The Pronk Pops Show 896, May 18, 2017, Story 1: A Broadcasting Legend, Roger Ailes, Dies at Age 77, Rest in Peace — Videos — Story 2: President Trump Tweets: “The is The Single Greatest Witch Hunt of A Politician in American History” — Special Counsel: Bad Idea — Robert Mueller: Good Choice — Videos

Posted on May 18, 2017. Filed under: American History, Barack H. Obama, Benghazi, Bill Clinton, Blogroll, Breaking News, Budgetary Policy, Congress, Countries, Donald J. Trump, Donald J. Trump, Donald J. Trump, Donald Trump, Donald Trump, Education, Employment, Fast and Furious, Federal Bureau of Investigation (FBI), Federal Government, Fiscal Policy, Foreign Policy, Former President Barack Obama, Fourth Amendment, Freedom of Speech, Government, Government Spending, Hate Speech, Hillary Clinton, Hillary Clinton, Hillary Clinton, Hillary Clinton, Hillary Clinton, History, House of Representatives, Illegal Immigration, Iran Nuclear Weapons Deal, IRS, Law, Media, News, Obama, People, Philosophy, Photos, Politics, President Trump, Presidential Appointments, Raymond Thomas Pronk, Regulation, Robert S. Mueller III, Scandals, Second Amendment, Security, Senate, Senator Jeff Sessions, Spying, Success, Surveillance and Spying On American People, Surveillance/Spying, Tax Policy, Technology, Terror, Terrorism, Trump Surveillance/Spying, Unemployment, United States Constitution, United States of America, United States Supreme Court, Videos, Wealth, Wisdom | Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , |

Project_1

The Pronk Pops Show Podcasts

Pronk Pops Show 896,  May 18, 2017

Pronk Pops Show 895,  May 17, 2017

Pronk Pops Show 894,  May 16, 2017

Pronk Pops Show 893,  May 15, 2017

Pronk Pops Show 892,  May 12, 2017

Pronk Pops Show 891,  May 11, 2017

Pronk Pops Show 890,  May 10, 2017

Pronk Pops Show 889,  May 9, 2017

Pronk Pops Show 888,  May 8, 2017

Pronk Pops Show 887,  May 5, 2017

Pronk Pops Show 886,  May 4, 2017

Pronk Pops Show 885,  May 3, 2017

Pronk Pops Show 884,  May 1, 2017

Pronk Pops Show 883 April 28, 2017

Pronk Pops Show 882: April 27, 2017

Pronk Pops Show 881: April 26, 2017

Pronk Pops Show 880: April 25, 2017

Pronk Pops Show 879: April 24, 2017

Pronk Pops Show 878: April 21, 2017

Pronk Pops Show 877: April 20, 2017

Pronk Pops Show 876: April 19, 2017

Pronk Pops Show 875: April 18, 2017

Pronk Pops Show 874: April 17, 2017

Pronk Pops Show 873: April 13, 2017

Pronk Pops Show 872: April 12, 2017

Pronk Pops Show 871: April 11, 2017

Pronk Pops Show 870: April 10, 2017

Pronk Pops Show 869: April 7, 2017

Pronk Pops Show 868: April 6, 2017

Pronk Pops Show 867: April 5, 2017

Pronk Pops Show 866: April 3, 2017

Pronk Pops Show 865: March 31, 2017

Pronk Pops Show 864: March 30, 2017

Pronk Pops Show 863: March 29, 2017

Pronk Pops Show 862: March 28, 2017

Pronk Pops Show 861: March 27, 2017

Pronk Pops Show 860: March 24, 2017

Pronk Pops Show 859: March 23, 2017

Pronk Pops Show 858: March 22, 2017

Pronk Pops Show 857: March 21, 2017

Pronk Pops Show 856: March 20, 2017

Pronk Pops Show 855: March 10, 2017

Pronk Pops Show 854: March 9, 2017

Pronk Pops Show 853: March 8, 2017

Pronk Pops Show 852: March 6, 2017

Pronk Pops Show 851: March 3, 2017

Pronk Pops Show 850: March 2, 2017

Pronk Pops Show 849: March 1, 2017

Pronk Pops Show 848: February 28, 2017

Pronk Pops Show 847: February 27, 2017

Pronk Pops Show 846: February 24, 2017

Pronk Pops Show 845: February 23, 2017

Pronk Pops Show 844: February 22, 2017

Pronk Pops Show 843: February 21, 2017

Pronk Pops Show 842: February 20, 2017

Pronk Pops Show 841: February 17, 2017

Pronk Pops Show 840: February 16, 2017

Pronk Pops Show 839: February 15, 2017

Pronk Pops Show 838: February 14, 2017

Pronk Pops Show 837: February 13, 2017

Pronk Pops Show 836: February 10, 2017

Pronk Pops Show 835: February 9, 2017

Pronk Pops Show 834: February 8, 2017

Pronk Pops Show 833: February 7, 2017

Pronk Pops Show 832: February 6, 2017

Pronk Pops Show 831: February 3, 2017

Pronk Pops Show 830: February 2, 2017

Pronk Pops Show 829: February 1, 2017

Image result for roger ailes dead at 77Image result for roger ailes and familyImage result for cartoons branco trump witch huntImage result for trump russian investigation a witch hunt

Story 1: A Broadcasting Legend, Roger Ailes, Dies at Age 77, Rest in Peace — Videos

Image result for roger ailes and familyImage result for roger ailes and family

Rupert Murdoch statement on Roger Ailes’ passing

Brit Hume on the life and legacy of Roger Ailes

Sean Hannity: I am forever grateful for Roger Ailes

Martha MacCallum remembers Roger Ailes

Rush Limbaugh Remembers Roger Ailes: “Roger And I Were Passengers In History”

Neil Cavuto remembers Roger Ailes

Gutfeld remembers Roger Ailes

The Sean Hannity Show May 18, 2017 || Remembering Roger Ailes

Laura Ingraham Show 5/18/17 – (FULL) Roger Ailes Built Success By Out Thinking His Competitors

Mark Levin Show: Tribute to Roger Ailes (audio from 05-18-2017)

Glenn & Bill React To Roger Aile’s Death | Bill O’Reilly’s First Interview Since Fox News Exit

Bill O’Reilly No Spin News: Paying Respects To Roger Ailes(RIP) & Hysterical Press (5/18/2017)

Rachel Maddow On The Passing Of Roger Ailes: ‘I Considered Him To Be A Friend’

Kimberly Guilfoyle pays tribute to Roger Ailes

Shepard Smith pays tribute to Roger Ailes

Roger Ailes, Who Built Fox News Into an Empire, Dies at 77

Former Fox News chairman and CEO Roger Ailes dead at 77

Remembering Roger Ailes

World reacts to the death of Roger Ailes

Former Fox News CEO Roger Ailes dead at 77

Roger Ailes leaves behind complicated legacy

Lionel Nation YouTube Live Stream: Roger Ailes Eulogium, Mueller the DNC Nightmare & Comey the Clown

Fox News anchors learned of the death of former chairman and CEO Roger Ailes from Drudge

  • Fox News anchors learned of death of former chairman and CEO from Drudge
  • Fox published a breaking news segment on Twitter following Roger Ailes’ death
  • Steve Doocy said: ‘They have published, Drudge has, a statement from his wife’
  • Ainsley Earhardt added: ‘Beth you are in our thoughts and our prayers, and so is Zachary, their beautiful son. Roger, rest in peace.’
  • Ailes died aged 77, according to his wife, who released statement to Matt Drudge
Roger Ailes has died at the age of 77, his wife Elizabeth revealed in a statement on Thursday

Roger Ailes has died at the age of 77, his wife Elizabeth revealed in a statement on Thursday

Fox News anchors only learned of the death of its former chairman and CEO from Drudge Report.

Roger Ailes died aged 77, according to his wife Elizabeth, who released a statement to Matt Drudge.

In a breaking news segment tweeted by the network on Thursday morning, Fox & Friends’ Steve Doocy reported: ‘Roger Ailes, one of the founders of the Fox News channel has died.

‘They have published, Drudge has, a statement from his wife Elizabeth.’

The statement was then read out before Ainsley Earhardt added: ‘Beth you are in our thoughts and our prayers, and so is Zachary, their beautiful son. Roger, rest in peace.’

His death comes less than a year after he resigned from the company over allegations of sexual harassment.

His wife Elizabeth, with whom he has one son, said: ‘I am profoundly sad and heartbroken to report that my husband, Roger Ailes, passed away this morning. Roger was a loving husband to me, to his son Zachary, and a loyal friend to many.

‘He was also a patriot, profoundly grateful to live in a country that gave him so much opportunity to work hard, to rise — and to give back.

‘During a career that stretched over more than five decades, his work in entertainment, in politics, and in news affected the lives of many millions.

‘And so even as we mourn his death, we celebrate his life,’ the statement reads.

Steve Doocy (left) reported: ‘Roger Ailes, one of the founders of the Fox News channel has died'

Steve Doocy (left) reported: ‘Roger Ailes, one of the founders of the Fox News channel has died’

There was no further information on the cause of Ailes’ death. He celebrated his 77th birthday on Monday.

Ailes had struggled with his health. He had hemophilia, multiple surgeries to replace his joints and a secret prostate surgery a few years ago that put him on an extended leave from the network, according to New York magazine reporter Gabriel Sherman.

Last year, Sherman reported that Ailes was still having trouble walking and rarely left his executive suite.

A friend who ran into Ailes in Palm Beach over the 2015-2016 holidays told the magazine that he was using a walker at the time.

In an excerpt from the 2013 biography Roger Ailes Off Camera, Ailes said he knew he didn’t have long left to live.

‘My doctor told me that I’m old, fat, and ugly, but none of those things is going to kill me immediately,’ he told the author, Zev Chafets, shortly before his 72nd birthday. ‘The actuaries say I have six to eight years. The best tables give me 10. Three thousand days, more or less.’

He added: ‘I’d give anything for another 10 years.’

http://www.dailymail.co.uk/news/article-4518872/Fox-News-learned-Roger-Ailes-death-Drudge.html#ixzz4hSwIC0Lw

Michael Wolff on Roger Ailes’ Final Days and a Complicated Murdoch Relationship

Matt Furman
Roger Ailes in his Fox News office in 2014.

The Fox News exec understood the intensity of the unhappiness and anger in another America that liberal media people are only now waking up to with Donald Trump.

I made a mental note last night to call Roger in the morning and get his take on the Trump events of the last few days. There are few conversations more entertaining and insightful than Roger Ailes on Republican politics, where he’s known all the players, their strengths and particularly their weaknesses. While the bet noir to liberals, his most scathing and often hilarious critiques have often been reserved for conservatives. His 50 years among the kahunas of GOP politics — as one of the creators of modern Republican politics — made him, among his other political claims to fame, among his party’s sharpest observers. On his friend Donald Trump, no one has been keener. But at 8:30 this morning, his wife Beth texted me that he had died a few minutes ago at age 77.

It was a particular cruelty of the anti-Ailes press that it often focused on Beth, with rumors of a breakdown in their marriage and impending divorce. In fact, she was fierce in her devotion to him, and his most implacable defender. In the 10 months since he had been forced out as chairman of Fox News Channel, the network —arguably, the most significant political force in American life for a generation — that he launched, built and ran for 20 years, she carried him. This past autumn, after their hard summer of accusations and media conviction, she had flown down to Palm Beach and bought for themselves a waterfront mansion, where she hoped he would retire and where living well would at least be some revenge.

Retirement was more Beth’s idea than his. Roger and I spoke a week ago, just after the last ouster at Fox — Bill Shine, his lieutenant who had taken over his job, following by a week the ouster of Bill O’Reilly — and, invariably, the subject was Fox’s quickly eroding fortunes and the possibilities for a new conservative network. Roger, yet proscribed by the non-compete provisions of his separation agreement, nevertheless had a plan in his head, and was taking calls. “I can’t call. But I can’t stop people from calling me,” he said. As we spoke, Beth texted pictures of their view and of a newly svelte Roger lying lazily in the sun.

All things considered, it was a happy winter. Or, anyway, he was certainly weighing the benefits of being out of the office and out of the fray. Still, clearly, both he and Beth could only get so far from the bitterness they felt about his end at Fox. Worse still, the terms of his departure from Fox put draconian limits on what he could say and how he might defend himself. The payout that he believed he had earned — having created a $30 billion asset and 21st Century Fox’s most profitable business — was the price of his silence. The most voluble and pugnacious man in American media was forced to keep still.

But privately, angrily, he couldn’t wait to settle scores.

In his view, the political showdown that was always bound to happen — which, to me, he had predicted several years before — had finally happened, albeit uglier, and with more finality, than he had ever expected. “They got the memo,” he said, with some forbearance. “If you strike the king, you better kill him.”

James Murdoch

Michael Wolff: It’s James Murdoch’s Fox News Now

By “they,” he meant Rupert Murdoch’s sons. And most particularly James Murdoch, who, two years ago, was elevated to CEO of his father’s company, who Ailes regarded as an impetuous, grandiose, self-satisfied rich kid. Wryly, he admitted bringing this feud on himself. “I made the money those kids spent. So, no, I wasn’t going to suck up to them.”

Indeed, not long before his ouster, Ailes had enraged James by going around his back and helping to convince his father to squelch a plan for a new, temple-like 21st Century Fox headquarters that James wanted to build.

The relationship of Ailes to Murdoch senior, often his loyal patron but frequently just a boss stuck having to indulge his highest earner, was also always a fraught one. When I wrote my Murdoch biography in 2009, one of the few stipulations of my access to Murdoch was that I not interview Ailes, who, I gathered, Rupert felt got too much credit for the company’s success.

In July, over a two week period of press leaks after former Fox anchor Gretchen Carlson filed a sexual harassment lawsuit, Ailes was ousted without opportunity to defend himself. Even when James hired the law firm Paul, Weiss, to investigate the charges against Ailes, Ailes himself wasn’t called. In effect, in order to get his payout, he had to accept his disgrace — and it was enough money that he agreed to what he surely considered a devil’s bargain.

It is, of course, impossible to know what might be true or not. And now it can never entirely be known. Surely, his political enemies, the legions of them, were concerned much less for the truth than that he be gone. As surely, less is true than what the various lawsuits allege, because that is the nature of lawsuits. All of us who know what Roger reflexively talks like, irascibly, caustically and with retrograde vividness, give him, at least privately, the benefit of the doubt.

In the end, the larger story is about someone who, from Nixon’s “silent majority” to Reagan’s “Reagan Democrats” to Fox News, understood the intensity of the unhappiness and anger in another America that we liberal media people are only now waking up to with Donald Trump.

More personally, when you’re in the media business, what you look for is someone who is at the top of his craft, who understands the real score, who knows how to gossip and who has stories to tell. If you missed knowing Roger, you missed out.

http://www.hollywoodreporter.com/news/michael-wolff-roger-ailes-final-days-a-complicated-murdoch-relationship-1005194

Image result for cartoons department of justice special couselor

Image result for trump tweet with all the illegal acts

Image result for cartoons branco trump witch hunt

Image result for cartoons branco trump witch hunt

 

Image result for cartoons branco hillary clinton public corruption

Image result for cartoons branco hillary clinton public corruption

Image result for cartoons branco hillary clinton public corruptionImage result for cartoons branco hillary clinton public corruption

Robert Meuller Named Special Prosecutor in Trump-Russia Probe. Tucker and Jason Chaffetz Weigh In.

Trump Blasts Russia Investigation as a ‘Witch Hunt’ on Twitter

Explaining Robert Mueller’s New Role as Special Counsel

While Most Sing Mueller’s Praises, Louie Gohmert Says He’s a Big Problem!

Bill Bennett talks pros and cons of Russia special counsel

Ingraham: Left has been trying to impeach since Election Day

What does special counsel mean for the Russia probe?

As special counsel, Mueller to have significant power in Russia probe

Brit Hume: Mueller is the grownup needed for Russia probe

Remarks from Robert Mueller III

Ding Dong The Witch Is Dead

Ding Dong! The Witch Is Dead lyrics

Play “Ding Dong! The Witc…”
on Amazon Music
Munchkins
Ding Dong! The Witch is dead. Which old Witch? The Wicked Witch!
Ding Dong! The Wicked Witch is dead.
Wake up – sleepy head, rub your eyes, get out of bed.
Wake up, the Wicked Witch is dead. She’s gone where the goblins go,
Below – below – below. Yo-ho, let’s open up and sing and ring the bells out.
Ding Dong’ the merry-oh, sing it high, sing it low.
Let them know
The Wicked Witch is dead!
Mayor
As Mayor of the Munchkin City, In the County of the Land of Oz, I welcome you most regally.
Barrister
But we’ve got to verify it legally, to see
Mayor
To see?
Barrister
If she
Mayor
If she?
Barrister
Is morally, ethic’lly
Father No.1
Spiritually, physically
Father No. 2
Positively, absolutely
Munchkins
Undeniably and reliably Dead
Coroner
As Coroner I must aver, I thoroughly examined her.
And she’s not only merely dead, she’s really most sincerely dead.
Mayor
Then this is a day of Independence For all the Munchkins and their descendants
Barrister
If any.
Mayor
Yes, let the joyous news be spread The wicked Old Witch at last is dead!

A Special Enemy

Former FBI Director Robert Mueller was born and bred to torment Donald Trump.

Donald Trump went to sleep Wednesday night with a new enemy outside his window: former FBI Director Robert S. Mueller III.

LEON NEYFAKH

Leon Neyfakh is a Slate staff writer.

Mueller, a 72-year-old former prosecutor who left the FBI in 2013, has been called upon by the Justice Department to serve as a special counsel to investigate Trump and his associates. In accordance with an order issued Wednesday by the deputy attorney general, it will be up to Mueller—whose last name is pronounced Muh-lur—to decide whether anyone involved in the Trump campaign should be charged with a crime. “I accept this responsibility and will discharge it to the best of my ability,” Mueller said in a statement Wednesday.

Even if Mueller’s investigation doesn’t result in any charges being brought, it’s almost certain Mueller and his team will end up asking Trump questions he doesn’t want to answer and demanding to see documents he doesn’t want to provide. Barring a drastic change in Trump’s disposition, the president will respond to these affronts by publishing angry tweets about Mueller and snarling about him in interviews. Maybe he’ll even compare him to a “dog,” as he did recently when talking about former Acting Attorney General Sally Yates. Or perhaps he could threaten Mueller, as he did last week in a tweet directed at former FBI Director James Comey.

While Trump loathes a lot of people, his hatred of Mueller is likely to be particularly intense. That’s because Mueller is exactly the kind of guy Trump always hates. He’s also exactly the kind of law enforcement official Trump doesn’t understand.

Raised in a wealthy suburb of Philadelphia, Mueller has Roman numerals in his name and attended a New Hampshire boarding school alongside John Kerry. Later, he followed in his father’s footsteps to Princeton, where he played lacrosse, and received a master’s from New York University and a J.D. from the University of Virginia School of Law. According to NPR, former CIA Director George Tenet described Mueller in 2013 as a “high Protestant with a locked jaw [and a] blue blazer, khaki pants, penny loafers, maybe a little Vitalis and Old Spice to boot.”

Mueller was an oddity at the FBI, said Tim Weiner, author of Enemies: A History of the FBI. “There are not a lot of people named Robert Swan Mueller III in the directory of the FBI,” he told me. “Bobby is very patrician. He’s very well-bred.”

It helped that Mueller was also a Marine who fought in Vietnam, having served as the leader of a rifle platoon and been awarded the Bronze Star and the Purple Heart. Journalists who’ve profiled him invariably note that Mueller’s time in the Marines shaped him profoundly and informed his demanding leadership style. When David Margolis showed up to his first day of work as Mueller’s deputy at the FBI, on the Monday after George W. Bush’s inauguration in 2001, he discovered an unsigned note on his desk that was unmistakably from Mueller: “It’s 0700. Where are you?”

Sworn in exactly one week before 9/11, Mueller found himself in charge of fixing a broken FBI that had failed to make sense of crucial clues before the attacks. Writing in Time in 2011, Barton Gellman described the state of the bureau before Mueller’s arrival: “The labor force—heavily white and male, with a blue collar culture that prized physical courage over book smarts lacked the language and technical skills to adapt.” Gellman explained that in the aftermath of 9/11, questions arose as to whether the FBI “was irreparably broken, ill equipped to collect intelligence and disinclined to share it anyway.”

Over the course of 12 years, Mueller worked to transform the agency into an organization that could both hold people responsible for past crimes and suss out malfeasance that hadn’t yet been committed—terrorist plots in particular. Mueller, Gellman wrote, “remade the bureau in his image,” as “[o]utsiders displaced agents with badges and guns as assistant directors in charge of finance, human resources, information technology and the directorate of weapons of mass destruction.” In his office, according to a Washingtonian piece by Garrett Graff, Mueller kept shelves lined with “counterterrorism books, manuals on IT and computers, and business books on such topics as ‘change management’ by corporate thinkers like Jack Welch.” Only a “tiny section,” Graff wrote, was “devoted to crime.”

Mueller, who is not an imposing street soldier who wears a cool uniform, doesn’t fit Trump’s image of a law enforcement official. As evidenced by the fact that villainous Milwaukee Sheriff David Clarke appears to have landed a job in the Department of Homeland Security, Trump prefers guys who are cartoonishly “tough on crime.” He also tends to focus his political attention on rank-and-file members of police unions, presenting himself as a friend to regular cops while ignoring the senior “brass” who tell them what to do.  Trump has refused to even acknowledge the memo he was sent in February in which a raft of high-profile police chiefs—including Bill Bratton from the NYPD and David Brown, who was head of the Dallas Police Department at the time of the deadly sniper attack that killed five officers—urged him to reconsider his preferred crime-reduction strategy of putting as many people as possible in prison for as long as the law allows.

It’s possible, though unlikely, that under different circumstances Trump would be impressed by a fancy, smart guy like Mueller and would try to impress him back. But there’s one more thing about Mueller that’s going to make it impossible for Trump to show him any respect: The former FBI director is practically blood brothers with James Comey.

The bond between the two men was forged in early 2004—years before Comey succeeded Mueller as FBI director. Comey, who was then serving as the deputy attorney general under John Ashcroft, was locked in a high-stakes dispute with George W. Bush, who wanted to overrule the Justice Department’s conclusion that an NSA domestic surveillance program was illegal. As Graff tells it in his Washingtonian piece, Ashcroft was in a hospital room recovering from surgery when he was ambushed by a pair of White House aides. Here’s Graff:

Comey was driving home on Constitution Avenue with his security escort of U.S. marshals the night of Tuesday, March 10, 2004, when he got a call. … White House chief of staff Andy Card and White House counsel [Alberto] Gonzales were on their way to see Ashcroft in the hospital.

Comey told his driver to turn on the emergency lights and head to the hospital. Then he began calling other Justice officials to rally them at George Washington University Hospital.

Mueller was at dinner with his wife and daughter when he got the call from Comey at 7:20 pm. “I’ll be right there,” he said.

In 2007, Comey testified before the Senate Judiciary Committee that he believed Card and Gonzales intended to use Ashcroft’s semiconscious state to get the attorney general to sign off on the surveillance program he had previously opposed. By intercepting them in Ashcroft’s hospital room, Comey and Mueller may have prevented the Bush administration officials from getting the attorney general’s signature. (Comey said in his testimony that Ashcroft made the ultimate decision to rebuff Card and Gonzales.) They also helped put the White House and the Justice Department on course for an epic confrontation. Not long after the incident at the hospital, Mueller told Bush he would resign if the surveillance program continued. Bush, realizing he faced a situation on par with Nixon’s “Saturday Night Massacre,” backed down. Afterward, Graff wrote, Mueller and Comey “shared a dark laugh” before going back to work.

“I think that experience, of having to stand together and say, ‘No, Mr. President, you can’t do this,’ really mind-melded them,” said Weiner. “It was a moment of brotherhood.”

At this point, no friend of Jim Comey is ever going to be a friend of Donald Trump, especially when he’s leading the same investigation that Comey led before his ouster. Odds are good, in fact, that Trump will use Mueller’s closeness with Comey to accuse him of bias and question the legitimacy of his inquiry.

If and when Trump does go after Mueller—he dipped his toe in the water Thursday morning by tweeting about how it was unfair that a special counsel had been appointed to conduct the “witch hunt” against him—their showdown will be marked by a pleasing irony. In one corner will be the patrician and brainy Mueller, who has little in common with the “real cops” the president so admires. In the other will be Trump, who will soon find out what being ”tough on crime” really means. …

THE SCOPE OF THE SPECIAL COUNSEL APPOINTMENT IS TOTALLY INADEQUATE

Rod Rosenstein just appointed former FBI Director (and, before that, US Attorney) Robert Mueller as Special Counsel to take over the investigation into Trump and his associates.

I’m agnostic about the selection of Mueller. He has the benefit of credibility among FBI Agents, so will be able to make up for some of what was lost with Jim Comey’s firing. He will be regarded by those who care about such things as non-partisan. With Jim Comey, Mueller stood up to Dick Cheney on Stellar Wind in 2004 (though I think in reality his willingness to withstand Cheney’s demands has been overstated).

But Mueller has helped cover up certain things in the past, most notably with the Amerithrax investigation.

My bigger concern is with the scope, which I believe to be totally inadequate.

Here’s how the order describes the scope:

(b) The Special Counsel is authorized to conduct the investigation confirmed by then-FBI Director James 8. Comey in testimony before the House Permanent Select Committee on Intelligence on March 20, 2017, including:

(i) any links and/or coordination between the Russian government and individuals associated with the campaign of President Donald Trump; and

(ii) any matters that arose or may arise directly from the investigation; and

(iii) any other matters within the scope of 28 C.F.R. § 600.4(a).

As I read this, it covers just the investigation into ties between the Russian government and people associated with Trump’s campaign. Presumably, that includes Mike Flynn, Paul Manafort, and Carter Page, among others.

But there are other aspects of the great swamp that is the Trump and Russia orbit that might not be included here. For example, would Manafort’s corrupt deals with Ukrainian oligarchs be included? Would Flynn’s discussions with Turkish officials, or Rudy Giuliani’s attempt to excuse Turkey’s violation of Iran sanctions? Would the garden variety money laundering on behalf of non-governmental Russian mobbed up businessmen be included, something that might affect Manafort, Jared Kushner, or Trump himself?

And remember there are at least two other aspects of the Russian hacking investigation. Back in February, Reuters reported that San Francisco’s office was investigating Guccifer 2.0 and Pittsburgh was investigating the actual hackers.  Somewhere (San Francisco would be the most logical spot), they’re presumably investigating whoever it is that has been dumping NSA’s hacking tools everywhere. I’ve learned that that geography has either changed, or there are other aspects tied to those issues in other corners of the country.

Plus, there’s the Wikileaks investigation in EDVA, the same district where the Mueller-led investigation might reside, but a distinct investigation.

Any one of those investigations might present strings that can be pulled, any one of which might lead to the unraveling of the central question: did Trump’s associates coordinate with the Russian government to become President. Unless Mueller can serve to protect those other corners of the investigation from Trump’s tampering, it would be easy to shut down any of them as they become productive.

Yet, as far as I understand the scope of this, Mueller will only oversee the central question, leaving those disparate ends susceptible to Trump’s tampering.

Update: In its statement on the appointment, ACLU raises concerns about whether this would include the investigation into Trump’s attempt to obstruct this investigation.

Update: WaPo’s Philip Rucker reminds that Mueller is law firm partners with Jamie Gorelick, who has been representing both Ivanka and Kushner in this issue.

Update: Mueller is quitting WilmberHale to take this gig. He’s also taking two WilmerHale former FBI people with him. Still, that’s a close tie to the lawyer of someone representing key subjects of this investigation.

Update: One addition to the ACLU concern about investigating the Comey firing. In the most directly relevant precedent, the Plame investigation, when Pat Fitzgerald expanded his investigation from the leak of Plame’s identity to the obstruction of the investigation, he asked for approval to do so from the Acting Attorney General overseeing the investigation — in that case, Jim Comey.

The Acting Attorney General in this case is Rod Rosenstein. So if Mueller were as diligent as Fitzgerald was, he would have to ask the guy who provided the fig leaf for Comey’s firing to approve the expansion of the investigation to cover his own fig leaf.

Update: Petey noted to me that Jeff Sessions’ narrow recusal may limit how broadly Rosenstein’s order may be drawn. It’s a really interesting observation. Here’s what I said about Sessions’ recusal (which is very similar to what I tried to address in this post).

There are two areas of concern regarding Trump’s ties that would not definitively be included in this recusal: Trump’s long-term ties to mobbed up businessmen with ties to Russia (a matter not known to be under investigation but which could raise concerns about compromise of Trump going forward), and discussions about policy that may involve quid pro quos (such as the unproven allegation, made in the Trump dossier, that Carter Page might take 19% in Rosneft in exchange for ending sanctions against Russia), that didn’t involve a pay-off in terms of the hacking. There are further allegations of Trump involvement in the hacking (a weak one against Paul Manafort and a much stronger one against Michael Cohen, both in the dossier), but that’s in no way the only concern raised about Trump’s ties with Russians.

The Pronk Pops Show Podcasts Portfolio

Listen To Pronk Pops Podcast or Download Shows 889-896

Listen To Pronk Pops Podcast or Download Shows 884-888

Listen To Pronk Pops Podcast or Download Shows 878-883

Listen To Pronk Pops Podcast or Download Shows 870-877

Listen To Pronk Pops Podcast or Download Shows 864-869

Listen To Pronk Pops Podcast or Download Shows 857-863

Listen To Pronk Pops Podcast or Download Shows 850-856

Listen To Pronk Pops Podcast or Download Shows 845-849

Listen To Pronk Pops Podcast or Download Shows 840-844

Listen To Pronk Pops Podcast or Download Shows 833-839

Listen To Pronk Pops Podcast or Download Shows 827-832

Listen To Pronk Pops Podcast or Download Shows 821-826

Listen To Pronk Pops Podcast or Download Shows 815-820

Listen To Pronk Pops Podcast or Download Shows 806-814

Listen To Pronk Pops Podcast or Download Shows 800-805

Listen To Pronk Pops Podcast or Download Shows 793-799

Listen To Pronk Pops Podcast or Download Shows 785-792

Listen To Pronk Pops Podcast or Download Shows 777-784

Listen To Pronk Pops Podcast or Download Shows 769-776

Listen To Pronk Pops Podcast or Download Shows 759-768

Listen To Pronk Pops Podcast or Download Shows 751-758

Listen To Pronk Pops Podcast or Download Shows 745-750

Listen To Pronk Pops Podcast or Download Shows 738-744

Listen To Pronk Pops Podcast or Download Shows 732-737

Listen To Pronk Pops Podcast or Download Shows 727-731

Listen To Pronk Pops Podcast or Download Shows 720-726

Listen To Pronk Pops Podcast or DownloadShows 713-719

Listen To Pronk Pops Podcast or DownloadShows 705-712

Listen To Pronk Pops Podcast or Download Shows 695-704

Listen To Pronk Pops Podcast or Download Shows 685-694

Listen To Pronk Pops Podcast or Download Shows 675-684

Listen To Pronk Pops Podcast or Download Shows 668-674

Listen To Pronk Pops Podcast or Download Shows 660-667

Listen To Pronk Pops Podcast or Download Shows 651-659

Listen To Pronk Pops Podcast or Download Shows 644-650

Listen To Pronk Pops Podcast or Download Shows 637-643

Listen To Pronk Pops Podcast or Download Shows 629-636

Listen To Pronk Pops Podcast or Download Shows 617-628

Listen To Pronk Pops Podcast or Download Shows 608-616

Listen To Pronk Pops Podcast or Download Shows 599-607

Listen To Pronk Pops Podcast or Download Shows 590-598

Listen To Pronk Pops Podcast or Download Shows 585- 589

Listen To Pronk Pops Podcast or Download Shows 575-584

Listen To Pronk Pops Podcast or Download Shows 565-574

Listen To Pronk Pops Podcast or Download Shows 556-564

Listen To Pronk Pops Podcast or Download Shows 546-555

Listen To Pronk Pops Podcast or Download Shows 538-545

Listen To Pronk Pops Podcast or Download Shows 532-537

Listen To Pronk Pops Podcast or Download Shows 526-531

Listen To Pronk Pops Podcast or Download Shows 519-525

Listen To Pronk Pops Podcast or Download Shows 510-518

Listen To Pronk Pops Podcast or Download Shows 500-509

Listen To Pronk Pops Podcast or Download Shows 490-499

Listen To Pronk Pops Podcast or Download Shows 480-489

Listen To Pronk Pops Podcast or Download Shows 473-479

Listen To Pronk Pops Podcast or Download Shows 464-472

Listen To Pronk Pops Podcast or Download Shows 455-463

Listen To Pronk Pops Podcast or Download Shows 447-454

Listen To Pronk Pops Podcast or Download Shows 439-446

Listen To Pronk Pops Podcast or Download Shows 431-438

Listen To Pronk Pops Podcast or Download Shows 422-430

Listen To Pronk Pops Podcast or Download Shows 414-421

Listen To Pronk Pops Podcast or Download Shows 408-413

Listen To Pronk Pops Podcast or Download Shows 400-407

Listen To Pronk Pops Podcast or Download Shows 391-399

Listen To Pronk Pops Podcast or Download Shows 383-390

Listen To Pronk Pops Podcast or Download Shows 376-382

Listen To Pronk Pops Podcast or Download Shows 369-375

Listen To Pronk Pops Podcast or Download Shows 360-368

Listen To Pronk Pops Podcast or Download Shows 354-359

Listen To Pronk Pops Podcast or Download Shows 346-353

Listen To Pronk Pops Podcast or Download Shows 338-345

Listen To Pronk Pops Podcast or Download Shows 328-337

Listen To Pronk Pops Podcast or Download Shows 319-327

Listen To Pronk Pops Podcast or Download Shows 307-318

Listen To Pronk Pops Podcast or Download Shows 296-306

Listen To Pronk Pops Podcast or Download Shows 287-295

Listen To Pronk Pops Podcast or Download Shows 277-286

Listen To Pronk Pops Podcast or Download Shows 264-276

Listen To Pronk Pops Podcast or Download Shows 250-263

Listen To Pronk Pops Podcast or Download Shows 236-249

Listen To Pronk Pops Podcast or Download Shows 222-235

Listen To Pronk Pops Podcast or Download Shows 211-221

Listen To Pronk Pops Podcast or Download Shows 202-210

Listen To Pronk Pops Podcast or Download Shows 194-201

Listen To Pronk Pops Podcast or Download Shows 184-193

Listen To Pronk Pops Podcast or Download Shows 174-183

Listen To Pronk Pops Podcast or Download Shows 165-173

Listen To Pronk Pops Podcast or Download Shows 158-164

Listen To Pronk Pops Podcast or Download Shows151-157

Listen To Pronk Pops Podcast or Download Shows 143-150

Listen To Pronk Pops Podcast or Download Shows 135-142

Listen To Pronk Pops Podcast or Download Shows 131-134

Listen To Pronk Pops Podcast or Download Shows 124-130

Listen To Pronk Pops Podcast or Download Shows 121-123

Listen To Pronk Pops Podcast or Download Shows 118-120

Listen To Pronk Pops Podcast or Download Shows 113 -117

Listen To Pronk Pops Podcast or Download Show 112

Listen To Pronk Pops Podcast or Download Shows 108-111

Listen To Pronk Pops Podcast or Download Shows 106-108

Listen To Pronk Pops Podcast or Download Shows 104-105

Listen To Pronk Pops Podcast or Download Shows 101-103

Listen To Pronk Pops Podcast or Download Shows 98-100

Listen To Pronk Pops Podcast or Download Shows 94-97

Listen To Pronk Pops Podcast or Download Show 93

Listen To Pronk Pops Podcast or Download Show 92

Listen To Pronk Pops Podcast or Download Show 91

Listen To Pronk Pops Podcast or Download Shows 88-90

Listen To Pronk Pops Podcast or Download Shows 84-87

Listen To Pronk Pops Podcast or Download Shows 79-83

Listen To Pronk Pops Podcast or Download Shows 74-78

Listen To Pronk Pops Podcast or Download Shows 71-73

Listen To Pronk Pops Podcast or Download Shows 68-70

Listen To Pronk Pops Podcast or Download Shows 65-67

Listen To Pronk Pops Podcast or Download Shows 62-64

Listen To Pronk Pops Podcast or Download Shows 58-61

Listen To Pronk Pops Podcast or Download Shows 55-57

Listen To Pronk Pops Podcast or Download Shows 52-54

Listen To Pronk Pops Podcast or Download Shows 49-51

Listen To Pronk Pops Podcast or Download Shows 45-48

Listen To Pronk Pops Podcast or Download Shows 41-44

Listen To Pronk Pops Podcast or Download Shows 38-40

Listen To Pronk Pops Podcast or Download Shows 34-37

Listen To Pronk Pops Podcast or Download Shows 30-33

Listen To Pronk Pops Podcast or Download Shows 27-29

Listen To Pronk Pops Podcast or Download Shows 17-26

Listen To Pronk Pops Podcast or Download Shows 16-22

Listen To Pronk Pops Podcast or Download Shows 10-15

Listen To Pronk Pops Podcast or Download Shows 1-9

Read Full Post | Make a Comment ( None so far )

The Pronk Pops Show 892, May 12, 2017, Story 1: Lester _______ (Bolt, Colt, Dolt, Holt, Jolt, Volt) Interviews President Donald J. Trump — The Real Scandal Is Obama Surveillance and Spying On Republican Party Presidential Candidates Using The Intelligent Community (CIA, NSA, FBI, …) Product–Unmasked and Leaked! — Videos– Story 2: Big Lie Media Crazy Credibility Crisis — Fake News is Media McCarthyism — Videos — Story 3: President Trump Voter Fraud Commission — Videos

Posted on May 12, 2017. Filed under: Addiction, American History, Benghazi, Blogroll, Breaking News, Cartoons, Communications, Computers, Congress, Corruption, Countries, Crime, Culture, Donald J. Trump, Donald J. Trump, Donald Trump, Donald Trump, Economics, Education, Elections, Empires, Employment, Fast and Furious, Federal Bureau of Investigation (FBI), Federal Government, Foreign Policy, Freedom of Speech, Government, Government Dependency, Government Spending, Hate Speech, High Crimes, History, House of Representatives, Human, Human Behavior, Illegal Immigration, Iran Nuclear Weapons Deal, IRS, Language, Law, Life, Lying, Marco Rubio, Media, National Interest, National Security Agency, News, Obama, Philosophy, Photos, Politics, Polls, President Barack Obama, President Trump, Progressives, Radio, Rand Paul, Raymond Thomas Pronk, Regulation, Scandals, Security, Senate, Servers, Software, Spying, Surveillance and Spying On American People, Surveillance/Spying, Taxation, Terror, Terrorism, Trump Surveillance/Spying, United States of America, Videos, Violence, War, Wealth, Wisdom | Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , |

Project_1

The Pronk Pops Show Podcasts

Pronk Pops Show 892,  May 12, 2017

Pronk Pops Show 891,  May 11, 2017

Pronk Pops Show 891,  May 11, 2017

Pronk Pops Show 890,  May 10, 2017

Pronk Pops Show 889,  May 9, 2017

Pronk Pops Show 888,  May 8, 2017

Pronk Pops Show 887,  May 5, 2017

Pronk Pops Show 886,  May 4, 2017

Pronk Pops Show 885,  May 3, 2017

Pronk Pops Show 884,  May 1, 2017

Pronk Pops Show 883 April 28, 2017

Pronk Pops Show 882: April 27, 2017

Pronk Pops Show 881: April 26, 2017

Pronk Pops Show 880: April 25, 2017

Pronk Pops Show 879: April 24, 2017

Pronk Pops Show 878: April 21, 2017

Pronk Pops Show 877: April 20, 2017

Pronk Pops Show 876: April 19, 2017

Pronk Pops Show 875: April 18, 2017

Pronk Pops Show 874: April 17, 2017

Pronk Pops Show 873: April 13, 2017

Pronk Pops Show 872: April 12, 2017

Pronk Pops Show 871: April 11, 2017

Pronk Pops Show 870: April 10, 2017

Pronk Pops Show 869: April 7, 2017

Pronk Pops Show 868: April 6, 2017

Pronk Pops Show 867: April 5, 2017

Pronk Pops Show 866: April 3, 2017

Pronk Pops Show 865: March 31, 2017

Pronk Pops Show 864: March 30, 2017

Pronk Pops Show 863: March 29, 2017

Pronk Pops Show 862: March 28, 2017

Pronk Pops Show 861: March 27, 2017

Pronk Pops Show 860: March 24, 2017

Pronk Pops Show 859: March 23, 2017

Pronk Pops Show 858: March 22, 2017

Pronk Pops Show 857: March 21, 2017

Pronk Pops Show 856: March 20, 2017

Pronk Pops Show 855: March 10, 2017

Pronk Pops Show 854: March 9, 2017

Pronk Pops Show 853: March 8, 2017

Pronk Pops Show 852: March 6, 2017

Pronk Pops Show 851: March 3, 2017

Pronk Pops Show 850: March 2, 2017

Pronk Pops Show 849: March 1, 2017

Pronk Pops Show 848: February 28, 2017

Pronk Pops Show 847: February 27, 2017

Pronk Pops Show 846: February 24, 2017

Pronk Pops Show 845: February 23, 2017

Pronk Pops Show 844: February 22, 2017

Pronk Pops Show 843: February 21, 2017

Pronk Pops Show 842: February 20, 2017

Pronk Pops Show 841: February 17, 2017

Pronk Pops Show 840: February 16, 2017

Pronk Pops Show 839: February 15, 2017

Pronk Pops Show 838: February 14, 2017

Pronk Pops Show 837: February 13, 2017

Pronk Pops Show 836: February 10, 2017

Pronk Pops Show 835: February 9, 2017

Pronk Pops Show 834: February 8, 2017

Pronk Pops Show 833: February 7, 2017

Pronk Pops Show 832: February 6, 2017

Pronk Pops Show 831: February 3, 2017

Pronk Pops Show 830: February 2, 2017

Pronk Pops Show 829: February 1, 2017

 

Story 1: Lester _______ (Bolt, Colt, Dolt, Holt, Jolt, Volt) Interviews President Donald J. Trump — The Real Scandal Is Obama Surveillance and Spying On Trump and Associates Using The Intelligent Community (CIA, NSA, FBI, …) Product!  —  Videos — 

 

Image result for obama surveillance of trumpImage result for cartoons obama surveillance of trumpImage result for trump crisisImage result for cartoons obama surveillance of trumpImage result for cartoons obama surveillance of trumpImage result for cartoons obama surveillance of trumpImage result for cartoons obama surveillance of trumpImage result for cartoons obama surveillance of trump

Image result for intelligence community

Image result for intelligence community

President Trump Full Interview with Lester Holt NBC 5/11/17

“This Is TOTALLY FAKE!” Tucker Loses His Temper on Russia Conspiracy

Obama Might have Spied on Rand Paul and Other Republicans

Obama Administration Spying on Rand Paul | Michael Savage (Audio)

Did President Obama Spy On Donald Trump? | True News

The Truth About FBI Director James Comey: You’re Fired!

Hannity: James Comey is a national embarrassment

Full || FBI Director James Comey Press Conference On Hillary Clinton Email Investigation (7-5-16)

United States Intelligence Community

From Wikipedia, the free encyclopedia
United States Intelligence Community
United States Intelligence Community Seal.svg

Seal of the United States Intelligence Community
Agency overview
Formed December 4, 1981
Agency executive

The United States Intelligence Community (IC)[1] is a federation of 16 separate United States government agencies that work separately and together to conduct intelligence activities considered necessary for the conduct of foreign relations and national security of the United States. Member organizations of the IC include intelligence agencies, military intelligence, and civilian intelligence and analysis offices within federal executive departments. The IC is headed by the Director of National Intelligence (DNI), who reports to the President of the United States.

Among their varied responsibilities, the members of the Community collect and produce foreign and domestic intelligence, contribute to military planning, and perform espionage. The IC was established by Executive Order 12333, signed on December 4, 1981, by U.S. PresidentRonald Reagan.[2]

The Washington Post reported in 2010 that there were 1,271 government organizations and 1,931 private companies in 10,000 locations in the United States that are working on counterterrorism, homeland security, and intelligence, and that the intelligence community as a whole includes 854,000 people holding top-secret clearances.[3] According to a 2008 study by the Office of the Director of National Intelligence, private contractors make up 29% of the workforce in the U.S. intelligence community and account for 49% of their personnel budgets.[4]

Etymology

The term “Intelligence Community” was first used during Lt. Gen. Walter Bedell Smith‘s tenure as Director of Central Intelligence (1950–1953).[5]

History

Intelligence is information that agencies collect, analyze, and distribute in response to government leaders’ questions and requirements. Intelligence is a broad term that entails:

Collection, analysis, and production of sensitive information to support national security leaders, including policymakers, military commanders, and Members of Congress. Safeguarding these processes and this information through counterintelligence activities. Execution of covert operations approved by the President. The IC strives to provide valuable insight on important issues by gathering raw intelligence, analyzing that data in context, and producing timely and relevant products for customers at all levels of national security—from the war-fighter on the ground to the President in Washington.[6]

Executive Order 12333 charged the IC with six primary objectives:[7]

  • Collection of information needed by the President, the National Security Council, the Secretary of State, the Secretary of Defense, and other executive branch officials for the performance of their duties and responsibilities;
  • Production and dissemination of intelligence;
  • Collection of information concerning, and the conduct of activities to protect against, intelligence activities directed against the U.S., international terrorist and/or narcotics activities, and other hostile activities directed against the U.S. by foreign powers, organizations, persons and their agents;
  • Special activities (defined as activities conducted in support of U.S. foreign policy objectives abroad which are planned and executed so that the “role of the United States Government is not apparent or acknowledged publicly”, and functions in support of such activities, but which are not intended to influence United States political processes, public opinion, policies, or media and do not include diplomatic activities or the collection and production of intelligence or related support functions);
  • Administrative and support activities within the United States and abroad necessary for the performance of authorized activities and
  • Such other intelligence activities as the President may direct from time to time.

Organization

Members

The IC is headed by the Director of National Intelligence (DNI), whose statutory leadership is exercised through the Office of the Director of National Intelligence (ODNI). The 16 members of the IC are:[8]

The official seals of U.S. Intelligence Community members.

Agency/Office Parent Agency Federal Department Date est.
Defense Intelligence Agency none Defense 1961
National Geospatial-Intelligence Agency none Defense 1996
National Reconnaissance Office none Defense 1961
National Security Agency none Defense 1952
Military Intelligence Corps United States Army Defense 1863
Office of Naval Intelligence United States Navy Defense 1882
Twenty-Fifth Air Force United States Air Force Defense 1948
Marine Corps Intelligence United States Marine Corps Defense 1939
Coast Guard Intelligence United States Coast Guard Homeland Security 1915
Office of Intelligence and Analysis none Homeland Security 2007
Central Intelligence Agency none Independent agency 1947
Bureau of Intelligence and Research none State 1945
Office of Terrorism and Financial Intelligence none Treasury 2004
Office of National Security Intelligence Drug Enforcement Administration Justice 2006
Intelligence Branch Federal Bureau of Investigation Justice 2005
Office of Intelligence and Counterintelligence none Energy 1977

Programs

The IC performs under two separate programs:

  • The National Intelligence Program (NIP), formerly known as the National Foreign Intelligence Program as defined by the National Security Act of 1947 (as amended), “refers to all programs, projects, and activities of the intelligence community, as well as any other programs of the intelligence community designated jointly by the Director of National Intelligence (DNI) and the head of a United States department or agency or by the President. Such term does not include programs, projects, or activities of the military departments to acquire intelligence solely for the planning and conduct of tactical military operations by United States Armed Forces”. Under the law, the DNI is responsible for directing and overseeing the NIP, though the ability to do so is limited (see the Organization structure and leadership section).
  • The Military Intelligence Program (MIP) refers to the programs, projects, or activities of the military departments to acquire intelligence solely for the planning and conduct of tactical military operations by United States Armed Forces. The MIP is directed and controlled by the Under Secretary of Defense for Intelligence. In 2005 the Department of Defense combined the Joint Military Intelligence Program and the Tactical Intelligence and Related Activities program to form the MIP.

Since the definitions of the NIP and MIP overlap when they address military intelligence, assignment of intelligence activities to the NIP and MIP sometimes proves problematic.

Organizational structure and leadership

IC Circle.jpg

The overall organization of the IC is primarily governed by the National Security Act of 1947 (as amended) and Executive Order12333. The statutory organizational relationships were substantially revised with the 2004 Intelligence Reform and Terrorism Prevention Act (IRTPA) amendments to the 1947 National Security Act.

Though the IC characterizes itself as a federation of its member elements, its overall structure is better characterized as a confederation due to its lack of a well-defined, unified leadership and governance structure. Prior to 2004, the Director of Central Intelligence (DCI) was the head of the IC, in addition to being the director of the CIA. A major criticism of this arrangement was that the DCI had little or no actual authority over the budgetary authorities of the other IC agencies and therefore had limited influence over their operations.

Following the passage of IRTPA in 2004, the head of the IC is the Director of National Intelligence (DNI). The DNI exerts leadership of the IC primarily through statutory authorities under which he or she:

  • controls the “National Intelligence Program” budget;
  • establishes objectives, priorities, and guidance for the IC; and
  • manages and directs the tasking of, collection, analysis, production, and dissemination of national intelligence by elements of the IC.

However, the DNI has no authority to direct and control any element of the IC except his own staff—the Office of the DNI—neither does the DNI have the authority to hire or fire personnel in the IC except those on his own staff. The member elements in the executive branch are directed and controlled by their respective department heads, all cabinet-level officials reporting to the President. By law, only the Director of the Central Intelligence Agency reports to the DNI.

In light of major intelligence failures in recent years that called into question how well Intelligence Community ensures U.S. national security, particularly those identified by the 9/11 Commission (National Commission on Terrorist Attacks Upon the United States), and the “WMD Commission” (Commission on the Intelligence Capabilities of the United States Regarding Weapons of Mass Destruction), the authorities and powers of the DNI and the overall organizational structure of the IC have become subject of intense debate in the United States.

Interagency cooperation

Previously, interagency cooperation and the flow of information among the member agencies was hindered by policies that sought to limit the pooling of information out of privacy and security concerns. Attempts to modernize and facilitate interagency cooperation within the IC include technological, structural, procedural, and cultural dimensions. Examples include the Intellipediawiki of encyclopedic security-related information; the creation of the Office of the Director of National Intelligence, National Intelligence Centers, Program Manager Information Sharing Environment, and Information Sharing Council; legal and policy frameworks set by the Intelligence Reform and Terrorism Prevention Act of 2004, information sharing Executive Orders 13354 and Executive Order 13388, and the 2005 National Intelligence Strategy.

Budget

Data visualization of U.S. intelligence black budget (2013)

The U.S. intelligence budget (excluding the Military Intelligence Program) in fiscal year 2013 was appropriated as $52.7 billion, and reduced by the amount sequestered to $49.0 billion.[9] In fiscal year2012 it peaked at $53.9 billion, according to a disclosure required under a recent law implementing recommendations of the 9/11 Commission.[10]The 2012 figure was up from $53.1 billion in 2010,[11] $49.8 billion in 2009,[12] $47.5 billion in 2008,[13] $43.5 billion in 2007,[14] and $40.9 billion in 2006.[15]

About 70 percent of the intelligence budget went to contractors for the procurement of technology and services (including analysis), according to the May 2007 chart from the ODNI. Intelligence spending has increased by a third over ten years ago, in inflation-adjusted dollars, according to the Center for Strategic and Budgetary Assessments.[citation needed]

In a statement on the release of newdeclassified figures, DNI Mike McConnell said[when?] there would be no additional disclosures of classified budget information beyond the overall spending figure because “such disclosures could harm national security”. How the money is divided among the 16 intelligence agencies and what it is spent on is classified. It includes salaries for about 100,000 people, multibillion-dollar satellite programs, aircraft, weapons, electronic sensors, intelligence analysis, spies, computers, and software.

On August 29, 2013 the Washington Post published the summary of the Office of the Director of National Intelligence’s multivolume FY 2013 Congressional Budget Justification, the U.S. intelligence community’s top-secret “black budget.”[16][17][18] The IC’s FY 2013 budget details, how the 16 spy agencies use the money and how it performs against the goals set by the president and Congress. Experts said that access to such details about U.S. spy programs is without precedent. Steven Aftergood, Federation of American Scientists, which provides analyses of national security issues stated that “It was a titanic struggle just to get the top-line budget number disclosed, and that has only been done consistently since 2007 … but a real grasp of the structure and operations of the intelligence bureaucracy has been totally beyond public reach. This kind of material, even on a historical basis, has simply not been available.”[19] Access to budget details will enable an informed public debate on intelligence spending for the first time said the co-chair of the 9/11 Commission Lee H. Hamilton. He added that Americans should not be excluded from the budget process because the intelligence community has a profound impact on the life of ordinary Americans.[19]

Oversight

Intelligence Community Oversight duties are distributed to both the Executive and Legislative branches. Primary Executive oversight is performed by the President’s Foreign Intelligence Advisory Board, the Joint Intelligence Community Council, the Office of the Inspector General, and the Office of Management and Budget. Primary congressional oversight jurisdiction over the IC is assigned to two committees: the United States House Permanent Select Committee on Intelligence and the United States Senate Select Committee on Intelligence. The House Armed Services Committee and Senate Armed Services Committee draft bills to annually authorize the budgets of DoD intelligence activities, and both the House and Senate appropriations committees annually draft bills to appropriate the budgets of the IC. The Senate Committee on Homeland Security and Governmental Affairs took a leading role in formulating the intelligence reform legislation in the 108th Congress.

See also

References

  1. Jump up^ Agrawal, Nina. “There’s more than the CIA and FBI: The 17 agencies that make up the U.S. intelligence community”. latimes.com. Retrieved 2017-01-30.
  2. Jump up^ “Executive Order 12333”. Cia.gov. Retrieved 2013-01-23.
  3. Jump up^ Dana Priest & William M Arkin (19 July 2010). “A hidden world, growing beyond control”. The Washington Post.
  4. Jump up^ Priest, Dana (2011). Top Secret America: The Rise of the New American Security State. Little, Brown and Company. p. 320. ISBN 0-316-18221-4.
  5. Jump up^ Michael Warner; Kenneth McDonald. “US Intelligence Community Reform Studies Since 1947” (PDF). CIA. p. 4. Retrieved 28 June 2013.
  6. Jump up^ Rosenbach, Eric & Aki J. Peritz (12 June 2009). “Confrontation or Collaboration? Congress and the Intelligence Community” (PDF). Belfer Center for Science and International Affairs, Harvard Kennedy School. Retrieved 21 July 2009.
  7. Jump up^ Executive Order 12333 text
  8. Jump up^ User, Super. “Members of the IC”.
  9. Jump up^ “DNI Releases Budget Figure for 2013 National Intelligence Program”. Office of the Director of National Intelligence. 30 October 2013. Retrieved 2 August 2014.
  10. Jump up^ DNI Releases FY 2012 Appropriated Budget Figure. Dni.gov (2012-10-30). Retrieved on 2013-08-16.
  11. Jump up^ “DNI Releases Budget Figure for 2010 National Intelligence Program”(PDF). Office of the Director of National Intelligence. 2010-10-28. Retrieved 15 June 2013.
  12. Jump up^ “DNI Releases Budget Figure for 2009 National Intelligence Program”(PDF). Retrieved 15 June 2013.
  13. Jump up^ “DNI Releases Budget Figure for 2008 National Intelligence Program”(PDF). Retrieved 15 June 2013.
  14. Jump up^ “DNI Releases Budget Figure for 2007 National Intelligence Program”(PDF). Retrieved 15 June 2013.
  15. Jump up^ Hacket, John F. (2010-10-28). “FY2006 National Intelligence Program Budget, 10-28-10” (PDF). Office of the Director of National Intelligence. Retrieved 15 June 2013.
  16. Jump up^ Matt DeLong (29 August 2013). “Inside the 2013 U.S. intelligence ‘black budget'”. The Washington Post. Retrieved 31 August 2013.
  17. Jump up^ Matthews, Dylan (29 August 2013). “America’s secret intelligence budget, in 11 (nay, 13) charts”. The Washington Post. Retrieved 31 August 2013.
  18. Jump up^ DeLong, Matt (29 August 2013). “2013 U.S. intelligence budget: Additional resources”. The Washington Post. Retrieved 31 August 2013.
  19. ^ Jump up to:a b Barton Gellman & Greg Miller (29 August 2013). “U.S. spy network’s successes, failures and objectives detailed in ‘black budget’ summary”. The Washington Post. Retrieved 31 August 2013.

Further reading

External links

https://en.wikipedia.org/wiki/United_States_Intelligence_Community

National Security Agency

From Wikipedia, the free encyclopedia
National Security Agency
Seal of the U.S. National Security Agency.svg

Seal of the National Security Agency
Flag of the U.S. National Security Agency.svg

Flag of the National Security Agency
National Security Agency headquarters, Fort Meade, Maryland.jpg
NSA Headquarters, Fort Meade, Maryland
Agency overview
Formed November 4, 1952; 64 years ago[1]
Preceding agency
  • Armed Forces Security Agency
Headquarters Fort Meade, Maryland, U.S.
39°6′32″N 76°46′17″WCoordinates: 39°6′32″N 76°46′17″W
Motto “Defending Our Nation. Securing The Future.”
Employees Classified (30,000–40,000 estimate)[2][3][4][5]
Annual budget Classified (estimated $10.8 billion, 2013)[6][7]
Agency executives
Parent agency United States Department of Defense
Website www.nsa.gov

The National Security Agency (NSA) is a military intelligence organization and a constituent of the United States Department of Defense (DOD). The NSA is responsible for global monitoring, collection, and processing of information and data for foreign intelligence and counterintelligence purposes, a discipline known as signals intelligence (SIGINT). NSA is concurrently charged with protection of U.S. government communications and information systems against penetration and network warfare.[8][9] Although many of NSA’s programs rely on “passive” electronic collection, the agency is authorized to accomplish its mission through active clandestine means,[10] among which are physically bugging electronic systems[11] and allegedly engaging in sabotage through subversive software.[12][13] Moreover, NSA maintains physical presence in a large number of countries across the globe, where its Special Collection Service (SCS) inserts eavesdropping devices in difficult-to-reach places. SCS collection tactics allegedly encompass “close surveillance, burglary, wiretapping, breaking and entering.”[14][15]

Unlike the Defense Intelligence Agency (DIA) and the Central Intelligence Agency (CIA), both of which specialize primarily in foreign human espionage, NSA does not unilaterally conduct human-source intelligence gathering, despite often being portrayed so in popular culture. Instead, NSA is entrusted with assistance to and coordination of SIGINT elements at other government organizations, which are prevented by law from engaging in such activities without the approval of the NSA via the Defense Secretary.[16] As part of these streamlining responsibilities, the agency has a co-located organization called the Central Security Service (CSS), which was created to facilitate cooperation between NSA and other U.S. military cryptanalysis components. Additionally, the NSA Director simultaneously serves as the Commander of the United States Cyber Command and as Chief of the Central Security Service.

Originating as a unit to decipher coded communications in World War II, it was officially formed as the NSA by President Harry S. Truman in 1952. Since then, it has become one of the largest U.S. intelligence organizations in terms of personnel and budget,[6][17] operating as part of the Department of Defense and simultaneously reporting to the Director of National Intelligence.

NSA surveillance has been a matter of political controversy on several occasions, such as its spying on anti-Vietnam-war leaders or economic espionage. In 2013, the extent of some of the NSA’s secret surveillance programs was revealed to the public by Edward Snowden. According to the leaked documents, the NSA intercepts the communications of over a billion people worldwide, many of whom are United States citizens, and tracks the movement of hundreds of millions of people using cellphones. Internationally, research has pointed to the NSA’s ability to surveil the domestic Internet traffic of foreign countries through “boomerang routing”.[18]

Contents

 [show

History

Army predecessor

The origins of the National Security Agency can be traced back to April 28, 1917, three weeks after the U.S. Congress declared war on Germany in World War I. A code and cipher decryption unit was established as the Cable and Telegraph Section which was also known as the Cipher Bureau. It was headquartered in Washington, D.C. and was part of the war effort under the executive branch without direct Congressional authorization. During the course of the war it was relocated in the army’s organizational chart several times. On July 5, 1917, Herbert O. Yardley was assigned to head the unit. At that point, the unit consisted of Yardley and two civilian clerks. It absorbed the navy’s cryptoanalysis functions in July 1918. World War I ended on November 11, 1918, and MI-8 moved to New York City on May 20, 1919, where it continued intelligence activities as the Code Compilation Company under the direction of Yardley.[19][20]

Black Chamber

Western Union allowed MI-8 to monitor telegraphic communications passing through the company’s wires until 1929.[21]

MI-8 also operated the so-called “Black Chamber“.[22] The Black Chamber was located on East 37th Street in Manhattan. Its purpose was to crack the communications codes of foreign governments. Jointly supported by the State Department and the War Department, the chamber persuaded Western Union, the largest U.S. telegram company, to allow government officials to monitor private communications passing through the company’s wires.[23]

Other “Black Chambers” were also found in Europe. They were established by the French and British governments to read the letters of targeted individuals, employing a variety of techniques to surreptitiously open, copy, and reseal correspondence before forwarding it to unsuspecting recipients.[24]

Despite the American Black Chamber’s initial successes, it was shut down in 1929 by U.S. Secretary of State Henry L. Stimson, who defended his decision by stating: “Gentlemen do not read each other’s mail”.[21]

World War II and its aftermath

During World War II, the Signal Security Agency (SSA) was created to intercept and decipher the communications of the Axis powers.[25] When the war ended, the SSA was reorganized as the Army Security Agency (ASA), and it was placed under the leadership of the Director of Military Intelligence.[25]

On May 20, 1949, all cryptologic activities were centralized under a national organization called the Armed Forces Security Agency (AFSA).[25] This organization was originally established within the U.S. Department of Defense under the command of the Joint Chiefs of Staff.[26] The AFSA was tasked to direct Department of Defense communications and electronic intelligence activities, except those of U.S. military intelligence units.[26] However, the AFSA was unable to centralize communications intelligence and failed to coordinate with civilian agencies that shared its interests such as the Department of State, Central Intelligence Agency (CIA) and the Federal Bureau of Investigation (FBI).[26] In December 1951, President Harry S. Truman ordered a panel to investigate how AFSA had failed to achieve its goals. The results of the investigation led to improvements and its redesignation as the National Security Agency.[27]

The agency was formally established by Truman in a memorandum of October 24, 1952, that revised National Security Council Intelligence Directive (NSCID) 9.[28] Since President Truman’s memo was a classified document,[28] the existence of the NSA was not known to the public at that time. Due to its ultra-secrecy the U.S. intelligence community referred to the NSA as “No Such Agency”.[29]

Vietnam War

In the 1960s, the NSA played a key role in expanding America’s commitment to the Vietnam War by providing evidence of a North Vietnamese attack on the American destroyer USS Maddox during the Gulf of Tonkin incident.[30]

A secret operation, code-named “MINARET“, was set up by the NSA to monitor the phone communications of Senators Frank Church and Howard Baker, as well as major civil rights leaders, including Martin Luther King, Jr., and prominent U.S. journalists and athletes who criticized the Vietnam War.[31] However, the project turned out to be controversial, and an internal review by the NSA concluded that its Minaret program was “disreputable if not outright illegal”.[31]

The NSA mounted a major effort to secure tactical communications among U.S. forces during the war with mixed success. The NESTOR family of compatible secure voice systems it developed was widely deployed during the Vietnam War, with about 30,000 NESTOR sets produced. However a variety of technical and operational problems limited their use, allowing the North Vietnamese to exploit intercepted U.S. communications.[32] :Vol I, p.79

Church Committee hearings

In the aftermath of the Watergate scandal, a congressional hearing in 1975 led by Sen. Frank Church[33] revealed that the NSA, in collaboration with Britain’s SIGINT intelligence agency Government Communications Headquarters (GCHQ), had routinely intercepted the international communications of prominent anti-Vietnam war leaders such as Jane Fonda and Dr. Benjamin Spock.[34] Following the resignation of President Richard Nixon, there were several investigations of suspected misuse of FBI, CIA and NSA facilities.[35] Senator Frank Church uncovered previously unknown activity,[35] such as a CIA plot (ordered by the administration of President John F. Kennedy) to assassinate Fidel Castro.[36] The investigation also uncovered NSA’s wiretaps on targeted American citizens.[37]

After the Church Committee hearings, the Foreign Intelligence Surveillance Act of 1978 was passed into law. This was designed to limit the practice of mass surveillance in the United States.[35]

From 1980s to 1990s

In 1986, the NSA intercepted the communications of the Libyan government during the immediate aftermath of the Berlin discotheque bombing. The White House asserted that the NSA interception had provided “irrefutable” evidence that Libya was behind the bombing, which U.S. President Ronald Reagan cited as a justification for the 1986 United States bombing of Libya.[38][39]

In 1999, a multi-year investigation by the European Parliament highlighted the NSA’s role in economic espionage in a report entitled ‘Development of Surveillance Technology and Risk of Abuse of Economic Information’.[40] That year, the NSA founded the NSA Hall of Honor, a memorial at the National Cryptologic Museum in Fort Meade, Maryland.[41] The memorial is a, “tribute to the pioneers and heroes who have made significant and long-lasting contributions to American cryptology”.[41] NSA employees must be retired for more than fifteen years to qualify for the memorial.[41]

NSA’s infrastructure deteriorated in the 1990s as defense budget cuts resulted in maintenance deferrals. On January 24, 2000, NSA headquarters suffered a total network outage for three days caused by an overloaded network. Incoming traffic was successfully stored on agency servers, but it could not be directed and processed. The agency carried out emergency repairs at a cost of $3 million to get the system running again. (Some incoming traffic was also directed instead to Britain’s GCHQ for the time being.) Director Michael Hayden called the outage a “wake-up call” for the need to invest in the agency’s infrastructure.[42]

War on Terror

After Osama bin Laden moved to Afghanistan in the 1980s, the NSA recorded all of his phone calls via satellite, logging over 2,000 minutes of conversation[43]

In the aftermath of the September 11 attacks, the NSA created new IT systems to deal with the flood of information from new technologies like the Internet and cellphones. ThinThread contained advanced data mining capabilities. It also had a “privacy mechanism”; surveillance was stored encrypted; decryption required a warrant. The research done under this program may have contributed to the technology used in later systems. ThinThread was cancelled when Michael Hayden chose Trailblazer, which did not include ThinThread’s privacy system.[44]

Trailblazer Project ramped up in 2002 and was worked on by Science Applications International Corporation (SAIC), Boeing, Computer Sciences Corporation, IBM, and Litton Industries. Some NSA whistleblowers complained internally about major problems surrounding Trailblazer. This led to investigations by Congress and the NSA and DoD Inspectors General. The project was cancelled in early 2004.

Turbulence started in 2005. It was developed in small, inexpensive “test” pieces, rather than one grand plan like Trailblazer. It also included offensive cyber-warfare capabilities, like injecting malware into remote computers. Congress criticized Turbulence in 2007 for having similar bureaucratic problems as Trailblazer.[45] It was to be a realization of information processing at higher speeds in cyberspace.[46]

Global surveillance disclosures

The massive extent of the NSA’s spying, both foreign and domestic, was revealed to the public in a series of detailed disclosures of internal NSA documents beginning in June 2013. Most of the disclosures were leaked by former NSA contractor, Edward Snowden.

Scope of surveillance

It was revealed that the NSA intercepts telephone and Internet communications of over a billion people worldwide, seeking information on terrorism as well as foreign politics, economics[47] and “commercial secrets”.[48] In a declassified document it was revealed that 17,835 phone lines were on an improperly permitted “alert list” from 2006 to 2009 in breach of compliance, which tagged these phone lines for daily monitoring.[49][50][51] Eleven percent of these monitored phone lines met the agency’s legal standard for “reasonably articulable suspicion” (RAS).[49][52]

A dedicated unit of the NSA locates targets for the CIA for extrajudicial assassination in the Middle East.[53] The NSA has also spied extensively on the European Union, the United Nations and numerous governments including allies and trading partners in Europe, South America and Asia.[54][55]

The NSA tracks the locations of hundreds of millions of cellphones per day, allowing it to map people’s movements and relationships in detail.[56] It reportedly has access to all communications made via Google, Microsoft, Facebook, Yahoo, YouTube, AOL, Skype, Apple and Paltalk,[57] and collects hundreds of millions of contact lists from personal email and instant messaging accounts each year.[58] It has also managed to weaken much of the encryption used on the Internet (by collaborating with, coercing or otherwise infiltrating numerous technology companies), so that the majority of Internet privacy is now vulnerable to the NSA and other attackers.[59][60]

Domestically, the NSA collects and stores metadata records of phone calls,[61] including over 120 million US Verizon subscribers,[62] as well as Internet communications,[57] relying on a secret interpretation of the Patriot Act whereby the entirety of US communications may be considered “relevant” to a terrorism investigation if it is expected that even a tiny minority may relate to terrorism.[63] The NSA supplies foreign intercepts to the DEA, IRS and other law enforcement agencies, who use these to initiate criminal investigations. Federal agents are then instructed to “recreate” the investigative trail via parallel construction.[64]

The NSA also spies on influential Muslims to obtain information that could be used to discredit them, such as their use of pornography. The targets, both domestic and abroad, are not suspected of any crime but hold religious or political views deemed “radical” by the NSA.[65]

Although NSA’s surveillance activities are controversial, government agencies and private enterprises have common needs, and sometimes cooperate at subtle and complex technical levels. Big data is becoming more advantageous, justifying the cost of required computer hardware, and social media lead the trend. The interests of NSA and Silicon Valley began to converge as advances in computer storage technology drastically reduced the costs of storing enormous amounts of data and at the same time the value of the data for use in consumer marketing began to rise. On the other hand, social media sites are growing as voluntary data mining operations on a scale that rivals or exceeds anything the government could attempt on its own.[66]

According to a report in The Washington Post in July 2014, relying on information provided by Snowden, 90% of those placed under surveillance in the U.S. are ordinary Americans, and are not the intended targets. The newspaper said it had examined documents including emails, text messages, and online accounts that support the claim.[67]

Legal accountability

Despite President Obama’s claims that these programs have congressional oversight, members of Congress were unaware of the existence of these NSA programs or the secret interpretation of the Patriot Act, and have consistently been denied access to basic information about them.[68] Obama has also claimed that there are legal checks in place to prevent inappropriate access of data and that there have been no examples of abuse;[69] however, the secret FISC court charged with regulating the NSA’s activities is, according to its chief judge, incapable of investigating or verifying how often the NSA breaks even its own secret rules.[70] It has since been reported that the NSA violated its own rules on data access thousands of times a year, many of these violations involving large-scale data interceptions;[71] and that NSA officers have even used data intercepts to spy on love interests.[72] The NSA has “generally disregarded the special rules for disseminating United States person information” by illegally sharing its intercepts with other law enforcement agencies.[73] A March 2009 opinion of the FISC court, released by court order, states that protocols restricting data queries had been “so frequently and systemically violated that it can be fairly said that this critical element of the overall … regime has never functioned effectively.”[74][75] In 2011 the same court noted that the “volume and nature” of the NSA’s bulk foreign Internet intercepts was “fundamentally different from what the court had been led to believe”.[73] Email contact lists (including those of US citizens) are collected at numerous foreign locations to work around the illegality of doing so on US soil.[58]

Legal opinions on the NSA’s bulk collection program have differed. In mid-December 2013, U.S. District Court Judge Richard Leon ruled that the “almost-Orwellian” program likely violates the Constitution, and wrote, “I cannot imagine a more ‘indiscriminate’ and ‘arbitrary invasion’ than this systematic and high-tech collection and retention of personal data on virtually every single citizen for purposes of querying and analyzing it without prior judicial approval. Surely, such a program infringes on ‘that degree of privacy’ that the Founders enshrined in the Fourth Amendment. Indeed, I have little doubt that the author of our Constitution, James Madison, who cautioned us to beware ‘the abridgement of freedom of the people by gradual and silent encroachments by those in power,’ would be aghast.”[76]

Later that month, U.S. District Judge William Pauley ruled that the NSA’s collection of telephone records is legal and valuable in the fight against terrorism. In his opinion, he wrote, “a bulk telephony metadata collection program [is] a wide net that could find and isolate gossamer contacts among suspected terrorists in an ocean of seemingly disconnected data” and noted that a similar collection of data prior to 9/11 might have prevented the attack.[77]

An October 2014 United Nations report condemned mass surveillance by the United States and other countries as violating multiple international treaties and conventions that guarantee core privacy rights.[78]

Official responses

On March 20, 2013 the Director of National Intelligence, Lieutenant General James Clapper, testified before Congress that the NSA does not wittingly collect any kind of data on millions or hundreds of millions of Americans, but he retracted this in June after details of the PRISM program were published, and stated instead that meta-data of phone and Internet traffic are collected, but no actual message contents.[79] This was corroborated by the NSA Director, General Keith Alexander, before it was revealed that the XKeyscore program collects the contents of millions of emails from US citizens without warrant, as well as “nearly everything a user does on the Internet”. Alexander later admitted that “content” is collected, but stated that it is simply stored and never analyzed or searched unless there is “a nexus to al-Qaida or other terrorist groups”.[69]

Regarding the necessity of these NSA programs, Alexander stated on June 27 that the NSA’s bulk phone and Internet intercepts had been instrumental in preventing 54 terrorist “events”, including 13 in the US, and in all but one of these cases had provided the initial tip to “unravel the threat stream”.[80] On July 31 NSA Deputy Director John Inglis conceded to the Senate that these intercepts had not been vital in stopping any terrorist attacks, but were “close” to vital in identifying and convicting four San Diego men for sending US$8,930 to Al-Shabaab, a militia that conducts terrorism in Somalia.[81][82][83]

The U.S. government has aggressively sought to dismiss and challenge Fourth Amendment cases raised against it, and has granted retroactive immunity to ISPs and telecoms participating in domestic surveillance.[84][85] The U.S. military has acknowledged blocking access to parts of The Guardian website for thousands of defense personnel across the country,[86][87] and blocking the entire Guardian website for personnel stationed throughout Afghanistan, the Middle East, and South Asia.[88]

Organizational structure

Michael S. Rogers, the director of the NSA.

The NSA is led by the Director of the National Security Agency (DIRNSA), who also serves as Chief of the Central Security Service (CHCSS) and Commander of the United States Cyber Command (USCYBERCOM) and is the highest-ranking military official of these organizations. He is assisted by a Deputy Director, who is the highest-ranking civilian within the NSA/CSS.

NSA also has an Inspector General, head of the Office of the Inspector General (OIG), a General Counsel, head of the Office of the General Counsel (OGC) and a Director of Compliance, who is head of the Office of the Director of Compliance (ODOC).[89]

Unlike other intelligence organizations such as CIA or DIA, NSA has always been particularly reticent concerning its internal organizational structure.

As of the mid-1990s, the National Security Agency was organized into five Directorates:

  • The Operations Directorate, which was responsible for SIGINT collection and processing.
  • The Technology and Systems Directorate, which develops new technologies for SIGINT collection and processing.
  • The Information Systems Security Directorate, which was responsible for NSA’s communications and information security missions.
  • The Plans, Policy and Programs Directorate, which provided staff support and general direction for the Agency.
  • The Support Services Directorate, which provided logistical and administrative support activities.[90]

Each of these directorates consisted of several groups or elements, designated by a letter. There were for example the A Group, which was responsible for all SIGINT operations against the Soviet Union and Eastern Europe, and G Group, which was responsible for SIGINT related to all non-communist countries. These groups were divided in units designated by an additional number, like unit A5 for breaking Soviet codes, and G6, being the office for the Middle East, North Africa, Cuba, Central and South America.[91][92]

Structure

As of 2013, NSA has about a dozen directorates, which are designated by a letter, although not all of them are publicly known. The directorates are divided in divisions and units starting with the letter of the parent directorate, followed by a number for the division, the sub-unit or a sub-sub-unit.

The main elements of the organizational structure of the NSA are:[93]

  • F – Directorate only known from unit F6, the Special Collection Service (SCS), which is a joint program created by CIA and NSA in 1978 to facilitate clandestine activities such as bugging computers throughout the world, using the expertise of both agencies.[94]
  • G – Directorate only known from unit G112, the office that manages the Senior Span platform, attached to the U2 spy planes.[95]
  • I – Information Assurance Directorate (IAD), which ensures availability, integrity, authentication, confidentiality, and non-repudiation of national security and telecommunications and information systems (national security systems).
  • J – Directorate only known from unit J2, the Cryptologic Intelligence Unit
  • L – Installation and Logistics
  • M – Human Resources
  • Q – Security and Counterintelligence
  • R – Research Directorate, which conducts research on signals intelligence and on information assurance for the U.S. Government.[96]
  • S – Signals Intelligence Directorate (SID), which is responsible for the collection, analysis, production and dissemination of signals intelligence. This directorate is led by a director and a deputy director. The SID consists of the following divisions:
    • S1 – Customer Relations
    • S2 – Analysis and Production Centers, with the following so-called Product Lines:
      • S2A: South Asia, S2B: China and Korea, S2C: International Security, S2E: Middle East/Asia, S2F: International Crime, S2G: Counter-proliferation, S2H: Russia, S2I: Counter-terrorism, S2J: Weapons and Space, S2T: Current Threats
    • S3 – Data Acquisition, with these divisions for the main collection programs:
      • S31 – Cryptanalysis and Exploitation Services (CES)
      • S32 – Tailored Access Operations (TAO), which hacks into foreign computers to conduct cyber-espionage and reportedly is “the largest and arguably the most important component of the NSA’s huge Signal Intelligence (SIGINT) Directorate, consisting of over 1,000 military and civilian computer hackers, intelligence analysts, targeting specialists, computer hardware and software designers, and electrical engineers.”[97]
      • S33 – Global Access Operations (GAO), which is responsible for intercepts from satellites and other international SIGINT platforms.[98] A tool which details and maps the information collected by this unit is code-named Boundless Informant.
      • S34 – Collections Strategies and Requirements Center
      • S35 – Special Source Operations (SSO), which is responsible for domestic and compartmented collection programs, like for example the PRISM program.[98] Special Source Operations is also mentioned in connection to the FAIRVIEW collection program.[99]
  • T – Technical Directorate (TD)
  • Directorate for Education and Training
  • Directorate for Corporate Leadership
  • Foreign Affairs Directorate, which acts as liaison with foreign intelligence services, counter-intelligence centers and the UKUSA-partners.
  • Acquisitions and Procurement Directorate
  • Information Sharing Services (ISS), led by a chief and a deputy chief.[100]

In the year 2000, a leadership team was formed, consisting of the Director, the Deputy Director and the Directors of the Signals Intelligence (SID), the Information Assurance (IAD) and the Technical Directorate (TD). The chiefs of other main NSA divisions became associate directors of the senior leadership team.[101]

After president George W. Bush initiated the President’s Surveillance Program (PSP) in 2001, the NSA created a 24-hour Metadata Analysis Center (MAC), followed in 2004 by the Advanced Analysis Division (AAD), with the mission of analyzing content, Internet metadata and telephone metadata. Both units were part of the Signals Intelligence Directorate.[102]

A 2016 proposal would combine the Signals Intelligence Directorate with the Information Assurance Directorate into a Directorate of Operations.[103]

Watch centers

The NSA maintains at least two watch centers:

  • National Security Operations Center (NSOC), which is the NSA’s current operations center and focal point for time-sensitive SIGINT reporting for the United States SIGINT System (USSS). This center was established in 1968 as the National SIGINT Watch Center (NSWC) and renamed into National SIGINT Operations Center (NSOC) in 1973. This “nerve center of the NSA” got its current name in 1996.[104]
  • NSA/CSS Threat Operations Center (NTOC), which is the primary NSA/CSS partner for Department of Homeland Security response to cyber incidents. The NTOC establishes real-time network awareness and threat characterization capabilities to forecast, alert, and attribute malicious activity and enable the coordination of Computer Network Operations. The NTOC was established in 2004 as a joint Information Assurance and Signals Intelligence project.[105]

Employees

The number of NSA employees is officially classified[4] but there are several sources providing estimates. In 1961, NSA had 59,000 military and civilian employees, which grew to 93,067 in 1969, of which 19,300 worked at the headquarters at Fort Meade. In the early 1980s NSA had roughly 50,000 military and civilian personnel. By 1989 this number had grown again to 75,000, of which 25,000 worked at the NSA headquarters. Between 1990 and 1995 the NSA’s budget and workforce were cut by one third, which led to a substantial loss of experience.[106]

In 2012, the NSA said more than 30,000 employees worked at Fort Meade and other facilities.[2] In 2012, John C. Inglis, the deputy director, said that the total number of NSA employees is “somewhere between 37,000 and one billion” as a joke,[4] and stated that the agency is “probably the biggest employer of introverts.”[4] In 2013 Der Spiegel stated that the NSA had 40,000 employees.[5] More widely, it has been described as the world’s largest single employer of mathematicians.[107] Some NSA employees form part of the workforce of the National Reconnaissance Office (NRO), the agency that provides the NSA with satellite signals intelligence.

As of 2013 about 1,000 system administrators work for the NSA.[108]

Security issues

The NSA received criticism early on in 1960 after two agents had defected to the Soviet Union. Investigations by the House Un-American Activities Committee and a special subcommittee of the United States House Committee on Armed Services revealed severe cases of ignorance in personnel security regulations, prompting the former personnel director and the director of security to step down and leading to the adoption of stricter security practices.[109] Nonetheless, security breaches reoccurred only a year later when in an issue of Izvestia of July 23, 1963, a former NSA employee published several cryptologic secrets.

The very same day, an NSA clerk-messenger committed suicide as ongoing investigations disclosed that he had sold secret information to the Soviets on a regular basis. The reluctance of Congressional houses to look into these affairs had prompted a journalist to write, “If a similar series of tragic blunders occurred in any ordinary agency of Government an aroused public would insist that those responsible be officially censured, demoted, or fired.” David Kahn criticized the NSA’s tactics of concealing its doings as smug and the Congress’ blind faith in the agency’s right-doing as shortsighted, and pointed out the necessity of surveillance by the Congress to prevent abuse of power.[109]

Edward Snowden‘s leaking of the existence of PRISM in 2013 caused the NSA to institute a “two-man rule“, where two system administrators are required to be present when one accesses certain sensitive information.[108]Snowden claims he suggested such a rule in 2009.[110]

Polygraphing

Defense Security Service (DSS) polygraph brochure given to NSA applicants

The NSA conducts polygraph tests of employees. For new employees, the tests are meant to discover enemy spies who are applying to the NSA and to uncover any information that could make an applicant pliant to coercion.[111] As part of the latter, historically EPQs or “embarrassing personal questions” about sexual behavior had been included in the NSA polygraph.[111]The NSA also conducts five-year periodic reinvestigation polygraphs of employees, focusing on counterintelligence programs. In addition the NSA conducts periodic polygraph investigations in order to find spies and leakers; those who refuse to take them may receive “termination of employment”, according to a 1982 memorandum from the director of the NSA.[112]

File:NSApolygraphvideo.webm

NSA-produced video on the polygraph process

There are also “special access examination” polygraphs for employees who wish to work in highly sensitive areas, and those polygraphs cover counterintelligence questions and some questions about behavior.[112] NSA’s brochure states that the average test length is between two and four hours.[113] A 1983 report of the Office of Technology Assessment stated that “It appears that the NSA [National Security Agency] (and possibly CIA) use the polygraph not to determine deception or truthfulness per se, but as a technique of interrogation to encourage admissions.”[114] Sometimes applicants in the polygraph process confess to committing felonies such as murder, rape, and selling of illegal drugs. Between 1974 and 1979, of the 20,511 job applicants who took polygraph tests, 695 (3.4%) confessed to previous felony crimes; almost all of those crimes had been undetected.[111]

In 2010 the NSA produced a video explaining its polygraph process.[115] The video, ten minutes long, is titled “The Truth About the Polygraph” and was posted to the Web site of the Defense Security Service. Jeff Stein of The Washington Post said that the video portrays “various applicants, or actors playing them — it’s not clear — describing everything bad they had heard about the test, the implication being that none of it is true.”[116] AntiPolygraph.org argues that the NSA-produced video omits some information about the polygraph process; it produced a video responding to the NSA video.[115] George Maschke, the founder of the Web site, accused the NSA polygraph video of being “Orwellian“.[116]

After Edward Snowden revealed his identity in 2013, the NSA began requiring polygraphing of employees once per quarter.[117]

Arbitrary firing

The number of exemptions from legal requirements has been criticized. When in 1964 the Congress was hearing a bill giving the director of the NSA the power to fire at will any employee,The Washington Post wrote: “This is the very definition of arbitrariness. It means that an employee could be discharged and disgraced on the basis of anonymous allegations without the slightest opportunity to defend himself.” Yet, the bill was accepted by an overwhelming majority.[109]

Insignia and memorials

Seal of the U.S. National Security Agency.svg

The heraldic insignia of NSA consists of an eagle inside a circle, grasping a key in its talons.[118] The eagle represents the agency’s national mission.[118] Its breast features a shield with bands of red and white, taken from the Great Seal of the United States and representing Congress.[118] The key is taken from the emblem of Saint Peter and represents security.[118]

When the NSA was created, the agency had no emblem and used that of the Department of Defense.[119] The agency adopted its first of two emblems in 1963.[119] The current NSA insignia has been in use since 1965, when then-Director, LTG Marshall S. Carter (USA) ordered the creation of a device to represent the agency.[120]

The NSA’s flag consists of the agency’s seal on a light blue background.

National Cryptologic Memorial

Crews associated with NSA missions have been involved in a number of dangerous and deadly situations.[121] The USS Liberty incident in 1967 and USS Pueblo incident in 1968 are examples of the losses endured during the Cold War.[121]

The National Security Agency/Central Security Service Cryptologic Memorial honors and remembers the fallen personnel, both military and civilian, of these intelligence missions.[122] It is made of black granite, and has 171 names carved into it, as of 2013 .[122] It is located at NSA headquarters. A tradition of declassifying the stories of the fallen was begun in 2001.[122]

NSANet (NSA’s intranet)

Behind the Green Door – Secure communications room with separate computer terminals for access to SIPRNET, GWAN, NSANET, and JWICS

NSANet stands for National Security Agency Network and is the official NSA intranet.[123] It is a classified network,[124] for information up to the level of TS/SCI[125] to support the use and sharing of intelligence data between NSA and the signals intelligence agencies of the four other nations of the Five Eyes partnership. The management of NSANet has been delegated to the Central Security Service Texas (CSSTEXAS).[126]

NSANet is a highly secured computer network consisting of fiber-optic and satellite communication channels which are almost completely separated from the public Internet. The network allows NSA personnel and civilian and military intelligence analysts anywhere in the world to have access to the agency’s systems and databases. This access is tightly controlled and monitored. For example, every keystroke is logged, activities are audited at random and downloading and printing of documents from NSANet are recorded.[127]

In 1998, NSANet, along with NIPRNET and SIPRNET, had “significant problems with poor search capabilities, unorganized data and old information”.[128] In 2004, the network was reported to have used over twenty commercial off-the-shelf operating systems.[129] Some universities that do highly sensitive research are allowed to connect to it.[130]

The thousands of Top Secret internal NSA documents that were taken by Edward Snowden in 2013 were stored in “a file-sharing location on the NSA’s intranet site” so they could easily be read online by NSA personnel. Everyone with a TS/SCI-clearance had access to these documents and as a system administrator, Snowden was responsible for moving accidentally misplaced highly sensitive documents to more secure storage locations.[131]

National Computer Security Center

The DoD Computer Security Center was founded in 1981 and renamed the National Computer Security Center (NCSC) in 1985. NCSC was responsible for computer security throughout the federal government.[132] NCSC was part of NSA,[133] and during the late 1980s and the 1990s, NSA and NCSC published Trusted Computer System Evaluation Criteria in a six-foot high Rainbow Series of books that detailed trusted computing and network platform specifications.[134] The Rainbow books were replaced by the Common Criteria, however, in the early 2000s.[134]

Facilities

Headquarters

National Security Agency headquarters in Fort Meade, 2013

Headquarters for the National Security Agency is located at 39°6′32″N 76°46′17″W in Fort George G. Meade, Maryland, although it is separate from other compounds and agencies that are based within this same military installation. Ft. Meade is about 20 mi (32 km) southwest of Baltimore,[135] and 25 mi (40 km) northeast of Washington, DC.[136] The NSA has its own exit off Maryland Route 295 South labeled “NSA Employees Only”.[137][138] The exit may only be used by people with the proper clearances, and security vehicles parked along the road guard the entrance.[139]

NSA is the largest employer in the U.S. state of Maryland, and two-thirds of its personnel work at Ft. Meade.[140] Built on 350 acres (140 ha; 0.55 sq mi)[141] of Ft. Meade’s 5,000 acres (2,000 ha; 7.8 sq mi),[142] the site has 1,300 buildings and an estimated 18,000 parking spaces.[136][143]

NSA headquarters building in Fort Meade (left), NSOC (right)

The main NSA headquarters and operations building is what James Bamford, author of Body of Secrets, describes as “a modern boxy structure” that appears similar to “any stylish office building.”[144] The building is covered with one-way dark glass, which is lined with copper shielding in order to prevent espionage by trapping in signals and sounds.[144] It contains 3,000,000 square feet (280,000 m2), or more than 68 acres (28 ha), of floor space; Bamford said that the U.S. Capitol “could easily fit inside it four times over.”[144]

The facility has over 100 watchposts,[145] one of them being the visitor control center, a two-story area that serves as the entrance.[144] At the entrance, a white pentagonal structure,[146] visitor badges are issued to visitors and security clearances of employees are checked.[147] The visitor center includes a painting of the NSA seal.[146]

The OPS2A building, the tallest building in the NSA complex and the location of much of the agency’s operations directorate, is accessible from the visitor center. Bamford described it as a “dark glass Rubik’s Cube“.[148] The facility’s “red corridor” houses non-security operations such as concessions and the drug store. The name refers to the “red badge” which is worn by someone without a security clearance. The NSA headquarters includes a cafeteria, a credit union, ticket counters for airlines and entertainment, a barbershop, and a bank.[146] NSA headquarters has its own post office, fire department, and police force.[149][150][151]

The employees at the NSA headquarters reside in various places in the Baltimore-Washington area, including Annapolis, Baltimore, and Columbia in Maryland and the District of Columbia, including the Georgetown community.[152]

Power consumption

Due to massive amounts of data processing, NSA is the largest electricity consumer in Maryland.[140]

Following a major power outage in 2000, in 2003 and in follow-ups through 2007, The Baltimore Sun reported that the NSA was at risk of electrical overload because of insufficient internal electrical infrastructure at Fort Meade to support the amount of equipment being installed. This problem was apparently recognized in the 1990s but not made a priority, and “now the agency’s ability to keep its operations going is threatened.”[153]

Baltimore Gas & Electric (BGE, now Constellation Energy) provided NSA with 65 to 75 megawatts at Ft. Meade in 2007, and expected that an increase of 10 to 15 megawatts would be needed later that year.[154] In 2011, NSA at Ft. Meade was Maryland’s largest consumer of power.[140] In 2007, as BGE’s largest customer, NSA bought as much electricity as Annapolis, the capital city of Maryland.[153]

One estimate put the potential for power consumption by the new Utah Data Center at US$40 million per year.[155]

History of headquarters

Headquarters at Fort Meade circa 1950s

When the agency was established, its headquarters and cryptographic center were in the Naval Security Station in Washington, D.C. The COMINT functions were located in Arlington Hall in Northern Virginia, which served as the headquarters of the U.S. Army‘s cryptographic operations.[156] Because the Soviet Union had detonated a nuclear bomb and because the facilities were crowded, the federal government wanted to move several agencies, including the AFSA/NSA. A planning committee considered Fort Knox, but Fort Meade, Maryland, was ultimately chosen as NSA headquarters because it was far enough away from Washington, D.C. in case of a nuclear strike and was close enough so its employees would not have to move their families.[157]

Construction of additional buildings began after the agency occupied buildings at Ft. Meade in the late 1950s, which they soon outgrew.[157] In 1963 the new headquarters building, nine stories tall, opened. NSA workers referred to the building as the “Headquarters Building” and since the NSA management occupied the top floor, workers used “Ninth Floor” to refer to their leaders.[158] COMSEC remained in Washington, D.C., until its new building was completed in 1968.[157] In September 1986, the Operations 2A and 2B buildings, both copper-shielded to prevent eavesdropping, opened with a dedication by President Ronald Reagan.[159] The four NSA buildings became known as the “Big Four.”[159] The NSA director moved to 2B when it opened.[159]

Fort Meade shooting

On March 30, 2015, shortly before 9 am, a stolen sports utility vehicle approached an NSA police vehicle blocking the road near the gate of Fort Meade, after it was told to leave the area. NSA officers fired on the SUV, killing the 27-year-old driver, Mya Hall, and seriously injuring her 20-year-old passenger. An NSA officer’s arm was injured when Hall subsequently crashed into his vehicle.[160][161]

The two women were transgender[162] and had just gotten off from a night of partying at a motel with the man they’d stolen the SUV from that morning. They “attempted to drive a vehicle into the National Security Agency portion of the installation without authorization”, according to an NSA statement.[163] FBI spokeswoman Amy Thoreson said the incident is not believed to be related to terrorism.[164] In June 2015 the FBI closed its investigation into the incident and federal prosecutors have declined to bring charges against anyone involved.[165]

An anonymous police official told The Washington Post, “This was not a deliberate attempt to breach the security of NSA. This was not a planned attack.” The two are believed to have made a wrong turn off the highway, while fleeing from the motel after stealing the vehicle. A small amount of cocaine was found in the SUV. A local CBS reporter initially said a gun was found,[166] but her later revision does not.[167] Dozens of journalists were corralled into a parking lot blocks away from the scene, and were barred from photographing the area.[168]

Computing

In 1995, The Baltimore Sun reported that the NSA is the owner of the single largest group of supercomputers.[169]

NSA held a groundbreaking ceremony at Ft. Meade in May 2013 for its High Performance Computing Center 2, expected to open in 2016.[170] Called Site M, the center has a 150 megawatt power substation, 14 administrative buildings and 10 parking garages.[149] It cost $3.2 billion and covers 227 acres (92 ha; 0.355 sq mi).[149] The center is 1,800,000 square feet (17 ha; 0.065 sq mi)[149] and initially uses 60 megawatts of electricity.[171]

Increments II and III are expected to be completed by 2030, and would quadruple the space, covering 5,800,000 square feet (54 ha; 0.21 sq mi) with 60 buildings and 40 parking garages.[149] Defense contractors are also establishing or expanding cybersecurity facilities near the NSA and around the Washington metropolitan area.[149]

Other U.S. facilities

Buckley Air Force Base in Colorado

Utah Data Center

As of 2012, NSA collected intelligence from four geostationary satellites.[155] Satellite receivers were at Roaring Creek Station in Catawissa, Pennsylvania and Salt Creek Station in Arbuckle, California.[155] It operated ten to twenty taps on U.S. telecom switches. NSA had installations in several U.S. states and from them observed intercepts from Europe, the Middle East, North Africa, Latin America, and Asia.[155]

NSA had facilities at Friendship Annex (FANX) in Linthicum, Maryland, which is a 20 to 25-minute drive from Ft. Meade;[172] the Aerospace Data Facility at Buckley Air Force Base in Aurora outside Denver, Colorado; NSA Texas in the Texas Cryptology Center at Lackland Air Force Base in San Antonio, Texas; NSA Georgia at Fort Gordon in Augusta, Georgia; NSA Hawaii in Honolulu; the Multiprogram Research Facility in Oak Ridge, Tennessee, and elsewhere.[152][155]

On January 6, 2011 a groundbreaking ceremony was held to begin construction on NSA’s first Comprehensive National Cyber-security Initiative (CNCI) Data Center, known as the “Utah Data Center” for short. The $1.5B data center is being built at Camp Williams, Utah, located 25 miles (40 km) south of Salt Lake City, and will help support the agency’s National Cyber-security Initiative.[173] It is expected to be operational by September 2013.[155]

In 2009, to protect its assets and to access more electricity, NSA sought to decentralize and expand its existing facilities in Ft. Meade and Menwith Hill,[174] the latter expansion expected to be completed by 2015.[175]

The Yakima Herald-Republic cited Bamford, saying that many of NSA’s bases for its Echelon program were a legacy system, using outdated, 1990s technology.[176] In 2004, NSA closed its operations at Bad Aibling Station (Field Station 81) in Bad Aibling, Germany.[177] In 2012, NSA began to move some of its operations at Yakima Research Station, Yakima Training Center, in Washington state to Colorado, planning to leave Yakima closed.[178] As of 2013, NSA also intended to close operations at Sugar Grove, West Virginia.[176]

International stations

RAF Menwith Hill has the largest NSA presence in the United Kingdom.[175]

Following the signing in 1946–1956[179] of the UKUSA Agreement between the United States, United Kingdom, Canada, Australia and New Zealand, who then cooperated on signals intelligence and ECHELON,[180] NSA stations were built at GCHQ Bude in Morwenstow, United Kingdom; Geraldton, Pine Gap and Shoal Bay, Australia; Leitrim and Ottawa, Canada; Misawa, Japan; and Waihopai and Tangimoana,[181] New Zealand.[182]

NSA operates RAF Menwith Hill in North Yorkshire, United Kingdom, which was, according to BBC News in 2007, the largest electronic monitoring station in the world.[183] Planned in 1954, and opened in 1960, the base covered 562 acres (227 ha; 0.878 sq mi) in 1999.[184]

The agency’s European Cryptologic Center (ECC), with 240 employees in 2011, is headquartered at a US military compound in Griesheim, near Frankfurt in Germany. A 2011 NSA report indicates that the ECC is responsible for the “largest analysis and productivity in Europe” and focusses on various priorities, including Africa, Europe, the Middle East and counterterrorism operations.[185]

In 2013, a new Consolidated Intelligence Center, also to be used by NSA, is being built at the headquarters of the United States Army Europe in Wiesbaden, Germany.[186] NSA’s partnership with Bundesnachrichtendienst (BND), the German foreign intelligence service, was confirmed by BND president Gerhard Schindler.[186]

Thailand

Thailand is a “3rd party partner” of the NSA along with nine other nations.[187] These are non-English-speaking countries that have made security agreements for the exchange of SIGINT raw material and end product reports.

Thailand is the site of at least two US SIGINT collection stations. One is at the US Embassy in Bangkok, a joint NSA-CIA Special Collection Service (SCS) unit. It presumably eavesdrops on foreign embassies, governmental communications, and other targets of opportunity.[188]

The second installation is a FORNSAT (foreign satellite interception) station in the Thai city of Khon Kaen. It is codenamed INDRA, but has also been referred to as LEMONWOOD.[188] The station is approximately 40 ha (100 acres) in size and consists of a large 3,700–4,600 m2 (40,000–50,000 ft2) operations building on the west side of the ops compound and four radome-enclosed parabolic antennas. Possibly two of the radome-enclosed antennas are used for SATCOM intercept and two antennas used for relaying the intercepted material back to NSA. There is also a PUSHER-type circularly-disposed antenna array (CDAA) array just north of the ops compound.[189][190]

NSA activated Khon Kaen in October 1979. Its mission was to eavesdrop on the radio traffic of Chinese army and air force units in southern China, especially in and around the city of Kunming in Yunnan Province. Back in the late 1970s the base consisted only of a small CDAA antenna array that was remote-controlled via satellite from the NSA listening post at Kunia, Hawaii, and a small force of civilian contractors from Bendix Field Engineering Corp. whose job it was to keep the antenna array and satellite relay facilities up and running 24/7.[189]

According to the papers of the late General William Odom, the INDRA facility was upgraded in 1986 with a new British-made PUSHER CDAA antenna as part of an overall upgrade of NSA and Thai SIGINT facilities whose objective was to spy on the neighboring communist nations of Vietnam, Laos, and Cambodia.[189]

The base apparently fell into disrepair in the 1990s as China and Vietnam became more friendly towards the US, and by 2002 archived satellite imagery showed that the PUSHER CDAA antenna had been torn down, perhaps indicating that the base had been closed. At some point in the period since 9/11, the Khon Kaen base was reactivated and expanded to include a sizeable SATCOM intercept mission. It is likely that the NSA presence at Khon Kaen is relatively small, and that most of the work is done by civilian contractors.[189]

Mission

NSA’s eavesdropping mission includes radio broadcasting, both from various organizations and individuals, the Internet, telephone calls, and other intercepted forms of communication. Its secure communications mission includes military, diplomatic, and all other sensitive, confidential or secret government communications.[191]

According to the Washington Post, “[e]very day, collection systems at the National Security Agency intercept and store 1.7 billion e-mails, phone calls and other types of communications. The NSA sorts a fraction of those into 70 separate databases.”[192]

Because of its listening task, NSA/CSS has been heavily involved in cryptanalytic research, continuing the work of predecessor agencies which had broken many World War II codes and ciphers (see, for instance, Purple, Venona project, and JN-25).

In 2004, NSA Central Security Service and the National Cyber Security Division of the Department of Homeland Security (DHS) agreed to expand NSA Centers of Academic Excellence in Information Assurance Education Program.[193]

As part of the National Security Presidential Directive 54/Homeland Security Presidential Directive 23 (NSPD 54), signed on January 8, 2008 by President Bush, the NSA became the lead agency to monitor and protect all of the federal government’s computer networks from cyber-terrorism.[9]

Operations

Operations by the National Security Agency can be divided in three types:

  • Collection overseas, which falls under the responsibility of the Global Access Operations (GAO) division.
  • Domestic collection, which falls under the responsibility of the Special Source Operations (SSO) division.
  • Hacking operations, which falls under the responsibility of the Tailored Access Operations (TAO) division.

Collection overseas

Echelon

Echelon was created in the incubator of the Cold War.[194] Today it is a legacy system, and several NSA stations are closing.[176]

NSA/CSS, in combination with the equivalent agencies in the United Kingdom (Government Communications Headquarters), Canada (Communications Security Establishment), Australia (Defence Signals Directorate), and New Zealand (Government Communications Security Bureau), otherwise known as the UKUSA group,[195] was reported to be in command of the operation of the so-called ECHELON system. Its capabilities were suspected to include the ability to monitor a large proportion of the world’s transmitted civilian telephone, fax and data traffic.[196]

During the early 1970s, the first of what became more than eight large satellite communications dishes were installed at Menwith Hill.[197] Investigative journalist Duncan Campbell reported in 1988 on the ECHELON surveillance program, an extension of the UKUSA Agreement on global signals intelligence SIGINT, and detailed how the eavesdropping operations worked.[198] In November 3, 1999 the BBC reported that they had confirmation from the Australian Government of the existence of a powerful “global spying network” code-named Echelon, that could “eavesdrop on every single phone call, fax or e-mail, anywhere on the planet” with Britain and the United States as the chief protagonists. They confirmed that Menwith Hill was “linked directly to the headquarters of the US National Security Agency (NSA) at Fort Meade in Maryland”.[199]

NSA’s United States Signals Intelligence Directive 18 (USSID 18) strictly prohibited the interception or collection of information about “… U.S. persons, entities, corporations or organizations….” without explicit written legal permission from the United States Attorney General when the subject is located abroad, or the Foreign Intelligence Surveillance Court when within U.S. borders. Alleged Echelon-related activities, including its use for motives other than national security, including political and industrial espionage, received criticism from countries outside the UKUSA alliance.[200][201]

Protesters against NSA data mining in Berlin wearing Chelsea Manning and Edward Snowden masks.

Other SIGINT operations overseas

The NSA is also involved in planning to blackmail people with “SEXINT“, intelligence gained about a potential target’s sexual activity and preferences. Those targeted had not committed any apparent crime nor were charged with one.[202]

In order to support its facial recognition program, the NSA is intercepting “millions of images per day”.[203]

The Real Time Regional Gateway is a data collection program introduced in 2005 in Iraq by NSA during the Iraq War that consisted of gathering all electronic communication, storing it, then searching and otherwise analyzing it. It was effective in providing information about Iraqi insurgents who had eluded less comprehensive techniques.[204] This “collect it all” strategy introduced by NSA director, Keith B. Alexander, is believed by Glenn Greenwald of The Guardian to be the model for the comprehensive worldwide mass archiving of communications which NSA is engaged in as of 2013.[205]

BoundlessInformant

Edward Snowden revealed in June 2013 that between February 8 and March 8, 2013, the NSA collected about 124.8 billion telephone data items and 97.1 billion computer data items throughout the world, as was displayed in charts from an internal NSA tool codenamed Boundless Informant. It was reported that some of these data reflected eavesdropping on citizens in countries like Germany, Spain and France.[206]

BoundlessInformant employs big data databases, cloud computing technology, and Free and Open Source Software (FOSS) to analyze data collected worldwide by the NSA.[207]

Bypassing encryption

In 2013, reporters uncovered a secret memo that claims the NSA created and pushed for the adoption of the Dual_EC_DRBG encryption standard that contained built-in vulnerabilities in 2006 to the United States National Institute of Standards and Technology (NIST), and the International Organization for Standardization (aka ISO).[208][209] This memo appears to give credence to previous speculation by cryptographers at Microsoft Research.[210]Edward Snowden claims that the NSA often bypasses encryption altogether by lifting information before it is encrypted or after it is decrypted.[209]

XKeyscore rules (as specified in a file xkeyscorerules100.txt, sourced by German TV stations NDR and WDR, who claim to have excerpts from its source code) reveal that the NSA tracks users of privacy-enhancing software tools, including Tor; an anonymous email service provided by the MIT Computer Science and Artificial Intelligence Laboratory (CSAIL) in Cambridge, Massachusetts; and readers of the Linux Journal.[211][212]

Domestic activity

NSA’s mission, as set forth in Executive Order 12333 in 1981, is to collect information that constitutes “foreign intelligence or counterintelligence” while not “acquiring information concerning the domestic activities of United States persons“. NSA has declared that it relies on the FBI to collect information on foreign intelligence activities within the borders of the United States, while confining its own activities within the United States to the embassies and missions of foreign nations.[213] The appearance of a ‘Domestic Surveillance Directorate’ of the NSA was soon exposed as a hoax in 2013.[214][215]

NSA’s domestic surveillance activities are limited by the requirements imposed by the Fourth Amendment to the U.S. Constitution. The Foreign Intelligence Surveillance Court for example held in October 2011, citing multiple Supreme Court precedents, that the Fourth Amendment prohibitions against unreasonable searches and seizures applies to the contents of all communications, whatever the means, because “a person’s private communications are akin to personal papers.”[216] However, these protections do not apply to non-U.S. persons located outside of U.S. borders, so the NSA’s foreign surveillance efforts are subject to far fewer limitations under U.S. law.[217] The specific requirements for domestic surveillance operations are contained in the Foreign Intelligence Surveillance Act of 1978 (FISA), which does not extend protection to non-U.S. citizens located outside of U.S. territory.[217]

George W. Bush administration

George W. Bush, president during the 9/11 terrorist attacks, approved the Patriot Act shortly after the attacks to take anti-terrorist security measures. Title 1, 2, and 9 specifically authorized measures that would be taken by the NSA. These titles granted enhanced domestic security against terrorism, surveillance procedures, and improved intelligence, respectively. On March 10, 2004, there was a debate between President Bush and White House Counsel Alberto Gonzales, Attorney General John Ashcroft, and Acting Attorney General James Comey. The Attorney Generals were unsure if the NSA’s programs could be considered constitutional. They threatened to resign over the matter, but ultimately the NSA’s programs continued.[218] On March 11, 2004, President Bush signed a new authorization for mass surveillance of Internet records, in addition to the surveillance of phone records.This allowed the president to be able to override laws such as the Foreign Intelligence Surveillance Act, which protected civilians from mass surveillance. In addition to this, President Bush also signed that the measures of mass surveillance were also retroactively in place.[219]

Warrantless wiretaps

On December 16, 2005, The New York Times reported that, under White House pressure and with an executive order from President George W. Bush, the National Security Agency, in an attempt to thwart terrorism, had been tapping phone calls made to persons outside the country, without obtaining warrants from the United States Foreign Intelligence Surveillance Court, a secret court created for that purpose under the Foreign Intelligence Surveillance Act (FISA).[220]

One such surveillance program, authorized by the U.S. Signals Intelligence Directive 18 of President George Bush, was the Highlander Project undertaken for the National Security Agency by the U.S. Army 513th Military Intelligence Brigade. NSA relayed telephone (including cell phone) conversations obtained from ground, airborne, and satellite monitoring stations to various U.S. Army Signal Intelligence Officers, including the 201st Military Intelligence Battalion. Conversations of citizens of the U.S. were intercepted, along with those of other nations.[221]

Proponents of the surveillance program claim that the President has executive authority to order such action, arguing that laws such as FISA are overridden by the President’s Constitutional powers. In addition, some argued that FISA was implicitly overridden by a subsequent statute, the Authorization for Use of Military Force, although the Supreme Court’s ruling in Hamdan v. Rumsfeld deprecates this view. In the August 2006 case ACLU v. NSA, U.S. District Court Judge Anna Diggs Taylor concluded that NSA’s warrantless surveillance program was both illegal and unconstitutional. On July 6, 2007 the 6th Circuit Court of Appeals vacated the decision on the grounds that the ACLU lacked standing to bring the suit.[222]

On January 17, 2006, the Center for Constitutional Rights filed a lawsuit, CCR v. Bush, against the George W. Bush Presidency. The lawsuit challenged the National Security Agency’s (NSA’s) surveillance of people within the U.S., including the interception of CCR emails without securing a warrant first.[223][224]

In September 2008, the Electronic Frontier Foundation (EFF) filed a class action lawsuit against the NSA and several high-ranking officials of the Bush administration,[225] charging an “illegal and unconstitutional program of dragnet communications surveillance,”[226] based on documentation provided by former AT&T technician Mark Klein.[227]

As a result of the USA Freedom Act passed by Congress in June 2015, the NSA had to shut down its bulk phone surveillance program on November 29 of the same year. The USA Freedom Act forbids the NSA to collect metadata and content of phone calls unless it has a warrant for terrorism investigation. In that case the agency has to ask the telecom companies for the record, which will only be kept for six months.

AT&T Internet monitoring

In May 2006, Mark Klein, a former AT&T employee, alleged that his company had cooperated with NSA in installing Narus hardware to replace the FBI Carnivore program, to monitor network communications including traffic between American citizens.[228]

Data mining

NSA was reported in 2008 to use its computing capability to analyze “transactional” data that it regularly acquires from other government agencies, which gather it under their own jurisdictional authorities. As part of this effort, NSA now monitors huge volumes of records of domestic email data, web addresses from Internet searches, bank transfers, credit-card transactions, travel records, and telephone data, according to current and former intelligence officials interviewed by The Wall Street Journal. The sender, recipient, and subject line of emails can be included, but the content of the messages or of phone calls are not.[229]

A 2013 advisory group for the Obama administration, seeking to reform NSA spying programs following the revelations of documents released by Edward J. Snowden.[230] mentioned in ‘Recommendation 30’ on page 37, “…that the National Security Council staff should manage an interagency process to review on a regular basis the activities of the US Government regarding attacks that exploit a previously unknown vulnerability in a computer application.” Retired cyber security expert Richard A. Clarke was a group member and stated on April 11 that NSA had no advance knowledge of Heartbleed.[231]

Illegally obtained evidence

In August 2013 it was revealed that a 2005 IRS training document showed that NSA intelligence intercepts and wiretaps, both foreign and domestic, were being supplied to the Drug Enforcement Administration (DEA) and Internal Revenue Service (IRS) and were illegally used to launch criminal investigations of US citizens. Law enforcement agents were directed to conceal how the investigations began and recreate an apparently legal investigative trail by re-obtaining the same evidence by other means.[232][233]

Barack Obama administration

In the months leading to April 2009, the NSA intercepted the communications of American citizens, including a Congressman, although the Justice Department believed that the interception was unintentional. The Justice Department then took action to correct the issues and bring the program into compliance with existing laws.[234] United States Attorney General Eric Holder resumed the program according to his understanding of the Foreign Intelligence Surveillance Act amendment of 2008, without explaining what had occurred.[235]

Polls conducted in June 2013 found divided results among Americans regarding NSA’s secret data collection.[236] Rasmussen Reports found that 59% of Americans disapprove,[237] Gallup found that 53% disapprove,[238] and Pew found that 56% are in favor of NSA data collection.[239]

Section 215 metadata collection

On April 25, 2013, the NSA obtained a court order requiring Verizon‘s Business Network Services to provide metadata on all calls in its system to the NSA “on an ongoing daily basis” for a three-month period, as reported by The Guardian on June 6, 2013. This information includes “the numbers of both parties on a call … location data, call duration, unique identifiers, and the time and duration of all calls” but not “[t]he contents of the conversation itself”. The order relies on the so-called “business records” provision of the Patriot Act.[240][241]

In August 2013, following the Snowden leaks, new details about the NSA’s data mining activity were revealed. Reportedly, the majority of emails into or out of the United States are captured at “selected communications links” and automatically analyzed for keywords or other “selectors”. Emails that do not match are deleted.[242]

The utility of such a massive metadata collection in preventing terrorist attacks is disputed. Many studies reveal the dragnet like system to be ineffective. One such report, released by the New America Foundation concluded that after an analysis of 225 terrorism cases, the NSA “had no discernible impact on preventing acts of terrorism.”[243]

Defenders of the program say that while metadata alone can’t provide all the information necessary to prevent an attack, it assures the ability to “connect the dots”[244] between suspect foreign numbers and domestic numbers with a speed only the NSA’s software is capable of. One benefit of this is quickly being able to determine the difference between suspicious activity and real threats.[citation needed] As an example, NSA director General Keith Alexander mentioned at the annual Cybersecurity Summit in 2013, that metadata analysis of domestic phone call records after the Boston Marathon bombing helped determine that[clarification needed] another attack in New York was baseless.[244]

In addition to doubts about its effectiveness, many people argue that the collection of metadata is an unconstitutional invasion of privacy. As of 2015, the collection process remains legal and grounded in the ruling from Smith v. Maryland (1979). A prominent opponent of the data collection and its legality is U.S. District Judge Richard J. Leon, who issued a report in 2013[245] in which he stated: “I cannot imagine a more ‘indiscriminate’ and ‘arbitrary invasion’ than this systematic and high tech collection and retention of personal data on virtually every single citizen for purposes of querying and analyzing it without prior judicial approval…Surely, such a program infringes on ‘that degree of privacy’ that the founders enshrined in the Fourth Amendment”.

The PRISM program[edit]

PRISM: a clandestine surveillance program under which the NSA collects user data from companies like Microsoft and Facebook.

Under the PRISM program, which started in 2007,[246][247] NSA gathers Internet communications from foreign targets from nine major U.S. Internet-based communication service providers: Microsoft,[248] Yahoo, Google, Facebook, PalTalk, AOL, Skype, YouTube and Apple. Data gathered include email, video and voice chat, videos, photos, VoIP chats such as Skype, and file transfers.

June 2015 – WikiLeaks: Industrial espionage

In June 2015, Wikileaks published documents, which showed that NSA spied on French companies.[249]

July 2015 – WikiLeaks: Espionage against German federal ministries

In July 2015, WikiLeaks published documents, which showed that NSA spied on federal German ministries since 1990s.[250][251] Even Germany’s Chancellor Angela Merkel‘s cellphones and phone of her predecessors had been intercepted.[252]

Claims of prevented terrorist attacks

Former NSA director General Keith Alexander claimed that in September 2009 the NSA prevented Najibullah Zazi and his friends from carrying out a terrorist attack.[253] However, this claim has been debunked and no evidence has been presented demonstrating that the NSA has ever been instrumental in preventing a terrorist attack.[254][255][256][257]

Hacking operations

Besides the more traditional ways of eavesdropping in order to collect signals intelligence, NSA is also engaged in hacking computers, smartphones and their networks. These operations are conducted by the Tailored Access Operations (TAO) division.

NSA’s China hacking group

According to the Foreign Policy magazine, “… the Office of Tailored Access Operations, or TAO, has successfully penetrated Chinese computer and telecommunications systems for almost 15 years, generating some of the best and most reliable intelligence information about what is going on inside the People’s Republic of China.”[258][259]

Syrian internet blackout

In an interview with Wired magazine, Edward Snowden said the Tailored Access Operations division accidentally caused Syria‘s internet blackout in 2012.[260]

Suspected responsibility for hacking operations by the Equation Group

The espionage group named the Equation Group, described by discoverers Kaspersky Labs as one of the most advanced (if not the most advanced) in the world as of 2015,[261]:31 and connected to over 500 malware infections in at least 42 countries over many years, is suspected of being a part of NSA.[262][263] The group’s known espionage methods have been documented to include interdiction (interception of legitimate CDs sent by a scientific conference organizer by mail),[261]:15 and the “unprecedented” ability to infect and be transmitted through the hard drive firmware of several of the major hard drive manufacturers, and create and use hidden disk areas and virtual disk systems for its purposes, a feat demanding access to the manufacturer’s source code of each to achieve.[261]:16–18 The methods used to deploy the tools demonstrated “surgical precision”, going so far as to exclude specific countries by IP and allow targeting of specific usernames on discussion forums.[261]:23–26 The techniques and knowledge used by the Equation Group are considered in summary to be “out of the reach of most advanced threat groups in the world except [this group].[261]:31

Software backdoors

Linux kernel

Linus Torvalds, the founder of Linux kernel, joked during a LinuxCon keynote on September 18, 2013 that the NSA, who are the founder of SELinux, wanted a backdoor in the kernel.[264] However, later, Linus’ father, a Member of the European Parliament (MEP), revealed that the NSA actually did this.[265]

When my oldest son was asked the same question: “Has he been approached by the NSA about backdoors?” he said “No”, but at the same time he nodded. Then he was sort of in the legal free. He had given the right answer, everybody understood that the NSA had approached him.

— Nils Torvalds, LIBE Committee Inquiry on Electronic Mass Surveillance of EU Citizens – 11th Hearing, 11 November 2013[266]
Microsoft Windows

_NSAKEY was a variable name discovered in Microsoft‘s Windows NT 4 Service Pack 5 (which had been released unstripped of its symbolic debugging data) in August 1999 by Andrew D. Fernandes of Cryptonym Corporation. That variable contained a 1024-bit public key.

IBM Notes

IBM Notes was the first widely adopted software product to use public key cryptography for client–server and server–server authentication and for encryption of data. Until US laws regulating encryption were changed in 2000, IBM and Lotus were prohibited from exporting versions of Notes that supported symmetric encryption keys that were longer than 40 bits. In 1997, Lotus negotiated an agreement with the NSA that allowed export of a version that supported stronger keys with 64 bits, but 24 of the bits were encrypted with a special key and included in the message to provide a “workload reduction factor” for the NSA. This strengthened the protection for users of Notes outside the US against private-sector industrial espionage, but not against spying by the US government.[267][268]

Boomerang routing

While it is assumed that foreign transmissions terminating in the U.S. (such as a non-U.S. citizen accessing a U.S. website) subject non-U.S. citizens to NSA surveillance, recent research into boomerang routing has raised new concerns about the NSA’s ability to surveil the domestic Internet traffic of foreign countries.[18] Boomerang routing occurs when an Internet transmission that originates and terminates in a single country transits another. Research at the University of Toronto has suggested that approximately 25% of Canadian domestic traffic may be subject to NSA surveillance activities as a result of the boomerang routing of Canadian Internet service providers.[18]

Hardware implanting

Intercepted packages are opened carefully by NSA employees
A “load station” implanting a beacon

A document included in NSA files released with Glenn Greenwald‘s book No Place to Hide details how the agency’s Tailored Access Operations (TAO) and other NSA units gain access to hardware. They intercept routers, servers and other network hardware being shipped to organizations targeted for surveillance and install covert implant firmware onto them before they are delivered. This was described by an NSA manager as “some of the most productive operations in TAO because they preposition access points into hard target networks around the world.”[269]

Computers seized by the NSA due to interdiction are often modified with a physical device known as Cottonmouth.[270] Cottonmouth is a device that can be inserted in the USB port of a computer in order to establish remote access to the targeted machine. According to NSA’s Tailored Access Operations (TAO) group implant catalog, after implanting Cottonmouth, the NSA can establish Bridging (networking) “that allows the NSA to load exploit software onto modified computers as well as allowing the NSA to relay commands and data between hardware and software implants.”[271]

Role in scientific research and development

NSA has been involved in debates about public policy, both indirectly as a behind-the-scenes adviser to other departments, and directly during and after Vice Admiral Bobby Ray Inman‘s directorship. NSA was a major player in the debates of the 1990s regarding the export of cryptography in the United States. Restrictions on export were reduced but not eliminated in 1996.

Its secure government communications work has involved the NSA in numerous technology areas, including the design of specialized communications hardware and software, production of dedicated semiconductors (at the Ft. Meade chip fabrication plant), and advanced cryptography research. For 50 years, NSA designed and built most of its computer equipment in-house, but from the 1990s until about 2003 (when the U.S. Congress curtailed the practice), the agency contracted with the private sector in the fields of research and equipment.[272]

Data Encryption Standard

FROSTBURG was the NSA’s first supercomputer, used from 1991 to 1997

NSA was embroiled in some minor controversy concerning its involvement in the creation of the Data Encryption Standard (DES), a standard and public block cipher algorithm used by the U.S. government and banking community. During the development of DES by IBM in the 1970s, NSA recommended changes to some details of the design. There was suspicion that these changes had weakened the algorithm sufficiently to enable the agency to eavesdrop if required, including speculation that a critical component—the so-called S-boxes—had been altered to insert a “backdoor” and that the reduction in key length might have made it feasible for NSA to discover DES keys using massive computing power. It has since been observed that the S-boxes in DES are particularly resilient against differential cryptanalysis, a technique which was not publicly discovered until the late 1980s, but which was known to the IBM DES team.

The United States Senate Select Committee on Intelligence reviewed NSA’s involvement, and concluded that while the agency had provided some assistance, it had not tampered with the design.[273][274] In late 2009 NSA declassified information stating that “NSA worked closely with IBM to strengthen the algorithm against all except brute force attacks and to strengthen substitution tables, called S-boxes. Conversely, NSA tried to convince IBM to reduce the length of the key from 64 to 48 bits. Ultimately they compromised on a 56-bit key.”[275][276]

Advanced Encryption Standard

The involvement of NSA in the selection of a successor to Data Encryption Standard (DES), the Advanced Encryption Standard (AES), was limited to hardware performance testing (see AES competition).[277] NSA has subsequently certified AES for protection of classified information (for at most two levels, e.g. SECRET information in an unclassified environment[clarification needed]) when used in NSA-approved systems.[278]

NSA encryption systems

STU-III secure telephones on display at the National Cryptologic Museum

The NSA is responsible for the encryption-related components in these legacy systems:

  • FNBDT Future Narrow Band Digital Terminal[279]
  • KL-7 ADONIS off-line rotor encryption machine (post-WWII – 1980s)[280][281]
  • KW-26 ROMULUS electronic in-line teletypewriter encryptor (1960s–1980s)[282]
  • KW-37 JASON fleet broadcast encryptor (1960s–1990s)[281]
  • KY-57 VINSON tactical radio voice encryptor[282]
  • KG-84 Dedicated Data Encryption/Decryption[282]
  • STU-III secure telephone unit,[282] phased out by the STE[283]

The NSA oversees encryption in following systems which are in use today:

The NSA has specified Suite A and Suite B cryptographic algorithm suites to be used in U.S. government systems; the Suite B algorithms are a subset of those previously specified by NIST and are expected to serve for most information protection purposes, while the Suite A algorithms are secret and are intended for especially high levels of protection.[278]

SHA

The widely used SHA-1 and SHA-2 hash functions were designed by NSA. SHA-1 is a slight modification of the weaker SHA-0 algorithm, also designed by NSA in 1993. This small modification was suggested by NSA two years later, with no justification other than the fact that it provides additional security. An attack for SHA-0 that does not apply to the revised algorithm was indeed found between 1998 and 2005 by academic cryptographers. Because of weaknesses and key length restrictions in SHA-1, NIST deprecates its use for digital signatures, and approves only the newer SHA-2 algorithms for such applications from 2013 on.[288]

A new hash standard, SHA-3, has recently been selected through the competition concluded October 2, 2012 with the selection of Keccak as the algorithm. The process to select SHA-3 was similar to the one held in choosing the AES, but some doubts have been cast over it,[289][290] since fundamental modifications have been made to Keccak in order to turn it into a standard.[291] These changes potentially undermine the cryptanalysis performed during the competition and reduce the security levels of the algorithm.[289]

Dual_EC_DRBG random number generator cryptotrojan

NSA promoted the inclusion of a random number generator called Dual_EC_DRBG in the U.S. National Institute of Standards and Technology‘s 2007 guidelines. This led to speculation of a backdoor which would allow NSA access to data encrypted by systems using that pseudo random number generator.[292]

This is now deemed to be plausible based on the fact that the output of the next iterations of the PRNG can provably be determined if the relation between two internal elliptic curve points is known.[293][294] Both NIST and RSA are now officially recommending against the use of this PRNG.[295][296]

Clipper chip

Because of concerns that widespread use of strong cryptography would hamper government use of wiretaps, NSA proposed the concept of key escrow in 1993 and introduced the Clipper chip that would offer stronger protection than DES but would allow access to encrypted data by authorized law enforcement officials.[297] The proposal was strongly opposed and key escrow requirements ultimately went nowhere.[298] However, NSA’s Fortezza hardware-based encryption cards, created for the Clipper project, are still used within government, and NSA ultimately declassified and published the design of the Skipjack cipher used on the cards.[299][300]

Perfect Citizen

Perfect Citizen is a program to perform vulnerability assessment by the NSA on U.S. critical infrastructure.[301][302] It was originally reported to be a program to develop a system of sensors to detect cyber attacks on critical infrastructure computer networks in both the private and public sector through a network monitoring system named Einstein.[303][304] It is funded by the Comprehensive National Cybersecurity Initiative and thus far Raytheon has received a contract for up to $100 million for the initial stage.

Academic research

NSA has invested many millions of dollars in academic research under grant code prefix MDA904, resulting in over 3,000 papers (as of 2007-10-11). NSA/CSS has, at times, attempted to restrict the publication of academic research into cryptography; for example, the Khufu and Khafre block ciphers were voluntarily withheld in response to an NSA request to do so. In response to a FOIA lawsuit, in 2013 the NSA released the 643-page research paper titled, “Untangling the Web: A Guide to Internet Research,[305] ” written and compiled by NSA employees to assist other NSA workers in searching for information of interest to the agency on the public Internet.[306]

Patents

NSA has the ability to file for a patent from the U.S. Patent and Trademark Office under gag order. Unlike normal patents, these are not revealed to the public and do not expire. However, if the Patent Office receives an application for an identical patent from a third party, they will reveal NSA’s patent and officially grant it to NSA for the full term on that date.[307]

One of NSA’s published patents describes a method of geographically locating an individual computer site in an Internet-like network, based on the latency of multiple network connections.[308] Although no public patent exists, NSA is reported to have used a similar locating technology called trilateralization that allows real-time tracking of an individual’s location, including altitude from ground level, using data obtained from cellphone towers.[309]

Controversy

File:Ron Wyden and James Clapper - 12 March 2013.webm

Excerpt from when James Clapper lied to Congress on NSA surveillance programs

In the United States, at least since 2001,[310] there has been legal controversy over what signal intelligence can be used for and how much freedom the National Security Agency has to use signal intelligence.[311] The government has made, in 2015, slight changes in how it uses and collects certain types of data,[312] specifically phone records. President Barack Obama has asked lawyers and his national security team to look at the tactics that are being used by the NSA. President Obama made a speech on January 17, 2014 where he defended the national security measures, including the NSA, and their intentions for keeping the country safe through surveillance. He said that it is difficult to determine where the line should be drawn between what is too much surveillance and how much is needed for national security because technology is ever changing and evolving. Therefore, the laws cannot keep up with the rapid advancements.

President Obama did make some changes to national security regulations and how much data can be collected and surveyed.[citation needed] The first thing he added, was more presidential directive and oversight so that privacy and basic rights are not violated. The president would look over requests on behalf of American citizens to make sure that their personal privacy is not violated by the data that is being requested. Secondly, surveillance tactics and procedures are becoming more public, including over 40 rulings of the FISC that have been declassified.[citation needed] Thirdly, further protections are being placed on activities that are justified under Section 702, such as the ability to retain, search and use data collected in investigations, which allows the NSA to monitor and intercept interaction of targets overseas. Finally, national security letters, which are secret requests for information that the FBI uses in their investigations, are becoming less secretive. The secrecy of the information requested will not be indefinite and will terminate after a set time if future secrecy is not required.[citation needed] Concerning the bulk surveillance of American’s phone records, President Obama also ordered a transition from bulk surveillance under Section 215 to a new policy that will eliminate unnecessary bulk collection of metadata.

As of May 7, 2015, the U.S. Court of Appeals for the Second Circuit ruled that the interpretation of Section 215 of the Patriot Act was wrong and that the NSA program that has been collecting Americans’ phone records in bulk is illegal.[313] It stated that Section 215 cannot be clearly interpreted to allow government to collect national phone data and, as a result, expired on June 1, 2015. This ruling “is the first time a higher-level court in the regular judicial system has reviewed the N.S.A. phone records program.” [314] The new bill getting passed later in May taking its place is known as the U.S.A. Freedom Act, which will enable the NSA to continue hunting for terrorists by analyzing telephone links between callers but “keep the bulk phone records in the hands of phone companies.”[314] This would give phone companies the freedom to dispose the records in an 18-month period. The White House argued that this new ruling validated President Obama’s support of the government being extracted from bulk data collection and giving power to the telecommunications companies.

Previously, the NSA paid billions of dollars to telecommunications companies in order to collect data from them.[315] While companies such as Google and Yahoo! claim that they do not provide “direct access” from their servers to the NSA unless under a court order,[316] the NSA had access to emails, phone calls and cellular data users.[317] With this new ruling, telecommunications companies would not provide the NSA with bulk information. The companies would allow the disposal of data in every 18 months,[314] which is arguably putting the telecommunications companies at a higher advantage.

This ruling made the collecting of phone records illegal, but it did not rule on Section 215’s constitutionality. Senate Majority Leader Mitch McConnell has already put forth a new bill to re-authorize the Patriot Act.[318] Defenders of this surveillance program are claiming that judges who sit on the Foreign Intelligence Surveillance Court (FISC) had ruled 37 times that this kind of collection of data is, in fact, lawful.[318] The FISC is the court specifically mandated to grant surveillance orders in the name of foreign intelligence. The new ruling made by the Second District Court of Appeals now retroactively dismisses the findings of the FISC on this program.

See also

Notes

 Story 2: Big Lie Media Crazy Credibility Crisis — Fake News is Media McCarthyism — No Tanks In Streets of D.C. Big Lie Coup Fake News — Videos

Image result for tanks in washington d.c.

Image result for cartoons obama surveillance of trump

Image result for cartoons obama surveillance of trump

Image result for cartoons obama surveillance of trump

Image result for cartoons obama surveillance of trump

Krauthammer: Comey incident has sent press over the edge

Conway: Democrats trashed Comey then made him a martyr

Ari Fleischer: Hypocrisy from Democratic Party is appalling

Michelle Malkin: Hypocrisy over Comey firing is overwhelming

Gingrich: Liberals will move on to Martian conspiracies next

Could a probe of Hillary’s email server be reopened?

Tucker to Dem: Are you saying Trump has corrupted FBI?

Rush Limbaugh rejects media’s ‘coup’ claims

Hume: Calling Comey firing a ‘coup’ is hysterical

Lionel on the Alex Jones Show: Fake News, Media Bias, McCarthyism, Redbaiting & Blatant Russophobia

The Truth About McCarthyism: Modern Parallels

Napolitano: Many FBI agents felt demeaned by Comey’s actions

Coup d’état

From Wikipedia, the free encyclopedia

A coup d’état (/ˌk dˈtɑː/ About this sound listen ; French: [ku.de.ta]), also known simply as a coup (/k/), a putsch (/pʊ/), or an overthrow, is the illegal and overt seizure of a state by the military or other elites within the state apparatus.[1]

Contents

 [show

Terminology

Etymology

The phrase coup d’état (French pronunciation:  [ku deta]) is French, literally meaning a “stroke of state” or “blow against the state.” In French the word “État” (French: [e.ta]), denoting a sovereign political entity, is capitalized.[2]

Although the concept of a coup d’état has been featured in politics since antiquity, the phrase is of relatively recent coinage;[3] the Oxford English Dictionary identifies it as a French expression meaning a “stroke of state.” The phrase did not appear within an English text before the 19th century except when used in translation of a French source, there being no simple phrase in English to convey the contextualized idea of a “knockout blow to the existing administration within a state.”

One early use within text translated from French was in 1785 in a printed translation of a letter from a French merchant, commenting on an arbitrary decree or “arrêt” issued by the French king restricting the import of British wool.[4] What may be its first published use within a text composed in English is an editor’s note in the London Morning Chronicle, 7 January 1802, reporting the arrest by Napoleon in France, of Moreau, Berthier, Masséna, and Bernadotte:

There was a report in circulation yesterday of a sort of coup d’état having taken place in France, in consequence of some formidable conspiracy against the existing government.

In post-Revolutionary France, the phrase came to be used to describe the various murders by Napoleon‘s hated secret police, the Gens d’Armes d’Elite, who murdered the Duke of Enghien:

…the actors in torture, the distributors of the poisoning draughts, and the secret executioners of those unfortunate individuals or families, whom Bonaparte’s measures of safety require to remove. In what revolutionary tyrants call grand[s] coups d’état, as butchering, or poisoning, or drowning, en masse, they are exclusively employed.[5]

Usage of the phrase

Clayton Thyne and Jonathan Powell’s dataset of coups defines attempted coups as “illegal and overt attempts by the military or other elites within the state apparatus to unseat the sitting executive.”[1] They arrive at this definition by combining common definitions in the existing literature and removing specificities and ambiguities that exist in many definitions.[1]

In looser usage, as in “intelligence coup” or “boardroom coup”, the term simply refers to gaining a sudden advantage on a rival.

Putsch

Since an unsuccessful coup d’état in 1920 (the Kapp Putsch), the Swiss-German word Putsch (pronounced [pʊtʃ], coined for the Züriputsch of September 6, 1839, in Zurich), also denotes the politico-military actions of an unsuccessful minority reactionary coup.[6][7][8]

Other recent and notable unsuccessful minority reactionary coups that are often referred to as Putsches are the 1923 Beer Hall Putsch and Küstrin Putsch, 1961 Algiers Putsch and the 1991 August Putsch. Putsch was used as disinformation by Hitler and his Nazi supporters to falsely claim that he had to suppress a reactionary coup during the Night of the Long Knives. Germans still use the term Röhm-Putsch to describe the murders, the term given to it by the Nazi regime, despite its unproven implication that the murders were necessary to prevent a coup. German authors often use quotation marks or write about the sogenannter Röhm-Putsch (“so-called Röhm Putsch”) for emphasis.[9]

Pronunciamiento

Pronunciamiento (“pronouncement”) is a term of Spanish and Latin-American origin for a special type of coup d’état. The coup d’état (called golpe de Estado in Spanish) was more common in Spain and South America, while the pronunciamiento was more common in Central America. The pronunciamiento is the formal explanation for deposing the regnant government, justifying the installation of the new government that was effected with the golpe de Estado.

In a coup, it is the military, paramilitary, or opposing political faction that deposes the current government and assumes power; whereas, in the pronunciamiento, the military deposes the existing government and installs an (ostensibly) civilian government.[10]

History

According to Clayton Thyne and Jonathan Powell’s coup dataset, there were 457 coup attempts from 1950 to 2010, of which 227 (49.7%) were successful and 230 (50.3%) were unsuccessful.[1] They find that coups have “been most common in Africa and the Americas (36.5% and 31.9%, respectively). Asia and the Middle East have experienced 13.1% and 15.8% of total global coups, respectively. Europe has experienced by far the fewest number of coup attempts: 2.6%.”[1] Most coup attempts occurred in the mid-1960s, but there were also large numbers of coup attempts in the mid-1970s and the early 1990s.[1] Successful coups have decreased over time.[1] Coups that occur in the post-Cold War period are more likely to result in democratic systems.[11][12][13] Coups that occur during civil wars shorten the war’s duration.[14] Research suggests that protests spur coups, as they help elites within the state apparatus to coordinate coups.[15]

Types

A 2016 study categorizes coups into four possible outcomes:[12]

  • Failed coup.
  • No regime change. Such as when a leader is illegally shuffled out of power without changing the identity of the group in power or the rules for governing.
  • Replacement of incumbent dictatorship with another.
  • Ouster of the dictatorship followed by democratization.

The 2016 study found that about half of all coups — both during and after the Cold War — install new autocratic regimes.[12] New dictatorships launched by coups engage in higher levels of repression in the year that follows the coup than existed in the year leading to the coup.[12] One third of coups during the Cold War and 10 percent of post-Cold War coups reshuffled the regime leadership.[12] Democracies were installed in the wake of 12 percent of Cold War coups and 40 percent of the post-Cold War coups.[12]

Samuel Huntington’s three types

Writing in 1968, political scientist Samuel P. Huntington identified three types of coup d’état, which correspond to the role the military plays in three different types of praetorian society.[16] As society changes, so does the role of the military. In the world of oligarchy, the soldier is a radical; in the middle class he is a participant and arbiter; as the “mass society looms on the horizon he becomes the conservative guardian of the existing order”.

Breakthrough coups

In breakthrough coups, the soldier plays the role of “reformer”, moving the society from “Oligarchical to Radical Praetorianism”. “In oligarchical praetorianism the dominant social forces are landowners, the leading clergy, and the wielders of the sword”. In “radical” society, the middle-class is an important social and political class. The shift toward “radical” society take the form of slow evolution, or a “breakthrough” to middle-class political participation may be led by civilian intelligentsia. A breakthrough to radical praetorianism (in which the military plays an important role among the middle class who govern) may occur when middle-class officers dislodge the civilian intelligentsia who led the breakthrough, or the military may take power directly from the absolute monarchy or the oligarchs in a military coup.

Arbiter coups

In this type of coup, society is in the stage of “radical praetorianism,” meaning that the praetorian society is in the “middle stages in the expansion of political participation,” when the middle-class (including the military) are actively involved in politics, but the masses are not regularly politically mobilized. This type of society often follows the breakthrough coup, which “clears the way for the entry of other middle-class elements into politics”. In radical praetorian society, various middle-class groups may act against one another in riots or demonstrations, and the military will step in with a military coup to re-establish order and “halt the rabid mobilization of social forces into politics and into the streets…to defuse the explosive political situation”.

Veto coup d’état

Veto coups d’état occur when the army vetoes the people’s mass participation and social mobilisation in governing themselves. “Military interventions of this “veto” variety thus directly reflect increasing lower-class political participation in politics”. In “veto coups” the soldier plays the role of “guardian of the existing order.” In such a case, the army confronts and suppresses large-scale, broad-based civil opposition.

Predictors

A 2003 review of the academic literature found that the following factors were associated with coups:

  • officers’ personal grievances
  • military organizational grievances
  • military popularity
  • military attitudinal cohesiveness
  • economic decline
  • domestic political crisis
  • contagion from other regional coups
  • external threat
  • participation in war
  • foreign veto power[clarify] and military’s national security doctrine
  • officers’ political culture
  • noninclusive institutions
  • colonial legacy
  • economic development
  • undiversified exports
  • officers’ class composition
  • military size
  • strength of civil society
  • regime legitimacy and past coups.[17]

The literature review in a 2016 study includes mentions of ethnic factionalism, supportive foreign governments, leader inexperience, slow growth, commodity price shocks, and poverty.[18]

The cumulative number of coups is a strong predictor of future coups.[17][19][20] Hybrid regimes are more vulnerable to coups than very authoritarian states or democratic states.[21] A 2015 study finds that terrorism is strongly associated with re-shuffling coups.[22] A 2016 study finds that there is an ethnic component to coups: “When leaders attempt to build ethnic armies, or dismantle those created by their predecessors, they provoke violent resistance from military officers.”[23] Another 2016 study shows that protests increase the risk of coups, presumably because they ease coordination obstacles among coup plotters and make international actors less likely to punish coup leaders.[24] A third 2016 study finds that coups become more likely in the wake of elections in autocracies when the results reveal electoral weakness for the incumbent autocrat.[25] A fourth 2016 study finds that inequality between social classes increase the likelihood of coups.[26] A 2016 study rejects the notion that participation in war makes coups more likely; to the contrary, coup risk declines in the presence of enduring interstate conflict.[27] One study found that coups are more likely to occur in states with small populations, as there are smaller coordination problems for coup-plotters.[28]

Coup-proofing

In what is referred to as “coup-proofing”, regimes create structures that make it hard for any small group to seize power. These coup-proofing strategies may include the strategic placing of family, ethnic, and religious groups in the military; creation of an armed force parallel to the regular military, and development of multiple internal security agencies with overlapping jurisdiction that constantly monitor one another.[29] Research shows that some coup-proofing strategies reduce the risk of coups occurring.[30][31] However, coup-proofing reduces military effectiveness,[32][33][34] and limits the rents that an incumbent can extract.[35]

A 2016 study shows that the implementation of succession rules reduce coup attempts.[36] Succession rules are believed to hamper coordination efforts among coup plotters by assuaging the elites who have more to gain with patience than with plotting.[36]

According to political scientists Curtis Bell and Jonathan Powell, coup attempts in neighbouring countries lead to greater coup-proofing and coup-related repression in a region.[37]

Democratization

Research suggests that coups promote democratization in staunchly authoritarian regimes, have become less likely to end democracy over time, and that the positive influence has strengthened since the end of the Cold War.[11][12][38][39][40]

A 2014 study found that “coups promote democratization, particularly among states that are least likely to democratize otherwise”.[38] The authors argue that coup attempts can have this consequence because leaders of successful coups have incentives to democratize quickly in order to establish political legitimacy and economic growth while leaders who stay in power after failed coup attempts see it as a sign that they must enact meaningful reforms to remain in power.[38] A 2014 study found that 40% of post-Cold War coups were successful. The authors argue that this may be due to the incentives created by international pressure.[11] A 2016 study found that democracies were installed in 12 percent of Cold War coups and 40 percent of the post-Cold War coups.[12]

Repression after failed coups, and counter-coups

According to Naunihal Singh, author of Seizing Power: The Strategic Logic of Military Coups (2014), it is “fairly rare” for the prevailing existing government to violently purge the army after a coup has been foiled. If it starts mass killing elements of the army, including officers who were not involved in the coup, this may trigger a “counter-coup” by soldiers who are afraid they will be next. To prevent such a desperate counter-coup that may be more successful than the initial attempt, governments usually resort to firing prominent officers and replacing them with loyalists instead.[41]

Some research suggests that increased repression and violence typically follow coup attempts (whether they’re successes or failures).[42] However, some tentative analysis by political scientist Jay Ulfelder finds no clear pattern of deterioration in human-rights practices in wake of failed coups in post-Cold War era.[43]

Notable counter-coups include the Ottoman countercoup of 1909, the 1960 Laotian counter-coup, the 1966 Nigerian counter-coup, the 1967 Greek counter-coup, and the 1971 Sudanese counter-coup.

A 2017 study finds that the use of state broadcasting by the putschist regime after Mali’s 2012 coup did not elevate explicit approval for the regime.[44]

International responses

The international community tends to react adversely to coups by reducing aid and imposing sanctions. A 2015 study finds that “coups against democracies, coups after the Cold War, and coups in states heavily integrated into the international community are all more likely to elicit global reaction.”[45] Another 2015 study shows that coups are the strongest predictor for the imposition of democratic sanctions.[46] A third 2015 study finds that Western states react strongest against coups of possible democratic and human rights abuses.[46] A 2016 study shows that the international donor community in the post-Cold War period penalizes coups by reducing foreign aid.[47] The US has been inconsistent in applying aid sanctions against coups both during the Cold War and post-Cold War periods, a likely consequence of its geopolitical interests.[47]

Organizations such as the African Union and Organization of American States have adopted anti-coup frameworks. Through the threat of sanctions, the organizations actively try to curb coups. A 2016 study finds that the African Union has played a meaningful role in reducing African coups.[48]

A forthcoming study in the Journal of Conflict Resolution finds that negative international responses to regimes created in coups have a significant influence on the sustainability of those regimes.[49] The study finds that “state reactions have the strongest effect during the Cold War, while international organizations matter the most afterward.”[49] Negative international responses from strong actors matter the most.[49]

Current leaders who assumed power via coups d’état

Position Name Assumed power as of Replaced Country Coup d’état
Sultan Qaboos bin Said al Said[50]1 23 July 1970 Said bin Taimur  Oman 1970 Omani coup d’état
President Teodoro Obiang Nguema Mbasogo 3 August 1979 Francisco Macías Nguema  Equatorial Guinea 1979 Equatoguinean coup d’état
President Yoweri Museveni 29 January 1986 Tito Okello  Uganda Ugandan Bush War
President Omar al-Bashir 30 June 1989 Sadiq al-Mahdi  Sudan 1989 Sudanese coup d’état
President Idriss Déby 2 December 1990 Hissène Habré  Chad 1990 Chadian revolution
President Isaias Afwerki 27 April 19912 Mengistu Haile Mariam
(Ethiopia)
 Eritrea Eritrean War of Independence
Prime Minister Hun Sen August 1997 Norodom Ranariddh  Cambodia 1997 Cambodian coup d’état
President Denis Sassou Nguesso 25 October 1997 Pascal Lissouba  Republic of the Congo Republic of the Congo Civil War
Prime Minister Frank Bainimarama 5 December 2006 Laisenia Qarase  Fiji 2006 Fijian coup d’état
President Mohamed Ould Abdel Aziz3 6 August 2008 Sidi Ould Cheikh Abdallahi  Mauritania 2008 Mauritanian coup d’état
President Abdel Fattah el-Sisi[51] 3 July 2013 Mohamed Morsi  Egypt 2013 Egyptian coup d’état
Prime Minister Prayuth Chan-ocha 22 May 2014 Niwatthamrong Boonsongpaisan4  Thailand 2014 Thai coup d’état
President of the Revolutionary Committee Mohammed Ali al-Houthi 6 February 2015 Abd Rabbuh Mansur Hadi5  Yemen 2014–15 Yemeni coup d’état

1Monarch who overthrew his father in a bloodless palace coup.
2As head of Provisional Government of Eritrea, which declared independence 24 May 1993.
3Subsequently, confirmed by a narrow margin in the 2009 Mauritanian presidential election, which was deemed “satisfactory” by international observers.
4Acting Prime Minister at that time.
5Hadi resigned on 22 January 2015.

See also

Story 3: President Trump Voter Fraud Commission — Videos

Image result for cartoons obama surveillance of trump

Trump Launches Commission To Investigate Voter Fraud

News Wrap: Trump signs executive orders on cybersecurity, voter fraud

Gov. Greg Abbott: Voter fraud is real, it must be stopped

Does the U.S. have a voter fraud problem?

John Fund References James O’Keefe’s Videos as Evidence of Voter Fraud

Veritas Voter Fraud Compilation – #VoterFraudIsReal

#CNNLeaks: James O’Keefe of Project Veritas Releases CNN Leaks and Offers Bounty for Its Destruction

The Pronk Pops Show Podcasts Portfolio

Listen To Pronk Pops Podcast or Download Shows 889-892

Listen To Pronk Pops Podcast or Download Shows 884-888

Listen To Pronk Pops Podcast or Download Shows 878-883

Listen To Pronk Pops Podcast or Download Shows 870-877

Listen To Pronk Pops Podcast or Download Shows 864-869

Listen To Pronk Pops Podcast or Download Shows 857-863

Listen To Pronk Pops Podcast or Download Shows 850-856

Listen To Pronk Pops Podcast or Download Shows 845-849

Listen To Pronk Pops Podcast or Download Shows 840-844

Listen To Pronk Pops Podcast or Download Shows 833-839

Listen To Pronk Pops Podcast or Download Shows 827-832

Listen To Pronk Pops Podcast or Download Shows 821-826

Listen To Pronk Pops Podcast or Download Shows 815-820

Listen To Pronk Pops Podcast or Download Shows 806-814

Listen To Pronk Pops Podcast or Download Shows 800-805

Listen To Pronk Pops Podcast or Download Shows 793-799

Listen To Pronk Pops Podcast or Download Shows 785-792

Listen To Pronk Pops Podcast or Download Shows 777-784

Listen To Pronk Pops Podcast or Download Shows 769-776

Listen To Pronk Pops Podcast or Download Shows 759-768

Listen To Pronk Pops Podcast or Download Shows 751-758

Listen To Pronk Pops Podcast or Download Shows 745-750

Listen To Pronk Pops Podcast or Download Shows 738-744

Listen To Pronk Pops Podcast or Download Shows 732-737

Listen To Pronk Pops Podcast or Download Shows 727-731

Listen To Pronk Pops Podcast or Download Shows 720-726

Listen To Pronk Pops Podcast or DownloadShows 713-719

Listen To Pronk Pops Podcast or DownloadShows 705-712

Listen To Pronk Pops Podcast or Download Shows 695-704

Listen To Pronk Pops Podcast or Download Shows 685-694

Listen To Pronk Pops Podcast or Download Shows 675-684

Listen To Pronk Pops Podcast or Download Shows 668-674

Listen To Pronk Pops Podcast or Download Shows 660-667

Listen To Pronk Pops Podcast or Download Shows 651-659

Listen To Pronk Pops Podcast or Download Shows 644-650

Listen To Pronk Pops Podcast or Download Shows 637-643

Listen To Pronk Pops Podcast or Download Shows 629-636

Listen To Pronk Pops Podcast or Download Shows 617-628

Listen To Pronk Pops Podcast or Download Shows 608-616

Listen To Pronk Pops Podcast or Download Shows 599-607

Listen To Pronk Pops Podcast or Download Shows 590-598

Listen To Pronk Pops Podcast or Download Shows 585- 589

Listen To Pronk Pops Podcast or Download Shows 575-584

Listen To Pronk Pops Podcast or Download Shows 565-574

Listen To Pronk Pops Podcast or Download Shows 556-564

Listen To Pronk Pops Podcast or Download Shows 546-555

Listen To Pronk Pops Podcast or Download Shows 538-545

Listen To Pronk Pops Podcast or Download Shows 532-537

Listen To Pronk Pops Podcast or Download Shows 526-531

Listen To Pronk Pops Podcast or Download Shows 519-525

Listen To Pronk Pops Podcast or Download Shows 510-518

Listen To Pronk Pops Podcast or Download Shows 500-509

Listen To Pronk Pops Podcast or Download Shows 490-499

Listen To Pronk Pops Podcast or Download Shows 480-489

Listen To Pronk Pops Podcast or Download Shows 473-479

Listen To Pronk Pops Podcast or Download Shows 464-472

Listen To Pronk Pops Podcast or Download Shows 455-463

Listen To Pronk Pops Podcast or Download Shows 447-454

Listen To Pronk Pops Podcast or Download Shows 439-446

Listen To Pronk Pops Podcast or Download Shows 431-438

Listen To Pronk Pops Podcast or Download Shows 422-430

Listen To Pronk Pops Podcast or Download Shows 414-421

Listen To Pronk Pops Podcast or Download Shows 408-413

Listen To Pronk Pops Podcast or Download Shows 400-407

Listen To Pronk Pops Podcast or Download Shows 391-399

Listen To Pronk Pops Podcast or Download Shows 383-390

Listen To Pronk Pops Podcast or Download Shows 376-382

Listen To Pronk Pops Podcast or Download Shows 369-375

Listen To Pronk Pops Podcast or Download Shows 360-368

Listen To Pronk Pops Podcast or Download Shows 354-359

Listen To Pronk Pops Podcast or Download Shows 346-353

Listen To Pronk Pops Podcast or Download Shows 338-345

Listen To Pronk Pops Podcast or Download Shows 328-337

Listen To Pronk Pops Podcast or Download Shows 319-327

Listen To Pronk Pops Podcast or Download Shows 307-318

Listen To Pronk Pops Podcast or Download Shows 296-306

Listen To Pronk Pops Podcast or Download Shows 287-295

Listen To Pronk Pops Podcast or Download Shows 277-286

Listen To Pronk Pops Podcast or Download Shows 264-276

Listen To Pronk Pops Podcast or Download Shows 250-263

Listen To Pronk Pops Podcast or Download Shows 236-249

Listen To Pronk Pops Podcast or Download Shows 222-235

Listen To Pronk Pops Podcast or Download Shows 211-221

Listen To Pronk Pops Podcast or Download Shows 202-210

Listen To Pronk Pops Podcast or Download Shows 194-201

Listen To Pronk Pops Podcast or Download Shows 184-193

Listen To Pronk Pops Podcast or Download Shows 174-183

Listen To Pronk Pops Podcast or Download Shows 165-173

Listen To Pronk Pops Podcast or Download Shows 158-164

Listen To Pronk Pops Podcast or Download Shows151-157

Listen To Pronk Pops Podcast or Download Shows 143-150

Listen To Pronk Pops Podcast or Download Shows 135-142

Listen To Pronk Pops Podcast or Download Shows 131-134

Listen To Pronk Pops Podcast or Download Shows 124-130

Listen To Pronk Pops Podcast or Download Shows 121-123

Listen To Pronk Pops Podcast or Download Shows 118-120

Listen To Pronk Pops Podcast or Download Shows 113 -117

Listen To Pronk Pops Podcast or Download Show 112

Listen To Pronk Pops Podcast or Download Shows 108-111

Listen To Pronk Pops Podcast or Download Shows 106-108

Listen To Pronk Pops Podcast or Download Shows 104-105

Listen To Pronk Pops Podcast or Download Shows 101-103

Listen To Pronk Pops Podcast or Download Shows 98-100

Listen To Pronk Pops Podcast or Download Shows 94-97

Listen To Pronk Pops Podcast or Download Show 93

Listen To Pronk Pops Podcast or Download Show 92

Listen To Pronk Pops Podcast or Download Show 91

Listen To Pronk Pops Podcast or Download Shows 88-90

Listen To Pronk Pops Podcast or Download Shows 84-87

Listen To Pronk Pops Podcast or Download Shows 79-83

Listen To Pronk Pops Podcast or Download Shows 74-78

Listen To Pronk Pops Podcast or Download Shows 71-73

Listen To Pronk Pops Podcast or Download Shows 68-70

Listen To Pronk Pops Podcast or Download Shows 65-67

Listen To Pronk Pops Podcast or Download Shows 62-64

Listen To Pronk Pops Podcast or Download Shows 58-61

Listen To Pronk Pops Podcast or Download Shows 55-57

Listen To Pronk Pops Podcast or Download Shows 52-54

Listen To Pronk Pops Podcast or Download Shows 49-51

Listen To Pronk Pops Podcast or Download Shows 45-48

Listen To Pronk Pops Podcast or Download Shows 41-44

Listen To Pronk Pops Podcast or Download Shows 38-40

Listen To Pronk Pops Podcast or Download Shows 34-37

Listen To Pronk Pops Podcast or Download Shows 30-33

Listen To Pronk Pops Podcast or Download Shows 27-29

Listen To Pronk Pops Podcast or Download Shows 17-26

Listen To Pronk Pops Podcast or Download Shows 16-22

Listen To Pronk Pops Podcast or Download Shows 10-15

Listen To Pronk Pops Podcast or Download Shows 1-9

Read Full Post | Make a Comment ( None so far )

The Pronk Pops Show 659, April 15, 2016, Story 1: Limbaugh Exposes Audio Dirty Trick On Cruz — Another Fox SNAFU (Situation Normal All Foxed Up) — Similar Audio Feed Problems With Trump Speech ABC Audio Feed– Audio On Limbaugh Show Experiences Similar Audio Glitch — Verified All Over America –New York Values? — Limousine Liberal Big Media Values — New York, New York — Breaking News: 7.1 Magnitude Earthquake in Southern Japan — Videos

Posted on April 15, 2016. Filed under: 2016 Presidential Campaign, 2016 Presidential Candidates, Blogroll, Breaking News, College, Countries, Donald J. Trump, Donald Trump, United States of America | Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , |

Project_1

The Pronk Pops Show Podcasts

Pronk Pops Show 659: April 15, 2016

Pronk Pops Show 658: April 14, 2016

Pronk Pops Show 657: April 13, 2016

Pronk Pops Show 656: April 12, 2016

Pronk Pops Show 655: April 11, 2016

Pronk Pops Show 654: April 8, 2016

Pronk Pops Show 653: April 7, 2016

Pronk Pops Show 652: April 6, 2016

Pronk Pops Show 651: April 4, 2016

Pronk Pops Show 650: April 1, 2016

Pronk Pops Show 649: March 31, 2016

Pronk Pops Show 648: March 30, 2016

Pronk Pops Show 647: March 29, 2016

Pronk Pops Show 646: March 28, 2016

Pronk Pops Show 645: March 24, 2016

Pronk Pops Show 644: March 23, 2016

Pronk Pops Show 643: March 22, 2016

Pronk Pops Show 642: March 21, 2016

Pronk Pops Show 641: March 11, 2016

Pronk Pops Show 640: March 10, 2016

Pronk Pops Show 639: March 9, 2016

Pronk Pops Show 638: March 8, 2016

Pronk Pops Show 637: March 7, 2016

Pronk Pops Show 636: March 4, 2016

Pronk Pops Show 635: March 3, 2016

Pronk Pops Show 634: March 2, 2016

Pronk Pops Show 633: March 1, 2016

Pronk Pops Show 632: February 29, 2016

Pronk Pops Show 631: February 25, 2016

Pronk Pops Show 630: February 24, 2016

Pronk Pops Show 629: February 22, 2016

Pronk Pops Show 628: February 19, 2016

Pronk Pops Show 627: February 18, 2016

Pronk Pops Show 626: February 17, 2016

Pronk Pops Show 625: February 16, 2016

Pronk Pops Show 624: February 15, 2016

Pronk Pops Show 623: February 12, 2016

Pronk Pops Show 622: February 11, 2016

Pronk Pops Show 621: February 10, 2016

Pronk Pops Show 620: February 9, 2016

Pronk Pops Show 619: February 8, 2016

Pronk Pops Show 618: February 5, 2016

Pronk Pops Show 617: February 4, 2016

Pronk Pops Show 616: February 3, 2016

Pronk Pops Show 615: February 1, 2016

Pronk Pops Show 614: January 29, 2016

Pronk Pops Show 613: January 28, 2016

Pronk Pops Show 612: January 27, 2016

Pronk Pops Show 611: January 26, 2016

Pronk Pops Show 610: January 25, 2016

Pronk Pops Show 609: January 22, 2016

Pronk Pops Show 608: January 21, 2016

Pronk Pops Show 607: January 20, 2016

Pronk Pops Show 606: January 19, 2016

Pronk Pops Show 605: January 15, 2015

Pronk Pops Show 604: January 14, 2016

Pronk Pops Show 603: January 13, 2016

Pronk Pops Show 602: January 12, 2016

Pronk Pops Show 601: January 11, 2015

Pronk Pops Show 600: January 8, 2016

Pronk Pops Show 599: January 6, 2016

Pronk Pops Show 598: January 5, 2016

Story 1: Limbaugh Exposes Audio Dirty Trick On Cruz — Another Fox SNAFU (Situation Normal All Foxed Up) — Similar Audio Feed Problems With Trump Speech ABC Audio Feed– Audio On Limbaugh Show Experiences Similar Audio Glitch — Verified All Over America –New York Values? — Limousine Liberal Big Media Values — New York, New York — Breaking News: 7.1 Magnitude Earthquake in Southern Japan — Videos

grand hyatt

NEW YORK, NY - APRIL 14: Republican presidential candidate Donald Trump speaks during the 2016 annual New York State Republican Gala on April 14, 2016 in New York City. Donald Trump, Senator Ted Cruz of Texas and Gov. John R. Kasich of Ohio take part in a fund-raiser for the state Republican Party, being the first time they are seen together since they decided to abandon the so-called loyalty pledge they signed last year to support whoever becomes the party nominee. (Photo by Eduardo Munoz Alvarez/Getty Images)

donald j trump

 tjohn kasich

Republican U.S. presidential candidate Ted Cruz speaks at the 2016 New York State Republican Gala in New York City, April 14, 2016. REUTERS/Brendan McDermid

trump ice rink trump ice rink3-wollman-rink

wollmaniceskatingrink02

Frank Sinatra – “Theme from New York New York” (Concert Collection)

Frank Sinatra-New York,New York-Lyrics

Lyrics

Start spreadin’ the news, I’m leavin’ today
I want to be a part of it
New York, New York
These vagabond shoes, are longing to stray
Right through the very heart of it
New York, New York

I want to wake up, in a city that never sleeps
And find I’m king of the hill
Top of the heap

These little town blues, are melting away
I’ll make a brand new start of it
In old New York
If I can make it there, I’ll make it anywhere
It’s up to you, New York..New York

New York…New York
I want to wake up, in a city that never sleeps
And find I’m A number one, top of the list
King of the hill, A number one….

These little town blues, are melting away
I’ll make a brand new start of it
In old New York
If I can make it there, I’ll make it anywhere
It’s up to you, New York..New York New York!!!

Rush Limbaugh – April 15, 2016 Full Podcast

Ted Cruz FULL SPEECH at 2016 New York State Republican Gala (4-14-16)

John Kasich FULL Speech at 2016 New York State Republican Gala (4-14-16)

FULL SPEECH: Donald Trump at the New York State Republican Gala (4-14-16) New York GOP Gala

LIVE Donald Trump New York State Republican Gala Grand Hyatt FULL SPEECH HD STREAM (4-14-16)

Q15 – Cruz, Trump – What are “New York Values?”

Donald Trump On “New York Values”

Donald Trump on New York Values – In His Own Words

Trump talks New York values at GOP gala

What does limousine liberal mean?

Trump widens lead in Fox News Poll, but voters have concerns

Latest Polls

Friday, April 15
Race/Topic(Click to Sort) Poll Results Spread
New York Republican Presidential Primary 0ptimus (R)* Trump 49, Kasich 23, Cruz 14 Trump +26
Arizona Senate – McCain vs. Kirkpatrick Behavior Research Center McCain 42, Kirkpatrick 42 Tie
President Obama Job Approval Gallup Approve 48, Disapprove 47 Approve +1
President Obama Job Approval Rasmussen Reports Approve 49, Disapprove 51 Disapprove +2
Thursday, April 14
Race/Topic(Click to Sort) Poll Results Spread
2016 Democratic Presidential Nomination FOX News Clinton 48, Sanders 46 Clinton +2
2016 Republican Presidential Nomination FOX News Trump 45, Cruz 27, Kasich 25 Trump +18
2016 Democratic Presidential Nomination CBS News Clinton 50, Sanders 44 Clinton +6
2016 Republican Presidential Nomination CBS News Trump 42, Cruz 29, Kasich 18 Trump +13
New York Democratic Presidential Primary NBC 4 NY/WSJ/Marist Clinton 57, Sanders 40 Clinton +17
Pennsylvania Republican Presidential Primary Monmouth Trump 44, Cruz 28, Kasich 23 Trump +16
General Election: Trump vs. Clinton FOX News Clinton 48, Trump 41 Clinton +7
General Election: Cruz vs. Clinton FOX News Clinton 45, Cruz 44 Clinton +1
General Election: Kasich vs. Clinton FOX News Kasich 49, Clinton 40 Kasich +9
General Election: Trump vs. Sanders FOX News Sanders 53, Trump 39 Sanders +14
General Election: Cruz vs. Sanders FOX News Sanders 51, Cruz 39 Sanders +12
General Election: Kasich vs. Sanders FOX News Sanders 47, Kasich 43 Sanders +4
General Election: Trump vs. Clinton CBS News Clinton 50, Trump 40 Clinton +10
General Election: Cruz vs. Clinton CBS News Clinton 45, Cruz 42 Clinton +3
General Election: Kasich vs. Clinton CBS News Kasich 47, Clinton 41 Kasich +6
General Election: Trump vs. Sanders CBS News Sanders 53, Trump 36 Sanders +17
General Election: Cruz vs. Sanders CBS News Sanders 50, Cruz 38 Sanders +12
General Election: Kasich vs. Sanders CBS News Sanders 46, Kasich 41 Sanders +5
President Obama Job Approval FOX News Approve 49, Disapprove 47 Approve +2
President Obama Job Approval CBS News Approve 46, Disapprove 45 Approve +1
President Obama Job Approval Reuters/Ipsos Approve 48, Disapprove 48 Tie
Congressional Job Approval CBS News Approve 14, Disapprove 77 Disapprove +63
Direction of Country CBS News Right Direction 30, Wrong Track 66 Wrong Track +36
Direction of Country Reuters/Ipsos Right Direction 25, Wrong Track 63 Wrong Track +38

http://www.realclearpolitics.com/epolls/latest_polls/

 

The Green Papers
2016 Presidential Primaries, Caucuses, and Conventions
Copyright www.flags.net/UNST.htm Republican Convention
Presidential Nominating Process
Debate –  Fox – Cleveland, Ohio: Thursday 6 August 2015
Debate – CNN – Ronald Reagan Presidential Library, Simi Valley, California: Wednesday 16 September 2015
Debate – CNBC – Boulder, Colorado: Wednesday 28 October 2015
Debate – Fox Business News – Milwaukee, Wisconsin: Tuesday 10 November 2015
Debate – CNN – Las Vegas, Nevada: Tuesday 15 December 2015
Debate – Fox Business Channel, Charleston, South Carolina: Thursday 14 January 2016
Debate – Fox – Iowa: Thursday 28 January 2016
Debate – CBS – South Carolina: February 2016 (presumably)
Debate – NBC/Telemundo – Texas: Friday 26 February 2016
Debate – CNN – TBD: March 2016 (presumably)
Debate – Salt Lake City, Utah (announced 20 February 2016): Monday 21 March 2016
41st Republican National Convention: Monday 18 July – Thursday 21 July 2016
Republicans
Candidate Popular
Vote
Delegate Votes
Soft
Pledged
Soft
Unpledged
Soft
Total
Hard Total
Trump, Donald John, Sr. 8,263,231  37.01% 757  32.04% 1   0.92% 758  30.66% 757  30.62%
Cruz, Rafael Edward “Ted” 6,324,157  28.33% 533  22.56% 11  10.09% 544  22.01% 529  21.40%
Rubio, Marco A. 3,483,761  15.60% 173   7.32%   173   7.00% 173   7.00%
Kasich, John Richard 2,982,743  13.36% 144   6.09%   144   5.83% 144   5.83%
Carson, Benjamin Solomon “Ben”, Sr. 698,989   3.13% 9   0.38%   9   0.36% 9   0.36%
Bush, John Ellis “Jeb” 257,920   1.16% 4   0.17%   4   0.16% 4   0.16%
Uncommitted 68,400   0.31% 11   0.47% 17  15.60% 28   1.13% 64   2.59%
Paul, Randal H. “Rand” 59,036   0.26% 1   0.04%   1   0.04% 1   0.04%
Christie, Christopher James “Chris” 54,043   0.24%        
Huckabee, Michael Dale “Mike” 48,740   0.22% 1   0.04%   1   0.04% 1   0.04%
Fiorina, Carleton Sneed “Carly” 36,107   0.16% 1   0.04%   1   0.04% 1   0.04%
Santorum, Richard John “Rick” 16,525   0.07%        
No Preference 9,312   0.04%        
Graham, Lindsey Olin 5,687   0.03%        
Gray, Elizabeth 5,455   0.02%        
(others) 3,382   0.02%        
Gilmore, James Stuart “Jim”, III 2,896   0.01%        
Pataki, George E. 2,006   0.01%        
Others 1,586   0.01%        
Cook, Timothy “Tim” 517   0.00%        
Jindal, Piyush “Bobby” 221   0.00%        
Martin, Andy 202   0.00%        
Witz, Richard P.H. 109   0.00%        
Lynch, James P. “Jim”, Sr. 100   0.00%        
Messina, Peter 79   0.00%        
Cullison, Brooks Andrews 56   0.00%        
Lynch, Frank 47   0.00%        
Robinson, Joe 44   0.00%        
Comley, Stephen Bradley, Sr. 32   0.00%        
Prag, Chomi 16   0.00%        
Dyas, Jacob Daniel “Daniel”, Sr. 15   0.00%        
McCarthy, Stephen John 12   0.00%        
Iwachiw, Walter N. 9   0.00%        
Huey, Kevin Glenn 8   0.00%        
Drozd, Matt 6   0.00%        
Mann, Robert Lawrence 5   0.00%        
Hall, David Eames          
(available)   729  30.85% 80  73.39% 809  32.73% 789  31.92%
Total 22,325,454 100.00% 2,363 100.00% 109 100.00% 2,472 100.00% 2,472 100.00%

HOW TRUMP CAN LOCK UP GOP NOMINATION BEFORE THE CONVENTION

To all the political junkies yearning for a contested Republican convention this summer: not so fast.

It’s still possible for Donald Trump to clinch the nomination by the end of the primaries on June 7. His path is narrow and perilous. But it’s plausible and starts with a big victory Tuesday in his home state New York primary.

Trump is the only candidate with a realistic chance of reaching the 1,237 delegates needed to clinch the nomination before the July convention in Cleveland. His rivals, Texas Sen. Ted Cruz and Ohio Gov. John Kasich, can only hope to stop him.

If Cruz and Kasich are successful, politicos across the country will have the summer of their dreams – a convention with an uncertain outcome. But Trump can put an end to those dreams, and he can do it without any of the 150 or so delegates who will go to the convention free to support the candidate of their choice.

What comes next isn’t a prediction, but rather, a way in which Trump could win the nomination outright on June 7.

To be sure, Trump will have to start doing a lot better than he has so far. He gets that chance starting Tuesday, beginning the day with 744 delegates.

NEW YORK

There are 95 delegates at stake in the Empire State, and it’s important for Trump to win a big majority of them. It won’t be easy.

There are 14 statewide delegates and three delegates in each congressional district.

If a candidate gets more than 50 percent of the statewide vote, he gets all 14 delegates. Otherwise, he has to share them with other candidates.

If a candidate gets more than 50 percent of the vote in a congressional district, he gets all three delegates. Otherwise, again, he has to share.

Trump leads statewide in the most recent preference polls, with right around 50 percent. New York is a large and diverse state, so he probably won’t win all the congressional districts.

Let’s say Trump does make it to 50 percent, but Kasich or Cruz wins five congressional districts; Trump will take 77 delegates on the night.

Trump’s running total: 821 delegates.

APRIL 26

Five states have primaries on April 26, with 172 delegates at stake: Pennsylvania, Connecticut, Delaware, Maryland and Rhode Island.

Pennsylvania could be trouble for Trump. The state has a unique system in which 54 delegates – three from each congressional district – are listed by name on the ballot, with no information for voters to know which candidate they support.

That means even if Trump wins Pennsylvania, he’s only guaranteed to claim 17 of the state’s 71 delegates.

Connecticut awards 13 delegates to the statewide winner and three to the winner of each congressional district, for a total of 28. The New York real estate mogul needs to win his neighboring state. If he does well, he could get 22 delegates.

Delaware’s 16 delegates are winner-take-all, increasing the importance of this small state. If Trump loses Delaware, he has to make it up elsewhere.

Maryland awards 14 delegates to the statewide winner and three to the winner of each congressional district, for a total of 38. Recent polls show Trump with a significant lead. If he does well, he could get 32 delegates.

Trump can afford to lose Rhode Island, which awards its 19 delegates proportionally.

In all, it’s a day on which we’ll say Trump claims 93 delegates.

Trump’s running total: 914.

MAY

Five states hold contests in May, with a total of 199 delegates at stake: Indiana, Nebraska, West Virginia, Oregon and Washington State.

Indiana’s May 3 primary is important for Trump. The state awards 30 delegates to the statewide winner and three delegates to the winner of each congressional district, for a total of 57. If Trump can win the state and a majority of the congressional districts, he could collect 45 delegates.

West Virginia is another unique state in which voters elect 31 delegates in the May 10 primary. In West Virginia, however, the delegates will be listed on the ballot along with the presidential candidate they support. If Trump does well here, he could pick up 20 or more delegates.

Nebraska’s 36 delegates are winner-take-all. But if Nebraska is like its neighbors Kansas and Iowa, two states Cruz won earlier in the race, Trump can’t count on these delegates.

Oregon and Washington state award delegates proportionally, so even the losers get some.

We’ll give Trump 70 delegates for the month.

Trump’s running total: 984.

JUNE 7

This could be Trump’s D-Day. Or his Waterloo.

Five states vote on June 7, with 303 delegates up for grabs. The biggest prize is California, along with New Jersey, South Dakota, Montana and New Mexico.

The only state Trump can afford to lose is New Mexico, which awards 24 delegates proportionally.

New Jersey, South Dakota and Montana are winner-take-all, with a total of 107 delegates.

California is more complicated, with 172 delegates at stake. The statewide winner gets only 13. The other 159 are awarded according to the results in individual congressional districts.

Each of the state’s 53 congressional districts has three delegates. You win the district, you get all three.

For Trump to clinch the nomination on June 7 – the last day of the primary season – he has to win a big majority of California’s congressional districts. If he wins 39 districts, he gets 130 delegates.

On the last voting day of the primary campaign, we’ll say Trump wins 242 delegates.

Trump’s running total: 1,226 – or 11 delegates short of the magic number.

OH, WAIT!

Missouri has certified the results of its March 15 primary, with Trump beating Cruz by 1,965 votes. If the results survive a potential recount, Trump wins Missouri and another 12 delegates.

Trump’s total: 1,238.

Cue the balloons.

http://hosted.ap.org/dynamic/stories/U/US_GOP_2016_TRUMPS_PATH?SITE=AP&SECTION=HOME&TEMPLATE=DEFAULT&CTIME=2016-04-16-09-02-40

Angry and frustrated upstate New York swings behind Trump

What do a New York lawyer, a business owner who calls himself a left-leaning Republican and a construction worker who elected Barack Obama have in common? They’re voting for Donald Trump.

None of them live on the breadline. They share surprisingly varied opinions. Yet they are profoundly frustrated — with the economy, with career politicians and with perceptions of declining American prestige.

The Republican frontrunner’s supporters are often portrayed as undereducated, underearning whites.

But in upstate New York, where Trump calls himself “the most popular person that’s ever lived,” the breadth of support spotlights his enduring appeal, albeit as the Republican elites plot to bring him down.

The most divisive presidential campaign in a generation hits New York on Tuesday.

“I don’t think he’s the Hitler everyone puts him out to be, I really truly don’t and as a New Yorker I grew up with the guy,” says Lloyd Knecht, 59, who owns a heating and air conditioning company that employs 30 people.

Knecht works in Binghamton, one of the fastest-shrinking towns in America and a pale imitation of an illustrious past where IBM was founded more than a century ago and where the flight simulator was invented.

The gradual departure of IBM and other manufacturing corporations, taking jobs and technology overseas, has left behind unemployment above the US average and a poverty rate higher than the state average.

Knecht worries about rising insurance and wage bills, though he believes in “some sort of national health plan.” He fears the economy is becoming sluggish. He supported Obama’s decriminalization of petty drug crimes.

Trump’s populist message promising to bring back jobs and restore national pride with his say-it-how-it-is manner strike a deep chord in an area that has long felt forgotten by state and federal politicians.

Bernie Sanders, trailing Hillary Clinton for the Democratic presidential ticket, was this week the first candidate to visit Binghamton since George W. Bush 16 years ago.

– Heroin-addicted ghost town –

Ahead of next week’s crucial primary Trump leads the Republican polls in New York state on 53.4 percent to Ohio Governor John Kasich’s 21.7 percent and Texas Senator Ted Cruz’s 17.6 percent, according to a RealClearPolitics average.

Christopher Love, a union member who has lived in the area 42 years and works in construction, says Binghamton has gone from “valley of opportunity” to a “ghost town” where young people either leave or get hooked on heroin.

Trump, a billionaire real-estate mogul and reality television star, is the only candidate talking about issues that matter to him, says Love.

“We’ve got to do something different. What we’ve been doing the last 30 years isn’t working,” he told AFP, wearing a Trump 2016 trucker hat. His octogenarian father-in-law, who described Democrat John F. Kennedy as the best US president in his lifetime, is also supporting Trump.

Binghamton supporters are not blind to Trump’s shortcomings — his tabloid divorces, business flops, dubious policy pronouncements, talk of banning Muslims. But it just makes him more human, they argue. He may be imperfect, but he’s the best of the bunch, they say.

Those who spoke to AFP dismissed Cruz as too radical, too religious, unlikeable — even “scary.”

They write off Kasich and have no time for Clinton, a two-time New York senator, even if one couple admitted to voting for her in the past.

“I think it’s just the frustration of people who have voted for many years and they’re getting disgusted, tired, desensitized even,” said Love, 49, asked about Trump’s appeal.

– You’re kidding –

Conrad Taylor, a 19-year-old student and elected Democrat on the Binghamton city council, says it is rural areas where Trump, 69, is making hay.

“Would I ever vote for Trump in a million years? No, but I can easily identify why so many people in our area think that he’s a good candidate,” he said.

People are angry with Republican grandees conspiring to deny Trump, who has never held elected office, the nomination — exposing a gulf between Washington’s elites and party rank-and-file.

“Frankly, I’m fed up,” said Kevin Guyette, a lifelong Republican who specializes in personal injury and criminal defense law — and another backing Trump for the White House.

He is exasperated by Republicans who deny climate change, marginalize women, explain the world through the Bible and refuse to entertain Obama’s pick for the Supreme Court.

“They make some outlandish comments that defy logic,” he said, appearing to ignore remarks by Trump that have seen him accused of everything from misogyny to inciting violence at his rallies.

But upstate New York is by no means monolithic. Trump has a favorability rating of 57 percent and an unfavorable rating of 39 percent among upstate Republicans, says Don Levy, director of the Siena College Research Institute, underlining how he sharply splits opinion.

Even in death, it seems, that remains.

Barbara Fuller, a retired music teacher and Democrat, says her late father supported Trump. But when she mentioned that at his funeral, there was disgust.

“They were all like, ‘You’re kidding. No, no, no,'” she said.

https://www.yahoo.com/news/angry-frustrated-upstate-york-swings-behind-trump-022716832.html

4/15/2016 — Major Earthquakes Strike Japan — Pacific Unrest Obvious — West Coast USA on watch

Magnitude 7.3 earthquake hits southern Japan. Kumamoto, 16 April, 2016. new earthquake

7.1 Magnitude Earthquake Hits Southern Japan | MSNBC

M 7.0 EARTHQUAKE – KYUSHU, JAPAN – April 15, 2016

Earthquake : Powerful 7.1 Earthquake rocks Southern Japan after 6.2 foreshock (Apr 15, 2016)

Multiple Earthquakes Hit Japan – 7.1 Quake Hits Japan – Tsunami Advisory – The Real Story

EARTHQUAKES IN JAPAN – WHAT CAUSES THEM? APRIL 15, 2016 KUNAMOTO

Bill Nye the Science Guy – Earthquakes (richter scale)

BN Pangaea and Plate Tectonics I

4.0-9.0 Magnitude Earthquake Simulation

JAPAN – The Earthquake – 15 Minutes Live-Cam

Most Powerful Earthquake in the World Ever – Full Documentary

Richter magnitude scale

From Wikipedia, the free encyclopedia

Earthquake Richter Scale.jpg

The Richter magnitude scale (also Richter scale) assigns a magnitude number to quantify the energy released by anearthquake. The Richter scale, developed in the 1930s, is a base-10logarithmic scale, which defines magnitude as the logarithm of the ratio of the amplitude of the seismic waves to an arbitrary, minor amplitude.

As measured with a seismometer, an earthquake that registers 5.0 on the Richter scale has a shaking amplitude 10 times that of an earthquake that registered 4.0, and thus corresponds to a release of energy 31.6 times that released by the lesser earthquake.[1] The Richter scale was succeeded in the 1970s by the moment magnitude scale. This is now the scale used by the United States Geological Survey to estimate magnitudes for all modern large earthquakes.[2]

Development

In 1935, the seismologistsCharles Francis Richter and Beno Gutenberg, of the California Institute of Technology, developed the (future) Richter magnitude scale, specifically for measuring earthquakes in a given area of study in California, as recorded and measured with the Wood-Anderson torsion seismograph. Originally, Richter reported mathematical values to the nearest quarter of a unit, but the values later were reported with one decimal place; the local magnitude scale compared the magnitudes of different earthquakes.[1] Richter derived his earthquake-magnitude scale from the apparent magnitude scale used to measure the brightness of stars.[3]

Richter established a magnitude 0 event to be an earthquake that would show a maximum, combined horizontal displacement of 1.0 µm (0.00004 in.) on a seismogram recorded with a Wood-Anderson torsion seismograph 100 km (62 mi.) from the earthquakeepicenter. That fixed measure was chosen to avoid negative values for magnitude, given that the slightest earthquakes that could be recorded and located at the time were around magnitude 3.0. The Richter magnitude scale itself has no lower limit, and contemporary seismometers can register, record, and measure earthquakes with negative magnitudes.

M_\text{L} (local magnitude) was not designed to be applied to data with distances to the hypocenter of the earthquake that were greater than 600 km (373 mi.).[2] For national and local seismological observatories, the standard magnitude scale in the 21st century is still M_\text{L}. This scale saturates[clarification needed] at around M_\text{L} = 7,[4] because the high frequency waves recorded locally have wavelengths shorter than the rupture lengths[clarification needed] of large earthquakes.

Later, to express the size of earthquakes around the planet, Gutenberg and Richter developed a surface wave magnitude scale (M_\text{s}) and a body wave magnitudescale (M_\text{b}).[5] These are types of waves that are recorded at teleseismic distances. The two scales were adjusted such that they were consistent with the M_\text{L}scale. That adjustment succeeded better with the M_\text{s} scale than with the M_\text{b} scale. Each scale saturates when the earthquake is greater than magnitude 8.0.

Because of this, researchers in the 1970s developed the moment magnitude scale (M_\text{w}). The older magnitude-scales were superseded by methods for calculating the seismic moment, from which was derived the moment magnitude scale.

About the origins of the Richter magnitude scale, C.F. Richter said:

I found a [1928] paper by Professor K. Wadati of Japan in which he compared large earthquakes by plotting the maximum ground motion against [the] distance to the epicenter. I tried a similar procedure for our stations, but the range between the largest and smallest magnitudes seemed unmanageably large. Dr. Beno Gutenberg then made the natural suggestion to plot the amplitudes logarithmically. I was lucky, because logarithmic plots are a device of the devil.

Details

The Richter scale was defined in 1935 for particular circumstances and instruments; the particular circumstances refer to it being defined for Southern California and “implicitly incorporates the attenuative properties of Southern California crust and mantle.”[6] The particular instrument used would become saturated by strong earthquakes and unable to record high values. The scale was replaced in the 1970s by the moment magnitude scale (MMS); for earthquakes adequately measured by the Richter scale, numerical values are approximately the same. Although values measured for earthquakes now are M_w (MMS), they are frequently reported by the press as Richter values, even for earthquakes of magnitude over 8, when the Richter scale becomes meaningless. Anything above 5 is classified as a risk by the USGS.[citation needed]

The Richter and MMS scales measure the energy released by an earthquake; another scale, the Mercalli intensity scale, classifies earthquakes by their effects, from detectable by instruments but not noticeable, to catastrophic. The energy and effects are not necessarily strongly correlated; a shallow earthquake in a populated area with soil of certain types can be far more intense in effects than a much more energetic deep earthquake in an isolated area.

Several scales have historically been described as the “Richter scale”, especially the local magnitudeM_\text{L} and the surface wave M_\text{s} scale. In addition, the body wave magnitude, m_\text{b}, and the moment magnitude, M_\text{w}, abbreviated MMS, have been widely used for decades. A couple of new techniques to measure magnitude are in the development stage by seismologists.

All magnitude scales have been designed to give numerically similar results. This goal has been achieved well for M_\text{L}, M_\text{s}, and M_\text{w}.[7][8] The m_\text{b} scale gives somewhat different values than the other scales. The reason for so many different ways to measure the same thing is that at different distances, for differenthypocentral depths, and for different earthquake sizes, the amplitudes of different types of elastic waves must be measured.

M_\text{L} is the scale used for the majority of earthquakes reported (tens of thousands) by local and regional seismological observatories. For large earthquakes worldwide, the moment magnitude scale (MMS) is most common, although M_\text{s} is also reported frequently.

The seismic moment, M_o, is proportional to the area of the rupture times the average slip that took place in the earthquake, thus it measures the physical size of the event. M_\text{w} is derived from it empirically as a quantity without units, just a number designed to conform to the M_\text{s} scale.[9] A spectral analysis is required to obtain M_o, whereas the other magnitudes are derived from a simple measurement of the amplitude of a specifically defined wave.

All scales, except M_\text{w}, saturate for large earthquakes, meaning they are based on the amplitudes of waves which have a wavelength shorter than the rupture length of the earthquakes. These short waves (high frequency waves) are too short a yardstick to measure the extent of the event. The resulting effective upper limit of measurement for M_L is about 7[4] and about 8.5[4] for M_\text{s}.[10]

New techniques to avoid the saturation problem and to measure magnitudes rapidly for very large earthquakes are being developed. One of these is based on the long period P-wave;[11] the other is based on a recently discovered channel wave.[12]

The energy release of an earthquake,[13] which closely correlates to its destructive power, scales with the 32 power of the shaking amplitude. Thus, a difference in magnitude of 1.0 is equivalent to a factor of 31.6 (=({10^{1.0}})^{(3/2)}) in the energy released; a difference in magnitude of 2.0 is equivalent to a factor of 1000 (=({10^{2.0}})^{(3/2)} ) in the energy released.[14] The elastic energy radiated is best derived from an integration of the radiated spectrum, but an estimate can be based on m_\text{b} because most energy is carried by the high frequency waves.

Richter magnitudes

Earthquake severity.jpg

The Richter magnitude of an earthquake is determined from the logarithm of the amplitude of waves recorded by seismographs (adjustments are included to compensate for the variation in the distance between the various seismographs and the epicenter of the earthquake). The original formula is:[15]

M_\mathrm{L} = \log_{10} A - \log_{10} A_\mathrm{0}(\delta) = \log_{10} [A / A_\mathrm{0}(\delta)],\

where A is the maximum excursion of the Wood-Anderson seismograph, the empirical function A0 depends only on theepicentral distance of the station, \delta. In practice, readings from all observing stations are averaged after adjustment with station-specific corrections to obtain the M_\text{L} value.

Because of the logarithmic basis of the scale, each whole number increase in magnitude represents a tenfold increase in measured amplitude; in terms of energy, each whole number increase corresponds to an increase of about 31.6 times the amount of energy released, and each increase of 0.2 corresponds to a doubling of the energy released.

Events with magnitudes greater than 4.5 are strong enough to be recorded by a seismograph anywhere in the world, so long as its sensors are not located in the earthquake’s shadow.

The following describes the typical effects of earthquakes of various magnitudes near the epicenter. The values are typical only. They should be taken with extreme caution, since intensity and thus ground effects depend not only on the magnitude, but also on the distance to the epicenter, the depth of the earthquake’s focus beneath the epicenter, the location of the epicenter and geological conditions (certain terrains can amplify seismic signals).

Magnitude Description Mercalli intensity Average earthquake effects Average frequency of occurrence (estimated)
Less than 2.0 Micro I Microearthquakes, not felt, or felt rarely. Recorded by seismographs.[16] Continual/several million per year
2.0–2.9 Minor I to II Felt slightly by some people. No damage to buildings. Over one million per year
3.0–3.9 II to IV Often felt by people, but very rarely causes damage. Shaking of indoor objects can be noticeable. Over 100,000 per year
4.0–4.9 Light IV to VI Noticeable shaking of indoor objects and rattling noises. Felt by most people in the affected area. Slightly felt outside. Generally causes none to minimal damage. Moderate to significant damage very unlikely. Some objects may fall off shelves or be knocked over. 10,000 to 15,000 per year
5.0–5.9 Moderate VI to VIII Can cause damage of varying severity to poorly constructed buildings. At most, none to slight damage to all other buildings. Felt by everyone. 1,000 to 1,500 per year
6.0–6.9 Strong VII to X Damage to a moderate number of well-built structures in populated areas. Earthquake-resistant structures survive with slight to moderate damage. Poorly designed structures receive moderate to severe damage. Felt in wider areas; up to hundreds of miles/kilometers from the epicenter. Strong to violent shaking in epicentral area. 100 to 150 per year
7.0–7.9 Major VIII or greater[17] Causes damage to most buildings, some to partially or completely collapse or receive severe damage. Well-designed structures are likely to receive damage. Felt across great distances with major damage mostly limited to 250 km from epicenter. 10 to 20 per year
8.0–8.9 Great Major damage to buildings, structures likely to be destroyed. Will cause moderate to heavy damage to sturdy or earthquake-resistant buildings. Damaging in large areas. Felt in extremely large regions. One per year
9.0 and greater At or near total destruction – severe damage or collapse to all buildings. Heavy damage and shaking extends to distant locations. Permanent changes in ground topography. One per 10 to 50 years

(Based on U.S. Geological Survey documents.)[18]

The intensity and death toll depend on several factors (earthquake depth, epicenter location, population density, to name a few) and can vary widely.

Minor earthquakes occur every day and hour. On the other hand, great earthquakes occur once a year, on average. The largest recorded earthquake was theGreat Chilean earthquake of May 22, 1960, which had a magnitude of 9.5 on the moment magnitude scale.[19] The larger the magnitude, the less frequent the earthquake happens.

Beyond 9.5, while extremely strong earthquakes are theoretically possible, the energies involved rapidly make such earthquakes on Earth effectively impossible without an extremely destructive source of external energy. For example, the asteroid impact that created the Chicxulub crater and caused the mass extinction that may have killed the dinosaurs has been estimated as causing a magnitude 13 earthquake (see below), while a magnitude 15 earthquake could destroy the Earth completely. Seismologist Susan Hough has suggested that 10 may represent a very approximate upper limit, as the effect if the largest known continuous belt of faults ruptured together (along the Pacific coast of the Americas).[20]

Energy release equivalents

The following table lists the approximate energy equivalents in terms of TNT explosive force – though note that the earthquake energy is released undergroundrather than overground.[21] Most energy from an earthquake is not transmitted to and through the surface; instead, it dissipates into the crust and other subsurface structures. In contrast, a small atomic bomb blast (see nuclear weapon yield) will not, it will simply cause light shaking of indoor items, since its energy is released above ground.

Approximate magnitude Approximate TNT equivalent for
seismic energy yield
Joule equivalent Example
0.0 15 g 63 kJ
0.2 30 g 130 kJ Large hand grenade
1.5 2.7 kg 11 MJ Seismic impact of typical small construction blast
2.1 21 kg 89 MJ West fertilizer plant explosion[22]
3.0 480 kg 2.0 GJ Oklahoma City bombing, 1995
3.5 2.7 metric tons 11 GJ PEPCON fuel plant explosion, Henderson, Nevada, 1988
3.87 9.5 metric tons 40 GJ Explosion at Chernobyl nuclear power plant, 1986
3.91 11 metric tons 46 GJ Massive Ordnance Air Blast bomb
6.0 15 kilotons 63 TJ Approximate yield of the Little Boy atomic bomb dropped on Hiroshima (~16 kt)
7.9 10.7 megatons 45 PJ Tunguska event
8.35 50 megatons 210 PJ Tsar Bomba—Largest thermonuclear weapon ever tested. Most of the energy was dissipated in the atmosphere. The seismic shock was estimated at 5.0–5.2[23]
9.15 800 megatons 3.3 EJ Toba eruption 75,000 years ago; among the largest known volcanic events.[24]
13.0 100 teratons 420 ZJ Yucatán Peninsula impact (creating Chicxulub crater) 65 Ma ago (108 megatons; over 4×1029 ergs = 400 ZJ).[25][26][27][28][29]

https://en.wikipedia.org/wiki/Richter_magnitude_scale

Limousine liberal

From Wikipedia, the free encyclopedia

Limousine liberal and latte liberal are pejorative Americanpolitical terms used to illustrate hypocrisy by a political liberal of upper class or upper middle classstatus; including calls for the use of mass transit while frequently using limousines or private jets,[1] claiming environmental consciousness but driving fuel inefficientsports cars or SUVs, attacking income inequality while being wealthy themselves, or ostensibly supporting public education while actually sending their children to private schools.[2]

“Limousine liberal” is also a reference to celebrities who use their fame to influence others into agreeing with their political and societal points of view. Such celebrities’ critics (including proponents of the pejorative) assert that their wealth and status keeps them out of touch with the American middle and lower middle classes they purport to support, and that they are typically blind to this disconnect.

Formation and early use

Procaccino campaign

DemocraticNew York Citymayoral hopeful Mario Procaccino coined the term “limousine liberal” to describe incumbent RepublicanMayorJohn Lindsay and his wealthy Manhattan backers during a heated 1969 campaign.

It was a populist and producerist epithet, carrying an implicit accusation that the people it described were insulated from all negative consequences of their programs purported to benefit the poor, and that the costs and consequences of such programs would be borne in the main by working class or lower middle classpeople who were not so poor as to be beneficiaries themselves. In particular, Procaccino criticized Lindsay for favoring unemployed blacks over working-class ethnic whites.[3]

One Procaccino campaign memo attacked “rich super-assimilated people who live on Fifth Avenue and maintain some choice mansions outside the city and have no feeling for the small middle class shopkeeper, home owner, etc. They preach the politics of confrontation and condone violent upheaval in society because they are not touched by it and are protected by their courtiers“.[4]The Independent later stated that “Lindsay came across as all style and no substance, a ‘limousine liberal’ who knew nothing of the concerns of the same ‘Silent Majority‘ that was carrying Richard Nixon to the White House at the very same time.”[5]

Later use

In the 1970s, the term was applied to wealthy liberal supporters of open-housing and forced school busing who didn’t make use of public schooling.[6] In Boston,Massachusetts, supporters of busing, such as Senator Ted Kennedy, sent their children to private schools or lived in affluent suburbs. To some South Bostonresidents, Kennedy’s support of a plan that “integrated” their children with blacks and his apparent unwillingness to do the same with his own children, was hypocrisy.[7]

By the late 1990s and early 21st century, the term has also come to be applied to those who support environmentalist or “green” goals, such as mass transit, yet drive large SUVs or literally have a limousine and driver. The Weekly Standard applied the term to Rep. Sheila Jackson Lee (D-TX 18) for being “routinely chauffeured the one short block to work–in a government car, by a member of her staff, at the taxpayers’ expense.”[8] The term was also used disparagingly in a 2004 episode of Law & Order by Fred Thompson‘s character, Arthur Branch, to criticize the politics and beliefs of his more liberal colleague, Serena Southerlyn.South Parks creators Trey Parker and Matt Stone poked fun at the tendency of some liberals to be more concerned with image than actually helping the earth in the episode “Smug Alert!

The New York Observer applied the term to 2008 Democratic presidential candidate John Edwards for paying $400 for a haircut and, according to the newspaper, “lectures about poverty while living in gated opulence”.[9]

In 2009, the term was applied by many commentators to former Senate Majority Leader and then-Obama cabinet appointee Tom Daschle for failing to pay back taxes and interest on the use of a limousine service.[10][11]

The term has often been applied to documentary filmmaker Michael Moore over the years by both critics on the left and right due to his habit of traveling around New York City in a limousine.[12][13]

Al Gore is often called a limousine liberal by his critics for his use of private jet planes[14] and SUVs,[15] while giving speeches calling for reductions in greenhouse gas emissions.[16] In the May 16, 2007 edition of TIME magazine, the term was used in the allegation that that “His (Gore’s) Tennessee mansion consumes 20 times the electricity used by the average American home”[17]

“Lexus liberal” is a variant on the term, used to describe an upper-middle class individual who supports the same ideas of the limousine liberals, but is still out-of-touch with the actual poor they purport to feel for. The term “Lexus” is used as these liberals are wealthy enough to afford a luxury car or high-end vehicle, such as the Lexus.

See also

References

  1. Jump up^ Time . “Limousine Liberal Hypocrisy” by Charles Krauthammer. Published March 16, 2007.
  2. Jump up^ NPR
  3. Jump up^ The New York Times. “Mayoral Follies, The 1969 Edition “ Published January 25, 1998.
  4. Jump up^ The Ungovernable City: John Lindsay and His Struggle to Save New York by Vincent J. Cannato, page 428.
  5. Jump up^ The Independent. “Obituary: John Lindsay “.Written December 22, 2000 by Rupert Cornwell.
  6. Jump up^ “A liberal interpretation: The current definition of right- and left-“ by Geoffrey Nunberg. Chicago Sun-Times. Published July 30, 2006.
  7. Jump up^ News/Features |
  8. Jump up^ Sheila Jackson Lee, Limousine Liberal
  9. Jump up^ Is Edwards An Easy Mark? | The New York Observer
  10. Jump up^ “The Post and Courier | Charleston SC, News, Sports, Entertainment”. Charleston.net. 2013-05-16. Retrieved 2013-06-04.
  11. Jump up^ Hart, Ron (February 8, 2009). “Future generations will pay for our mistakes”. Newsherald.com. Archived from the original on February 17, 2009. RetrievedJune 4, 2013.
  12. Jump up^ Business Insider: The REAL Fun Was At The Michael Moore Afterparty
  13. Jump up^ Newsmax: Michael Moore: The Leni Riefenstahl of the Left
  14. Jump up^ “Articles – Al Gore and the Limits of Recycling”. RealClearPolitics. 2006-06-02. Retrieved 2013-06-04.
  15. Jump up^ Malkin, Michelle (2008-07-17). “Limousine liberal video of the day: Gore and his gas-guzzling fans exposed!; Update: What global warming consensus? «”. Michelle Malkin. Retrieved 2013-06-04.
  16. Jump up^ Al Gore (speaker) (2008). A Generational Challenge to Repower America. Retrieved 2013-03-27.
  17. Jump up^ Krauthammer, Charles (2007-03-16). “Limousine Liberal Hypocrisy”. TIME. Retrieved 2013-06-04.

https://en.wikipedia.org/wiki/Limousine_liberal

The Pronk Pops Show Podcasts Portfolio

Listen To Pronk Pops Podcast or Download Shows 651-659

Listen To Pronk Pops Podcast or Download Shows 644-650

Listen To Pronk Pops Podcast or Download Shows 637-643

Listen To Pronk Pops Podcast or Download Shows 629-636

Listen To Pronk Pops Podcast or Download Shows 617-628

Listen To Pronk Pops Podcast or Download Shows 608-616

Listen To Pronk Pops Podcast or Download Shows 599-607

Listen To Pronk Pops Podcast or Download Shows 590-598

Listen To Pronk Pops Podcast or Download Shows 585- 589

Listen To Pronk Pops Podcast or Download Shows 575-584

Listen To Pronk Pops Podcast or Download Shows 565-574

Listen To Pronk Pops Podcast or Download Shows 556-564

Listen To Pronk Pops Podcast or Download Shows 546-555

Listen To Pronk Pops Podcast or Download Shows 538-545

Listen To Pronk Pops Podcast or Download Shows 532-537

Listen To Pronk Pops Podcast or Download Shows 526-531

Listen To Pronk Pops Podcast or Download Shows 519-525

Listen To Pronk Pops Podcast or Download Shows 510-518

Listen To Pronk Pops Podcast or Download Shows 500-509

Listen To Pronk Pops Podcast or Download Shows 490-499

Listen To Pronk Pops Podcast or Download Shows 480-489

Listen To Pronk Pops Podcast or Download Shows 473-479

Listen To Pronk Pops Podcast or Download Shows 464-472

Listen To Pronk Pops Podcast or Download Shows 455-463

Listen To Pronk Pops Podcast or Download Shows 447-454

Listen To Pronk Pops Podcast or Download Shows 439-446

Listen To Pronk Pops Podcast or Download Shows 431-438

Listen To Pronk Pops Podcast or Download Shows 422-430

Listen To Pronk Pops Podcast or Download Shows 414-421

Listen To Pronk Pops Podcast or Download Shows 408-413

Listen To Pronk Pops Podcast or Download Shows 400-407

Listen To Pronk Pops Podcast or Download Shows 391-399

Listen To Pronk Pops Podcast or Download Shows 383-390

Listen To Pronk Pops Podcast or Download Shows 376-382

Listen To Pronk Pops Podcast or Download Shows 369-375

Listen To Pronk Pops Podcast or Download Shows 360-368

Listen To Pronk Pops Podcast or Download Shows 354-359

Listen To Pronk Pops Podcast or Download Shows 346-353

Listen To Pronk Pops Podcast or Download Shows 338-345

Listen To Pronk Pops Podcast or Download Shows 328-337

Listen To Pronk Pops Podcast or Download Shows 319-327

Listen To Pronk Pops Podcast or Download Shows 307-318

Listen To Pronk Pops Podcast or Download Shows 296-306

Listen To Pronk Pops Podcast or Download Shows 287-295

Listen To Pronk Pops Podcast or Download Shows 277-286

Listen To Pronk Pops Podcast or Download Shows 264-276

Listen To Pronk Pops Podcast or Download Shows 250-263

Listen To Pronk Pops Podcast or Download Shows 236-249

Listen To Pronk Pops Podcast or Download Shows 222-235

Listen To Pronk Pops Podcast or Download Shows 211-221

Listen To Pronk Pops Podcast or Download Shows 202-210

Listen To Pronk Pops Podcast or Download Shows 194-201

Listen To Pronk Pops Podcast or Download Shows 184-193

Listen To Pronk Pops Podcast or Download Shows 174-183

Listen To Pronk Pops Podcast or Download Shows 165-173

Listen To Pronk Pops Podcast or Download Shows 158-164

Listen To Pronk Pops Podcast or Download Shows151-157

Listen To Pronk Pops Podcast or Download Shows 143-150

Listen To Pronk Pops Podcast or Download Shows 135-142

Listen To Pronk Pops Podcast or Download Shows 131-134

Listen To Pronk Pops Podcast or Download Shows 124-130

Listen To Pronk Pops Podcast or Download Shows 121-123

Listen To Pronk Pops Podcast or Download Shows 118-120

Listen To Pronk Pops Podcast or Download Shows 113 -117

Listen To Pronk Pops Podcast or Download Show 112

Listen To Pronk Pops Podcast or Download Shows 108-111

Listen To Pronk Pops Podcast or Download Shows 106-108

Listen To Pronk Pops Podcast or Download Shows 104-105

Listen To Pronk Pops Podcast or Download Shows 101-103

Listen To Pronk Pops Podcast or Download Shows 98-100

Listen To Pronk Pops Podcast or Download Shows 94-97

Listen To Pronk Pops Podcast or Download Show 93

Listen To Pronk Pops Podcast or Download Show 92

Listen To Pronk Pops Podcast or Download Show 91

Listen To Pronk Pops Podcast or Download Shows 88-90

Listen To Pronk Pops Podcast or Download Shows 84-87

Listen To Pronk Pops Podcast or Download Shows 79-83

Listen To Pronk Pops Podcast or Download Shows 74-78

Listen To Pronk Pops Podcast or Download Shows 71-73

Listen To Pronk Pops Podcast or Download Shows 68-70

Listen To Pronk Pops Podcast or Download Shows 65-67

Listen To Pronk Pops Podcast or Download Shows 62-64

Listen To Pronk Pops Podcast or Download Shows 58-61

Listen To Pronk Pops Podcast or Download Shows 55-57

Listen To Pronk Pops Podcast or Download Shows 52-54

Listen To Pronk Pops Podcast or Download Shows 49-51

Listen To Pronk Pops Podcast or Download Shows 45-48

Listen To Pronk Pops Podcast or Download Shows 41-44

Listen To Pronk Pops Podcast or Download Shows 38-40

Listen To Pronk Pops Podcast or Download Shows 34-37

Listen To Pronk Pops Podcast or Download Shows 30-33

Listen To Pronk Pops Podcast or Download Shows 27-29

Listen To Pronk Pops Podcast or Download Shows 17-26

Listen To Pronk Pops Podcast or Download Shows 16-22

Listen To Pronk Pops Podcast or Download Shows 10-15

Listen To Pronk Pops Podcast or Download Shows 01-09

 

Read Full Post | Make a Comment ( None so far )

The Pronk Pops Show 630, February 24, 2016, Story 1: Rubio Repeating Republican Rat Rants — Enforce The Law — A Reasonable Response — Remove and Deport The 30-50 Million Illegal Aliens In The United States — It Is The Law! — Arrest The Employers of The Illegal Aliens — Heading For The Last Roundup — Videos

Posted on February 24, 2016. Filed under: 2016 Presidential Campaign, 2016 Presidential Candidates, Blogroll, Breaking News, Budgetary Policy, Communications, Corruption, Countries, Donald J. Trump, Donald Trump, Economics, Education, Fiscal Policy, Marco Rubio, Monetary Policy, Taxation, Taxes, Ted Cruz, Ted Cruz, United States Constitution, United States of America, Videos, Wall Street Journal, Wealth, Wisdom | Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , |

Project_1

The Pronk Pops Show Podcasts

Pronk Pops Show 630: February 24, 2016

Pronk Pops Show 629: February 22, 2016

Pronk Pops Show 628: February 19, 2016

Pronk Pops Show 627: February 18, 2016

Pronk Pops Show 626: February 17, 2016

Pronk Pops Show 625: February 16, 2016

Pronk Pops Show 624: February 15, 2016

Pronk Pops Show 623: February 12, 2016

Pronk Pops Show 622: February 11, 2016

Pronk Pops Show 621: February 10, 2016

Pronk Pops Show 620: February 9, 2016

Pronk Pops Show 619: February 8, 2016

Pronk Pops Show 618: February 5, 2016

Pronk Pops Show 617: February 4, 2016

Pronk Pops Show 616: February 3, 2016

Pronk Pops Show 615: February 1, 2016

Pronk Pops Show 614: January 29, 2016

Pronk Pops Show 613: January 28, 2016

Pronk Pops Show 612: January 27, 2016

Pronk Pops Show 611: January 26, 2016

Pronk Pops Show 610: January 25, 2016

Pronk Pops Show 609: January 22, 2016

Pronk Pops Show 608: January 21, 2016

Pronk Pops Show 607: January 20, 2016

Pronk Pops Show 606: January 19, 2016

Pronk Pops Show 605: January 15, 2015

Pronk Pops Show 604: January 14, 2016

Pronk Pops Show 603: January 13, 2016

Pronk Pops Show 602: January 12, 2016

Pronk Pops Show 601: January 11, 2015

Pronk Pops Show 600: January 8, 2016

Pronk Pops Show 599: January 6, 2016

Pronk Pops Show 598: January 5, 2016

Pronk Pops Show 597: December 21, 2015

Pronk Pops Show 596: December 18, 2015

Pronk Pops Show 595: December 17, 2015

Pronk Pops Show 594: December 16, 2015

Pronk Pops Show 593: December 15, 2015

Pronk Pops Show 592: December 14, 2015 

Pronk Pops Show 591: December 11, 2015 

Pronk Pops Show 590: December 10, 2015 

Pronk Pops Show 589: December 9, 2015 

Pronk Pops Show 588: December 7, 2015 

Pronk Pops Show 587: December 4, 2015 

Pronk Pops Show 586: December 3, 2015 

Pronk Pops Show 585: December 2, 2015 

Pronk Pops Show 584: December 1, 2015 

Pronk Pops Show 583: November 30, 2015 

Pronk Pops Show 582: November 25, 2015 

Pronk Pops Show 581: November 24, 2015 

Pronk Pops Show 580: November 23, 2015  

Pronk Pops Show 579: November 20, 2015 

Pronk Pops Show 578: November 19, 2015 

Pronk Pops Show 577: November 18, 2015 

Pronk Pops Show 576: November 17, 2015

Pronk Pops Show 575: November 16, 2015  (more…)

Read Full Post | Make a Comment ( None so far )

The Pronk Pops Show 607, January 20, 2016, Story 1: Tea Party Patriot Palin Endorses Donald J. Trump — Make America Great Again — Stump for Trump — George Carlin – The big club — You Not In It! — Videos

Posted on January 20, 2016. Filed under: 2016 Presidential Campaign, 2016 Presidential Candidates, American History, Ben Carson, Ben Carson, Bernie Sanders, Blogroll, Breaking News, Chris Christie, Communications, Countries, Defense Spending, Donald J. Trump, Donald Trump, Donald Trump, Education, Elections, Employment, Federal Government, Foreign Policy, Government, Government Spending, Hillary Clinton, Hillary Clinton, Hillary Clinton, History, Illegal Immigration, Jeb Bush, Marco Rubio, Medicare, National Security Agency, News, Obama, Philosophy, Photos, Politics, Polls, President Barack Obama, Progressives, Radio, Rand Paul, Rand Paul, Raymond Thomas Pronk, Regulation, Scandals, Second Amendment, Security, Social Security, Success, Taxation, Taxes, Ted Cruz, Ted Cruz, Terror, Terrorism, Unemployment, United States Constitution, United States of America, Videos, Violence, War, Wealth, Wisdom | Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , |

Project_1

The Pronk Pops Show Podcasts

Pronk Pops Show 607: January 20, 2015

Pronk Pops Show 606: January 19, 2015

Pronk Pops Show 605: January 15, 2015

Pronk Pops Show 604: January 14, 2015

Pronk Pops Show 603: January 13, 2015

Pronk Pops Show 602: January 12, 2015

Pronk Pops Show 601: January 11, 2015

Pronk Pops Show 600: January 8, 2015

Pronk Pops Show 599: January 6, 2015

Pronk Pops Show 598: January 5, 2015

Pronk Pops Show 597: December 21, 2015

Pronk Pops Show 596: December 18, 2015

Pronk Pops Show 595: December 17, 2015

Pronk Pops Show 594: December 16, 2015

Pronk Pops Show 593: December 15, 2015

Pronk Pops Show 592: December 14, 2015 

Pronk Pops Show 591: December 11, 2015 

Pronk Pops Show 590: December 10, 2015 

Pronk Pops Show 589: December 9, 2015 

Pronk Pops Show 588: December 7, 2015 

Pronk Pops Show 587: December 4, 2015 

Pronk Pops Show 586: December 3, 2015 

Pronk Pops Show 585: December 2, 2015 

Pronk Pops Show 584: December 1, 2015 

Pronk Pops Show 583: November 30, 2015 

Pronk Pops Show 582: November 25, 2015 

Pronk Pops Show 581: November 24, 2015 

Pronk Pops Show 580: November 23, 2015  

Pronk Pops Show 579: November 20, 2015 

Pronk Pops Show 578: November 19, 2015 

Pronk Pops Show 577: November 18, 2015 

Pronk Pops Show 576: November 17, 2015

Pronk Pops Show 575: November 16, 2015  (more…)

Read Full Post | Make a Comment ( None so far )

The Pronk Pops Show 570, November 6, 2015, Story 1: Mainstream Media Mob Electronic Lynching of Dr. Ben Carson — Attempted Assassination Fails — Limbaugh Unmasked The Perpetrators — The Conservative Right Strikes Back — Videos

Posted on November 6, 2015. Filed under: 2016 Presidential Campaign, 2016 Presidential Candidates, American History, Ben Carson, Blogroll, Books, Breaking News, Communications, Constitutional Law, Culture, Education, Employment, Federal Government, Government, Government Spending, Health, Health Care, Health Care Insurance, Hillary Clinton, History, Independence, Insurance, Investments, Language, Law, Media, News, Photos, Politics, Polls, Raymond Thomas Pronk, Social Security, Taxation, Taxes, Unemployment, Videos, Violence, War, Wealth, Welfare Spending, Wisdom | Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , |

Project_1

The Pronk Pops Show Podcasts

Pronk Pops Show 570: November 6, 2015 

Pronk Pops Show 569: November 5, 2015 

Pronk Pops Show 568: November 4, 2015 

Pronk Pops Show 567: November 3, 2015 

Pronk Pops Show 566: November 2, 2015

Pronk Pops Show 565: October 30, 2015

Pronk Pops Show 564: October 29, 2015 

Pronk Pops Show 563: October 28, 2015 

Pronk Pops Show 562: October 27, 2015 

Pronk Pops Show 561: October 26, 2015 

Pronk Pops Show 560: October 23, 2015

Pronk Pops Show 559: October 22, 2015 

Pronk Pops Show 558: October 21, 2015

Pronk Pops Show 557: October 20, 2015 

Pronk Pops Show 556: October 19, 2015

Pronk Pops Show 555: October 16, 2015

Pronk Pops Show 554: October 15, 2015 

Pronk Pops Show 553: October 14, 2015

Pronk Pops Show 552: October 13, 2015 

Pronk Pops Show 551: October 12, 2015 

Pronk Pops Show 550: October 9, 2015 

Pronk Pops Show 549: October 8, 2015 

Pronk Pops Show 548: October 7, 2015 

Pronk Pops Show 547: October 5, 2015

Pronk Pops Show 546: October 2, 2015 

Pronk Pops Show 545: October 1, 2015 

Pronk Pops Show 544: September 30, 2015 

Pronk Pops Show 543: September 29, 2015 

Pronk Pops Show 542: September 28, 2015 

Pronk Pops Show 541: September 25, 2015 

Pronk Pops Show 540: September 24, 2015 

Pronk Pops Show 539: September 23, 2015 

Pronk Pops Show 538: September 22, 2015 

Pronk Pops Show 537: September 21, 2015 

Pronk Pops Show 536: September 18, 2015 

Pronk Pops Show 535: September 17, 2015 

Pronk Pops Show 534: September 16, 2015 

Pronk Pops Show 533: September 15, 2015  

Pronk Pops Show 532: September 14, 2015 

Pronk Pops Show 531: September 11, 2015

Pronk Pops Show 530: September 10, 2015 

Pronk Pops Show 529: September 9, 2015 

Pronk Pops Show 528: September 8, 2015 

Pronk Pops Show 527: September 4, 2015 

Pronk Pops Show 526: September 3, 2015  

Pronk Pops Show 525: September 2, 2015 

Pronk Pops Show 524: August 31, 2015  

Pronk Pops Show 523: August 27, 2015  

Pronk Pops Show 522: August 26, 2015 

Pronk Pops Show 521: August 25, 2015 

Pronk Pops Show 520: August 24, 2015 

Pronk Pops Show 519: August 21, 2015 

Pronk Pops Show 518: August 20, 2015  

Pronk Pops Show 517: August 19, 2015 

Pronk Pops Show 516: August 18, 2015

Pronk Pops Show 515: August 17, 2015

Pronk Pops Show 514: August 14, 2015

Pronk Pops Show 513: August 13, 2015

Pronk Pops Show 512: August 12, 2015

Pronk Pops Show 511: August 11, 2015

Pronk Pops Show 510: August 10, 2015

Story 1: Mainstream Media Mob Electronic Lynching of Dr. Ben Carson — Attempted Assassination Fails — Limbaugh Unmasked The Perpetrators — The Conservative Right Strikes Back — Videos

a lie

Ben Carson Thanks ‘Biased’ Media After Raising $3.5 Million In One Week

Ben Carson On Biased Media and Trump This Week FULL Interview

Dr. Ben Carson Talks West Point With Bill O’Reilly

Scrutinizing Ben Carson – Donald Trump – O’Reilly Talking points

Ben Carson Holds Press Conference On West Point Scholarship False Claims (11-6-15)

November 6, 2015: GOP Presidential candidate Dr. Ben Carson addressed the media this evening on the alleged false claims he made in his book, “Gifted Hands”, including that he received a full scholarship offer to West Point and that he allegedly tried to stab a friend and hit his mother with a hammer.

Ben Carson strikes back at the press

Glenn Beck Exposes Obama’s Fraudulent History and Radicalized Beliefs

Report Questions Ben Carson’s West Point Story, Campaign Pushes Back – Cavuto

Ben Carson: “I was offered a full scholarship to West Point” (Oct 9, 2015) | Charlie Rose

Ben Carson thinks Egypt’s pyramids were built by Joseph

Carson: Egypt’s Pyramids Built To Store Grain

Republican presidential candidate Ben Carson stood by his belief that Egypt’s great pyramids were built by the Biblical figure Joseph to store grain, an assertion dismissed by experts. (Nov. 5)

Ben Carson: How I Got into Politics (Oct. 9, 2015) | Charlie Rose

Dr. Benjamin Carson’s Amazing Speech at the National Prayer Breakfast with Obama Present

Fox News: Ben Carson Admits Story About Getting Into West Point Was NOT TRUE

Carson Campaign: Politico Story About West Point Acceptance Not True

The Politico, Lies about Ben Carson

Politico: Carson admits fabricating scholarship story

audio 11/6/15 RUSH LIMBAUGH: POLITICO & MEDIA TRYING TO TAKEDOWN BEN CARSON

Hillary’s Vicious Media Tools Now Getting Brutal On Ben Carson (Limbaugh)

Rush Limbaugh – November 6, 2015 Full Podcast

Rush Limbaugh Explains Why Trump And Carson Are Circling The Top Of The Tier

Rush Limbaugh: Trump is driving the GOP establishment insane

Rush Limbaugh: Only Trump or Carson can stop GOP donor agenda

Dr. Ben Carson’s response to a 10-year old boy-Amazing!

Dr. Carson’s amazing speech at CPAC 2014

INCREDIBLE: DR. BEN CARSON STOPS BY “THE VIEW” AND DEMOLISHES LIBERALISM

RUSH: Dr. Ben Carson Has Everyone In Democrat Party Scared To Death

RUSH LIMBAUGH NAILS IT ABOUT BEN CARSON

“There is not a single person in the media today that could wear Dr. Benjamin Carson’s uniform, whatever uniform he puts on in a day, a business suit, if it’s surgical scrubs, there’s not a single member of the media that could do anything close to what Ben Carson has done with his life. ”

Ben Carson: Debate audience picked up on media bias

Ben Carson on CNN: Full interview, part 1

Ben Carson on CNN: Full interview, part 2

Ben Carson on CNN: Full interview, part 3

Mark Levin – Obama the “Red Diaper Baby”

Unearthed: Obama Admits Mentor Was Communist Agitator Frank Marshall Davis

The Untold Story of Barack Obama’s Mentor

(CNN) Andy Martin’s discovery that Obama’s father is communist Frank Marshall Davis

Paul Kengor & Glenn Beck “The Communist” on GBTV Frank Marshall Davis Barack Obama’s Mentor

Van Jones: ‘Ben Carson Bewilders, I Think, Most Black Democrats’

Hillary’s Vicious Media Tools Now Getting Brutal On Ben Carson (Limbaugh)

audio 11/6/15 BEN CARSON TO CNN, “ASK HILLARY THE SAME QUESTIONS”

Poll: Ben Carson is 9 points ahead of Hillary! (Limbaugh)

Psychological Warfare, Credibility

Enemy of the State (1998)

Peggy Lee — Is That All There Is? 1969

Latest Polls

Friday, November 6
Race/Topic   (Click to Sort) Poll Results Spread
Iowa Republican Presidential Caucus CNN/ORC Carson 23, Trump 25, Rubio 13, Cruz 11, Bush 5, Fiorina 4, Jindal 4, Huckabee 2, Christie 3, Kasich 2, Paul 2, Santorum 0, Graham 2, Pataki 0 Trump +2
Iowa Democratic Presidential Caucus CNN/ORC Clinton 55, Sanders 37, O’Malley 3 Clinton +18
President Obama Job Approval Gallup Approve 49, Disapprove 47 Approve +2
President Obama Job Approval Rasmussen Reports Approve 45, Disapprove 54 Disapprove +9
Thursday, November 5
Race/Topic   (Click to Sort) Poll Results Spread
North Carolina Republican Presidential Primary Elon University Carson 31, Trump 19, Rubio 10, Cruz 10, Bush 5, Fiorina 3, Huckabee 3, Kasich 1, Christie 2, Paul 2, Santorum 0, Graham 1, Jindal 0, Walker, Perry Carson +12
North Carolina Democratic Presidential Primary Elon University Clinton 57, Sanders 24, O’Malley 3 Clinton +33
North Carolina: Trump vs. Clinton Elon University Clinton 50, Trump 40 Clinton +10
North Carolina: Carson vs. Clinton Elon University Carson 48, Clinton 44 Carson +4
North Carolina: Rubio vs. Clinton Elon University Rubio 46, Clinton 45 Rubio +1
North Carolina: Bush vs. Clinton Elon University Clinton 47, Bush 43 Clinton +4
North Carolina: Fiorina vs. Clinton Elon University Clinton 48, Fiorina 42 Clinton +6
Michigan: Trump vs. Clinton WXYZ-TV/Detroit Free Press Clinton 46, Trump 38 Clinton +8
Michigan: Carson vs. Clinton WXYZ-TV/Detroit Free Press Carson 46, Clinton 40 Carson +6
Michigan: Trump vs. Sanders WXYZ-TV/Detroit Free Press Sanders 48, Trump 36 Sanders +12
Michigan: Carson vs. Sanders WXYZ-TV/Detroit Free Press Carson 45, Sanders 36 Carson +9
President Obama Job Approval Quinnipiac Approve 42, Disapprove 54 Disapprove +12
President Obama Job Approval Monmouth Approve 44, Disapprove 48 Disapprove +4
President Obama Job Approval Reuters/Ipsos Approve 42, Disapprove 52 Disapprove +10
Congressional Job Approval Monmouth Approve 13, Disapprove 77 Disapprove +64
Direction of Country Monmouth Right Direction 21, Wrong Track 68 Wrong Track +47
Direction of Country Reuters/Ipsos Right Direction 27, Wrong Track 58 Wrong Track +31

LIMBAUGH: CARSON IS VICTIM OF ‘ELECTRONIC LYNCHING’

Media ‘telling an outright lie’ in ‘an assassination attempt’

Talk-radio kingpin Rush Limbaugh shredded Politico and accused the news site and mainstream media of coordinating an “assassination attempt” against Dr. Ben Carson on Friday.

In fact, Limbaugh went even further, calling the onslaught of attacks an “electronic lynching being conducted against the Republican African-American candidate by a majority-white mainstream American liberal media.”

In a damning accusation Friday, Politico claimed Carson’s campaign “admitted he did not tell the truth” about having been accepted into the U.S. Military Academy at West Point.

A Carson spokesperson made a response to an inquiry by Politico into the veracity of a story in the surgeon’s autobiography, “Gifted Hands,” that the then-17-year-old was offered a full scholarship after a meeting in 1969 with Gen. William Westmoreland in 1969.

Dr. Ben Carson’s inspiring manifesto, “America the Beautiful: Rediscovering What Made This Nation Great” – $4.95 today only at the WND Superstore!

Politico reported West Point had no record of either Carson’s application or admission.

However, a Carson spokesman told the Daily Caller on Friday, “The Politico story is an outright lie.”

Doug Watts said, “The campaign never admitted to anything,” and Carson “[N]ever said he was admitted or even applied” to West Point.

“I want to show you how this works. I want to share with you some headlines that have run during the course of this program,” Limbaugh said, blasting Politico as a “liar,” and listing the following media reports Friday:

Several of the news outlets – including Politico – amended their original headlines with the Carson campaign called the Politico story “an outright lie.”

In a press conference late Friday, Carson ripped into combative reporters:

If you look at one of the websites that West Point has today, it says government offer for full scholarship to West Point. So they use that very language themselves. So almost 50 years ago, they may have been using that language as well.

They were very impressed with what I had done. I had become the city executive officer in less time than anybody else had ever done that. They were saying, “You would be a tremendous addition to the military, and we can get you into West Point with a full scholarship. I simply said, “I want to be a doctor. I really appreciate it. I’m very flattered.” And I moved on. So it didn’t go on any further than that. …

I think what it shows, and what these kinds of things show, is that there is a desperation on behalf of some to try to find a way to tarnish me because they have been looking through everything. They have been talking to everybody I’ve ever known, everybody I’ve ever seen, [saying], “There’s got to be a scandal. There’s got to be something. He’s having an affair, there’s gotta be something.” They are getting desperate. So next week it’ll be my kindergarten teacher who says that I peed in my pants. I mean, this is just ridiculous. But it’s OK because I totally expect it.

Dr. Carson explained that, as the top ROTC student in Detroit 50 years ago, he was invited to “a number of events because of my position.” In that role, he was invited to meet Gen. Westmoreland.

“That was also a time, as I recall, that several of the high brass told me that I would be somebody that they would be interested in in the military. It was an offer to me. I interpreted it as an offer. … They told me this was available to me because of my accomplishments and that they would be delighted for me to do it. And I told them immediately that my intention was to become a physician. It always has been, and I was very honored but I would not be pursuing that.”

Carson said he “made it clear” in his book that he, in fact, only applied to one college because he had just enough money for one application fee.

When relentlessly pressed about his childhood years, Carson told reporters, “My prediction is that all of you guys trying to pile on is actually going to help me, because, when I go out to these book signings and I see these thousands of people, they say, ‘Don’t let the media get you down. Don’t let them disturb you. Please continue to fight for us.’ They understand that this is a witch hunt. …

“Let me just say one thing. I do not remember this level of scrutiny for one President Barack Obama when he was running. In fact, I remember just the opposite. I remember people just [saying], ‘Oh well, we won’t really talk about that. We won’t talk about that relationship. Well, Frank Marshall Davis, we don’t want to talk about that. Bernardine Dohrn, Bill Ayers, we don’t really know him. You know, all the things that Jeremiah Wright was saying, oh, not a big problem.’

“[Obama] goes to Occidental College, doesn’t do all that well, and somehow ends up at Columbia University. His records are sealed. Why are his records sealed? Why are you guys not interested in why his records are sealed? Why are you not interested in that? Let me ask you that. Can somebody tell me why? … Now you’re saying that something that happened with the words ‘a scholarship was offered’ was the big deal, but the president of the United States, his academic records being sealed is not? Tell me how there’s equivalence there.”

Carson told reporters he wouldn’t “sit back and let you be completely unfair without letting the American people know what’s going on.”

He added, “And the American people are waking up to your games.”
 http://www.wnd.com/2015/11/limbaugh-carson-is-victim-of-electronic-lynching/#sXtuGSojLqHGJlxX.99

Read more at http://www.wnd.com/2015/11/limbaugh-carson-is-victim-of-electronic-lynching/#sXtuGSojLqHGJlxX.99

New front-runner Ben Carson faces closer scrutiny of his life story

By David Weigel and David A. Fahrenthold

Republican presidential candidate Ben Carson — now making the transition from living legend to scrutinized candidate — faced new questions Friday about the way he tells his powerful life story.

For years, Carson has said he was offered a “full scholarship” to the U.S. Military Academy when he was a high-achieving high school Army ROTC cadet in the late 1960s. But Carson never applied to West Point, was never accepted and never received a formal scholarship offer. In fact, West Point does not offer scholarships; all cadets attend free.

The story was first reported Friday by Politico. Carson responded to the resulting controversy by saying that when he spoke of an “offer,” he referred to informal, verbal statements of encouragement from military leaders he met through the ROTC, the Reserve Officers’ Training Corps .

“I was told that because of my accomplishments, they would be able to manage to get me into West Point and that I wouldn’t have to pay anything,” Carson said on the Christian Broadcasting Network. He said he decided not to apply and went to Yale University instead to pursue medicine. “There was no application process [at West Point]. I never even started down that path,” Carson said.

Carson’s campaign cast the episode as new evidence of persecution of the candidate by the news media. Tension between Carson and the media came to a boil Friday night in Florida, where at a combative news conference the candidate asked why President Obama had not been subjected to such scrutiny.

 “The words ‘a scholarship was offered’ were a big deal, but the president of the United States’ academic records being sealed is not?” he said.

The original Politico report declared that Carson had “fabricated” a story about “his application and acceptance” at West Point. It also claimed that the candidate had “admitted” the fabrication.

Carson’s campaign vehemently denied those statements.

The Politico story seemed to mischaracterize a small but key detail in the way Carson has told the story. In many cases, Carson implied only that he received a formal offer from West Point. He never said explicitly that he had been accepted or even that he had applied.

“It gives journalism a bad name,” said Armstrong Williams, Carson’s close friend and business manager. “It only fits into Dr. Carson’s narrative of a witch hunt” by the media.

By mid-afternoon, Politico posted a new version of its story that no longer included the wording that Carson had “fabricated” a part of his biography. Later in the day, the news site posted an editor’s note stating that the story should have made clear that Carson never claimed to have applied for admission to West Point.

“We continue to stand by the story,” Politico spokeswoman Lauren Edmonds said in a statement. “We updated it to reflect Ben Carson’s on the record response to the New York Times and other new details, which underscore the validity of our original reporting.”

As the day went on, conservative media voices chimed in to agree with Carson. “It’s almost like the Politico is the official leak machine for the Republican establishment,” Rush Limbaugh said on his syndicated radio show. Radio host and blogger Erick Erickson replaced an entire post about “the beginning of Ben Carson’s end” with one about a “demonstrably false” Politico report.

Carson, 64, achieved worldwide fame for his daring surgeries at Johns Hopkins Hospital in Baltimore and for his story of rising out of poverty in southwest Detroit. This week, as Carson has challenged Donald Trump for the lead in the Republican presidential primary contest, there has been a new focus on Carson’s personal beliefs and on the way he tells his life story.

First, the Web site BuzzFeed posted a 17-year-old video of a commencement speech in which Carson offers an alternative theory about why the ancient Egyptians built the pyramids. In Carson’s telling, they were not built to be tombs, as historians and archeologists say. Instead, they were built for grain storage, in keeping with the biblical story of Joseph, in which the patriarch counseled the pharaoh to store up grain for years of famine.

Carson told CBS News this week that he still believes that the pyramids were granaries, saying the proof was in sealed chambers inside the structures. “You would need that if you were trying to preserve grain for a long period of time,” he said.

Then, CNN sought to verify a key part of Carson’s life story: that, as a young man in Detroit, he had committed acts of violence, including smashing a boy’s nose with a thrown rock, attempting to stab a friend in the abdomen and threatening his own mother with a hammer during an argument.

CNN interviewed nine people who knew Carson during his childhood and who said that the violent incidents did not fit their recollections of him.

Carson said CNN did not speak with the right people. “I was generally a nice person,” he told the network. “It’s just that I had a very bad temper. So unless you were the victim of that temper, why would you know?”

It was an unusually odd situation: a presidential candidate insisting, in the face of skepticism, that he really did have a history of violence.

The part of Carson’s life at issue Friday — the “offer” he got, or did not get, from West Point — is a story that Carson has told repeatedly in books, interviews and speeches.

He tells it in the context of his rapid rise through high school Army ROTC, which ended with him as the top-ranking cadet in Detroit.

“I was offered a full scholarship to West Point,” Carson wrote in his 1990 memoir, “Gifted Hands.” “I didn’t refuse the scholarship outright, but I let them know that a military career wasn’t where I saw myself going. As overjoyed as I felt to be offered such a scholarship, I wasn’t really tempted. The scholarship would have obligated me to spend four years in military service after I finished college, precluding my chances to go on to medical school.”

In that account and others, Carson seems to rely on loose, broad definitions for the words “offer” and “scholarship.”

In fact, applicants to West Point must be sponsored by a member of Congress or the secretary of the Army. If accepted, they attend tuition-free: There are no “scholarships” at West Point beyond the benefits that all cadets get.

Doug Watts, a spokesman for Carson’s campaign, said Carson never completed the process for acceptance by West Point and never had an official sponsor. Indeed, in “Gifted Hands,” Carson makes clear that he actually applied only to one school: Yale.

“Each college required a ten-dollar non-returnable entrance fee sent with the application,” Carson wrote. “I had exactly ten dollars, so I could apply only to one.”

Still, his campaign spokesman said, it was proper to say Carson had an “offer” of a scholarship because military leaders had told him that his acceptance would be a sure thing.

“He was told by the ROTC commander that he could have an appointment,” Watts said. “Dr. Carson rejected the offer, did not apply or pursue admission. Had he done so, and been accepted, that would have been tantamount to a scholarship, the same that all cadets receive.”

In one of his books, Carson also made a similar claim about a scholarship offer from another school.

“The University of Michigan had offered me a scholarship, but I wanted to go farther from home,” he wrote in his 1999 book, “The Big Picture.”

A spokesman for the University of Michigan, Rick Fitzgerald, said he could not confirm that account. The university no longer has records from that time. Carson’s camp said the scenario was similar to that involving West Point: He had decided to apply elsewhere and never submitted an application.

https://www.washingtonpost.com/politics/newly-minted-frontrunner-ben-carson-faces-new-scrutiny-of-his-life-story/2015/11/06/8877e032-84b8-11e5-8ba6-cec48b74b2a7_story.html

Exclusive: Carson claimed West Point ‘scholarship’ but never applied

Republican hits POLITICO story, later admits to The New York Times he wasn’t offered aid.

11/06/15 11:29 AM EST

Updated 11/06/15 03:42 PM EST

Republican presidential candidate Ben Carson on Friday conceded that he never applied nor was granted admission to West Point and attempted to recast his previous claims of a full scholarship to the military academy — despite numerous public and written statements to the contrary over the last few decades.

West Point has occupied a central place in Carson’s personal story for years. According to a tale told in his book, “Gifted Hands,” the then-17 year old was introduced in 1969 to Gen. William Westmoreland, who had just ended his command of U.S. forces in Vietnam, and the two dined together. That meeting, according to Carson’s telling, was followed by the offer of a “full scholarship” to the military academy.

Story Continued Below

West Point, however, has no record of Carson applying, much less being extended admission.

“In 1969, those who would have completed the entire process would have received their acceptance letters from the Army Adjutant General,” said Theresa Brinkerhoff, a spokeswoman for the academy. She said West Point has no records that indicate Carson even began the application process. “If he chose to pursue (the application process), then we would have records indicating such,” she said.

When presented by POLITICO with these facts, Carson’s campaign conceded he never applied.

“Dr. Carson was the top ROTC student in the City of Detroit,” campaign manager Barry Bennett wrote in an email to POLITICO. “In that role he was invited to meet General Westmoreland. He believes it was at a banquet. He can’t remember with specificity their brief conversation but it centered around Dr. Carson’s performance as ROTC City Executive Officer.”

“He was introduced to folks from West Point by his ROTC Supervisors,” Bennett added. “They told him they could help him get an appointment based on his grades and performance in ROTC. He considered it but in the end did not seek admission.”

In an interview with The New York Times following the POLITICO story, Mr. Carson said: “I don’t remember all the specific details. Because I had done so extraordinarily well you know I was told that someone like me – they could get a scholarship to West Point. But I made it clear I was going to pursue a career in medicine.”

“It was, you know, an informal ‘with a record like yours we could easily get you a scholarship to West Point.’”

Carson would have needed to seek admission in order to receive an offer of free education from West Point. Also, according to West Point, there is no such thing as a “full scholarship” to the military academy, as Carson represented in his book.

An application to West Point begins with a nomination by a member of Congress or another prominent government or military official. After that, a rigorous vetting process begins. If offered admission, all costs are covered for all students; indeed there are no “full scholarships,” per se.

The statement from Carson’s campaign manager on Friday went on to say: “There are ‘Service Connected’ nominations for stellar High School ROTC appointments. Again he was the top ROTC student in Detroit. I would argue strongly that an Appointment is indeed an amazing full scholarship. Having ran several Congressional Offices I am very familiar with the Nomination process.

“Again though his Senior Commander was in touch with West Point and told Dr. Carson he could get in, Dr. Carson did not seek admission.”

Ben Carson has repeatedly claimed he was offered a full scholarship from West Point. He conveys the story in at least two other books, “You Have a Brain” and “Take the Risk.” Carson repeated his West Point claim as recently as Aug. 13, when he fielded questions from supporters on Facebook.

And in October, Carson shared the story with Charlie Rose: “I had a goal of achieving the office of city executive officer [in JROTC]. Well, no one had ever done that in that amount of time … Long story short, it worked, I did it. I was offered full scholarship to West Point, got to meet General Westmoreland, go to Congressional Medal dinners, but decided really my pathway would be medicine.”

The Carson campaign pushed back against POLTICO’s story after its publication, with Carson himself telling Christian Broadcasting Network’s “The Brody File” that the media “will go through all lengths trying to discredit me.” According to a tweet from the show, Carson said, of the mainstream media, “they’ll ask my kindergarten teacher, ‘did I ever wet my pants.’”

The concession from Carson’s campaign comes as serious questions about other points of fact in Carson’s personal narrative are questioned, including the seminal episode in which he claimed to have attempted to stab a close friend. Similarly, details have emerged that cast doubt on the nature of Carson’s encounter with one of the most prominent military men of that era.

The West Point spokeswoman said it certainly is possible Carson talked with Westmoreland, and perhaps the general even encouraged him to apply to West Point. However, she said, the general would have explained the benefits of a West Point education without guaranteeing him entry.

In “Gifted Hands,” Carson says he excelled in his ROTC program at Detroit’s Southwestern High School, earning the respect of his superiors — just a couple years after anger problems led him to try to murder a friend. He attained the rank of second lieutenant by his senior year of high school and became the student leader of the city’s ROTC programs.

In May of his senior year, he was chosen to march in the city’s Memorial Day parade.

“I felt so proud, my chest bursting with ribbons and braids of every kind. To make it more wonderful, we had important visitors that day. Two soldiers who had won the Congressional Medal of Honor in Viet Nam were present,” he wrote. “More exciting to me, General William Westmoreland (very prominent in the Viet Nam war) attended with an impressive entourage. Afterward, Sgt. Hunt” — his high school ROTC director — “introduced me to General Westmoreland, and I had dinner with him and the Congressional Medal winners. Later I was offered a full scholarship to West Point.”

But, according to records of Westmoreland’s schedule that were provided by the U.S. Army, the general did not visit Detroit around Memorial Day in 1969 or have dinner with Carson. In fact, the general’s records suggest he was in Washington that day and played tennis at 6:45 p.m.

There are, however, several reports of an event in February of that year, similar to the one Carson described. Then, Westmoreland was the featured guest at a 1,500-person banquet to celebrate Medal of Honor recipient Dwight Johnson. The event drew prominent guests, including the governor at the time, the mayor of Detroit, the president of Ford Motor Company and nine previous Medal of Honor awardees, according to an Associated Press account of the event.

Carson, a leader of the city’s ROTC program at the time, may have been among the invited guests at the $10-a-plate event.

Carson’s later retelling of the events in this period of his life downplays his meeting with Westmoreland and that event’s link to a West Point acceptance. In his January 2015 book, “You Have a Brain,” — a book geared toward teenagers — Carson again recalls his rapid rise through his high school ROTC program to become the top student officer in the city.

“That position allowed me the chance to meet four-star general William Westmoreland, who had commanded all American forces in Vietnam before being promoted to Army Chief of Staff at the Pentagon in Washington, D.C.,” he wrote. “I also represented the Junior ROTC at a dinner for Congressional Medal of Honor winners, marched at the front of Detroit’s Memorial Day parade as head of an ROTC contingent, and was offered a full scholarship to West Point.”

Carson has said he turned down the supposed offer of admission because he knew he wanted to be a doctor and attending West Point would have required four years of military service after graduation.

Cecil Murphey, who ghostwrote “Gifted Hands,” told POLITICO that his memory of Carson’s exchange with Westmoreland was hazy.

“My gut response is that it was not a private meeting, but there were others there,” he said in an email. “The general took a liking to Ben and opened doors.”

http://www.politico.com/story/2015/11/ben-carson-west-point-215598#ixzz3qkUVQcJd

Ben Carson admits he lied about West Point scholarship, insists stories about troubled childhood are true

BY MEG WAGNER

Ben Carson admitted Friday that he lied about earning a prestigious scholarship to West Point while controversy over the validity of his troubled kid-to-renowned doctor narrative reached a crescendo.

The 2016 GOP candidate said he fabricated a part of his 1996 autobiography, “Gifted Hands,” in which he claimed he was given a “full scholarship” to the U.S. Military Academy just hours after he rebuked accusations that he lied about his violent outbursts as a child and teenager.

In the nearly 20-year-old book, Carson boasted about his transformation from rage-filled boy to refined neurosurgeon, describing how he once tried to hit his mother with a hammer and attempted to stab one of his friends to death.

His former classmates, however, said they don’t remember the Republican as a rough kid.

BEN CARSON STILL THINKS JOSEPH BUILT PYRAMIDS TO STORE GRAIN 

“I don’t know nothing about that,” Gerald Ware, Carson’s classmate at Detroit’s Southwestern High School, told CNN. “It would have been all over the whole school.”

PHOTO TAKEN OCT. 28, 2015BRENNAN LINSLEY/AP

Republican Presidential candidate Ben Carson claimed in his 1996 book that he had a violent childhood full of moments of ‘pathological anger.’

CNN spoke with nine people Carson grew up with. Not one remembered the Republican’s self-proclaimed violent outbursts.

While Carson slammed the CNN report, calling it a “bunch of lies” and “pathetic,” he did admit that there is at least one falsehood in the book: A story about how Gen. William Westmoreland offered the then-17-year-old a full-ride to West Point.

Carson said that as the leader of his high school’s Junior ROTC program, he attended a 1969 Memorial Day dinner for Congressional Medal of Honor winners. There, he met with General Westmoreland.

“Later I was offered a full scholarship to West Point,” he wrote.

BEN CARSON OVERTAKES TRUMP IN NATIONAL POLLING AVERAGE 

Carson may have met Westmoreland at the 1969 banquet — which was held in February, not May — but the general would not have promised the student a scholarship, West Point told POLITICO. All costs are covered for admitted West Point students, so “full ride” scholarships don’t exist.

Carson was “introduced to folks from West Point by his ROTC Supervisors” at a banquet, Carson’s campaign manager Barry Bennett said. While they may have discussed application process, Carson never applied or received a scholarship.

Instead, he attended Yale University before going on to the University of Michigan’s medical school.

West Point said it has no records of Carson applying to or enrolling in the academy.

Carson admitted he “doesn’t remember all the specific details” of meeting Westmoreland.

Ben Carson’s Violent Childhood Called Into Question as Classmates Don’t Remember
NY Daily News

“Because I had done so extraordinarily well you know I was told someone like me – they could get a scholarship to West Point,” Carson told the New York Times.

Despite the scholarship lie, Carson defended the rest of the book Friday, saying all the stories about his violent childhood are true.

In the 19-year-old book, Carson claimed he once tried to strike his mother with a hammer as they argued over clothing. His brother Curtis stepped in and disarmed the boy before he could physically harm their mother.

Carson also said he physically attacked at least two of his school friends.

In the seventh grade he hit a boy named Jerry with a lock after he teased Carson for saying something “stupid” in English class.

Carson wrote that he was given a MIKE GROLL/ASSOCIATED PRESS

Carson wrote that he was given a “full scholarship” to West Point.

“I swung at him, lock in hand. The blow slammed into his forehead, and he groaned, staggering backward, blood seeping from a three-inch gash,” Carson wrote.

Two years later, in the ninth grade, he tried to stab a friend who he identified in the book only as “Bob.” The blade stuck Bob’s belt buckle, breaking the blade and leaving the teen unharmed.

“I was trying to kill somebody,” Carson wrote of the knife attack, calling it a moment of “pathological anger.”

The teenage Carson ran to the bathroom after the failed stabbing and prayed. Since then, he has never had a problem with his temper, he claimed in the book.

Carson’s classmates remembered him as introverted and studious — someone who was more likely to be found in the library than in the middle of a schoolyard fight.

Carson's classmates have described him as a quiet, shy student, not an angry young man.

Carson’s classmates have described him as a quiet, shy student, not an angry young man.

“He was a quiet, shy kid, not too outgoing,” said his junior high and high school classmate Jerry Dixon. “Bennie stayed home a lot or went to the library to work.”

Dixon said he is not the Jerry the doctor-turned-politician beat with a lock — and said he had never even heard of such an incident.

Carson refused to reveal the names of his victims in a Friday interview on CNN, saying to name them would be “victimizing.”

He admitted that he changed the names in his autobiography, but maintained both “Bob” and “Jerry” are real people who will only be identified if they chose to come forward on their own.

“Tell me what makes you think you’re going to find those specific people?” Carson asked CNN’s Alisyn Camerota. “What is your methodology? Because I don’t understand it.”

Carson’s campaign adviser Armstrong Williams also refused to identify the candidate’s alleged victims or provide any kind of documentation showing disciplinary actions for his claimed school fights.

“Why would anyone cooperate with your obvious witch hunt?” Armstrong Williams wrote to CNN in an email last week, the day before Halloween. “No comment and moving on…… Happy Halloween!!!!!”

Donald Trump quickly weighed in on his rival’s controversy.

“The Carson story is either a total fabrication or, if true, even worse-trying to hit mother over the head with a hammer or stabbing friend!” he tweeted Thursday.

http://www.nydailynews.com/news/politics/ben-carson-violent-childhood-called-question-article-1.2425591

Ben Carson Says He Was Never Accepted to West Point

Photo
Ben Carson prepared to board his campaign bus after appearing at a book signing in Fort Lauderdale, Fla., on Thursday.

Ben Carson prepared to board his campaign bus after appearing at a book signing in Fort Lauderdale, Fla., on Thursday.Credit Joe Raedle/Getty Images

A report on Friday said Ben Carson had acknowledged never having applied to West Point, raising questions about his repeated assertions that he had turned down a scholarship to attend the military academy.

According to the report, in Politico, West Point had no record that Mr. Carson, who has been leading in some national polls in the race for the Republican presidential nomination, had applied. When Politico approached Mr. Carson’s campaign with the information, his campaign manager, Barry Bennett, in a statement, explained that Mr. Carson had considered an offer to receive help getting an appointment to the academy, but he did not apply.

In repeated references to West Point over the years, Mr. Carson has strongly implied that he had a standing offer to attend.

In his statement, Mr. Bennett said, “Dr. Carson was the top R.O.T.C. student in the City of Detroit.”

Referring to Gen. William C. Westmoreland, the Army chief of staff at the time, Mr. Bennett added: “In that role he was invited to meet General Westmoreland. He believes it was at a banquet. He can’t remember with specificity their brief conversation but it centered around Dr. Carson’s performance as R.O.T.C. city executive officer.”

“He was introduced to folks from West Point by his R.O.T.C. supervisors,” Mr. Bennett said. “They told him they could help him get an appointment based on his grades and performance in R.O.T.C. He considered it but in the end did not seek admission.”

In an interview with The New York Times on Friday, Mr. Carson said: “I don’t remember all the specific details. Because I had done so extraordinarily well you know I was told that someone like me – they could get a scholarship to West Point. But I made it clear I was going to pursue a career in medicine.”

“It was, you know, an informal ‘with a record like yours we could easily get you a scholarship to West Point.’”

Mr. Carson has recounted the episode of being offered a scholarship at various points in telling his triumphant personal story. (Technically, West Point does not offer scholarships; it is free to attend.)

In his recent book, “You Have a Brain,” Mr. Carson described how he decided which college to attend: “I still had the scholarship offer from West Point as a result of my R.O.T.C. achievements.”

More recently, in a Facebook post in August responding to a question, he wrote that he had been “thrilled to get an offer from West Point.”

“But I knew medicine is what I wanted to do. So I applied to only one school. (it was all the money I had). I applied to Yale and thank God they accepted me. I often wonder what might have happened had they said no.”

The revelation came just a couple of days after a CNN report questioned the accuracy of Mr. Carson’s accounts of violent episodes in his youth, which are central to his often-told story of personal redemption through faith and hard work, one that has made him a favorite of evangelical Christian voters. On Friday, shortly before the Politico report was published, Mr. Carson attacked the CNN report as a “bunch of lies.”

http://www.nytimes.com/politics/first-draft/2015/11/06/ben-carson-west-point/

Ben Carson defends his telling of an informal offer from West Point

By David Weigel

Ben Carson defended his long-told story of a “scholarship” to West Point today, responding to scrutiny by saying that he merely had received an “informal” offer of a free ride to the military academy.

“Because I had done so extraordinarily well you know I was told that someone like me [could] get a scholarship to West Point,” Carson told the New York Times. “It was, you know, an informal ‘with a record like yours we could easily get you a scholarship to West Point.'”

Allies of the former neurosurgeon, who has slowly risen to the top of 2016 Republican primary polls, had been making a similar case all day. The argument — which depends on a careful parsing of verbs — is that he never applied, even after being told he’d be a sure-thing candidate. The point, which found many takers in conservative media, was that the controversy could be dismissed as a witch hunt.

That reasoning came together Friday morning, after Politico published a story titled “Ben Carson admits fabricating West Point scholarship.” After confirming that Carson had never applied to West Point, and that a meeting Carson described with Gen. William Westmoreland apparently did not happen when the candidate had claimed, the story quoted Carson campaign manager Barry Bennett’s new explanation.

“He was introduced to folks from West Point by his ROTC Supervisors,” Bennett said. “They told him they could help him get an appointment based on his grades and performance in ROTC. He considered it but in the end did not seek admission.”

[The Fix: Ben Carson didn’t get a ‘full scholarship’ from West Point. That’s a big problem for his campaign.]

West Point cadets must be sponsored by a member of Congress or the Secretary of the Army. But Doug Watts, a spokesman for the campaign, said that Carson never completed — nor claimed to have completed — the process for acceptance into West Point, and those never had an official sponsor.

“He was told by the ROTC Commander that he could have an appointment,” explained Watts. “Dr. Carson rejected the offer, did not apply or pursue admission. Had he done so, and been accepted, that would have been tantamount to a scholarship, the same that all cadets receive.”

In an interview, Carson’s close friend Armstrong Williams argued that Politico had written a false headline off of Bennett’s accurate quote.

“In the story itself, the campaign does not say Dr. Carson applied to West Point,” Williams said of Politico. “Dr. Carson boasts about his scores in ROTC. Westmoreland encourages him to apply. As Dr. Carson says, they were impressed by his scores, but he never applied. They said to him, we could get you in. This guy got into Yale — obviously he could have got in. The headline was a fabrication.”

Carson, whose steady rise to the top of presidential primary polls has started to draw media scrutiny his way, is depending on a loose interpretation of the word “scholarship.” There is no tuition at West Point; there is no equivalent of a “scholarship” as generally understood at most universities. In his memoir “Gifted Hands” and in anecdotes about the offer, Carson never says that he “applied,” only that some “scholarship” came his way after a meeting with Westmoreland and “congressional medal winners.”

“I was offered a full scholarship to West Point,” Carson wrote. “I didn’t refuse the scholarship outright, but I let them know that a military career wasn’t where I saw myself going. As overjoyed as I felt to be offered such a scholarship, I wasn’t really tempted. The scholarship would have obligated me to spend four years in military service after I finished college, precluding my chances to go on to medical school.”

That description of the offer came with its own problems — it is not, for example, impossible for a West Point graduate to complete his service, then become a doctor. But Carson’s allies insist that the gap between “applying” and being offered a “scholarship” debunks the Politico story. Indeed, in “Gifted Hands,” Carson repeatedly described how he had only $10 to submit with a college application, limiting his choices.

“Each college required a ten-dollar non-returnable entrance fee sent with the application,” Carson wrote. “I had exactly ten dollars, so I could apply only to one.”

In an August 2015 Facebook post, Carson described that situation again, to tell a questioner that he applied only to Yale.

“I was the highest student ROTC member in Detroit and was thrilled to get an offer from West Point,” wrote Carson. “But I knew medicine is what I wanted to do. So I applied to only one school. (It was all the money I had). I applied to Yale and thank God they accepted me.”

Williams, who had not spoken to Carson since Politico’s story went online, insisted that it was “shoddy journalism” and oversold what Carson himself had claimed.

“It gives journalism a bad name,” said Williams. “It only fits into Dr. Carson’s narrative of a witch hunt.”

On Friday afternoon, conservative talkers like Rush Limbaugh, Hugh Hewitt, and Sean Hannity criticized the coverage that had made Carson out as a dissembler. But at least one of his rivals sense a political opportunity in the scrum.

“Well, I think it’s really the beginning of the end,” said Donald Trump in an interview.

https://www.washingtonpost.com/news/post-politics/wp/2015/11/06/ben-carsons-allies-defend-west-point-story-he-got-an-offer-did-not-apply/

Ben Carson’s ‘West Point’ story isn’t totally accurate. Here’s why that could be a problem.

By Chris Cillizza

Ben Carson’s admission Friday to Politico that he had not been offered and accepted a full scholarship to West Point could be a major problem for a presidential candidate whose appeal is almost entirely built on his remarkable personal story.

In two of his books — the popular “Gifted Hands” as well as a newer book entitled “You Have a Brain” — Carson tells the West Point story as part of his aspirational life that began in poverty in Detroit and continued through a decorated career as a world-renowned pediatric neurosurgeon.

Now we know that story is, at best, somewhat misleading. It is of course possible that Carson was either led to believe he might have been given a scholarship to the military academy if he had applied or simply misunderstood a conversation he participated in. That is the direction the Carson team appears to be headed, saying in a statement of his meeting with then-Gen. William Westmoreland: “He can’t remember with specificity their brief conversation but it centered around Dr. Carson’s performance as ROTC City Executive Officer.”

Regardless of whether the West Point story is a simple misunderstanding or something more nefarious, what it will do is raise this simple question: What else in Ben Carson’s remarkable biography might not be totally, 100 percent accurate?

Even before the West Point story broke, Carson was dealing with suggestions that his recounting of his tough childhood highlighted by a terrible temper and a series of altercations with his mother — among other people — might not be true.

CNN report, which was based on interviews with nine people who knew Carson as a young man, argues that the violent portrait he paints of himself doesn’t jibe with the person they knew. “All of the people interviewed expressed surprise about the incidents Carson has described,” reads the CNN story. “No one challenged the stories directly. Some of those interviewed expressed skepticism, but noted that they could not know what had happened behind closed doors.”

Carson spent Thursday insisting that the people who were directly involved in these purported attacks weren’t the people that CNN had spoken to and, therefore, the report had no merit.

Now, with the West Point story raging, Carson will come under even more pressure to explain some of the fuzzier parts of his personal biography. And if any other inconsistencies or outright falsehoods come out amid that heightened scrutiny, it could spell curtains for a Carson campaign that has just moved into the pole position in the Republican primary race.

https://www.washingtonpost.com/news/the-fix/wp/2015/11/06/ben-carson-didnt-get-a-full-scholarship-west-point-thats-a-big-problem-for-his-campaign/

With question over West Point offer, Ben Carson feels the glare of the front-runner’s spotlight

Timothy M. Phelps

retired Baltimore neurosurgeon Ben Carson has reached the top in several recent national polls, he is also experiencing new scrutiny as a front-runner for the Republican presidential nomination.

On Friday, his name dominated political news with a Politico report that his campaign “admits fabricating a West Point scholarship” in his autobiography, though that reference was later taken out of the story. The story also quoted a West Point spokeswoman as saying the famous military academy had no record of an application from Carson.

Barry Bennett, Carson’s campaign manager, said in an interview that Carson’s book,“Gifted Hands,” was accurate when Carson wrote, “I was offered a full scholarship to West Point.”

“I would not have used the word ‘full scholarship.’ I would have said ‘nomination,’ but it’s not a fabrication, it’s not a lie,” Bennett said in an interview. At West Point, tuition and other expenses are paid by the government.

Bennett said that Carson, who he said was the top high school Junior ROTC officer in Detroit, was offered a nomination to West Point by ROTC officials in the city. He said he did not have names, but that the campaign and others are trying to locate them to corroborate Carson’s story.

Later, Carson told Fox News’ Bill O’Reilly that his account of the West Point episode “could have been more clarified. I told it as I understood it.”

Also, Theresa Brinkerhoff, the chief of media relations at West Point, said that a comment she made to Politico was “misconstrued.”

Politico wrote that West Point had no record of Carson applying to the academy, but Brinkerhoff said in an interview that the academy does not keep records beyond three years if a candidate does not attend the school. The academy has no way of knowing whether Carson applied, Brinkerhoff said.

In the end, Bennett confirmed that Carson had not applied. In his book, Carson wrote that he never had any interest in any career other than medicine. “I remembered the scholarship offer from West Point. A teaching career? Business? None of these areas held any real interest,” he said.

Clearly, however, Carson has left an impression that the offer to go to the academy came from West Point itself. On Facebook in August, Carson took a question from someone named Bill, who “wanted to know if it was true that I was offered a slot at West Point after high school. Bill, that is true. I was the highest student ROTC member in Detroit and was thrilled to get an offer from West Point. But I knew medicine is what I wanted to do. So I applied to only one school.”

Carson went to Yale.

Carson was also involved in a contentious interview Friday morning on CNN. Anchor Alisyn Camerota badgered him about reports by the network that it had been unable to locate some childhood friends or family members Carson mentions having assaulted in his autobiography.

In his book, Carson says he once tried to stab a person he refers to as Bob. On Friday, Carson told CNN that person was really a family member by another name who did not want to be identified. Other childhood friends mentioned in the book could decide for themselves whether to come forward, he said.

Bennett said the political attacks were a function of national polls over the past week showing him ahead of Donald Trump and all other Republicans for the nomination.

“Somewhere, there is a panicked candidate running for the Republican presidential nomination who is spreading a lot of dirt,” Bennett said.

http://www.latimes.com/nation/politics/la-na-ben-carson-20151106-story.html

The Pronk Pops Show Podcasts Portfolio

Listen To Pronk Pops Podcast or Download Show 565-570

Listen To Pronk Pops Podcast or Download Show 556-564

Listen To Pronk Pops Podcast or Download Show 546-555

Listen To Pronk Pops Podcast or Download Show 538-545

Listen To Pronk Pops Podcast or Download Show 532-537

Listen To Pronk Pops Podcast or Download Show 526-531

Listen To Pronk Pops Podcast or Download Show 519-525

Listen To Pronk Pops Podcast or Download Show 510-518

Listen To Pronk Pops Podcast or Download Show 500-509

Listen To Pronk Pops Podcast or Download Show 490-499

Listen To Pronk Pops Podcast or Download Show 480-489

Listen To Pronk Pops Podcast or Download Show 473-479

Listen To Pronk Pops Podcast or Download Show 464-472

Listen To Pronk Pops Podcast or Download Show 455-463

Listen To Pronk Pops Podcast or Download Show 447-454

Listen To Pronk Pops Podcast or Download Show 439-446

Listen To Pronk Pops Podcast or Download Show 431-438

Listen To Pronk Pops Podcast or Download Show 422-430

Listen To Pronk Pops Podcast or Download Show 414-421

Listen To Pronk Pops Podcast or Download Show 408-413

Listen To Pronk Pops Podcast or Download Show 400-407

Listen To Pronk Pops Podcast or Download Show 391-399

Listen To Pronk Pops Podcast or Download Show 383-390

Listen To Pronk Pops Podcast or Download Show 376-382

Listen To Pronk Pops Podcast or Download Show 369-375

Listen To Pronk Pops Podcast or Download Show 360-368

Listen To Pronk Pops Podcast or Download Show 354-359

Listen To Pronk Pops Podcast or Download Show 346-353

Listen To Pronk Pops Podcast or Download Show 338-345

Listen To Pronk Pops Podcast or Download Show 328-337

Listen To Pronk Pops Podcast or Download Show 319-327

Listen To Pronk Pops Podcast or Download Show 307-318

Listen To Pronk Pops Podcast or Download Show 296-306

Listen To Pronk Pops Podcast or Download Show 287-295

Listen To Pronk Pops Podcast or Download Show 277-286

Listen To Pronk Pops Podcast or Download Show 264-276

Listen To Pronk Pops Podcast or Download Show 250-263

Listen To Pronk Pops Podcast or Download Show 236-249

Listen To Pronk Pops Podcast or Download Show 222-235

Listen To Pronk Pops Podcast or Download Show 211-221

Listen To Pronk Pops Podcast or Download Show 202-210

Listen To Pronk Pops Podcast or Download Show 194-201

Listen To Pronk Pops Podcast or Download Show 184-193

Listen To Pronk Pops Podcast or Download Show 174-183

Listen To Pronk Pops Podcast or Download Show 165-173

Listen To Pronk Pops Podcast or Download Show 158-164

Listen To Pronk Pops Podcast or Download Show 151-157

Listen To Pronk Pops Podcast or Download Show 143-150

Listen To Pronk Pops Podcast or Download Show 135-142

Listen To Pronk Pops Podcast or Download Show 131-134

Listen To Pronk Pops Podcast or Download Show 124-130

Listen To Pronk Pops Podcast or Download Shows 121-123

Listen To Pronk Pops Podcast or Download Shows 118-120

Listen To Pronk Pops Podcast or Download Shows 113 -117

Listen To Pronk Pops Podcast or Download Show 112

Listen To Pronk Pops Podcast or Download Shows 108-111

Listen To Pronk Pops Podcast or Download Shows 106-108

Listen To Pronk Pops Podcast or Download Shows 104-105

Listen To Pronk Pops Podcast or Download Shows 101-103

Listen To Pronk Pops Podcast or Download Shows 98-100

Listen To Pronk Pops Podcast or Download Shows 94-97

Listen To Pronk Pops Podcast or Download Shows 93

Listen To Pronk Pops Podcast or Download Shows 92

Listen To Pronk Pops Podcast or Download Shows 91

Listen To Pronk Pops Podcast or Download Shows 88-90

Listen To Pronk Pops Podcast or Download Shows 84-87

Listen To Pronk Pops Podcast or Download Shows 79-83

Listen To Pronk Pops Podcast or Download Shows 74-78

Listen To Pronk Pops Podcast or Download Shows 71-73

Listen To Pronk Pops Podcast or Download Shows 68-70

Listen To Pronk Pops Podcast or Download Shows 65-67

Listen To Pronk Pops Podcast or Download Shows 62-64

Listen To Pronk Pops Podcast or Download Shows 58-61

Listen To Pronk Pops Podcast or Download Shows 55-57

Listen To Pronk Pops Podcast or Download Shows 52-54

Listen To Pronk Pops Podcast or Download Shows 49-51

Listen To Pronk Pops Podcast or Download Shows 45-48

Listen To Pronk Pops Podcast or Download Shows 41-44

Listen To Pronk Pops Podcast or Download Shows 38-40

Listen To Pronk Pops Podcast or Download Shows 34-37

Listen To Pronk Pops Podcast or Download Shows 30-33

Listen To Pronk Pops Podcast or Download Shows 27-29

Listen To Pronk Pops Podcast or Download Shows 17-26

Listen To Pronk Pops Podcast or Download Shows 16-22

Listen To Pronk Pops Podcast or Download Shows 10-15

Listen To Pronk Pops Podcast or Download Shows 01-09

Read Full Post | Make a Comment ( None so far )

The Pronk Pops Show 539, September 23, 2015, Story 1: Watermelon President Obama and Pope Francis — Green on The Outside and Red On The Inside — Neither Is An Authority On Science, Economics, Or Democides — Cosmic or Social Justice Is Using Coercion and Force To Steal — Leads To Democide and Genocide — Videos

Posted on September 23, 2015. Filed under: American History, Blogroll, Breaking News, Budgetary Policy, Communications, Constitutional Law, Culture, Economics, Education, Employment, Fiscal Policy, Foreign Policy, Government, Government Dependency, Government Spending, History, Illegal Immigration, Immigration, Independence, Labor Economics, Law, Legal Immigration, Media, Medicare, News, Philosophy, Photos, Politics, Polls, Pro Life, Progressives, Radio, Raymond Thomas Pronk, Social Security, Tax Policy, Taxation, Taxes, Terror, Terrorism, Unemployment, Videos, Violence, War, Wealth, Welfare Spending, Wisdom | Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , |

Project_1

The Pronk Pops Show Podcasts

Pronk Pops Show 539: September 23, 2015 

Pronk Pops Show 538: September 22, 2015 

Pronk Pops Show 537: September 21, 2015 

Pronk Pops Show 536: September 18, 2015 

Pronk Pops Show 535: September 17, 2015 

Pronk Pops Show 534: September 16, 2015 

Pronk Pops Show 533: September 15, 2015  

Pronk Pops Show 532: September 14, 2015 

Pronk Pops Show 531: September 11, 2015

Pronk Pops Show 530: September 10, 2015 

Pronk Pops Show 529: September 9, 2015 

Pronk Pops Show 528: September 8, 2015 

Pronk Pops Show 527: September 4, 2015 

Pronk Pops Show 526: September 3, 2015  

Pronk Pops Show 525: September 2, 2015 

Pronk Pops Show 524: August 31, 2015  

Pronk Pops Show 523: August 27, 2015  

Pronk Pops Show 522: August 26, 2015 

Pronk Pops Show 521: August 25, 2015 

Pronk Pops Show 520: August 24, 2015 

Pronk Pops Show 519: August 21, 2015 

Pronk Pops Show 518: August 20, 2015  

Pronk Pops Show 517: August 19, 2015 

Pronk Pops Show 516: August 18, 2015

Pronk Pops Show 515: August 17, 2015

Pronk Pops Show 514: August 14, 2015

Pronk Pops Show 513: August 13, 2015

Pronk Pops Show 512: August 12, 2015

Pronk Pops Show 511: August 11, 2015

Pronk Pops Show 510: August 10, 2015

Pronk Pops Show 509: July 24, 2015

Pronk Pops Show 508: July 20, 2015

Pronk Pops Show 507: July 17, 2015

Pronk Pops Show 506: July 16, 2015

Pronk Pops Show 505: July 15, 2015

Pronk Pops Show 504: July 14, 2015

Pronk Pops Show 503: July 13, 2015

Pronk Pops Show 502: July 10, 2015

Pronk Pops Show 501: July 9, 2015

Pronk Pops Show 500: July 8, 2015

Pronk Pops Show 499: July 6, 2015

Pronk Pops Show 498: July 2, 2015

Pronk Pops Show 497: July 1, 2015

Pronk Pops Show 496: June 30, 2015

Pronk Pops Show 495: June 29, 2015

Pronk Pops Show 494: June 26, 2015

Pronk Pops Show 493: June 25, 2015

Pronk Pops Show 492: June 24, 2015

Pronk Pops Show 491: June 23, 2015

Pronk Pops Show 490: June 22, 2015

Pronk Pops Show 489: June 19, 2015

Pronk Pops Show 488: June 18, 2015

Pronk Pops Show 487: June 17, 2015

Pronk Pops Show 486; June 16, 2015

Pronk Pops Show 485: June 15, 2015

Pronk Pops Show 484: June 12, 2015

Pronk Pops Show 483: June 11, 2015

Pronk Pops Show 482; June 10, 2015

Pronk Pops Show 481: June 9, 2015

Pronk Pops Show 480: June 8, 2015

Pronk Pops Show 479: June 5, 2015

Pronk Pops Show 478: June 4, 2015

Pronk Pops Show 477: June 3, 2015

Pronk Pops Show 476: June 2, 2015

Pronk Pops Show 475: June 1, 2015

Story 1: Watermelon President Obama and Pope Francis — Green on The Outside and Red On The Inside — Neither Is An Authority On Science, Economics, Or Democides — Cosmic or Social Justice Is Using Coercion and Force To Steal — Leads To Democide and Genocide — Videos

Lord Acton on “Power Corrupts”

I cannot accept your canon that we are to judge Pope and King unlike other men, with a favourable presumption that they did no wrong. If there is any presumption it is the other way, against the holders of power, increasing as the power increases. Historic responsibility has to make up for the want of legal responsibility. Power tends to corrupt, and absolute power corrupts absolutely. Great men are almost always bad men, even when they exercise influence and not authority, still more when you superadd the tendency or the certainty of corruption by authority. There is no worse heresy than that the office sanctifies the holder of it.

letter that Acton wrote to Bishop Creighton

faces of socialism

In The Shoes of the Fisherman (Last Scene)

Pope Francis in the USA- Welcome ceremony and visit to the President

Milton Friedman – Collectivism

AYN RAND PREDICTS OBAMAS END TO THE REPUBLIC

Milton Friedman – Socialism is Force

Milton Friedman discusses the moral values encouraged by economic systems and explains that a primary difference between capitalism and socialism is the difference between free choice and compulsory force.

Milton Friedman – Whats wrong with welfare? (Q&A)

Milton Friedman on Donahue #2

Milton Friedman Speaks – Is Capitalism Humane?

Rush Limbaugh Bashes Pope Francis

Milton Friedman on Hayek’s “Road to Serfdom” 1994 Interview 1 of 2

Milton Friedman on Hayek’s “Road to Serfdom” 1994 Interview 2 of 2

Friedrich Hayek: Why Intellectuals Drift Towards Socialism

Friedrich Hayek on Redistribution of Wealth

F A Hayek – Social Justice

Thomas Sowell – The Quest for Cosmic Justice (Full Video)

The reason Social Justice is fundamentally incompatible with equality of opportunity.

Thomas Sowell and a Conflict of Visions

The Life & Thought of Friedrich Hayek

Immigration, World Poverty and Gumballs – Updated 2010

Immigration by the Numbers — Off the Charts

Watermelons

ManBearPig, Climategate and Watermelons: A conversation with author James Delingpole

James Delingpole is a bestselling British author and blogger who helped expose the Climategate scandal back in 2009. Reason.tv caught up with Delingpole in Los Angeles recently to learn more about his entertaining and provocative new book Watermelons: The Green Movement’s True Colors. At its very roots, argues Delingpole, climate change is an ideological battle, not a scientific one. In other words, it’s green on the outside and red on the inside. At the end of the day, according to Delingpole, the “watermelons” of the modern environmental movement do not want to save the world. They want to rule it.

MAJOR REDUCTIONS IN CARBON EMISSIONS ARE NOT WORTH THE MONEY 4 /14- Intelligence Squared U.S.

Climate Change in 12 Minutes – The Skeptic’s Case

James Delingpole: Great Britain, the Green Movement, and the End of the World

Richard Lindzen, Ph.D. Lecture Deconstructs Global Warming Hysteria (High Quality Version)

Mind blowing speech by Robert Welch in 1958 predicting Insiders plans to destroy America

The Ten Planks of the 
Communist Manifesto
1848 by Karl Heinrich Marx

List of short-term demands, also known as the ten planks:

1. Abolition of private property and the application of all rents of land to public purposes.

2. A heavy progressive or graduated income tax.

3. Abolition of all rights of inheritance.

4. Confiscation of the property of all emigrants and rebels.

5. Centralisation of credit in the hands of the state, by means of a national bank with State capital and an exclusive monopoly.

6. Centralisation of the means of communications and transportation in the hands of the State.

7. Extension of factories and instruments of production owned by the state, the bringing into cultivation of waste lands, and the improvement of the soil generally in accordance with a common plan.

8. Equal liability of all to labor. Establishment of industrial armies, especially for agriculture.

9. Combination of agriculture with manufacturing industries, gradual abolition of the distinction between town and country, by a more equitable distribution of population over the country.

10. Free education for all children in public schools. Abolition of children’s factory labor in its present form. Combination of education with industrial production.[1]

https://en.wikipedia.org/wiki/The_Communist_Manifesto

The Left Has Its Pope

By Thomas Sowell

Pope Francis has created political controversy, both inside and outside the Catholic Church, by blaming capitalism for many of the problems of the poor. We can no doubt expect more of the same during his visit to the United States.

Pope Francis is part of a larger trend of the rise of the political left among Catholic intellectuals. He is, in a sense, the culmination of that trend.
There has long been a political left among Catholics, as among other Americans. Often they were part of the pragmatic left, as in the many old Irish-run, big city political machines that dispensed benefits to the poor in exchange for their votes, as somewhat romantically depicted in the movie classic, “The Last Hurrah.”

But there has also been a more ideological left. Where the Communists had their official newspaper, “The Daily Worker,” there was also “The Catholic Worker” published by Dorothy Day.

A landmark in the evolution of the ideological left among Catholics was a publication in the 1980s, by the National Conference of Catholic Bishops, titled “Pastoral Letter on Catholic Social Teaching and the U.S. Economy.”

Although this publication was said to be based on Catholic teachings, one of its principal contributors, Archbishop Rembert Weakland, said: “I think we should be up front and say that really we took this from the Enlightenment era.”

The specifics of the Bishops’ Pastoral Letter reflect far more of the secular Enlightenment of the 18th century than of Catholic traditions. Archbishop Weakland admitted that such an Enlightenment figure as Thomas Paine “is now coming back through a strange channel.”

Strange indeed. Paine rejected the teachings of “any church that I know of,” including “the Roman church.” He said: “My own mind is my own church.” Nor was Paine unusual among the leading figures of the 18th century Enlightenment.

To base social or moral principles on the philosophy of the 18th century Enlightenment, and then call the result “Catholic teachings” suggests something like bait-and-switch advertising.

But, putting aside religious or philosophical questions, we have more than two centuries of historical evidence of what has actually happened as the ideas of people like those Enlightenment figures were put into practice in the real world — beginning with the French Revolution and its disastrous aftermath.

Both the authors of the Bishops’ Pastoral Letter in the 1980s, and Pope Francis today, blithely throw around the phrase “the poor,” and blame poverty on what other people are doing or not doing to or for “the poor.”

Any serious look at the history of human beings over the millennia shows that the species began in poverty. It is not poverty, but prosperity, that needs explaining. Poverty is automatic, but prosperity requires many things — none of which is equally distributed around the world or even within a given society.

Geographic settings are radically different, both among nations and within nations. So are demographic differences, with some nations and groups having a median age over 40 and others having a median age under 20. This means that some groups have several times as much adult work experience as others.

Cultures are also radically different in many ways.

As distinguished economic historian David S. Landes put it, “The world has never been a level playing field.” But which has a better track record of helping the less fortunate — fighting for a bigger slice of the economic pie, or producing a bigger pie?

In 1900, only 3 percent of American homes had electric lights but more than 99 percent had them before the end of the century. Infant mortality rates were 165 per thousand in 1900 and 7 per thousand by 1997. By 2001, most Americans living below the official poverty line had central air conditioning, a motor vehicle, cable television with multiple TV sets, and other amenities.

A scholar specializing in the study of Latin America said that the official poverty level in the United States is the upper middle class in Mexico. The much criticized market economy of the United States has done far more for the poor than the ideology of the left.

Pope Francis’ own native Argentina was once among the leading economies of the world, before it was ruined by the kind of ideological notions he is now promoting around the world.

http://www.realclearpolitics.com/articles/2015/09/22/the_left_has_its_pope_128160.html

Pope Francis’s fact-free flamboyance

Opinion writer

Pope Francis embodies sanctity but comes trailing clouds of sanctimony. With a convert’s indiscriminate zeal, he embraces ideas impeccably fashionable, demonstrably false and deeply reactionary. They would devastate the poor on whose behalf he purports to speak — if his policy prescriptions were not as implausible as his social diagnoses are shrill.

Supporters of Francis have bought newspaper and broadcast advertisements to disseminate some of his woolly sentiments that have the intellectual tone of fortune cookies. One example: “People occasionally forgive, but nature never does.” The Vatican’s majesty does not disguise the vacuity of this. Is Francis intimating that environmental damage is irreversible? He neglects what technology has accomplished regarding London’s air (see Page 1 of Dickens’s “Bleak House”) and other matters.

George F. Will writes a twice-weekly column on politics and domestic and foreign affairs. He began his column with The Post in 1974, and he received the Pulitzer Prize for Commentary in 1977. He is also a contributor to FOX News’ daytime and primetime programming.View Archive

And the Earth is becoming “an immense pile of filth”? Hyperbole is a predictable precursor of yet anotherU.N. Climate Change Conference — the 21st since 1995. Fortunately, rhetorical exhibitionism increases as its effectiveness diminishes. In his June encyclical and elsewhere, Francis lectures about our responsibilities, but neglects the duty to be as intelligent as one can be.This man who says “the Church does not presume to settle scientific questions” proceeds as though everything about which he declaims is settled, from imperiled plankton to air conditioning being among humanity’s “harmful habits.” The church that thought it was settled science that Galileo was heretical should be attentive to all evidence.

Francis deplores “compulsive consumerism,” a sin to which the 1.3 billion persons without even electricity can only aspire. He leaves the Vatican to jet around praising subsistence farming, a romance best enjoyed from 30,000 feet above the realities that such farmers yearn to escape.

The saint who is Francis’s namesake supposedly lived in sweet harmony with nature. For most of mankind, however, nature has been, and remains, scarcity, disease and natural — note the adjective — disasters. Our flourishing requires affordable, abundant energy for the production of everything from food to pharmaceuticals. Poverty has probably decreased more in the past two centuries than in the preceding three millennia because of industrialization powered by fossil fuels. Only economic growth has ever produced broad amelioration of poverty, and since growth began in the late 18th century, it has depended on such fuels.

Matt Ridley, author of “The Rational Optimist,” notes that coal supplanting wood fuel reversed deforestation, and that “fertilizer manufactured with gas halved the amount of land needed to produce a given amount of food.” The capitalist commerce that Francis disdains is the reason the portion of the planet’s population living in “absolute poverty” ($1.25 a day) declined from 53 percent to 17 percent in three decades after 1981. Even in low-income countries, writes economist Indur Goklany, life expectancy increased from between 25 to 30 years in 1900 to 62 years today. Sixty-three percent of fibers are synthetic and derived from fossil fuels; of the rest, 79 percent come from cotton, which requires synthetic fertilizers and pesticides. “Synthetic fertilizers and pesticides derived from fossil fuels,” he says, “are responsible for at least 60 percent of today’s global food supply.” Without fossil fuels, he says, global cropland would have to increase at least 150 percent — equal to the combined land areas of South America and the European Union — to meet current food demands.

Francis grew up around the rancid political culture of Peronist populism, the sterile redistributionism that has reduced his Argentina from the world’s 14th highest per-capita gross domestic product in 1900 to 63rd today. Francis’s agenda for the planet — “global regulatory norms” — would globalize Argentina’s downward mobility.

As the world spurns his church’s teachings about abortion, contraception, divorce, same-sex marriage and other matters, Francis jauntily makes his church congruent with the secular religion of “sustainability.” Because this is hostile to growth, it fits Francis’s seeming sympathy for medieval stasis, when his church ruled the roost, economic growth was essentially nonexistent and life expectancy was around 30.

Francis’s fact-free flamboyance reduces him to a shepherd whose selectively reverent flock, genuflecting only at green altars, is tiny relative to the publicity it receives from media otherwise disdainful of his church. Secular people with anti-Catholic agendas drain his prestige, a dwindling asset, into promotion of policies inimical to the most vulnerable people and unrelated to what once was the papacy’s very different salvific mission.

He stands against modernity, rationality, science and, ultimately, the spontaneous creativity of open societies in which people and their desires are not problems but precious resources. Americans cannot simultaneously honor him and celebrate their nation’s premises.

https://www.washingtonpost.com/opinions/pope-franciss-fact-free-flamboyance/2015/09/18/7d711750-5d6a-11e5-8e9e-dce8a2a2a679_story.html

Obama’s welcoming speech to Pope Francis, and the pope’s reply

President Barack Obama’s remarks came first Wednesday morning at the White House. Pope Francis’ own comments are below the president’s.

Obama

Good morning! What a beautiful day the Lord has made! Holy Father, on behalf of Michelle and myself, welcome to the White House. Our backyard is not typically this crowded – but the size and spirit of today’s gathering is just a small reflection of the deep devotion of some 70 million American Catholics . . . and the way your message of love and hope has inspired so many people, across our nation and around the world. On behalf of the American people, it is my great honor and privilege to welcome you to the United States of America.

Today, we mark many firsts. Your Holiness, you have been celebrated as the first pope from the Americas. This is your first visit to the United States. And you are also the first pontiff to share an encyclical through a Twitter account.

Holy Father, your visit not only allows me, in some small way, to reciprocate the extraordinary hospitality you extended to me at the Vatican last year. It also reveals how much all Americans, from every background and of every faith, value the role that the Catholic Church plays in strengthening America. From my time working in impoverished neighborhoods with the Catholic Church in Chicago to my travels as president, I’ve seen firsthand how, every day, Catholic communities, priests, nuns and laity feed the hungry, heal the sick, shelter the homeless, educate our children and fortify the faith that sustains so many.

What is true in America is true around the world. From the busy streets of Buenos Aires to remote villages in Kenya, Catholic organizations serve the poor, minister to prisoners, build schools and homes, and operate orphanages and hospitals. And just as the Church has stood with those struggling to break the chains of poverty, it has given voice and hope to those seeking to break the chains of violence and oppression.

And yet, I believe the excitement around your visit must be attributed not only to your role as pope, but to your unique qualities as a person. In your humility, your embrace of simplicity, the gentleness of your words and the generosity of your spirit, we see a living example of Jesus’ teachings, a leader whose moral authority comes not just through words but also through deeds.

You call on all of us, Catholic and non-Catholic alike, to put the “least of these” at the center of our concern. You remind us that in the eyes of God our measure as individuals, and as societies, is not determined by wealth or power or station or celebrity, but by how well we hew to Scripture’s call to lift up the poor and the marginalized, to stand up for justice and against inequality, and to ensure that every human being is able to live in dignity – because we are all made in the image of God.

You remind us that “the Lord’s most powerful message” is mercy. That means welcoming the stranger with empathy and a truly open heart – from the refugee who flees war-torn lands to the immigrant who leaves home in search of a better life. It means showing compassion and love for the marginalized and the outcast, those who have suffered and those who seek redemption.

You remind us of the costs of war, particularly on the powerless and defenseless, and urge us toward the imperative of peace. Holy Father, we are grateful for your invaluable support of our new beginning with the Cuban people, which holds out the promise of better relations between our countries, greater cooperation across our hemisphere and a better life for the Cuban people. We thank you for your passionate voice against the deadly conflicts that ravage the lives of so many men, women and children; and your call for nations to resist the sirens of war and resolve disputes through diplomacy.

You remind us that people are only truly free when they can practice their faith freely. Here in the United States, we cherish religious liberty. Yet around the world at this very moment, children of God, including Christians, are targeted and even killed because of their faith. Believers are prevented from gathering at their places of worship. The faithful are imprisoned. Churches are destroyed. So we stand with you in defense of religious freedom and interfaith dialogue, knowing that people everywhere must be able to live out their faith free from fear and intimidation.

And, Holy Father, you remind us that we have a sacred obligation to protect our planet – God’s magnificent gift to us. We support your call to all world leaders to support the communities most vulnerable to a changing climate and to come together to preserve our precious world for future generations.

Your Holiness, in your words and deeds, you set a profound moral example. And in these gentle but firm reminders of our obligations to God and to one another, you are shaking us out of complacency. All of us may, at times, experience discomfort when we contemplate the distance between how we lead our daily lives and what we know to be true and right. But I believe such discomfort is a blessing, for it points to something better. You shake our conscience from slumber; you call on us to rejoice in Good News, and give us confidence that we can come together, in humility and service, and pursue a world that is more loving, more just, and more free. Here at home and around the world, may our generation heed your call to “never remain on the sidelines of this march of living hope!”

For that great gift of hope, Holy Father, we thank you, and welcome you, with joy and gratitude, to the United States of America.

Pope Francis

Good morning. Mr. President, I am deeply grateful for your welcome in the name of the all Americans. As a son of an immigrant family, I am happy to be a guest in this country, which was largely built by such families.

I look forward to these days of encounter and dialogue in which I hope to listen to and share many of the hopes and dreams of the American people. During my visit, I will have the honor of addressing Congress, where I hope, as a brother of this country, to offer words of encouragement to those called to guide the nation’s political future in fidelity to its founding principles. I will also travel to Philadelphia for the eighth World Meeting of Families to celebrate and support the institutions of marriage and the family at this critical moment in the history of our civilization.

Mr. President, together with their fellow citizens, American Catholics are committed to building a society which is truly tolerant and inclusive, to safeguarding the rights of individuals and communities, and to rejecting every form of unjust discrimination. With countless other people of goodwill, they are likewise concerned that efforts to build a just and wisely ordered society respect their deepest concerns and the right to religious liberty. That freedom reminds one of America’s most precious possessions. And, as my brothers, the United States bishops, have reminded us, all are called to be vigilant, precisely as good citizens, to preserve and defend that freedom from everything that would threaten or compromise it.

Mr. President, I find it encouraging that you are proposing an initiative for reducing air pollution. Accepting the urgency, it seems clear to me also that climate change is a problem which can no longer be left to our future generation. When it comes to the care of our common home, we are living at a critical moment of history. We still have time to make the change needed to bring about a sustainable and integral development, for we know that things can change.

Such change demands on our part a serious and responsible recognition not only of the kind of world we may be leaving to our children, but also to the millions of people living under a system which has overlooked them. Our common home has been part of this group of the excluded, which cries out to heaven and which today powerfully strikes our homes, our cities, our societies. To use a telling phrase of the Rev. Martin Luther King, we can say that we have defaulted on a promissory note, and now is the time to honor it.

We know by faith that the Creator does not abandon us; He never forsakes his loving plan or repents of having created us. Humanity has the ability to work together in building our common home. As Christians inspired by this certainty, we wish to commit ourselves to the conscious and responsible care of our common home.

Mr. President, the efforts which were recently made to mend broken relationships and to open new doors to cooperation within our human family represent positive steps along the path of reconciliation, justice and freedom.

I would like all men and women of goodwill in this great nation to support the efforts of the international community to protect the vulnerable in our world and to stimulate integral and inclusive models of development, so that our brothers and sisters everywhere may know the blessings of peace and prosperity which God wills for all his children.

Mr. President, once again I thank you for your welcome, and I look forward to these days in your country. God bless America.

Read Pope Francis’ Speech That He Gave at the White House