podcast or Download Shows 963-969

Listen To Pronk Pops Podcast or Download Shows 955-962

Listen To Pronk Pops Podcast or Download Shows 946-954

Listen To Pronk Pops Podcast or Download Shows 938-945

Listen To Pronk Pops Podcast or Download Shows 926-937

Listen To Pronk Pops Podcast or Download Shows 916-925

Listen To Pronk Pops Podcast or Download Shows 906-915

Listen To Pronk Pops Podcast or Download Shows 889-896

Listen To Pronk Pops Podcast or Download Shows 884-888

Listen To Pronk Pops Podcast or Download Shows 878-883

Listen To Pronk Pops Podcast or Download Shows 870-877

Listen To Pronk Pops Podcast or Download Shows 864-869

Listen To Pronk Pops Podcast or Download Shows 857-863

Listen To Pronk Pops Podcast or Download Shows 850-856

Listen To Pronk Pops Podcast or Download Shows 845-849

Listen To Pronk Pops Podcast or Download Shows 840-844

Listen To Pronk Pops Podcast or Download Shows 833-839

Listen To Pronk Pops Podcast or Download Shows 827-832

Listen To Pronk Pops Podcast or Download Shows 821-826

Listen To Pronk Pops Podcast or Download Shows 815-820

Listen To Pronk Pops Podcast or Download Shows 806-814

Listen To Pronk Pops Podcast or Download Shows 800-805

Listen To Pronk Pops Podcast or Download Shows 793-799

Listen To Pronk Pops Podcast or Download Shows 785-792

Listen To Pronk Pops Podcast or Download Shows 777-784

Listen To Pronk Pops Podcast or Download Shows 769-776

Listen To Pronk Pops Podcast or Download Shows 759-768

Listen To Pronk Pops Podcast or Download Shows 751-758

Listen To Pronk Pops Podcast or Download Shows 745-750

Listen To Pronk Pops Podcast or Download Shows 738-744

Listen To Pronk Pops Podcast or Download Shows 732-737

Listen To Pronk Pops Podcast or Download Shows 727-731

Listen To Pronk Pops Podcast or Download Shows 720-726

Listen To Pronk Pops Podcast or DownloadShows 713-719

Listen To Pronk Pops Podcast or DownloadShows 705-712

Listen To Pronk Pops Podcast or Download Shows 695-704

Listen To Pronk Pops Podcast or Download Shows 685-694

Listen To Pronk Pops Podcast or Download Shows 675-684

Listen To Pronk Pops Podcast or Download Shows 668-674

Listen To Pronk Pops Podcast or Download Shows 660-667

Listen To Pronk Pops Podcast or Download Shows 651-659

Listen To Pronk Pops Podcast or Download Shows 644-650

Listen To Pronk Pops Podcast or Download Shows 637-643

Listen To Pronk Pops Podcast or Download Shows 629-636

Listen To Pronk Pops Podcast or Download Shows 617-628

Listen To Pronk Pops Podcast or Download Shows 608-616

Listen To Pronk Pops Podcast or Download Shows 599-607

Listen To Pronk Pops Podcast or Download Shows 590-598

Listen To Pronk Pops Podcast or Download Shows 585- 589

Listen To Pronk Pops Podcast or Download Shows 575-584

Listen To Pronk Pops Podcast or Download Shows 565-574

Listen To Pronk Pops Podcast or Download Shows 556-564

Listen To Pronk Pops Podcast or Download Shows 546-555

Listen To Pronk Pops Podcast or Download Shows 538-545

Listen To Pronk Pops Podcast or Download Shows 532-537

Listen To Pronk Pops Podcast or Download Shows 526-531

Listen To Pronk Pops Podcast or Download Shows 519-525

Listen To Pronk Pops Podcast or Download Shows 510-518

Listen To Pronk Pops Podcast or Download Shows 500-509

Listen To Pronk Pops Podcast or Download Shows 490-499

Listen To Pronk Pops Podcast or Download Shows 480-489

Listen To Pronk Pops Podcast or Download Shows 473-479

Listen To Pronk Pops Podcast or Download Shows 464-472

Listen To Pronk Pops Podcast or Download Shows 455-463

Listen To Pronk Pops Podcast or Download Shows 447-454

Listen To Pronk Pops Podcast or Download Shows 439-446

Listen To Pronk Pops Podcast or Download Shows 431-438

Listen To Pronk Pops Podcast or Download Shows 422-430

Listen To Pronk Pops Podcast or Download Shows 414-421

Listen To Pronk Pops Podcast or Download Shows 408-413

Listen To Pronk Pops Podcast or Download Shows 400-407

Listen To Pronk Pops Podcast or Download Shows 391-399

Listen To Pronk Pops Podcast or Download Shows 383-390

Listen To Pronk Pops Podcast or Download Shows 376-382

Listen To Pronk Pops Podcast or Download Shows 369-375

Listen To Pronk Pops Podcast or Download Shows 360-368

Listen To Pronk Pops Podcast or Download Shows 354-359

Listen To Pronk Pops Podcast or Download Shows 346-353

Listen To Pronk Pops Podcast or Download Shows 338-345

Listen To Pronk Pops Podcast or Download Shows 328-337

Listen To Pronk Pops Podcast or Download Shows 319-327

Listen To Pronk Pops Podcast or Download Shows 307-318

Listen To Pronk Pops Podcast or Download Shows 296-306

Listen To Pronk Pops Podcast or Download Shows 287-295

Listen To Pronk Pops Podcast or Download Shows 277-286

Listen To Pronk Pops Podcast or Download Shows 264-276

Listen To Pronk Pops Podcast or Download Shows 250-263

Listen To Pronk Pops Podcast or Download Shows 236-249

Listen To Pronk Pops Podcast or Download Shows 222-235

Listen To Pronk Pops Podcast or Download Shows 211-221

Listen To Pronk Pops Podcast or Download Shows 202-210

Listen To Pronk Pops Podcast or Download Shows 194-201

Listen To Pronk Pops Podcast or Download Shows 184-193

Listen To Pronk Pops Podcast or Download Shows 174-183

Listen To Pronk Pops Podcast or Download Shows 165-173

Listen To Pronk Pops Podcast or Download Shows 158-164

Listen To Pronk Pops Podcast or Download Shows 151-157

Listen To Pronk Pops Podcast or Download Shows 143-150

Listen To Pronk Pops Podcast or Download Shows 135-142

Listen To Pronk Pops Podcast or Download Shows 131-134

Listen To Pronk Pops Podcast or Download Shows 124-130

Listen To Pronk Pops Podcast or Download Shows 121-123

Listen To Pronk Pops Podcast or Download Shows 118-120

Listen To Pronk Pops Podcast or Download Shows 113 -117

Listen To Pronk Pops Podcast or Download Show 112

Listen To Pronk Pops Podcast or Download Shows 108-111

Listen To Pronk Pops Podcast or Download Shows 106-108

Listen To Pronk Pops Podcast or Download Shows 104-105

Listen To Pronk Pops Podcast or Download Shows 101-103

Listen To Pronk Pops Podcast or Download Shows 98-100

Listen To Pronk Pops Podcast or Download Shows 94-97

Listen To Pronk Pops Podcast or Download Show 93

Listen To Pronk Pops Podcast or Download Show 92

Listen To Pronk Pops Podcast or Download Show 91

Listen To Pronk Pops Podcast or Download Shows 88-90

Listen To Pronk Pops Podcast or Download Shows 84-87

Listen To Pronk Pops Podcast or Download Shows 79-83

Listen To Pronk Pops Podcast or Download Shows 74-78

Listen To Pronk Pops Podcast or Download Shows 71-73

Listen To Pronk Pops Podcast or Download Shows 68-70

Listen To Pronk Pops Podcast or Download Shows 65-67

Listen To Pronk Pops Podcast or Download Shows 62-64

Listen To Pronk Pops Podcast or Download Shows 58-61

Listen To Pronk Pops Podcast or Download Shows 55-57

Listen To Pronk Pops Podcast or Download Shows 52-54

Listen To Pronk Pops Podcast or Download Shows 49-51

Listen To Pronk Pops Podcast or Download Shows 45-48

Listen To Pronk Pops Podcast or Download Shows 41-44

Listen To Pronk Pops Podcast or Download Shows 38-40

Listen To Pronk Pops Podcast or Download Shows 34-37

Listen To Pronk Pops Podcast or Download Shows 30-33

Listen To Pronk Pops Podcast or Download Shows 27-29

Listen To Pronk Pops Podcast or Download Shows 17-26

Listen To Pronk Pops Podcast or Download Shows 16-22

Listen To Pronk Pops Podcast or Download Shows 10-15

Listen To Pronk Pops Podcast or Download Shows 1-9

Read Full Post | Make a Comment ( None so far )

The Pronk Pops Show 1060,April 12, 2018, Story 1: Clueless Congress Questions Facebook Founder Mark Zuckerberg Who Does An Imitation of Brenda Lee I’m Sorry and The End of The World — Privacy Is Dead — Stop Your Addiction — Quit Social Media and Big Lie Media and Select Better Sources of Entertainment — Be Addiction Free and Happy — Congress Sings Special Angel and Be My Baby To Zuckerberg — NSA: Secret Surveillance State — Every Step You Make –Videos

Posted on April 15, 2018. Filed under: Addiction, Addiction, Addiction, American History, Blogroll, Breaking News, Business, Cartoons, Communications, Congress, Corruption, Countries, Culture, Deep State, Drugs, Education, Elections, Empires, Federal Bureau of Investigation (FBI), Federal Bureau of Investigation (FBI) and Department of Justice (DOJ), Federal Communications Commission, Federal Government, First Amendment, Fourth Amendment, Free Trade, Freedom of Speech, Government Dependency, Government Spending, Hate Speech, Health, History, House of Representatives, Human Behavior, Illegal Drugs, Independence, Investments, Language, Legal Drugs, Movies, Music, National Security Agency, News, People, Philosophy, Photos, Politics, Polls, President Trump, Public Corruption, Radio, Raymond Thomas Pronk, Regulation, Rule of Law, Second Amendment, Senate, Social Networking, Spying on American People, Success, Surveillance/Spying, Taxation, Taxes, Ted Cruz, Trump Surveillance/Spying, United States Constitution, United States of America, Videos, Violence, Wall Street Journal, War, Wealth, Wisdom | Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , |

 Project_1

The Pronk Pops Show Podcasts

Pronk Pops Show 1060, April 12, 2018

Pronk Pops Show 1059, April 11, 2018

Pronk Pops Show 1058, April 10, 2018

Pronk Pops Show 1057, April 9, 2018

Pronk Pops Show 1056, April 4, 2018

Pronk Pops Show 1055, April 2, 2018

Pronk Pops Show 1054, March 29, 2018

Pronk Pops Show 1053, March 28, 2018

Pronk Pops Show 1052, March 27, 2018

Pronk Pops Show 1051, March 26, 2018

Pronk Pops Show 1050, March 23, 2018

Pronk Pops Show 1049, March 22, 2018

Pronk Pops Show 1048, March 21, 2018

Pronk Pops Show 1047, March 20, 2018

Pronk Pops Show 1046, March 19, 2018

Pronk Pops Show 1045, March 8, 2018

Pronk Pops Show 1044, March 7, 2018

Pronk Pops Show 1043, March 6, 2018

Pronk Pops Show 1042, March 1, 2018

Pronk Pops Show 1041, February 28, 2018

Pronk Pops Show 1040, February 27, 2018

Pronk Pops Show 1039, February 26, 2018

Pronk Pops Show 1038, February 23, 2018

Pronk Pops Show 1037, February 22, 2018

Pronk Pops Show 1036, February 21, 2018

Pronk Pops Show 1035, February 16, 2018

Pronk Pops Show 1034, February 15, 2018  

Pronk Pops Show 1033, February 14, 2018  

Pronk Pops Show 1032, February 13, 2018

Pronk Pops Show 1031, February 12, 2018

Pronk Pops Show 1030, February 9, 2018

Pronk Pops Show 1028, February 7, 2018

Pronk Pops Show 1027, February 2, 2018

Pronk Pops Show 1026, February 1, 2018

Pronk Pops Show 1025, January 31, 2018

Pronk Pops Show 1024, January 30, 2018

Pronk Pops Show 1023, January 29, 2018

Pronk Pops Show 1022, January 26, 2018

Pronk Pops Show 1021, January 25, 2018

Pronk Pops Show 1020, January 24, 2018

Pronk Pops Show 1019, January 18, 2018

Pronk Pops Show 1018, January 17, 2018

Pronk Pops Show 1017, January 16, 2018

Pronk Pops Show 1016, January 10, 2018

Pronk Pops Show 1015, January 9, 2018

Pronk Pops Show 1014, January 8, 2018

See the source imageSee the source imageSee the source imageSee the source imageSee the source imageSee the source imageSee the source image

See the source image

Image result for cartoons on nsa and facebook spying on american people

Image result for cartoons on nsa and facebook spying on american peopleImage result for cartoons on nsa and facebook spying on american peopleImage result for cartoons on nsa and facebook spying on american people

Image result for cartoons on nsa and facebook spying on american peopleImage result for branco cartoons on nsa and facebook spying on american peopleSee the source image

See the source image

See the source image

See the source image

See the source image

See the source image

See the source image

See the source image

See the source image

See the source image

See the source image

See the source image

See the source image

See the source image

See the source image

Image result for branco cartoons on nsa and facebook spying on american people

See the source image

See the source image

See the source image

See the source image

See the source image

See the source image

See the source image

See the source imageSee the source image

See the source image

See the source image

See the source image

See the source imageSee the source image

See the source image

See the source image

See the source image

See the source image

See the source image

See the source image

See the source image

See the source image

See the source image

See the source image

 

See the source image

See the source image

See the source image

See the source image

See the source image

 

See the source image

See the source image

 

 

Image result for branco cartoons on nsa and facebook spying on american people

Image result for branco cartoons on nsa and facebook spying on american people

See the source image

See the source image

See the source image

The Police – Every Breath You Take

How the Government Tracks You: NSA Surveillance

NSA Whistleblower: Everyone in US under virtual surveillance, all info stored, no matter the post

NSA WILLIAN BINNEY EXPLAINS THE ORIGINS OF FACEBOOK AND SOCIAL NETWORKS

NSA Whistleblower William Binney: The Future of FREEDOM

How NSA Tracks You Bill Binney

NSA Surveillance and What To Do About It

Facebook Spies on You For The Government

How to Avoid Surveillance…With Your Phone | Christopher Soghoian | TED Talks

NSA-Whistleblower William Binney on Apple, Google, Facebook, Microsoft

William Binney – The Government is Profiling You (The NSA is Spying on You)

William Binney Warning: Surveillance Turns Inward & Political

Intel community ‘not being honest’ with president about Russia ‒ Bill Binney

 

William Binney Breaks Down What Sort Of Surveillance Donald Trump Was Actually Under

NSA Whistleblower Bill Binney on Tucker Carlson 03.24.2017

Bill Binney explodes the Russia witchhunt

‘NSA owns entire network anywhere in the world’ – whistleblower William Binney

XKeyscore: The search engine that lets the NSA keep tabs on you

X-KeyScore: The Government’s Farthest Reaching Intelligence Program Yet

NSA’s ‘XKeyscore’ gives warrantless access to all Internet activity

“You’re Being Watched”: Edward Snowden Emerges as Source Behind Explosive Revelations of NSA Spying

Report: NSA can indeed monitor you online

NSA Spying on YouTube, Facebook | The Rubin Report

The Police – Every Breath You Take

 

Story 1: Clueless Congress Questions Facebook Founder Mark Zuckerberg Who Does An Imitation of Brenda Lee I’m Sorry and The End of The World — Privacy Is Dead — Stop Your Addiction — Quit Social Media and Big Lie Media and Select Better Sources of Entertainment — Be Addiction Free and Happy — Congress Sings Special Angel To Zuckerberg — Videos

See the source image

See the source imageSee the source imageSee the source imageSee the source imageSee the source imageSee the source image

See the source image

Brenda Lee – I’m Sorry

I’m sorry, so sorry
That I was such a fool
I didn’t know
Love could be so cruel
Oh-oh-oh-oh-oh-oh-oh-yesYou tell me mistakes
Are part of being young
But that don’t right
The wrong that’s been done(I’m sorry) I’m sorry
(So sorry) So sorry
Please accept my apology
But love is blind
And I was too blind to see

Oh-oh-oh-oh-oh-oh-oh-yes

You tell me mistakes
Are part of being young
But that don’t right
The wrong that’s been done
Oh-oh-oh-oh-oh-oh-oh-yes

I’m sorry, so sorry
Please accept my apology
But love was blind
And I was too blind to see

(Sorry)

Music by:

Ronnie Self
Lyrics by:

Dub Allbritten

Brenda Lee – The end of the world(1963)

Brenda Lee – End Of The World Lyrics

Why does the sun go on shining
Why does the sea rush to shore
Don’t they know it’s the end of the world
’cause You don’t love me anymore, YesWhy do the birds go on singing
Why do the stars glow above
Don’t they know it’s the end of the world
It ended when I lost your loveI wake up in the mornin’ and I wonder
Why everythings the same as it was
I can’t understand, No
I can’t understand
How life goes on the way it doesWhy does my heart go on beating
Why do these eyes of mine cry
Don’t they know it’s the end of the world
It ended when you said goodbye(spoken)
Why does my heart go on beating
Why do these eyes of mine cry
(sung)
Don’t they know it’s the end of the world
It ended when you said goodbye
Goodbye
Songwriters: PETER MCNULTY-CONNOLLY, MARCUS MYBE, LOUIE ST. LOUIS, KURTIS DESHAUN WILLIAMS, MICHAEL ANGELO
End Of The World lyrics © Universal Music Publishing Group

This Is What People Really Think About Zuckerberg’s Congressional Testimony (HBO)

#MSM Sockpuppet Coverup and Shell Game: #Zuckerberg’s Show Trial and #Syrian Gas Hocus Pocus

Facebook Is a Government Surveillance Tool: Lionel Buries Hillary Apologist in this Epic Takedown

POLL: Americans Blame Deep State Shill Mark Zuckerberg and Facebook for Fake News

Why Facebook’s Business Model Is Only Now Coming Under Fire | CNBC

Mark Zuckerberg admits to ‘big mistake’ at Senate hearing

Zuckerberg’s Senate hearing highlights in 10 minutes

Analysis: House tougher on Zuckerberg than Senate

5 awkward moments at the Facebook hearing

Would Congress be able to successfully regulate Facebook?

Jim Cramer: Congress Won’t Accept Mark Zuckerberg’s Analysis Of Data Breach | CNBC

Zuckerberg, Cruz get feisty over Facebook bias

Sen. Harris questions Facebook’s values on trust and transparency

Rep. Marsha Blackburn reacts to Zuckerberg’s testimony

An in depth look at Zuckerberg’s Senate testimony

Why Facebook’s Business Model Is Only Now Coming Under Fire | CNBC

Facebook will find a way around regulations: Mentor to Mark Zuckerberg

Ari Melber’s Two Takeaways From Mark Zuckerberg’s Testimony | The Beat With Ari Melber | MSNBC

Silicon Valley insider on why smartphones are “slot machines”

New Rule: Social Media is the New Nicotine | Real Time with Bill Maher (HBO)

Facebook founder warns of social media addiction

How social media makes us unsocial | Allison Graham | TEDxSMU

5 Crazy Ways Social Media Is Changing Your Brain Right Now

Is Social Media Addictive? | Through The Wormhole

Facebook Documentary | The Dangers of Social Media: Facebook | Facebook facts

A year offline, what I have learned | Paul Miller | TEDxEutropolis

Is Social Media Hurting Your Mental Health? | Bailey Parnell | TEDxRyersonU

Social Media: Too Much of a Good Thing? | Samia Khan | TEDxTerryTalks

Rebuilding Self-Esteem After Addiction to Social Media | Sarayu Chityala | TEDxMarkhamPublicLibrary

Live in the Moment: Delete Social Media | Ryan Thomas | TEDxAshburnSalon

Tucker REACTS to Mark Zuckerberg’s Testimony (Day 1)

“Facebook EXPLOITS a Vulnerability in Human Psychology!” Tucker Carlson on Social Media

Silicon Valley execs sound off on Mark Zuckerberg’s testimony

Social Media Nightmares

Fmr. Facebook Exec: Social Media Ripping Apart Society, “You are programmed.” [Chamath Palihapitiya]

Chamath Palihapitiya, Founder and CEO Social Capital, on Money as an Instrument of Change

CBS 60 Minutes interview Donald Trump Social Media Has More Power Than Money pIdZZb1DddA

Facebook Locks Out Jordan Peterson | Campus Unmasked

Jordan B Peterson – Let go of Bad Habits & People and rise like a Phoenix

Jordan Peterson | How to Rise to the Top of the Dominance Hierarchy

Jordan Peterson; Talks Facebook and It’s Emotionally Addictive Powers..!

Jordan Peterson – What Makes Overcoming Addiction So Difficult?

Jordan Peterson – How to Solve addiction simply

Motivate yourself to beat addiction | Jordan Peterson & Stefan Molyneux

Potential: Jordan Peterson TEDxUofT

Quit social media | Dr. Cal Newport | TEDxTysons

Sen Kennedy destroys Mark Zuckerberg

Sen. Kennedy to Mark Zuckerberg: ‘Your User Agreement Sucks’ 4/10/18

“WHY DIDN’T FACEBOOK INFORM USERS??!!” Kamala Harris CONFRONTS Mark Zuckerberg on Facebook’s Breach

7 Facts That’ll Make You Delete Your Facebook

Did senators questioning Facebook’s Mark Zuckerberg understand the internet?

Zuckerberg’s second day of questioning, in three minutes

What we learned about Facebook from Mark Zuckerberg’s testimony

Senator Asks How Facebook Remains Free, Mark Zuckerberg Smirks: ‘We Run Ads’ | NBC News

5 awkward moments at the Facebook hearing

These are the most confusing questions Congress asked Zuckerberg

Questions that left Mark Zuckerberg SPEECHLESS during Senate Hearing

Mark Zuckerberg CRIES after Ted Cruz BURSTED INTO FLAMES

Congressman Scalise Acts Nice Then Hammers Mark Zuckerberg Over Facebook Shutting Down Republicans!

WATCH: Mark Zuckerberg Stumbles When Asked To Define ‘Hate Speech’ – His Answer Is Truly Shocking

Congresswoman Won’t Let Mark Zuckerberg WEASAL His Way Out Of Her Question About Tracking People!

Jim Cramer: Congress Won’t Accept Mark Zuckerberg’s Analysis Of Data Breach | CNBC

Tucker REACTS to Mark Zuckerberg’s Testimony (Day 1)

Bobby Helms – You Are My Special Angel – ( Alta Calidad ) HD

My Special Angel
You are my special angel
Sent from up above
The Lord smiled down on me
And sent an angel to love (to love)
You are my special angel
Right from paradise
I know you’re an angel
Heaven is in your eyes
The smile from your lips brings the summer sunshine
Tears from your eyes bring the rain
I feel your touch, your warm embrace
And I’m in heaven again
You are my special angel
Through eternity
I’ll have my special angel
Here to watch over me
I feel your touch, your warm embrace
And I’m in heaven again
You are my special angel
Through eternity
I’ll have my special angel
Here to watch over me (watch over me)
Here to watch over me
(Angel, angel, whoa-oh-oh-oh, oh, oh oh, oh)
Songwriters: Jimmy (usa Duncan / Jimmy (usa 2 Duncan
My Special Angel lyrics © Warner/Chappell Music, Inc