The Pronk Pops Show 905, June 6, 2017, Story 1: Seven Countries Break Off Diplomatic Ties With Qatar’s For Support of Radical Islamic Terrorists — Will Saudi Arabia Invade and Annex Qatar? — No — Videos –Story 2: President Trump Meets With Republican Congressional Leaders About Passing Tax Reform and Repealing and Replacing Obamacare By Labor Day — Videos — Story 3: NSA Contractor Reality Leigh Winner Leaked NSA Top Secret Document To Intercept — Videos — Story 4: Wikileaks Julian Assange Critical Of Intercept and Reporter That Lead To Arrest of NSA Contractor Leaker Reality Winner –Videos

Posted on June 6, 2017. Filed under: American History, Blogroll, Breaking News, Budgetary Policy, Cartoons, Congress, Constitutional Law, Countries, Culture, Defense Spending, Donald J. Trump, Donald J. Trump, Donald J. Trump, Donald Trump, Donald Trump, Economics, Egypt, Empires, Employment, Energy, Fiscal Policy, Foreign Policy, Government Spending, History, House of Representatives, Human, Human Behavior, Labor Economics, Law, Life, Lying, Media, Middle East, Natural Gas, Natural Gas, News, Nuclear, Oil, Oil, People, Philosophy, Photos, Politics, Qatar, Radio, Raymond Thomas Pronk, Resources, Rule of Law, Saudi Arabia, Senate, Tax Policy, Taxation, Taxes, Technology, Terror, Terrorism, Trade Policy, United Kingdom, United States of America, Videos, War, Wealth, Weapons, Weather, Wisdom, Yemen | Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , |

Project_1

The Pronk Pops Show Podcasts

Pronk Pops Show 905,  June 6, 2017

Pronk Pops Show 904,  June 5, 2017

Pronk Pops Show 903,  June 1, 2017

Pronk Pops Show 902,  May 31, 2017

Pronk Pops Show 901,  May 30, 2017

Pronk Pops Show 900,  May 25, 2017

Pronk Pops Show 899,  May 24, 2017

Pronk Pops Show 898,  May 23, 2017

Pronk Pops Show 897,  May 22, 2017

Pronk Pops Show 896,  May 18, 2017

Pronk Pops Show 895,  May 17, 2017

Pronk Pops Show 894,  May 16, 2017

Pronk Pops Show 893,  May 15, 2017

Pronk Pops Show 892,  May 12, 2017

Pronk Pops Show 891,  May 11, 2017

Pronk Pops Show 890,  May 10, 2017

Pronk Pops Show 889,  May 9, 2017

Pronk Pops Show 888,  May 8, 2017

Pronk Pops Show 887,  May 5, 2017

Pronk Pops Show 886,  May 4, 2017

Pronk Pops Show 885,  May 3, 2017

Pronk Pops Show 884,  May 1, 2017

Pronk Pops Show 883 April 28, 2017

Pronk Pops Show 882: April 27, 2017

Pronk Pops Show 881: April 26, 2017

Pronk Pops Show 880: April 25, 2017

Pronk Pops Show 879: April 24, 2017

Pronk Pops Show 878: April 21, 2017

Pronk Pops Show 877: April 20, 2017

Pronk Pops Show 876: April 19, 2017

Pronk Pops Show 875: April 18, 2017

Pronk Pops Show 874: April 17, 2017

Pronk Pops Show 873: April 13, 2017

Pronk Pops Show 872: April 12, 2017

Pronk Pops Show 871: April 11, 2017

Pronk Pops Show 870: April 10, 2017

Pronk Pops Show 869: April 7, 2017

Pronk Pops Show 868: April 6, 2017

Pronk Pops Show 867: April 5, 2017

Pronk Pops Show 866: April 3, 2017

Pronk Pops Show 865: March 31, 2017

Pronk Pops Show 864: March 30, 2017

Pronk Pops Show 863: March 29, 2017

Pronk Pops Show 862: March 28, 2017

Pronk Pops Show 861: March 27, 2017

Pronk Pops Show 860: March 24, 2017

Pronk Pops Show 859: March 23, 2017

Pronk Pops Show 858: March 22, 2017

Pronk Pops Show 857: March 21, 2017

Pronk Pops Show 856: March 20, 2017

Pronk Pops Show 855: March 10, 2017

Pronk Pops Show 854: March 9, 2017

Pronk Pops Show 853: March 8, 2017

Pronk Pops Show 852: March 6, 2017

Pronk Pops Show 851: March 3, 2017

Pronk Pops Show 850: March 2, 2017

Pronk Pops Show 849: March 1, 2017

Image result for diplomatic crisis in middle east

 

Image result for republican leaders meet at white house June 6 2017Image result for nsa leaker identifier reality winner Image result for cartoons president trump and leaks

Image result for cartoons president trump and leaksImage result for cartoons national security agency and leakers

Story 1: Seven Countries Break Off Diplomatic Ties With Qatar’s For Support of Radical Islamic Terrorists Including Islamic State, al Qaeda and Muslim Brotherhood — Will Saudi Arabia Invade and Annex Qatar? — No — Videos —

Image result for Trump Tweets on qatarImage result for map of us military bases in qatarImage result for map of countries in middel east qatar baharain saudia arabi egypt

Image result for diplomatic crisis in middle east

Image result for cartoons qatar, saudi arabia terrorism

Image result for cartoons qatar, saudi arabia terrorism

US media seek elusive ‘Russian hackers’ in Qatar-Arab league crisis

President Trump sides with the Arab nations isolating Qatar

Here’s What’s Behind the Qatar Diplomatic Split

In Front of Trump, Al-Sisi Exposes Supporters of Terrorism

Breaking News: Gulf countries cut ties with Qatar

US General “ISIS Funded By US Allies, Saudi Arabia & Qatar” At Congressional Meeting

Qatar responds to terror funding charges

Published on Sep 25, 2014

EXCLUSIVE: Christiane Amanpour asks the Emir of Qatar about allegations that the country funds terrorism.

LOL: Saudi Arabia ditching Qatar over terrorism

Joe Biden – ISIS terrorists armed by Turkey, Qatar, Saudi Arabia, UAE

Diplomatic Spat: Several Gulf States cut ties with Qatar for allegedly ‘supporting terrorism’

Two more nations cut off diplomatic ties with Qatar following five Arab countries

5 Arab countries severe diplomatic links with Qatar

Egypt, Saudi Arabia among countries cutting ties with Qatar

How Arab nations isolating Qatar will impact the US

Qatar Diplomatic Dispute: Kuwait’s emir to visit Saudi Arabia to mediate in Qatar crisis

Qatar faces embargoes as biggest regional diplomatic crisis in years escalates

Qatar under siege

Saudi Arabia Ups The Ante In Gulf Rift With Qatar

US pres. praises Saudi stance on Qatar

Is Saudi Arabia preparing an annexation of Qatar?

Is the Qatar boycott a precursor to invasion?

Food, fuel and flights: How Qatar may suffer

How disruptive is the Qatar crisis for the middle east?

How Powerful Is Qatar?

Qatar: A tiny country asserts powerful influence

Qatar calls Saudi, UAE, Bahrain withdrawal a ‘big mistake’

Published on Mar 5, 2014

Saudi Arabia, the United Arab Emirates and Bahrain have said they are withdrawing their ambassadors from Qatar because Doha had not implemented an agreement among Gulf Arab countries not to interfere in each others’ internal affairs.The three countries said the move was necessary “to protect their security and stability”. But Qatar called the move a “big mistake”.Al Jazeera speaks with Nasser Bin Hamad Al Khalifa, the former Qatar ambassador to the UN and US.

U.S. Military Praises Qatar, Despite Trump Tweet

AP Exclusive: Inside US Central Command in Qatar

B-52 Arrivals – Al Udeid Air Base, Qatar

 

CNN Exclusive: US suspects Russian hackers planted fake news behind Qatar crisis

Washington (CNN)US investigators believe Russian hackers breached Qatar’s state news agency and planted a fake news report that contributed to a crisis among the US’ closest Gulf allies, according to US officials briefed on the investigation.

The FBI recently sent a team of investigators to Doha to help the Qatari government investigate the alleged hacking incident, Qatari and US government officials say.
Intelligence gathered by the US security agencies indicates that Russian hackers were behind the intrusion first reported by the Qatari government two weeks ago, US officials say. Qatar hosts one of the largest US military bases in the region.
The alleged involvement of Russian hackers intensifies concerns by US intelligence and law enforcement agencies that Russia continues to try some of the same cyber-hacking measures on US allies that intelligence agencies believe it used to meddle in the 2016 elections.
US officials say the Russian goal appears to be to cause rifts among the US and its allies. In recent months, suspected Russian cyber activities, including the use of fake news stories, have turned up amid elections in France, Germany and other countries.
It’s not yet clear whether the US has tracked the hackers in the Qatar incident to Russian criminal organizations or to the Russian security services blamed for the US election hacks. One official noted that based on past intelligence, “not much happens in that country without the blessing of the government.”
The FBI and CIA declined to comment. A spokeswoman for the Qatari embassy in Washington said the investigation is ongoing and its results would be released publicly soon.
Kremlin spokesman Dmitry Peskov dismissed what he called CNN’s “fake” reporting Wednesday.
“It’s another lie that was published,” he told reporters. “Unfortunately, our colleagues from CNN again and again publish references to unnamed sources in unnamed agencies, etc, etc. These streams of information have no connection with the reality. It’s so far away from the reality. Fake is a fake.”
The Qatari government has said a May 23 news report on its Qatar News Agency attributed false remarks to the nation’s ruler that appeared friendly to Iran and Israel and questioned whether President Donald Trump would last in office.
Qatari Foreign Minister Sheikh Mohammed Bin Abdulrahman al-Thani told CNN the FBI has confirmed the hack and the planting of fake news.
“Whatever has been thrown as an accusation is all based on misinformation and we think that the entire crisis being based on misinformation,” the foreign minister told CNN’s Becky Anderson. “Because it was started based on fabricated news, being wedged and being inserted in our national news agency which was hacked and proved by the FBI.”
Sheikh Saif Bin Ahmed Al-Thani, director of the Qatari Government Communications Office, confirmed that Qatar’s Ministry of Interior is working with the FBI and the United Kingdom’s National Crime Agency on the ongoing hacking investigation of the Qatar News Agency.
“The Ministry of Interior will reveal the findings of the investigation when completed,” he told CNN.
Partly in reaction to the false news report, Qatar’s neighbors, led by Saudi Arabia and the United Arab Emirates, have cut off economic and political ties, causing a broader crisis.
The report came at a time of escalating tension over accusations Qatar was financing terrorism.
On Tuesday, Trump tweeted criticism of Qatar that mirrors that of the Saudis and others in the region who have long objected to Qatar’s foreign policy. He did not address the false news report.
“So good to see the Saudi Arabia visit with the King and 50 countries already paying off,” Trump said in a series of tweets. “They said they would take a hard line on funding extremism, and all reference was pointing to Qatar. Perhaps this will be the beginning of the end to the horror of terrorism!”
In his tweet, Trump voiced support for the regional blockade of Qatar and cited Qatar’s funding of terrorist groups. The Qataris have rejected the terror-funding accusations.
Hours after Trump’s tweets, the US State Department said Qatar had made progress on stemming the funding of terrorists but that there was more work to be done.
US and European authorities have complained for years about funding for extremists from Saudi Arabia and other nations in the Gulf region. Fifteen of the 19 9/11 hijackers were Saudi citizens.
Last year, during a visit to Saudi Arabia, Obama administration officials raised the issue of Saudi funding to build mosques in Europe and Africa that are helping to spread an ultra-conservative strain of Islam.
US intelligence has long been concerned with what they say is the Russian government’s ability to plant fake news in otherwise credible streams, according to US officials.
That concern has surfaced in recent months in congressional briefings by former FBI Director James Comey.
Comey told lawmakers that one reason he decided to bypass his Justice Department bosses in announcing no charges in the probe of Hillary Clinton’s private email server was the concern about an apparent fake piece of Russian intelligence. The intelligence suggested the Russians had an email that indicated former Attorney General Loretta Lynch had assured Democrats she wouldn’t let the Clinton probe lead to charges.
The FBI came to believe the email was fake, but still feared the Russians could release it to undermine the Justice Department’s role in the probe.

Gulf plunged into diplomatic crisis as countries cut ties with Qatar

Qatari diplomats ejected and land, air and sea traffic routes cut off in row over terror and regional stability

Saudi Arabia TV reports on cutting of ties with Qatar

The Gulf has been hit by its biggest diplomatic crisis in years after Arab nations including Saudi Arabia, the United Arab Emirates, Egypt and Bahrain cut ties with Qatar, accusing it of destabilising the region with its support for Islamist groups.

The countries said they would halt all land, air and sea traffic with Qatar, eject its diplomats and order Qatari citizens to leave the Gulf states within 14 days. Shoppers in the Qatari capital, Doha, meanwhile packed supermarkets amid fears the country, which relies on imports from its neighbours, would face food shortages after Saudi Arabia closed its sole land border.

Social media reports from Doha showed supermarket shelves empty as nervous consumers began to worry that stocks of food and water would run out. As much as 40% of Qatar’s food comes over the Saudi border.

The small but very wealthy nation, the richest in the world per capita, was also expelled from a Saudi-led coalition fighting in Yemen.

https://interactive.guim.co.uk/2016/08/explainer-interactive/embed/embed.html?id=40daeb83-4c13-4fe9-a592-473d1f7eb53e

The coordinated move dramatically escalates a dispute over Qatar’s support of Islamist movements, including the Muslim Brotherhood, and its perceived tolerance of Saudi Arabia’s arch-rival, Iran. The dispute is the worst to hit the Gulf since the formation of the Gulf Co-operation Council in 1981.

Qatar’s foreign affairs ministry said the measures were unjustified and based on false claims and assumptions. As the Qatari stock market tumbled and oil prices rose, it accused its fellow Gulf states of violating its sovereignty.

“The state of Qatar has been subjected to a campaign of lies that have reached the point of complete fabrication,” a statement said. “It reveals a hidden plan to undermine the state of Qatar.”

Saudi Arabia said it took the decision to cut diplomatic ties owing to Qatar’s “embrace of various terrorist and sectarian groups aimed at destabilising the region”, including the Muslim Brotherhood, al-Qaida, Islamic State and groups supported by Iran in Saudi Arabia’s restive eastern province of Qatif.

Egypt’s foreign ministry accused Qatar of taking an “antagonist approach” towards the country and said “all attempts to stop it from supporting terrorist groups failed”. It gave the Qatari ambassador 48 hours to leave Egypt, and ordered its own chargé d’affaires in Qatar to return to Cairo within 48 hours.

The tiny island nation of Bahrain blamed its decision on Qatar’s “media incitement, support for armed terrorist activities, and funding linked to Iranian groups to carry out sabotage and spreading chaos in Bahrain”.

In a sign of Qatar’s growing isolation, Yemen’s internationally backed government – which no longer holds its capital and large portions of the country – joined the move to break relations, as did the Maldives and the government based in eastern Libya

https://interactive.guim.co.uk/uploader/embed/2017/06/qatar-zip/giv-3902pAcwKt0BiU60/

There effect on air travel in the region was immediate. Qatar Airways, one of the region’s major long-haul carriers, said it was suspending all flights to Saudi Arabia. Etihad, the Abu Dhabi-based carrier, said it would suspend flights to Qatar “until further notice”. Emirates, the Dubai-based carrier, announced it would suspend Qatar flights starting on Tuesday, and Dubai-based budget carrier flydubai said it would suspend flights to and from Doha from Tuesday.

Egypt announced its airspace will be closed to all Qatari airplanes from Tuesday.

Monday’s diplomatic moves came two weeks after four Arab countries blocked Qatar-based media over the appearance of comments attributed to the Qatari emir that praised Iran. Qatar said hackers had taken over the website of its state-run news agency and faked the comments.

A senior Iranian official said the decision to sever ties with Qatar would not help end the crisis in the Middle East. Hamid Aboutalebi, deputy chief of staff for Iran’s president, Hassan Rouhani, tweeted: “The era of cutting diplomatic ties and closing borders is over … it is not a way to resolve crisis. These countries have no other option but to start regional dialogue.”

The US military said it had “no plans to change our posture in Qatar” amid the diplomatic crisis. Qatar is home to the sprawling al-Udeid airbase, which houses the US military’s central command and 10,000 American troops.

Qatar has long faced criticism from its Arab neighbours over its support of Islamists and Doha has long welcomed senior figures from Hamas and the Muslim Brotherhood.

The Saudi’s chief worry is the Muslim Brotherhood, the transnational Sunni Islamist political movement outlawed by Saudi Arabia and the UAE, which regards it as posing a threat to their system of hereditary rule.

Gulf countries led by Saudi Arabia fell out with Qatar over its backing of the former Egyptian president, Mohamed Morsi, a Brotherhood member, and in March 2014, Saudi Arabia, the United Arab Emirates and Bahrain recalled their ambassadors from Qatar over the rift.

Diplomatic relations resumed eight months later when Qatar forced some Brotherhood members to leave the country and quieted others but the 2014 crisis did not involve a land and sea blockade, as is threatened now.

The Qatar Council issued a fresh statement on Monday afternoon seeking to reassure its citizens that it had taken the necessary steps to ensure normal life continued, including by keeping sea ports open for trade and making sure that air space with countries not involved in the boycott remained open. It said it would not expel the 300,000 Egyptians working in Qatar as a reprisal.

Saudi Arabia however kept up the pressure on Qatar by saying it was withdrawing al-Jazeera’s media licence and closing its Saudi office, saying the Qatar-funded broadcaster had promoted terrorist plots and supported the Houthi rebels in Yemen.

It also banned all Qatar flagged vessels from is ports and lorries due to enter Qatar over the Saudi border were blocked from doing so.

The Saudi aim is to apply pressure to make Qatar change its foreign policy, but questioning the legitimacy of a fellow monarch could prove to be a double edged sword for any Gulf ruler.

Since 2014, Qatar has repeatedly and strongly denied that it funds extremist groups. However, it remains a key financial patron of the Hamas-controlled Gaza Strip and has been the home of the exiled Hamas official Khaled Mashaal since 2012. One of the first signs of any compromise will be the withdrawal of Hamas leaders from Doha.

Western officials have also accused Qatar of allowing or even encouraging funding of Sunni extremists such as al-Qaida’s branch in Syria, once known as the Nusra Front.

The row comes only two weeks after the US president, Donald Trump, visited the Middle East to seal major defence contracts with Saudi Arabia worth $110bn, set up an anti-extremist institute in Riyadh and urge the Gulf states to build an alliance against Iran.

The Saudis are in part countering the allegation of funding extremism, frequently made in Washington and in the past by Trump himself, by pointing the finger at Qatar for backing terrorism.

Speaking in Australia, the US secretary of state, Rex Tillerson, played down the seriousness of the diplomatic dispute and said it would not affect counter-terrorism efforts.

“I think what we’re witnessing is a growing list of irritants in the region that have been there for some time, and they’ve bubbled up so that countries have taken action in order to have those differences addressed,” he said.

https://www.theguardian.com/world/2017/jun/05/saudi-arabia-and-bahrain-break-diplomatic-ties-with-qatar-over-terrorism

 

7 Countries Break Off Ties With Qatar, Accuse It Of Funding ISIS & Al Qaeda

The Logical Indian Crew

June 5th, 2017

3.1k
SHARES

Courtesy: BBC | Image Credit: 1tv

In an unprecedented and major diplomatic rift, six Arab countries (and seven countries overall) have broken ties with Qatar, accusing it of sponsoring terror groups and trying to destablise the Middle-east. Qatar has hit back at the allegations, calling them “unjustified” and having “no basis in fact”.

The development happened in Monday, 5 June, when Bahrain announced diplomatic withdrawal from Qatar. Saudi Arabia, the United Arab Emirates (UAE), Egypt, Yemen, Libya, and Maldives swiftly followed suit.

Saudi state news agency SPA stated that the move was to “protect its national security from the dangers of terrorism and extremism”.

The six Arab countries have accused Qatar of channeling funds to the Islamic State (IS) and Al Qaeda, something Qatar repeatedly denied. The Qatari foreign minister said, “The measures are unjustified and are based on claims and allegations that have no basis in fact … not affect the normal lives of citizens and residents.”

Qatar has a history of sympathy towards extremist groups like the Muslim Brotherhood and its state-owned media outlet, Al Jazeera, has been accused of furthering Islamist ideologies. Additionally, Qatar has always been seen with suspicion with its Sunni peers in the Middle-east because of its close ties with Iran.

While hostility between the Gulf countries is not a new concept, this sudden outburst of diplomatic breakdown was largely unforeseen. However, it must be noted that this happened only two weeks after US President Donald Trump’s visit to Saudi Arabia and two weeks after several Gulf nations blocked Qatari news sites.

Saudi Arabia has removed Qatar from the coalition fighting rebels in Yemen due to “practices that strengthen terrorism” and its support of extremist groups. The countries said that they have closed their airspace to Qatar Airways. The UAE, Saudi Arabia and Bahrain have given Qatari visitors two weeks’ time to leave their countries.

Meanwhile, the Qatari stock market has plunged. The situation is highly nuclear and unpredictable, with the Qatari government becoming increasingly isolated and the already low oil prices expected to be negatively affected further. There are also humanitarian concerns, especially with food supply as Qatar received 40% of its food supplies by truck from Saudi Arabia.

US Secretary of State Rex Tillerson, who is currently in Australia, called for the parties involved to solve their disputes through constructive dialogue. Turkey reportedly conveyed that it was ready to mediate between Qatar and the Gulf states.

However, with borders closed and ties existent only with Oman and Kuwait in the region, Qatar struggles to make sense of recent events even as it economy is in freefall.

Qatar

From Wikipedia, the free encyclopedia

Coordinates: 25°30′N 51°15′E

State of Qatar

دولة قطر (Arabic)
Dawlat Qatar
Flag of Qatar
Emblem of Qatar
Flag Emblem
Anthem: السلام الأميري
As Salam al Amiri  (transliteration)
Amiri Salute

MENU
0:00
Location and extent of Qatar (dark green) on the Arabian Peninsula.

Location and extent of Qatar (dark green) on the Arabian Peninsula.
Capital
and largest city
Doha
25°18′N 51°31′E
Official languages Arabic
Ethnic groups(2010[1])
Religion Islam
Demonym Qatari
Government Unitary constitutionalmonarchy
• Emir
Tamim bin Hamad Al Thani
• Deputy Emir
Abdullah bin Hamad bin Khalifa Al Thani
Abdullah bin Nasser bin Khalifa Al Thani
Legislature Consultative Assembly
Establishment
18 December 1878
• Declared independence
1 September 1971
• Independence from the United Kingdom
3 September 1971
Area
• Total
11,586 km2(4,473 sq mi) (164th)
• Water (%)
0.8
Population
• 2016 estimate
2,675,522[a][2](142nd)
• 2010 census
1,699,435[3] (148th)
• Density
176/km2 (455.8/sq mi) (76th)
GDP (PPP) 2017 estimate
• Total
$353.143 billion[4](49th)
• Per capita
$145,894[4] (1st)
GDP (nominal) 2015 estimate
• Total
$185.395 billion[4]
• Per capita
$68,940[5] (4th)
Gini (2007) 41.1[6]
medium
HDI (2014) Increase 0.850[7]
very high · 32nd
Currency Riyal (QAR)
Time zone AST (UTC+3)
Drives on the right[8]
Calling code +974
ISO 3166 code QA
Internet TLD

Qatar (/ˈkætɑːr/,[9] Listeni/ˈkɑːtɑːr/, /ˈkɑːtər/ or Listeni/kəˈtɑːr/;[10] Arabic: قطر‎‎ Qatar [ˈqɑtˤɑr]; local vernacular pronunciation: [ˈɡɪtˤɑr]),[11][12] officially the State of Qatar (Arabic: دولة قطر‎‎ Dawlat Qatar), is a sovereign country located in Western Asia, occupying the small Qatar Peninsula on the northeastern coast of the Arabian Peninsula. Its sole land border is with Saudi Arabia to the south, with the rest of its territory surrounded by the Persian Gulf. An arm of the Persian Gulf separates Qatar from the nearby island country of Bahrain.

Following Ottoman rule, Qatar became a British protectorate in the early 20th century until gaining independence in 1971. Qatar has been ruled by the House of Thani since the early 19th century. Sheikh Jassim bin Mohammed Al Thani was the founder of the State of Qatar. Qatar is a hereditary monarchy and its head of state is Emir Sheikh Tamim bin Hamad Al Thani. Whether it should be regarded as a constitutional[13][14] or an absolute monarchy[15][16][17][18] is a matter of opinion. In 2003, the constitution was overwhelmingly approved in a referendum, with almost 98% in favour.[19][20] In early 2017, Qatar’s total population was 2.6 million: 313,000 Qatari citizens and 2.3 million expatriates.[21]

Qatar is a high income economy, backed by the world’s third largest natural gas reserves and oil reserves.[22] The country has the highest per capita income in the world. Qatar is classified by the UN as a country of very high human development and is the most advanced Arab state for human development.[23] Qatar is a significant power in the Arab world, supporting several rebel groups during the Arab Spring both financially and through its globally expanding media group, Al Jazeera Media Network.[24][25][26] For its size, Qatar wields disproportionate influence in the world, and has been identified as a middle power.[27][28] Qatar will host the 2022 FIFA World Cup, becoming the first Arab country to do so.[29]

In 2017, Saudi Arabia, Bahrain, the United Arab Emirates and Egypt, among other Gulf states, cut off diplomatic relations with Qatar and labeled the country a terrorist state, causing the 2017 Qatar diplomatic crisis.

Etymology

Pliny the Elder, a Roman writer, documented the earliest account pertaining to the inhabitants of the Peninsula around the mid-first century AD, referring to them as the Catharrei, a designation which may have derived from the name of a prominent local settlement.[30][31] A century later, Ptolemy produced the first known map to depict the peninsula, referring to it as Catara.[31][32] The map also referenced a town named “Cadara” to the east of the peninsula.[33] The term ‘Catara’ (or, alternatively, Cataraei)[34] was exclusively used until the 18th century, after which ‘Katara’ emerged as the most commonly recognised spelling.[33] Eventually, the modern derivative Qatar was adopted as the country’s name.[33]

In Standard Arabic, the name is pronounced [ˈqɑtˤɑr], while in the local dialect it is [ˈɡitˤar].[11]

History

Antiquity

Dot carvings at Jebel Jassassiyeh, dating to c. 4000 BC.

Human habitation of Qatar dates back to 50,000 years ago.[35] Settlements and tools dating back to the Stone Age have been unearthed in the peninsula.[35] Mesopotamian artefacts originating from the Ubaid period (ca. 6500–3800 BC) have been discovered in abandoned coastal settlements.[36] Al Da’asa, a settlement located on the western coast of Qatar, is the most important Ubaid site in the country and is believed to have accommodated a small seasonal encampment.[37][38]

Kassite Babylonian material dating back to the second millennium BC found in Al Khor Islands attests to trade relations between the inhabitants of Qatar and the Kassites in modern-day Bahrain.[39] Among the findings were 3,000,000 crushed snail shells and Kassite potsherds.[37] It has been suggested that Qatar is the earliest known site of shellfish dye production, owing to a Kassite purple dye industry which existed on the coast.[36][40]

In 224 AD, the Sasanian Empire gained control over the territories surrounding the Persian Gulf.[41] Qatar played a role in the commercial activity of the Sasanids, contributing at least two commodities: precious pearls and purple dye.[42] Under the Sasanid reign, many of the inhabitants in Eastern Arabia were introduced to Christianity following the eastward dispersal of the religion by Mesopotamian Christians.[43] Monasteries were constructed and further settlements were founded during this era.[44][45] During the latter part of the Christian era, Qatar comprised a region known as ‘Beth Qatraye’ (Syriac for “region of the Qataris”).[46] The region was not limited to Qatar; it also included Bahrain, Tarout Island, Al-Khatt, and Al-Hasa.[47]

In 628, Muhammad sent a Muslim envoy to a ruler in Eastern Arabia named Munzir ibn Sawa Al Tamimi and requested that he and his subjects accept Islam. Munzir obliged his request, and accordingly, most of the Arab tribes in the region converted to Islam.[48] After the adoption of Islam, the Arabs led the Muslim conquest of Persia which resulted in the fall of the Sasanian Empire.[49]

Early and late Islamic period (661–1783)

Abbasid Caliphate at its greatest extent, c. 850.

Qatar was described as a famous horse and camel breeding centre during the Umayyad period.[50] In the 8th century, it started benefiting from its commercially strategic position in the Persian Gulf and went on to become a centre of pearl trading.[51][52]

Substantial development in the pearling industry around the Qatari Peninsula occurred during the Abbasid era.[50] Ships voyaging from Basra to India and China would make stops in Qatar’s ports during this period. Chinese porcelain, West African coins and artefacts from Thailand have been discovered in Qatar.[49] Archaeological remains from the 9th century suggest that Qatar’s inhabitants used greater wealth to construct higher quality homes and public buildings. Over 100 stone-built houses, two mosques, and an Abbasid fort were constructed in Murwab during this period.[53][54] However, when the caliphate’s prosperity declined in Iraq, so too did it in Qatar.[55]Qatar is mentioned in 13th-century Muslim scholar Yaqut al-Hamawi‘s book, Mu’jam Al-Buldan, which alludes to the Qataris’ fine striped woven cloaks and their skills in improvement and finishing of spears.[56]

Much of Eastern Arabia was controlled by the Usfurids in 1253, but control of the region was seized by the prince of Ormus in 1320.[57] Qatar’s pearls provided the kingdom with one of its main sources of income.[58] In 1515, Manuel I of Portugal vassalised the Kingdom of Ormus. Portugal went on to seize a significant portion of Eastern Arabia in 1521.[58][59] In 1550, the inhabitants of Al-Hasa voluntarily submitted to the rule of the Ottomans, preferring them to the Portuguese.[60] Having retained a negligible military presence in the area, the Ottomans were expelled by the Bani Khalid tribe in 1670.[61]

Bahraini and Saudi rule (1783–1868)

A map of East Arabia in 1794.

In 1766, the Utub tribe of Al Khalifa migrated from Kuwait to Zubarah in Qatar.[62][63] By the time of their arrival, the Bani Khalid exercised weak authority over the peninsula, not withholding that the largest village was ruled by a distant kin of the Bani Khalid.[64] In 1783, Qatar-based Bani Utbah clans and allied Arab tribes invaded and annexed Bahrain from the Persians. The Al Khalifa imposed their authority over Bahrain and extended their area of jurisdiction to Qatar.[62]

A partially restored section of the ruined town of Zubarah.

Following the swearing in of Saud ibn Abd al-Aziz as crown prince of the Wahhabi in 1788, he moved to expand his empire eastward towards the Persian Gulf and Qatar. After defeating the Bani Khalid in 1795, the Wahhabi were attacked on two fronts. The Ottomans and Egyptians assaulted the western front, while the Al Khalifa in Bahrain and the Omanis launched an attack against the eastern front.[65][66] Upon being made aware of advancements by the Egyptians on the western frontier in 1811, the Wahhabi amir reduced his garrisons in Bahrain and Zubarah in order to re-position his troops. Said bin Sultan of Muscat capitalised on this opportunity and raided the Wahhabi garrisons on the eastern coast, setting fire to the fort in Zubarah. The Al Khalifa were effectively returned to power thereafter.[66]

As punishment for piracy, an East India Company vessel bombarded Doha in 1821, destroying the town and forcing hundreds of residents to flee. In 1825, the House of Thani was established with Sheikh Mohammed bin Thani as the first leader.[67]

Although Qatar had the legal status of a dependency, there was a popular sentiment of resentment against the Al Khalifa. In 1867, the Al Khalifa, along with the ruler of Abu Dhabi, sent a massive naval force to Al Wakrah in an effort to crush the Qatari rebels. This resulted in the maritime Qatari–Bahraini War of 1867–1868, in which Bahraini and Abu Dhabi forces sacked and looted Doha and Al Wakrah.[68] However, the Bahraini hostilities were in violation of the 1820 Anglo-Bahraini Treaty. The joint incursion, in addition to the Qatari counterattack, prompted British political agent Lewis Pelly to impose a settlement in 1868. His mission to Bahrain and Qatar and the resulting peace treaty were milestones because they implicitly recognised the distinctness of Qatar from Bahrain and explicitly acknowledged the position of Mohammed bin Thani. In addition to censuring Bahrain for its breach of agreement, the British protectorate asked to negotiate with a representative from Qatar, a role which Mohammed bin Thani was selected to fulfil. The results of the negotiations left the nation with a new-found sense of political identity, although it did not gain an official standing as a protectorate until 1916.

Ottoman rule (1871–1915)

Qatar in an 1891 Adolf Stieler map

Old city of Doha, January 1904.

Under military and political pressure from the governor of the Ottoman Vilayet of Baghdad, Midhat Pasha, the ruling Al Thani tribe submitted to Ottoman rule in 1871.[69] The Ottoman government imposed reformist (Tanzimat) measures concerning taxation and land registration to fully integrate these areas into the empire.[69] Despite the disapproval of local tribes, Al Thani continued supporting Ottoman rule. However, Qatari-Ottoman relations soon stagnated, and in 1882 they suffered further setbacks when the Ottomans refused to aid Al Thani in his expedition of Abu Dhabi-occupied Al Khor. In addition, the Ottomans supported the Ottoman subject Mohammed bin Abdul Wahab who attempted to supplant Al Thani as kaymakam of Qatar in 1888.[70] This eventually led Al Thani to rebel against the Ottomans, whom he believed were seeking to usurp control of the peninsula. He resigned as kaymakam and stopped paying taxes in August 1892.[71]

In February 1893, Mehmed Hafiz Pasha arrived in Qatar in the interests of seeking unpaid taxes and accosting Jassim bin Mohammed’s opposition to proposed Ottoman administrative reforms. Fearing that he would face death or imprisonment, Jassim retreated to Al Wajbah (10 miles west of Doha), accompanied by several tribe members. Mehmed’s demand that Jassim disband his troops and pledge his loyalty to the Ottomans was met with refusal. In March, Mehmed imprisoned Jassim’s brother and 13 prominent Qatari tribal leaders on the Ottoman corvette Merrikh as punishment for his insubordination. After Mehmed declined an offer to release the captives for a fee of 10,000 liras, he ordered a column of approximately 200 troops to advance towards Jassim’s Al Wajbah Fort under the command of Yusuf Effendi, thus signalling the start of the Battle of Al Wajbah.[49]

Effendi’s troops came under heavy gunfire by a sizable troop of Qatari infantry and cavalry shortly after arriving to Al Wajbah. They retreated to Shebaka fortress, where they were again forced to draw back from a Qatari incursion. After they withdrew to Al Bidda fortress, Jassim’s advancing column besieged the fortress, resulting in the Ottomans’ concession of defeat and agreement to relinquish their captives in return for the safe passage of Mehmed Pasha’s cavalry to Hofuf by land.[72] Although Qatar did not gain full independence from the Ottoman Empire, the result of the battle forced a treaty that would later form the basis of Qatar’s emerging as an autonomous country within the empire.[73]

British rule (1916–1971)

Zubarah Fort built in 1938.

The Ottoman Empire fell into disorder after losing battles in different fronts in the Middle Eastern theatre of World War I. Qatar took part in the Arab revolt against the Ottomans. The revolt was successful and Ottoman rule in the country further declined. The United Kingdom and the Ottoman Empire accorded their recognition to Sheikh Abdullah bin Jassim Al Thani and his successors’ right to rule over the whole of the Qatari Peninsula. The Ottomans renounced all their rights to Qatar and, following the outbreak of the First World War, Abdullah bin Jassim Al Thani (who was pro-British) forced them to abandon Doha in 1915.[74]

As a result of the partitioning of the Ottoman Empire, Qatar became a British protectorate on 3 November 1916. On that day, the United Kingdom signed a treaty with Sheikh Abdullah bin Jassim Al Thani to bring Qatar under its Trucial System of Administration. While Abdullah agreed not to enter into any relations with any other power without prior consent of the British government, the British guaranteed the protection of Qatar from all aggression by sea.[74] On 5 May 1935, Abdullah signed another treaty with the British government which granted Qatar protection against internal and external threats.[74] Oil reserves were first discovered in 1939. However, exploitation was delayed by World War II.

The sphere of influence of the British Empire started diminishing after World War II, particularly after the Independence of India and Pakistan in 1947. In the 1950s, oil began replacing pearling and fishing as Qatar’s main sources of revenue. Oil earnings began to fund the expansion and modernisation of Qatar’s infrastructure. Pressure for a British withdrawal from the Arab emirates in the Persian Gulf increased during the 1950s. When Britain officially announced in 1968 that it would politically disengage from the Persian Gulf in three years’ time, Qatar joined Bahrain and seven other Trucial States in a federation. Regional disputes, however, quickly compelled Qatar to resign and declare independence from the coalition which would eventually evolve into the United Arab Emirates.

Independence and aftermath (1971–present)

Traditional dhows in front of the West Bay skyline as seen from the Doha Corniche.

The State of Qatar entered into a general maritime truce with the United Kingdom in 1868. A General Treaty was concluded between the two on 3 November 1916. The General Treaty reserved foreign affairs and defence to the United Kingdom but allowed internal autonomy. On 3 September 1971, those “special treaty arrangements” that were “inconsistent with full international responsibility as a sovereign and independent state” were terminated.[75] This was done under an agreement reached between the Ruler of Qatar and the Government of the United Kingdom.[76][75]

In 1991, Qatar played a significant role in the Gulf War, particularly during the Battle of Khafji in which Qatari tanks rolled through the streets of the town and provided fire support for Saudi Arabian National Guard units that were engaging Iraqi Army troops. Qatar allowed coalition troops from Canada to use the country as an airbase to launch aircraft on CAP duty and also permitted air forces from the United States and France to operate in its territories.[35]

In 1995, Emir Hamad bin Khalifa Al Thani seized control of the country from his father Khalifa bin Hamad Al Thani, with the support of the armed forces and cabinet, as well as neighbouring states[77] and France.[78] Under Emir Hamad, Qatar has experienced a moderate degree of liberalisation, including the launch of the Al Jazeera television station (1996), the endorsement of women’s suffrage or right to vote in municipal elections (1999), drafting its first written constitution (2005) and inauguration of a Roman Catholic church (2008). In 2010, Qatar won the rights to host the 2022 FIFA World Cup, making it the first country in the Middle East to be selected to host the tournament. The Emir announced Qatar’s plans to hold its first national legislative elections in 2013. They were scheduled to be held in the second half of 2013, but were postponed in June 2013 and may be delayed until 2019.

In 2003, Qatar served as the US Central Command headquarters and one of the main launching sites of the invasion of Iraq.[79] In March 2005, a suicide bombing killed a British teacher at the Doha Players Theatre, shocking the country, which had not previously experienced acts of terrorism. The bombing was carried out by Omar Ahmed Abdullah Ali, an Egyptian resident in Qatar who had suspected ties to Al-Qaeda in the Arabian Peninsula.[80][81] In 2011, Qatar joined NATO operations in Libya and reportedly armed Libyan opposition groups.[82] It is also currently a major funder of weapons for rebel groups in the Syrian civil war.[83] Qatar is pursuing an Afghan peace deal and in January 2012 the Afghan Taliban said they were setting up a political office in Qatar to facilitate talks.

In June 2013, Sheikh Tamim bin Hamad Al Thani became the Emir of Qatar after his father handed over power in a televised speech.[84] Sheikh Tamim has prioritised improving the domestic welfare of citizens, which includes establishing advanced healthcare and education systems, and expanding the country’s infrastructure in preparation for the hosting of the 2022 World Cup.[85]

Qatar participated in the Saudi Arabian-led intervention in Yemen against the Houthis and forces loyal to former President Ali Abdullah Saleh, who was deposed in the 2011 Arab Spring uprisings.[86]

In June 2017, Egypt, Saudi Arabia, United Arab Emirates, Bahrain, Yemen and Libya cut off diplomatic relations with Qatar, citing the country’s support of groups they considered to be extremist. [87]

Politics

Emir Tamim bin Hamad Al Thani with U.S. President Donald Trump in May 2017

Qatar is either a constitutional[13][14] or an absolute monarchy[16][18] ruled by the Al Thani family.[88][89] The Al Thani dynasty has been ruling Qatar since the family house was established in 1825.[1] In 2003, Qatar adopted a constitution that provided for the direct election of 30 of the 45 members of the Legislative Council.[1][90][91] The constitution was overwhelmingly approved in a referendum, with almost 98% in favour.[19][20]

The eighth Emir of Qatar is Tamim bin Hamad Al Thani, whose father Hamad bin Khalifa Al Thani handed power to him on 25 June 2013.[92] The supreme chancellor has the exclusive power to appoint and remove the prime minister and cabinet ministers who, together, constitute the Council of Ministers, which is the supreme executive authority in the country.[93] The Council of Ministers also initiates legislation. Laws and decrees proposed by the Council of Ministers are referred to the Advisory Council (Majilis Al Shura) for discussion after which they are submitted to the Emir for ratification.[93] A Consultative Assembly has limited legislative authority to draft and approve laws, but the Emir has final say on all matters.[1] The current Council is composed entirely of members appointed by the Emir,[1] as no legislative elections have been held since 1970 when there were partial elections to the body.[1] Legislative elections have been postponed until at least 2019.[94]

Qatari law does not permit the establishment of political bodies or trade unions.[95]

Sharia law

According to Qatar’s Constitution, Sharia law is the main source of Qatari legislation.[96][97] In practice, Qatar’s legal system is a mixture of civil law and Sharia law.[98][99] Sharia law is applied to family law, inheritance, and several criminal acts (including adultery, robbery and murder). In some cases, Sharia-based family courts treat a female’s testimony as being worth half that of a man.[100] Codified family law was introduced in 2006. Islamic polygyny is permitted.[78]

Judicial corporal punishment is common in Qatar due to the Hanbali interpretation of Sharia Law. Flogging is employed as a punishment for alcohol consumption or illicit sexual relations.[101] Article 88 of Qatar’s criminal code declares that the penalty for adultery is 100 lashes,[102] and in 2006, a Filipino woman received that punishment.[102] In 2010, at least 18 people (mostly foreign nationals) were sentenced to receive between 40 and 100 lashes for offences involving “illicit sexual relations” or alcohol consumption.[103] In 2011, at least 21 people (mostly foreign nationals) were sentenced to between 30 and 100 lashes for the same reasons,[104] and in 2012, six expatriates were sentenced to either 40 or 100 lashes.[101] Only Muslims considered medically fit are liable to have such sentences carried out. It is unknown if the sentences were implemented.[105] In April 2013, a Muslim expatriate was sentenced to 40 lashes for alcohol consumption,[106][107][108] and in June 2014, a Muslim expatriate was sentenced to 40 lashes for consuming alcohol and driving under the influence.[109] Stoning is a legal punishment in Qatar,[110] and apostasy and homosexuality are crimes punishable by the death penalty.[111][112] Blasphemy can result in up to seven years in prison, while proselytising can incur a 10-year sentence.[111] Homosexuality is a crime punishable by the death penalty.

Alcohol consumption is partially legal in Qatar; some five-star luxury hotels are allowed to sell alcohol to their non-Muslim customers.[113][114] Muslims are not allowed to consume alcohol, and those caught consuming it are liable to flogging or deportation. Non-Muslim expatriates can obtain a permit to purchase alcohol for personal consumption. The Qatar Distribution Company (a subsidiary of Qatar Airways) is permitted to import alcohol and pork; it operates the one and only liquor store in the country, which also sells pork to holders of liquor licences.[115][116] Qatari officials have also indicated a willingness to allow alcohol in “fan zones” at the 2022 FIFA World Cup.[117]

Until 2011, restaurants on the Pearl-Qatar (a man-made island near Doha) were allowed to serve alcoholic drinks.[113][114] In December of that year, however, restaurants there were told to stop selling liquor.[113][118] No explanation was given for the ban,[113][114] but it was speculated that the government wanted to project a more pious image in advance of the country’s first election of a royal advisory body, and there were rumours of a financial dispute between the government and the resort’s developers.[118]

In 2014, a modesty campaign was launched to remind tourists of the country’s restrictive dress code.[119] Female tourists were advised not to wear leggings, miniskirts, sleeveless dresses, or short or tight clothing in public. Men were warned against wearing only shorts and singlets.[120]

Human rights

According to the U.S. State Department, expatriate workers from nations throughout Asia and parts of Africa voluntarily migrate to Qatar as low-skilled labourers or domestic servants, but some subsequently face conditions indicative of involuntary servitude. Some of the more common labour rights violations include beatings, withholding of payment, charging workers for benefits for which the employer is responsible, restrictions on freedom of movement (such as the confiscation of passports, travel documents, or exit permits), arbitrary detention, threats of legal action, and sexual assault.[121] Many migrant workers arriving for work in Qatar have paid exorbitant fees to recruiters in their home countries.[121]

As of 2014, certain provisions of the Qatari Criminal Code allows punishments such as flogging and stoning to be imposed as criminal sanctions. The UN Committee Against Torture found that these practices constituted a breach of the obligations imposed by the UN Convention Against Torture.[122][123] Qatar retains the death penalty, mainly for threats against national security. Use of the death penalty is rare and no state executions have taken place in Qatar since 2003.[124] In Qatar, homosexual acts are illegal and can be punished by death.[125]

Under the provisions of Qatar’s sponsorship law, sponsors have the unilateral power to cancel workers’ residency permits, deny workers’ ability to change employers, report a worker as “absconded” to police authorities, and deny permission to leave the country.[121]As a result, sponsors may restrict workers’ movements and workers may be afraid to report abuses or claim their rights.[121] According to the ITUC, the visa sponsorship system allows the exaction of forced labour by making it difficult for a migrant worker to leave an abusive employer or travel overseas without permission.[126] Qatar also does not maintain wage standards for its immigrant labourers. Qatar commissioned international law firm DLA Piper to produce a report investigating the immigrant labour system. In May 2014 DLA Piper released over 60 recommendations for reforming the kafala system including the abolition of exit visas and the introduction of a minimum wage which Qatar has pledged to implement.[127]

In May 2012, Qatari officials declared their intention to allow the establishment of an independent trade union.[128] Qatar also announced it will scrap its sponsor system for foreign labour, which requires that all foreign workers be sponsored by local employers.[128]Additional changes to labour laws include a provision guaranteeing that all workers’ salaries are paid directly into their bank accounts and new restrictions on working outdoors in the hottest hours during the summer.[129] New draft legislation announced in early 2015 mandates that companies that fail to pay workers’ wages on time could temporarily lose their ability to hire more employees.[130]

In October 2015 Qatar’s Emir signed into law new reforms to the country’s sponsorship system, with the new law taking effect within one year.[131] Critics claim that the changes could fail to address some labour rights issues.[132][133][134]

The country enfranchised women at the same time as men in connection with the 1999 elections for a Central Municipal Council.[90][135] These elections—the first ever in Qatar—were deliberately held on 8 March 1999, International Women’s Day.[90]

Foreign relations

Former Emir Hamad bin Khalifa Al Thani and U.S. Secretary of State John Kerry in 2013.

As a small country with larger neighbours, Qatar seeks to project influence and protect its state and ruling dynasty.[136] The history of Qatar’s alliances provides insight into the basis of their policy. Between 1760 and 1971, Qatar sought formal protection from the high transitory powers of the Ottomans, British, the Al-Khalifa’s from Bahrain, the Arabians, and the Wahhabis from Saudi Arabia.[137][page needed] Qatar’s rising international profile and active role in international affairs has led some analysts to identify it as a middle power. Qatar was an early member of OPEC and a founding member of the Gulf Cooperation Council (GCC). It is a member of the Arab League. The country has not accepted compulsory International Court of Justice jurisdiction.[1]

Qatar also has bilateral relationships with a variety of foreign powers. Qatar hosts the Al Udeid Air Base, a joint U.S.-British base, which acts as the hub for all American and British air operations in the Persian Gulf.[138] It has allowed American and British forces to use an air base to send supplies to Iraq and Afghanistan.[139] Despite hosting this strategic military installation, Qatar is not always a strong Western ally. Qatar has allowed the Afghan Taliban to set up a political office inside the country and has close ties to Iran, including a shared natural gas field.[140] According to leaked documents published in The New York Times, Qatar’s record of counter-terrorism efforts was the “worst in the region”.[141] The cable suggested that Qatar’s security service was “hesitant to act against known terrorists out of concern for appearing to be aligned with the U.S. and provoking reprisals”.[141]

Qatar has mixed relations with its neighbours in the Persian Gulf region. Qatar signed a defence co-operation agreement with Iran,[142] with whom it shares the largest single non-associated gas field in the world. It was the second nation, the first being France, to have publicly announced its recognition of the Libyan opposition‘s National Transitional Council as the legitimate government of Libya amidst the 2011 Libyan civil war.[143]

Qatar’s flag in Libya after the Libyan Civil War; Qatar played an influential role during the Arab Spring.

In 2014, Qatar’s relations with Bahrain, Saudi Arabia, and the United Arab Emirates came to a boiling point over Qatar’s support for the Muslim Brotherhood[77] and extremist groups in Syria.[144] This culminated in the three aforementioned countries withdrawing their ambassadors from Qatar in March 2014.[145] When the ambassadors withdrew, the GCC was reportedly on the verge of a crisis linked to the emergence of distinct political blocs with conflicting interests. Saudi Arabia, the UAE and Bahrain were engaged in a political struggle with Qatar, while Oman and Kuwait represent a non-aligned bloc within the GCC.[145] Relations between the countries improved after the Gulf Cooperation Council (GCC) announced Bahrain, Saudi Arabia, and the UAE returned their diplomats to Qatar.[146] Islam Hassan, a researcher in Persian Gulf Studies at Qatar University, claims that, with the resolution of the GCC crisis, Qatar reached a new level of political maturity. He goes on to assert that Qatar managed to bring an end to the crisis without changing any of its foreign policy principles or abandoning its allies.[145]

According to the Al Jazeera America, “Numerous reports suggest that the Saudi-led coalition against opposition groups in Yemen has indiscriminately attacked civilians and used cluster bombs in civilian-populated areas, in violation of international law.”[147]

In recent years, Qatar has been using Islamist militants in a number of countries including Egypt, Syria, Libya, Somalia and Mali to further its foreign policy. Courting Islamists from the Muslim Brotherhood to Salafist groups has served as a power amplifier for the country, as it believes since the beginning of the Arab Spring that these groups represented the wave of the future.[141][136][148] David Cohen, the Under Secretary for terrorism and financial intelligence at the U.S. Treasury, said that Qatar is a “permissive jurisdiction for terrorist financing.”[149]There is evidence that these groups supported by Qatar include the hard-line Islamic militant groups active in northern Syria.[141] As of 2015, Qatar, Saudi Arabia and Turkey are openly backing the Army of Conquest,[150][151] an umbrella group of anti-government forces fighting in the Syrian Civil War that reportedly includes an al-Qaeda linked al-Nusra Front and another Salafi coalition known as Ahrar ash-Sham.[149][152]

Qatar supported the democratically elected President Mohamed Morsi with diplomatic support and the state-owned Al Jazeera network before he was deposed in a military coup.[153][154] Qatar offered Egypt a $7.5 billion loan during the year he was in power.[155]

Qatar’s alignment with Hamas, first reported in early 2012,[156] has drawn criticism from Israel, the United States, Egypt and Saudi Arabia, “who accuse Qatar of undermining regional stability by supporting Hamas.”[157]However, the Foreign Minister of Qatar has denied supporting Hamas, stating “We do not support Hamas but we support the Palestinians.”[158] Following a peace agreement, Qatar pledged $1 billion in humanitarian aid to Gaza.[159]

Qatar has hosted academic, religious, political, and economic conferences. The 11th annual Doha Forum recently brought in key thinkers, professionals of various backgrounds, and political figures from all over the world to discuss democracy, media and information technology, free trade, and water security issues. In addition, the forum has featured the Middle East Economic Future conference since 2006.[160] In more recent times, Qatar has hosted peace talks between rival factions across the globe. Notable among these include the Darfur Agreement. The Doha Declaration is the basis of the peace process in Darfur and it has achieved significant gains on the ground for the African region. Notable achievements included the restoration of security and stability, progress made in construction and reconstruction processes, return of displaced residents and uniting of Darfur people to face challenges and push forward the peace process.[161] Qatar donated £88.5million in funds to finance recovery and reconstruction in Darfur.[162]

In June 2017, Saudi Arabia, the UAE, Bahrain, Egypt and Yemen broke diplomatic ties with Qatar, accusing Qatar of supporting Islamist extremism and terrorism,[163] escalating a dispute over Qatar’s support of the Muslim Brotherhood, the world’s oldest Islamist movement.[164] Saudi Arabia explained the move to be a necessary measure in protecting the kingdom’s security. Qatari troops were also removed from the military coalition in Yemen. Egypt closed its airspace and seaports to all Qatari transportation.[164][165]

Military

Qatar’s Dassault Mirage 2000 flying over Libya.

The Qatar Armed Forces are the military forces of Qatar. The country maintains a modest military force of approximately 11,800 men, including an army (8,500), navy (1,800) and air force (1,500). Qatar’s defence expenditures accounted for approximately 4.2% of gross national product in 1993. Qatar has recently signed defence pacts with the United States and United Kingdom, as well as with France earlier in 1994. Qatar plays an active role in the collective defence efforts of the Gulf Cooperation Council; the other five members are Saudi Arabia, Kuwait, Bahrain, the UAE, and Oman. The presence of a large Qatari Air Base, operated by the United States and several other UN nations, provides a guaranteed source of defence and national security. In 2008 Qatar spent US$2.355 billion on military expenditures, 2.3% of the gross domestic product.[166] Qatari special forces have been trained by France and other Western countries, and are believed to possess considerable skill.[167] They also helped the Libyan rebels during the 2011 Battle of Tripoli.[167]

The Stockholm International Peace Research Institute (SIPRI) found that in 2010–14 Qatar was the 46th largest arms importer in the world. However, SIPRI writes, Qatar’s plans to transform and significantly enlarge its armed forces have accelerated. Orders in 2013 for 62 tanks and 24 self-propelled guns from Germany were followed in 2014 by a number of other contracts, including 24 combat helicopters and 3 AEW aircraft from the USA, and 2 tanker aircraft from Spain.[168]

Qatar’s military participated in the Saudi Arabian-led intervention in Yemen against the Shia Houthis. In 2015, Al Jazeera America reported: “Numerous reports suggest that the Saudi-led coalition against opposition groups in Yemen has indiscriminately attacked civilians and used cluster bombs in civilian-populated areas, in violation of international law.”[169] Many civilians have been killed and the large parts of the infrastructure in this region is now destroyed.[170] Hospitals have also been bombed by the Saudis and those operating with them.[171][172]

Administrative divisions

Municipalities of Qatar since 2004

Since 2004, Qatar has been divided into seven municipalities (Arabic: baladiyah).[173]

  1. Madinat ash Shamal
  2. Al Khor
  3. Umm Salal
  4. Al Daayen
  5. Al Rayyan
  6. Doha
  7. Al Wakrah

For statistical purposes, the municipalities are further subdivided into 98 zones (as of 2010),[174] which are in turn subdivided into blocks.[175]

Geography

Desert Coast
Desert landscape in Qatar

The Qatari peninsula 160 kilometres (100 mi) protrudes into the Persian Gulf north of Saudi Arabia. It lies between latitudes 24° and 27° N, and longitudes 50° and 52° E. Most of the country consists of a low, barren plain, covered with sand. To the southeast lies the Khor al Adaid (“Inland Sea“), an area of rolling sand dunes surrounding an inlet of the Persian Gulf. There are mild winters and very hot, humid summers.

The highest point in Qatar is Qurayn Abu al Bawl at 103 metres (338 ft)[1] in the Jebel Dukhan to the west, a range of low limestone outcroppings running north-south from Zikrit through Umm Bab to the southern border. The Jebel Dukhan area also contains Qatar’s main onshore oil deposits, while the natural gas fields lie offshore, to the northwest of the peninsula.

Biodiversity and environment

Qatari Ostriches

Qatar signed the Rio Convention on Biological Diversity on 11 June 1992, and became a party to the convention on 21 August 1996.[176] It has subsequently produced a National Biodiversity Strategy and Action Plan, which was received by the convention on 18 May 2005.[177] A total of 142 fungal species have been recorded from Qatar.[178] A book recently produced by the Ministry of Environment documents the lizards known or believed to occur in Qatar, based on surveys conducted by an international team of scientists and other collaborators.[179]

For two decades, Qatar has had the highest per-capita carbon dioxide emissions in the world, at 49.1 metric tons per person in 2008.[180] Qataris are also some of the highest consumers of water per capita per day, using around 400 litres.[181]

In 2008 Qatar launched its National Vision 2030 which highlights environmental development as one of the four main goals for Qatar over the next two decades. The National Vision pledges to develop sustainable alternatives to oil-based energy to preserve the local and global environment.[182]

Climate

[hide]Climate data for Qatar
Month Jan Feb Mar Apr May Jun Jul Aug Sep Oct Nov Dec Year
Average high °C (°F) 22
(72)
23
(73)
27
(81)
33
(91)
39
(102)
42
(108)
42
(108)
42
(108)
39
(102)
35
(95)
30
(86)
25
(77)
33.3
(91.9)
Average low °C (°F) 14
(57)
15
(59)
17
(63)
21
(70)
27
(81)
29
(84)
31
(88)
31
(88)
29
(84)
25
(77)
21
(70)
16
(61)
23
(73.5)
Average precipitation mm (inches) 12.7
(0.5)
17.8
(0.701)
15.2
(0.598)
7.6
(0.299)
2.5
(0.098)
0
(0)
0
(0)
0
(0)
0
(0)
0
(0)
2.5
(0.098)
12.7
(0.5)
71
(2.794)
Source: http://us.worldweatheronline.com/doha-weather-averages/ad-dawhah/qa.aspx

Economy

Graphical depiction of Qatar’s product exports in 28 color-coded categories (2011).

Commercial district in Doha.

Before the discovery of oil, the economy of the Qatari region focused on fishing and pearl hunting. Report prepared by local governors of Ottoman Empire in 1892 states that total income from pearl hunting in 1892 is 2,450,000 kran.[68] After the introduction of the Japanese cultured pearl onto the world market in the 1920s and 1930s, Qatar’s pearling industry crashed. Oil was discovered in Qatar in 1940, in Dukhan Field.[183] The discovery transformed the state’s economy. Now, the country has a high standard of living for its legal citizens. With no income tax, Qatar (along with Bahrain) is one of the countries with the lowest tax rates in the world. The unemployment rate in June 2013 was 0.1%.[184] Corporate law mandates that Qatari nationals must hold 51% of any venture in the Emirate.[78]

As of 2016, Qatar has the fourth highest GDP per capita in the world, according to the International Monetary Fund[5] It relies heavily on foreign labour to grow its economy, to the extent that migrant workers compose 86% of the population and 94% of the workforce.[185][186] Qatar has been criticised by the International Trade Union Confederation.[187] The economic growth of Qatar has been almost exclusively based on its petroleum and natural gas industries, which began in 1940.[188] Qatar is the leading exporter of liquefied natural gas.[167] In 2012, it was estimated that Qatar would invest over $120 billion in the energy sector in the next ten years.[189] The country is a member state of Organization of Petroleum Exporting Countries (OPEC), having joined the organisation in 1961.[190]

In 2012, Qatar retained its title of richest country in the world (according to per capita income) for the third time in a row, having first overtaken Luxembourg in 2010. According to the study published by the Washington based Institute of International Finance, Qatar’s per capita GDP at purchasing power parity (PPP) was $106,000 (QR387,000) in 2012, helping the country retain its ranking as the world’s wealthiest nation. Luxembourg came a distant second with nearly $80,000 and Singapore third with per capita income of about $61,000. The research put Qatar’s GDP at $182bn in 2012 and said it had climbed to an all-time high due to soaring gas exports and high oil prices. Its population stood at 1.8 million in 2012. The same study published that Qatar Investment Authority (QIA), with assets of $115bn, was ranked 12th among the richest sovereign wealth funds in the world.[191]

Established in 2005, Qatar Investment Authority is the country’s sovereign wealth fund, specialising in foreign investment.[192] Due to billions of dollars in surpluses from the oil and gas industry, the Qatari government has directed investments into United States, Europe, and Asia Pacific. As of 2013, the holdings were valued at $100 billion in assets. Qatar Holding is the international investment arm of QIA. Since 2009, Qatar Holding has received $30–40bn a year from the state. As of 2014, it has investments around the world in Valentino, Siemens, Printemps, Harrods, The Shard, Barclays Bank, Heathrow Airport, Paris Saint-Germain F.C., Volkswagen Group, Royal Dutch Shell, Bank of America, Tiffany, Agricultural Bank of China, Sainsbury’s, BlackBerry,[193] and Santander Brasil.[194][195]

The country is free from taxes, however, authorities have announced plans to levy taxes on junk food and luxury items in the coming years. The taxes would be implemented on goods that harm the human body – for example fast food, tobacco products, and soft drinks. The roll out of these initial taxes is believed to be due to the fall in oil prices and a deficit that the country faced in the year 2016. Additionally, the country has seen job cuts in the year 2016 from its petroleum companies and other sectors in the government.[196] [197]

Energy

Qatar Airways Airbus A380, Qatar Airways, one of the world’s largest airlines, links over 150 international destinations from its base in Doha.

As of 2012, Qatar has proven oil reserves of 15 billion barrels and gas fields that account for more than 13% of the global resource. As a result, it is the richest state per-capita in the world. None of its 2 million residents live below the poverty line and less than 1% are unemployed.[198]

Qatar’s economy was in a downturn from 1982 to 1989. OPEC quotas on crude oil production, the lower price for oil, and the generally unpromising outlook on international markets reduced oil earnings. In turn, the Qatari government’s spending plans had to be cut to match lower income. The resulting recessionary local business climate caused many firms to lay off expatriate staff. With the economy recovering in the 1990s, expatriate populations, particularly from Egypt and South Asia, have grown again.

Oil production will not long remain at peak levels of 500,000 barrels (80,000 m³) per day, as oil fields are projected to be mostly depleted by 2023. However, large natural gas reserves have been located off Qatar’s northeast coast. Qatar’s proved reserves of gas are the third-largest in the world, exceeding 250 trillion cubic feet (7,000 km³). The economy was boosted in 1991 by completion of the $1.5-billion Phase I of North Field gas development. In 1996, the Qatargas project began exporting liquefied natural gas (LNG) to Japan. Further phases of North Field gas development costing billions of dollars are in various stages of planning and development.

Qatar’s heavy industrial projects, all based in Umm Said, include a refinery with a 50,000 barrels (8,000 m³) per day capacity, a fertiliser plant for urea and ammonia, a steel plant, and a petrochemical plant. All these industries use gas for fuel. Most are joint ventures between European and Japanese firms and the state-owned Qatar General Petroleum Corporation (QGPC). The US is the major equipment supplier for Qatar’s oil and gas industry, and US companies are playing a major role in North Field gas development.[198]

Qatar’s National Vision 2030 has made investment in renewable resources a major goal for the country over the next two decades.[182] Qatar pursues a vigorous programme of “Qatarisation“, under which all joint venture industries and government departments strive to move Qatari nationals into positions of greater authority. Growing numbers of foreign-educated Qataris, including many educated in the US, are returning home to assume key positions formerly occupied by expatriates. To control the influx of expatriate workers, Qatar has tightened the administration of its foreign manpower programmes over the past several years. Security is the principal basis for Qatar’s strict entry and immigration rules and regulations.[198]

Demographics

Skyline of Doha

The number of people in Qatar fluctuates considerably depending on the season, since the country relies heavily on migrant labour. In early 2017, Qatar’s total population was 2.6 million, of which 313,000 were Qatari citizens (12%) and 2.3 million were expatriates.[21] Non-Arab foreigners make up the vast majority of Qatar’s population; Indians are the largest community, numbering 650,000 in 2017,[21] followed by 350,000 Nepalis, 280,000 Bangladeshis, 260,000 Filipinos, 200,000 Egyptians, 145,000 Sri Lankans and 125,000 Pakistanis among many other nationalities.[21]

Qatar’s first demographic records date back to 1892, and were conducted by Ottoman governors in the region. Based on this census, which includes only the residents in cities, the total population in 1892 was 9,830.[68]

Populations
Year Pop. ±%
1904 27,000
1970 111,133 +311.6%
1986 369,079 +232.1%
1997 522,023 +41.4%
2004 744,029 +42.5%
2010 1,699,435 +128.4%
2013 1,903,447 +12.0%
2016 2,545,000 +33.7%
Source: Qatar Statistics Authority (1904–2004);[199]2010 Census;[3] 2013 est.[200][201] 2016[202]

The 2010 census recorded the total population at 1,699,435.[3] In January 2013, the Qatar Statistics Authority estimated the country’s population at 1,903,447, of which 1,405,164 were males and 498,283 females.[200] At the time of the first census, held in 1970, the population was 111,133.[199] The population has tripled in the decade to 2011, up from just over 600,000 people in 2001, leaving Qatari nationals as less than 15% of the total population.[201] The influx of male labourers has skewed the gender balance, and women are now just one-quarter of the population.

Projections released by Qatar Statistical Authority indicates that the total population of Qatar could reach 2.8 million by 2020. Qatar’s National Development Strategy (2011–16) had estimated that the country’s population would reach 1.78m in 2013, 1.81m in 2014, 1.84m in 2015 and 1.86m in 2016 – the yearly growth rate being merely 2.1%. But the country’s population has soared to 1.83 million by the end of 2012, showing 7.5% growth over the previous year.[203] Qatar’s total population hit a record high of 2.46 million in November 2015, an increase of 8.5% from the previous year, far exceeding official projections.[204]

Religion

Mosque in Qatar

Religion in Qatar (2010)[205][206]

  Islam (67.7%)
  Christianity (13.8%)
  Hinduism (13.8%)
  Buddhism (3.1%)
  Others (0.7%)
  Unaffiliated (0.9%)

Islam is Qatar’s predominant religion and enjoys official status.[207] Most Qatari citizens belong to the Salafi Muslim movement of Sunni Islam, about 20% of Muslims in Qatar follow Shia Islam with other Muslims sects being very small in number.[208][209][210][211] Qatar is 67.7% Muslim, 13.8% Christian, 13.8% Hindu and 3.1% are Buddhist– other religions and religiously unaffiliated people accounted for the remaining 1.6%.[212] Sharia law is the main source of Qatari legislation according to Qatar’s Constitution.[96][97]

The Christian population is composed almost entirely of foreigners. Since 2008, Christians have been allowed to build churches on ground donated by the government,[213] though foreign missionary activity is officially discouraged.[214] Active churches include the Mar Thoma Church, Malankara Orthodox Syrian Church, the Roman Catholic Church of Our Lady of the Rosary and the Anglican Church of the Epiphany.[215][216][217] There are also two Mormon wards.[215][216][217]

Languages

Arabic is the official language of Qatar, with Qatari Arabic the local dialect. Qatari Sign Language is the language of the deaf community. English is commonly used as a second language,[218]and a rising lingua franca, especially in commerce, to the extent that steps are being taken to try to preserve Arabic from English’s encroachment.[219] English is particularly useful for communication with Qatar’s large expatriate community. Reflecting the multicultural make-up of the country, many other languages are also spoken, including Baluchi, Hindi, Malayalam, Urdu, Pashto, Tamil, Telugu, Nepali, Sinhalese, Bengali, and Tagalog, Bahasa Indonesia.[220]

In 2012, Qatar joined the international French-speaking organisation of La Francophonie (OIF) as a new associate member. However, in December 2013, the French daily Le Monde revealed that Qatar, which has very few native French speakers, had not yet paid any contribution to the OIF,[221] while the outgoing Administrator of the OIF complained in 2015 that Qatar had not kept any of the promises it made when it joined the organisation and had never paid its annual membership fees.[222]

Culture

Qatar’s culture is similar to other countries in Eastern Arabia, being significantly influenced by Islam. Qatar National Day, hosted annually on 18 December, has had an important role in developing a sense of national identity.[223] It is observed in remembrance of Jassim bin Mohammed Al Thani‘s succession to the throne and his subsequent unification of the country’s various tribes.[224][225] Since 1 July 2008, Hamad Bin Abdulaziz Al-Kawari has been the Minister for Culture, Arts and Heritage of Qatar.

Arts and museums

Several senior members of Qatar’s ruling Al Thani family are noted collectors of Islamic and contemporary art.

The Museum of Islamic Art, opened in 2008, is regarded as one of the best museums in the region.[226] This, and several other Qatari museums, like the Arab Museum of Modern Art, falls under the Qatar Museums Authority (QMA) which is led by Sheikha Al-Mayassa bint Hamad bin Khalifa Al-Thani, the sister of the ruling Emir of the State of Qatar, and the prominent collector and art patron Sheikh Hassan bin Mohammed Al Thani.[227] The QMA also sponsors artistic events abroad, such as major exhibitions by Takahashi Murakami in Versailles (2010) and Damien Hirst in London (2012).

Qatar is the world’s biggest buyer in the art market by value.[228] The Qatari cultural sector is being developed to enable the country to reach world recognition to contribute to the development of a country that comes mainly from its resources from the gas industry.[229]

Media

The news desk of Al Jazeera English, a Qatari news channel

Qatar’s media was classified as “not free” in the 2014 Freedom of the Press report by Freedom House.[230] TV broadcasting in Qatar was started in 1970.[231] Al Jazeera is a main television network headquartered in Doha, Qatar. Al Jazeera initially launched in 1996 as an Arabic news and current affairs satellite TV channel of the same name, but has since expanded into a global network of several speciality TV channels known collectively as the Al Jazeera Media Network.

It has been reported that journalists practice self-censorship, particularly in regards to the government and ruling family of Qatar.[232] Criticism of the government, Emir and ruling family in the media is illegal. According to article 46 of the press law “The Emir of the state of Qatar shall not be criticised and no statement can be attributed to him unless under a written permission from the manager of his office.”[233] Journalists are also subject to prosecution for insulting Islam.[230]

In 2014, a Cybercrime Prevention Law was passed. The law is said to restrict press freedom, and carries prison sentences and fines for broad reasons such as jeopardising local peace or publishing false news.[234] The Gulf Center for Human Rights has stated that the law is a threat to freedom of speech and has called for certain articles of the law to be revoked.[235]

Press media has undergone expansion in recent years. There are currently seven newspapers in circulation in Qatar, with four being published in Arabic and three being published in English.[236] There are also newspapers from India, Nepal and Sri Lanka with editions printed from Qatar.

In regards to telecommunication infrastructure, Qatar is the highest ranked Middle Eastern country in the World Economic Forum’s Network Readiness Index (NRI) – an indicator for determining the development level of a country’s information and communication technologies. Qatar ranked number 23 overall in the 2014 NRI ranking, unchanged from 2013.[237]

Music

The music of Qatar is based on Bedouin poetry, song and dance. Traditional dances in Doha are performed on Friday afternoons; one such dance is the Ardah, a stylised martial dance performed by two rows of dancers who are accompanied by an array of percussion instruments, including al-ras (a large drum whose leather is heated by an open fire), tambourines and cymbals with small drums.[238] Other percussion instruments used in folk music include galahs (a tall clay jar) and tin drinking cups known as tus or tasat, usually used in conjunction with a tabl, a longitudinal drum beaten with a stick.[239] String instruments, such as the oud and rebaba, are also commonly used.[238]

Sport

Association football is the most popular sport in Qatar, both in terms of players and spectators.[240] The Qatar national under-20 team finished runners-up to West Germany in the 1981 FIFA World Youth Championship after a 4–0 defeat in the final. In January 2011, the Asian Football Confederation’s fifteenth Asian Cup was held in Qatar. It was the second time Qatar had hosted the tournament, with the other instance being the 1988 edition.[241]

On 2 December 2010, Qatar won their bid to host the 2022 FIFA World Cup, despite never previously qualifying for the FIFA World Cup Finals.[242] Local organisers are planning to build 9 new stadiums and expand 3 existing stadiums for this event. Qatar’s winning bid for the 2022 World Cup was greeted enthusiastically in the Persian Gulf region as it was the first time a country in the Middle East had been selected to host the tournament. However, the bid has been embroiled in much controversy, including allegations of bribery and interference in the investigation of the alleged bribery. European football associations have also objected to the 2022 World Cup being held in Qatar for a variety of reasons, from the impact of warm temperatures on players’ fitness, to the disruption it might cause in European domestic league calendars should the event be rescheduled to take place during winter.[243][244] In May 2014, Qatari football official Mohammed bin Hammam was accused of making payments totalling £3m to officials in return for their support for the Qatar bid.[245] However, a FIFA inquiry into the bidding process in November 2014 cleared Qatar of any wrongdoing.[246]

The Guardian, a British national daily newspaper, produced a short documentary named “Abuse and exploitation of migrant workers preparing emirate for 2022”.[247] A 2014 investigation by The Guardian reports that migrant workers who have been constructing luxurious offices for the organisers of the 2022 World Cup have not been paid in over a year, and are now “working illegally from cockroach-infested lodgings.”[248] For 2014, Nepalese migrants involved in constructing infrastructure for the 2022 World Cup died at a rate of one every two days.[249] The Qatar 2022 organising committee have responded to various allegations by claiming that hosting the World Cup in Qatar would act as a “catalyst for change” in the region.[250]

Though football is the most popular sport, other team sports have experienced considerable success at senior level. In 2015, the national handball team emerged as runners-up to France in the World Men’s Handball Championship as hosts, however the tournament was marred by numerous controversies regarding the host nation and its team.[251] Further, in 2014, Qatar won the world championship in men’s 3×3 basketball.[252]

Khalifa International Tennis and Squash Complex in Doha hosted the WTA Tour Championships in women’s tennis between 2008 and 2010. Doha holds the WTA Premier tournament Qatar Ladies Open annually. Since 2002, Qatar has hosted the annual Tour of Qatar, a cycling race in six stages. Every February, riders are racing on the roads across Qatar’s flat land for six days. Each stage covers a distance of more than 100 km, though the time trial usually is a shorter distance. Tour of Qatar is organised by the Qatar Cycling Federation for professional riders in the category of Elite Men.[253]

The Qatar Army Skydiving Team has several different skydiving disciplines placing among the top nations in the world. The Qatar National Parachute team performs annually during Qatar’s National Day and at other large events, such as the 2015 World Handball Championship.[254] Doha four times was the host of the official FIVB Volleyball Men’s Club World Championship and three times host FIVB Volleyball Women’s Club World Championship. Doha one time Host Asian Volleyball Championship.[255]

Education

Qatar University, main area

Qatar University, east view

Qatar hired the RAND Corporation to reform its K–12 education system.[167] Through Qatar Foundation, the country has built Education City, a campus which hosts local branches of the Weill Cornell Medical College, Carnegie Mellon School of Computer Science, Georgetown University School of Foreign Service, Northwestern’s Medill School of Journalism, Texas A&M’s School of Engineering, and other Western institutions.[167]

UNESCO Institute for Statistics Literacy Rate Qatar population plus 15 1985-2015

The illiteracy rate in Qatar was 3.1% for males and 4.2% for females in 2012, the lowest in the Arab-speaking world, but 86th in the world.[256] Citizens are required to attend government-provided education from kindergarten through high school.[257] Qatar University, founded in 1973, is the country’s oldest and largest institution of higher education.[258][259]

In November 2002, emir Hamad bin Khalifa Al Thani created The Supreme Education Council.[260] The Council directs and controls education for all ages from the pre-school level through the university level, including the “Education for a New Era” initiative which was established to try to position Qatar as a leader in education reform.[261][262] According to the Webometrics Ranking of World Universities, the top-ranking universities in the country are Qatar University (1,881st worldwide), Texas A&M University at Qatar (3,905th) and Weill Cornell Medical College in Qatar (6,855th).[263]

In 2008, Qatar established the Qatar Science & Technology Park in Education City to link those universities with industry. Education City is also home to a fully accredited international Baccalaureate school, Qatar Academy. In addition, two Canadian institutions, the College of the North Atlantic (headquarters in Newfoundland and Labrador) and the University of Calgary, have inaugurated campuses in Doha. Other for-profit universities have also established campuses in the city.[264] In 2009, under the patronage of H.H. Sheikha Mozah Al Missned, the World Innovation Summit for Education (WISE) was established with the aim of transforming education through innovation.

In 2012, Qatar was ranked third from the bottom of the 65 OECD countries participating in the PISA test of maths, reading and skills for 15- and 16-year-olds, comparable to Colombia or Albania, despite having the highest per capita income in the world.[265][266] As part of its national development strategy, Qatar has outlined a 10-year strategic plan to improve the level of education.[267] Furthermore, the government has launched educational outreach programs, such as Al-Bairaq. Al-Bairaq was launched in 2010 aims to provide high school students with an opportunity to experience a research environment in the Center for Advanced Materials in Qatar University. The program encompasses the STEM fields and languages.[268]

Healthcare

See also

https://en.wikipedia.org/wiki/Qatar

Story 2: President Trump Meets With Republican Congressional Leaders About Passing Tax Reform and Repealing and Replacing Obamacare By Labor Day — Videos — 

Image result for republican leaders meet at white house June 6 2017

Trump Talks Health Care Bill with GOP Leaders

Trump and GOP leaders meet at White House

Trump tweets about congressional leader meeting

President Trump Meets with Paul Ryan, Mitch McConnell & GOP Leaders 6/6/17

White House wants healthcare vote this summer, tax reform in fall

By Ayesha Rascoe | WASHINGTON

The White House is hoping to kick-start its stalled legislative agenda with congressional action on healthcare reform this summer that will clear the way for lawmakers to begin work on a major tax bill after the Sept. 4 Labor Day holiday, an administration official said on Monday.

Senate Republicans will vote on their version of healthcare reform legislation before lawmakers’ August recess, White House Director of Legislative Affairs Marc Short said. The House of Representatives passed a bill in May.

“There’s been a lot of discussions with staff,” Short told reporters at a briefing. “I think the text is pretty far along.”

Congress will then turn its focus to overhauling the tax code in September. While the administration would prefer that the effort not add to the national debt, Short stressed that the top priority would be cutting taxes.

“We want it to be revenue neutral, and we are still supportive of tax reform, but I am also saying to you that what we believe is most important to get the economy going is the tax cuts,” he said.

President Donald Trump will meet with the Republican leaders of the House and the Senate, Paul Ryan and Mitch McConnell, on Tuesday to discuss the path forward for his agenda, said White House spokeswoman Lindsay Walters.

Trump has pressed for quicker action in Congress, but his administration has also been hampered by investigations into alleged ties between Trump’s election campaign and Russia.

The Trump administration has outlined a broad plan that would cut tax rates for businesses and streamline the tax system for individuals. But, the proposal has been short on details — including the cost of the tax cuts and what loopholes would be closed.

The healthcare bill passed by the House could result in 23 million people losing insurance, the Congressional Budget Office estimated, a conclusion that Republicans were quick to challenge. The bill would also reduce federal deficits by $119 billion between 2017 and 2026, according to the analysis.

Short said he believed that the Senate healthcare bill would be “similar” to the House package.

Senator John Cornyn, the No.2 Republican in the Senate, said Monday evening he thought there would be a vote on a healthcare bill in the Senate in July.

Short also said the White House expects for Congress to raise the government’s borrowing authority, also known as the debt limit, before the August recess.

(Additional reporting Richard Cowan, Susan Cornwell and Ayesha Rascoe; Editing by Lisa Shumaker)

http://www.reuters.com/article/us-usa-trump-congress-idUSKBN18X031

Story 3: NSA Contractor Pluribus International Employee Reality Winner Leaked NSA Top Secret Document To Intercept — Videos —

Image result for reality winnerImage result for reality winner

NSA Hacking Leak: Who is Reality Winner?

The TRUTH About Leaker Reality Winner

ACLJ’s Jay Sekulow on NSA Leaker “Reality Winner”

Accused leaker plugged: The case of Reality Winner

Varney & Co : Napolitano on NSA contractor who leaked classified Russia report : 6/6/2017

Published on Jun 6, 2017

A federal contractor was arrested for leaking a classified, top secret NSA report on Russian hacking during the 2016 presidential election. Reality Leigh Winner appeared in U.S. District Court in Augusta, Ga., to face one charge of removing classified material from a government facility and mailing it to a news outlet.

That Intel Leaker? Arrested! Plus More with Judge Nap!

The Latest on “Reality Winner” NSA Leaker Charged and Arrested!

Accused Leaker Shared Anti-Trump Opinions Before Arrest

Accused Leaker Reality Winner Criticized Trump On Twitter

NSA Leak: Should employees be vetted better?

LIMBAUGH: NSA Leaker ‘Reality Winner’ Has Been RADICALIZED By American Pop Culture

The Intercept Burns Reality Winner: Deep State NSA Dupe and Clueless Unwitting Shill

Reality Winner Psy-Op: The Intercept Rats Out Deep State NSA Contractor Shill and Top Secret Leaker

Deep State NSA Contractor “Reality Winner” Caught Leaking Top Secret Info

Augusta contractor charged with mishandling top-secret U.S. materials

The government announced Reality Leigh Winner’s arrest Monday, about an hour after The Intercept reported that it had obtained a top-secret National Security Agency report about Russia’s interference. The NSA report, according to The Intercept, says Russian military intelligence officials executed a cyberattack on a U.S. voting software supplier and sent spear-phishing emails to more than 100 local election officials days before last November’s presidential election.

Former FBI Director James Comey is expected to testify Thursday before a Senate panel that is probing Russia’s interference in the presidential election. Comey was fired last month amid an FBI investigation into possible ties between Russia and Donald Trump’s campaign.

In announcing the charge against Winner, the U.S. Justice Department did not identify the classified material — which was dated on or about May 5 — or the news outlet. But The Intercept reported the NSA document it received anonymously was dated May 5.

Trump has railed against leaks from his government, calling for a Justice Department investigation. While Winner’s mother, Billie Winner-Davis, described her as no fan of the president, she added, “she’s not an activist.”

Winner is a contractor with Pluribus International Corporation and is assigned to a U.S. government facility in Georgia, where she has held a top-secret clearance, according to the U.S. Justice Department. The government started investigating her after the news outlet contacted it on Tuesday about an upcoming story concerning the intelligence materials.

The news outlet provided federal officials a copy of the classified information. Federal investigators said the pages appeared “folded and/or creased, suggesting they had been printed and hand-carried out of a secured space.” They quickly identified six people who had printed the materials, including Winner, and found she had email contact with the news agency.

While the Justice Department did not identify the material Winner allegedly mailed the news outlet, it did disclose it is classified at the “Top Secret level, indicating that its unauthorized disclosure could reasonably result in exceptionally grave damage to the national security, and is marked as such.”

Winner’s attorney, Titus Nichols, said she is a U.S. Air Force veteran with no criminal convictions. Winner’s last station with the Air Force was at Fort Meade in Maryland, where the NSA is located. She was still in federal custody Monday, Nichols said, and a court hearing about her detention is set for Thursday. Nichols plans to argue for her release.

“We look forward to getting the evidence and reviewing it and working hard to resolve this matter so my client can put it behind her and so she can go back on with her life,” he said. “She is a good person.”

Monday, Winner-Davis, 51, of Kingsville, Texas, said she spoke to her daughter by phone after she was arrested Saturday.

“She was just in shock,” she said. “She was very quiet. She was scared.”

While Trump is “not her man,” Winner-Davis said, “she hasn’t gone to any riots or marches.” Her daughter was involved with an organization called Athletes Serving Athletes, and she would run with disabled children, helping them along. She also loves to paint and sketch and is fond of drawing Jesus Christ. Her photos on social media show her to be a fitness buff who enjoyed yoga and weightlifting.

“Reality is a beautiful person,” she said. “She’s kind and caring.”

Winner’s posts on Facebook and Twitter have been decidedly anti-Trump. She appeared to be acting on her strong political opinions, even recently visiting the office of a Republican U.S. senator. A Feb. 14 post on Facebook showed her standing outside the downtown Atlanta district office of U.S. Sen. David Perdue. She wrote, “A great American once told us to go out and have conversations with one another.”

One person posted a comment asking her how it went. She responded that she got a “private 30-minute meeting,” not specifying with whom, and said Perdue’s “state policy director is going to send me email updates on some of my concerns regarding climate change and what the state of Georgia is doing to reduce dependency on fossil fuels.

“I was able to draw the parallel between the 2011 interview of President Bashar al Assad claiming utter ignorance of the human rights violations his citizens were protesting,” Winner wrote, “to Trump’s statement last week that the White House hadn’t received any calls about the DAPL (Dakota Access Pipeline), nor were there any protests before last week. They got the message.”

Since the news of her arrest broke, other Facebook users have hijacked many of her posts with angry messages. Below the post about her visit to Perdue’s office, someone wrote, “Hope they toss you in Ft. Leavenworth for the better part of a half century. You are a TRAITOR to your country and the Govt. should absolutely make an example out of you!”

Other recent comments: “Leakers wear prison sneakers” and “Enjoy life in prison you traitor.” Under a photo of Winner doing a pull-up someone posted: “Looks like you’ll have fun lifting weights in prison for the next 10-20 years.”

A few people offered messages of support, such as, “Hey girl we need to send you money for your defense fund.”

If convicted of the charge of “gathering, transmitting or losing defense information,” Winner could face up to 10 years in prison, court records show.

“Exceptional law enforcement efforts allowed us quickly to identify and arrest the defendant,” Deputy Attorney General Rod Rosenstein said in a prepared statement. “Releasing classified material without authorization threatens our nation’s security and undermines public faith in government. People who are trusted with classified information and pledge to protect it must be held accountable when they violate that obligation.”

Winner-Davis said she feels like she’s in a “whirlwind.” She traveled to Augusta and saw her daughter in court Monday but could not talk to her. They just exchanged glances.

“It’s hard not to cry,” she said.

Staff writers Johnny Edwards and Craig Schneider contributed to this story.

Read the FBI arrest application affidavit

http://www.ajc.com/news/breaking-news/augusta-contractor-charged-with-mishandling-top-secret-materials/VFqwwNvxTBe7w2BxkQaWNM/?icmp=AJC_internallink_06062017_digesttease_0606

‘My daughter served her country and ALWAYS does what’s right. But she is NOT a fan of Trump’ – NSA leaker Reality Winner’s parents say Air Force vet is ‘good girl’ being used for ‘political purposes’

  • Reality Winner charged with taking classified material from government facility
  • Her parents Billie-Jean and Gary Davis spoke at her Augusta, GA, home on Tuesday to tell of their concern and stress her good record
  • Her father Gary hinted at her defense tactic and said:  ‘We want her face out there rather than what’s being pulled for their own political purposes.’
  • The decorated former US Air Force linguist, who held Top Secret government clearance, made multiple posts on social media attacking Donald Trump
  • She tweeted ‘Trump is a c**t’ and a ‘piece of s**t’ in a series of posts and compared being white to terrorism
  • Her Nissan Cube was covered in bumper stickers including one saying ‘make America green again’ and the car had what looks like more NSA paper inside
  • Vegan, tattooed yoga instructor was fan of pollster Nate Silver, too ‘scared’ of climate change to have children and had signed picture of Anderson Cooper
  • If convicted of leaking intel, Winner could spend up to 10 years in a federal penitentiary 
  • Her case bears resemblance to Chelsea Manning, a former US Army soldier who leaked classified military documents to Wikileaks 

The mother of alleged NSA leaker Reality Leigh Winner told DailyMail.com today that her daughter always does what’s right, had served her country for six years and had never been in trouble with anyone.

Billie-Jean Davis said they didn’t know what was going on and wouldn’t know anything more until her daughter’s next hearing on Thursday.

‘We haven’t talked with her that much. We saw her only at the court hearing. I think she’s doing okay,’ she said. ‘I’m overwhelmed, I’m very worried about her. I never saw any of this coming.’

Mrs Davis spoke outside her daughter’s home alongside her husband Gary. He hinted at her defense by saying people were using her for ‘their own political purposes’.

If found guilty of breaching the Espionage Act by passing an NSA analysis of alleged Russian hacking to The Intercept, she faces up to ten years in prison.

Her father’s comments and Winner’s social media accounts, which is filled with loathing for Donald Trump, suggests she may try to claim her prosecution is politically-motivated and that she was acting as a whistleblower.

Reality Leigh Winner, a decorated former US Air Force linguist who held Top Secret government clearance, is accused of leaking NSA intelligence

Support: Billie-Jean Davis, Reality Winner's mother, and Gary Davis, her father, have flown from their home in Texas to be nearer their daughter, who will be arraigned on Thursday

Support: Billie-Jean Davis, Reality Winner’s mother, and Gary Davis, her father, have flown from their home in Texas to be nearer their daughter, who will be arraigned on Thursday

Right-on causes: Bumper stickers on the Bernie Sanders-supporting, Trump-hating alleged NSA leaker called for people to 'make America green again' and to 'pray for our priests'

Right-on causes: Bumper stickers on the Bernie Sanders-supporting, Trump-hating alleged NSA leaker called for people to ‘make America green again’ and to ‘pray for our priests’

Speaking outside the Augusta, Georgia, home where Winner was arrested on Saturday by ten car loads of FBI agents, her mother said her daughter had not been politically-minded growing up.

‘She’s a good girl, she’s a good person, she’s never been in trouble with anyone, the law or anything.

‘She always does what’s right. She served her country, she was in the Air Force for six years. She volunteers, she does whatever she can to make the community and the world better. That’s what she wants to do.’

Mrs Davis said that the 25-year-old did not share anything about her job with her parents but described her interests.

‘She’s very talented artist – she paints, she draws. She loves studying about anything and everything she can.

‘She taught herself Arabic before she even got in the Air Force. She’s a yoga instructor and very athletic. Loves to work out, that is her world.’

THE SAYINGS OF COMRADE REALITY WINNER

@realDonaldTrump the most dangerous entry to this country was the orange fascist we let into the white house 

– February 11, 2017

 TrumpIsAC***

– January 30, 2017

#notmypresident #Recount2016

– November 29, 2016 

@kanyewest you should make a shirt that says, ‘being white is terrorism’

– February 25, 2017 

You have got to be s****ing me right now. No one has called? The White House shut down their phone lines. There have been protests for months, at both the drilling site and and outside the White House. I’m losing my mind. If you voted for this piece of s***, explain this. He’s lying. He’s blatantly lying and the second largest supply of freshwater in the country is now at risk. #NoDAPL #NeverMyPresident #Resist 

-February 9, 2017 

 @altusda #NoUSDAblackout #RESISTANCE

– February 18, 2017

#F***ingWall

– January 26, 2017 

On people invading Augusta for Master’s week: They’re bringing drugs. They’re bringing crime. They’re rapists. And some, I assume, are good people,

– April 2, 2017 

Her mother said that her daughter, who speaks Farsi, Pashto and Dari – the principal languages of Iran and Afghanistan – was based solely in the U.S. for the Air Force and had not been sent overseas.

Mrs Davis said that Winner had called her father on Saturday. ‘She let him know that she was in trouble and that she had been arrested. She asked if we could come on up and take care of her animals.’

She said that her daughter had not appeared particularly upset about anything in relation to the Trump administration in recent months, despite her extensive social media postings.

‘Not anything more than our normal conversations. Not anything more than that. I never saw this coming.’

Her mother said her daughter did not have any association with any other hackers or groups.

‘Absolutely not,’ she said. ‘In fact if you look on her Facebook, she had posted that she actually went and met with the state representative here in Georgia, to have a sit-down talk with him about what was important to her.

‘[Their conversation] had to do with the climate and the North Dakota pipeline. That was her issue at that point.

‘She posted on Facebook, that instead of bashing people, do it the right way. That’s what kind of a girl she is.’

Her father, Gary Davis, added that they would be staying in Georgia ‘as long as we are needed. We want to make sure she is treated fairly and afforded all her rights.’

He added: ‘The side of Reality we know and love is not what’s being portrayed.

‘We want her face out there rather than what’s being pulled for their own political purposes. She’s a good kid and we are here to help her get through this.’

Neighbor Hank Thompson shared with DailyMail.com the scene on Saturday when Winner had been arrested.

He said that about ten cars with dark windows surrounded the house and had it cordoned off with police tape.

‘They were talking to her out on the step,’ he said. ‘She seemed nervous, I guess, with everything that’s going on.’

He said that she had only been at the property for a few months and was ‘pretty quiet’ in her comings and goings but that he occasionally saw a ‘tall, young man with a red pick-up truck’ at the house. He also said that the mail truck regularly stopped to deliver packages.

When she wasn't tweeting about Trump, Winner spent much of her free time working out

When she wasn’t tweeting about Trump, Winner spent much of her free time working out

Lots of paper: Reality Winner's car also housed other paperwork - it is unclear if these documents were connected with her work

Lots of paper: Reality Winner’s car also housed other paperwork – it is unclear if these documents were connected with her work

It has since been revealed that she was an outspoken opponent of Trump who once branded the president a c**t

It has since been revealed that she was an outspoken opponent of Trump who once branded the president a c**t

Winner’s posting show she was a Bernie Sanders supporter who hated Donald Trump. She even claimed that being white could be compared to terrorism.

It has since emerged the contractor who speaks four languages may have used her linguistics skills to work at a government ‘listening post’ which collects intelligence from the Middle East and Europe, The Daily Beast reported.

She is believed to have worked at the ‘Sweet Tea’ outpost in Fort Gordon, Georgia, where thousands of specialists allegedly work to translate and analyze intercepted messages.

The decorated former USAF linguist – who held Top Secret government clearance – made multiple posts on social media attacking Trump and joking about Russia’s influence in the election.

Under the alias Sara Winners, she made several tweets with the hashtag #NotMyPresident and #Recount 2016. She wrote that ‘Trump is a c**t’ and a ‘piece of s**t’ in a series of angry tweets over the past few months.

The outspoken Sanders supporter also posted a signed picture of CNN anchor Anderson Cooper, thanking her for her service.

During the run-up to presidential election, Winner – a keen bodybuilder and fitness fanatic – had joked about the Kremlin’s influence, saying: ‘On a positive note, this Tuesday when we become the United States of the Russian Federation, Olympic lifting will be the national sport.’

After Trump was declared president, the apparently distraught 25-year-old wrote: ‘Well. People suck.’

She also posted a signed picture of CNN anchor Anderson Cooper, thanking her for her service 

She also posted a signed picture of CNN anchor Anderson Cooper, thanking her for her service

Bernie Sanders-supporting Reality Winner served as a linguist in the US Air Force since 2013 and spoke Pashto, Farsi and Dari. Pictured here in uniform with her mother Billie

Bernie Sanders-supporting Reality Winner served as a linguist in the US Air Force since 2013 and spoke Pashto, Farsi and Dari. Pictured here in uniform with her mother Billie

She also tweeted to Nate Silver, the ex-New York Times pollster whose confident predictions that Clinton had as high as an 85 per cent chance of winning made him a laughing stock – but not to Winner.

‘I listened to you daily, and your podcast kept me sane,’ Winner wrote at the FiveThirtyEight podcast on November 9. ‘What the heck #betrayed #disillusioned.’

‘Privjet Russia’  tweeted Winner the following day, which translates to ‘Hi Russia.’

She also retweeted Sanders’ statement calling the president racist and xenophobic.

Winner has also frequently trolled the president, tweeting at him directly.

In response to a Trump tweet about immigrants coming from seven Muslim-majority countries  being ‘SO DANGEROUS’, Winner asked: ‘have you ever even met an Iranian?’

After the U.S. Department of Agriculture began blacking out public information, Winner tweeted ‘#RESISTANCE’.

Her frustration appears to have come to a head in May when Winner, a contractor with Pluribus International Corporation – a defense contractor that does work for the NSA – allegedly downloaded documents revealing that Russia had hacked an electoral voting machine.

She then posted the intel to online news site The Intercept who published the findings last month.

The leaked documents seemed to show Russia carried out cyber attacks on companies which produce software used during elections.

But the NSA were quickly able to link the leak back to Winner after The Intercept presented them with stolen documents for verification.

NSA officers were able to determine, by analyzing creases in the pages and a secret series of ‘tracking dots’ on the paper, that they had been printed at the NSA’s Augusta, Georgia offices.

Only six people had access to those printers so from there, it was simply a case of narrowing down the suspects. After agents found communication between Winner and the new site, she was arrested.

Winner is now facing up to ten years in jail if found guilty on charged of removing classified material from a government facility.

When Winner wasn’t posting about politics, her social media paints her as something of a loner.

Her life appears to have revolved around her frequent body building and work outs, her vegan diet, and her pets. She has countless selfies of herself working out at the gym, yet few photos of herself with friends.

The 25-year-old, who lists herself as ‘single’ recently held a ‘cativersary’ – complete with birthday cake for her cat Mina and regularly posted about her dog. She also revealed she had been ‘feeling so down.’

The intelligent US Air Force vet had just returned from a solo ‘spiritual journey’ to Belize in Central America when she was arrested.

In one of her vacation snaps, Winner – who appears to be very close with her family including sister Britty – revealed she had recently lost her step father Gary Winner who she considered her dad.

‘There is nothing that can fix the hole in my heart that you left behind,’ she wrote.

‘I still don’t know who I am without you here or how to keep moving forward without the one person who believed unconditionally in everything I want to do in life.

‘Old habits die hard, I still find myself making time to call you in the evenings or jotting down notes or stories to tell you next time we speak. It’s like I have a little piece of you here with me. I miss you, Dad.’

Billie Winner-Davis said that her daughter never discussed her work, and that her family didn’t know much information about her job as a government contractor.

She said Winner who had been a linguist for the U.S. Air Force and can speak middle eastern languages Farsi, Dari and Pashto.

Farsi is the principal language of Iran, while Dari and Pashto are the two most commonly-spoken languages of Afghanistan.

She won a commendation medal for he work as a Cryptologic Language Analyst before she left service in December 2016 at rank of senior airman.

 When she wasn't posting about politics, Winner's social media paints her as something of a loner whose main focus was on bodybuilding

 When she wasn’t posting about politics, Winner’s social media paints her as something of a loner whose main focus was on bodybuilding

Arrested: The government has charged Reality Leigh Winner (pictured), 25, a Georgia intelligence contractor, with passing secret documents to the media

Arrested: The government has charged Reality Leigh Winner (pictured), 25, a Georgia intelligence contractor, with passing secret documents to the media

She is the first person to have charges leveled against her in connection with leaks related to Russian election hacking

She is the first person to have charges leveled against her in connection with leaks related to Russian election hacking

Winner was employed by contractor Pluribus International Corporation in February, and had been working with access to top secret documents since then

Smarts appear to run in the family as her sister Britty is studying for a PhD in Pharmacology and Toxicology at Michigan State University.

Winner was an employee at Pluribus International Corporation based out of Alexandria, Virginia. She was then posted to a government agency in Georgia. She worked at the facility since February 13, and held Top Secret security clearance.

Pluribus is an analytical and engineering service that provides its services to federal, defense, security and the intelligence community on a contractual basis. The company has 22 locations across the world, including three in the Republic of Korea.

Her mother revealed that she is unsure if her daughter will be able to seek bond and that she has a hearing on Thursday.

‘I don’t know what they’re alleging,’ she told told The Daily Beast. ‘I don’t know who she might have sent it to. [DOJ] were very vague.

 President Trump (above on Monday) has repeatedly railed against leaks, and administration members have called on congressional committees to focus on alleged Russian interference

 President Trump (above on Monday) has repeatedly railed against leaks, and administration members have called on congressional committees to focus on alleged Russian interference

An NSA document published by The Intercept reveals a Russian-backed effort to target local government officials and U.S. firms as part of the campaign

An NSA document published by The Intercept reveals a Russian-backed effort to target local government officials and U.S. firms as part of the campaign

‘They said she mishandled and released documents that she shouldn’t have, but we had no idea what it pertained to or who.’

Winner’s case has divided opinion, with some branding her a ‘traitor’ but others hailing her as a hero.

It bears some resemblance to the case of Chelsea Manning, a transgender US Army soldier who was convicted by court-martial in July 2013 for leaking nearly three-quarters of a million classified or sensitive military materials to Wikileaks.

She said at the time she’d been moved to release the secret information because she ‘believed I was going to help people’. She wanted to provide a real record of the realities of war, and give a human face to the casualties.

Manning was sentenced to 35 years at the maximum-security U.S. Disciplinary Barracks at Fort Leavenworth but had her sentence commuted by then-President Obama to just seven years, and she was freed on May 17.

Just as with Winner, public reaction to news Manning leaked the document was mixed. Some hailed her as a 21st-century Tiananmen Square Tank Man after some believe the documents may have triggered the Arab Spring, while others denounced her as a traitor.

The Intercept report based on her leak has been largely overshadowed by her arrest.

It said a top secret NSA document revealed efforts by Russian military intelligence to conduct a spear phishing cyber attack on a company and on local voter registration.

The NSA document is titled ‘Spear-Phishing campaign TTPs used Against U.S. and Foreign Government Political Entities

It states that ‘It is unknown if the GRU (Russian military intelligence) was able to successfully compromise any of the entities targeted as part of this campaign. While this [redacted] cyber espionage program utilized some techniques that were similar to other Russian GRU cyber operations units, this activity demonstrated several characteristics that distinguish it from another major GRU spear-phishing program known as [redacted].’

‘Russian General Staff Main Intelligence Directorate actors… executed cyber espionage operations against a named U.S. company in August 2016, evidently to obtain information on elections-related software and hardware solutions,’ according to the document the Intercept published.

‘The actors likely used data obtained from that operation to… launch a voter registration-themed spear-phishing campaign targeting U.S. local government organizations.’

Previous analyses by the intelligence community have stated that Russia was behind hacking into the Democratic National Committee and Hillary Clinton’s campaign chair in an effort to impact the election, but have not provided evidence of a successful campaign to affect the vote count or voter rolls.

The feds got a warrant for Winner's arrest

The feds got a warrant for Winner’s arrest

The affidavit mentions a 'U.S. Government Agency' believed to be the NSA

The affidavit mentions a ‘U.S. Government Agency’ believed to be the NSA

Winner confessed to being the source quickly.

According to the FBI, ‘Winner agreed to talk with agents during the execution of the warrant. During that conversation, Winner admitted intentionally identifying and printing the classified intelligence reporting at issue despite not having a ‘need to know,’ and with knowledge that the intelligence reporting was classified.’

Without a lawyer present, ‘Winner further admitted removing the classified intelligence reporting from her office space, retaining it, and mailing it from Augusta, Georgia, to the news outlet, which she knew was not authorized to receive or possess the documents,’ according to the government.

The prosecution documents do not name The Intercept, but sources said it was the outlet the leak was to.

An affidavit by an FBI agent in support of an arrest warrant states that on June 1, the FBI was notified by a government agency that it had been contacted by an unnamed news outlet in connection to a story.

After examining the Top Secret document, investigators found pages appeared to be folded or creased – indicating it was printed and carried out of a ‘secured space’ by hand.

An audit concluded that six individuals had printed the document – including Winner.

Upon being interviewed, Winner admitted printing it without having a ‘need to know.’

According to the Intercept, the NSA sought redactions after being contacted, some of which were accepted.

President Trump has repeatedly railed against leaks, and administration members have called on congressional committees to focus not just on alleged Russian interference, but ‘unmasking’ of individuals in leaked governments and leak investigations.

‘It is my opinion that many of the leaks coming out of the White House are fabricated lies made up by the media,’ Trump tweeted last week.

HOW THE INTERCEPT REPORT COINCIDES WITH CHARGES AGAINST REALITY WINNER

The charges against Reality Winner, 25, coincided with a report by The Intercept that a top secret NSA document revealed efforts by Russian military intelligence to conduct a spear phishing cyber attack on a company and on local voter registration. 

‘Russian General Staff Main Intelligence Directorate actors … executed cyber espionage operations against a named U.S. company in August 2016, evidently to obtain information on elections-related software and hardware solutions,’ according to the document the Intercept published.

‘The actors likely used data obtained from that operation to … launch a voter registration-themed spear-phishing campaign targeting U.S. local government organizations.’

The Intercept story states that the documents raise the possibility that Russian-based hackers ‘may have breached at least some elements of the voting system,’ bringing the investigation of election interference to a new level. 

According to the FBI, ‘Winner agreed to talk with agents during the execution of the warrant. During that conversation, Winner admitted intentionally identifying and printing the classified intelligence reporting at issue despite not having a ‘need to know,’ and with knowledge that the intelligence reporting was classified.’

Without a lawyer present, ‘Winner further admitted removing the classified intelligence reporting from her office space, retaining it, and mailing it from Augusta, Georgia, to the news outlet, which she knew was not authorized to receive or possess the documents,’ according to the government.

An affidavit by an FBI agent in support of an arrest warrant states that on June 1, the FBI was notified by a government agency that it had been contacted by an unnamed news outlet in connection to a story.

After examining the Top Secret document, investigators found pages appeared to be folded or creased – indicating it was printed and carried out of a ‘secured space’ by hand.

An audit concluded that six individuals had printed the document – including Winner.

Upon being interviewed, Winner admitted printing it without having a ‘need to know.’ 

http://www.dailymail.co.uk/news/article-4578260/NSA-leaker-Reality-Winner-s-parents-say-served-country.html#ixzz4jKnlrQa5

 

Alleged NSA leaker met with Perdue staff months before arrest

Who is Reality Winner? The Accused NSA Leaker
The Augusta federal contractor who was charged Monday with leaking top-secret information to the press met with members of U.S. Sen. David Perdue’s staff earlier this year, the Republican’s office confirmed.

Reality Leigh Winner, a 25-year-old contractor with Pluribus International Corporation, posted a selfie with her eyebrows raised outside of the first-term senator’s Atlanta office to Facebook on Feb. 14.

“A great American once told us to go out and have conversations with one another,” Winner wrote in the post, in which she also wrote she was “feeling optimistic.”

A Perdue spokeswoman confirmed Tuesday that aides from the senator’s Atlanta office indeed met with Winner in February to discuss “environmental issues.”

Then-Senator-elect David Perdue in November 2014. JOHN SPINK/JSPINK@AJC.COM The Atlanta Journal-Constitution

“Our team meets with hundreds of Georgians monthly to discuss issues important to them,” the spokeswoman said in a statement. She said Perdue’s office does not ask about employment in routine meetings with constituents and that Winner’s work as a federal contractor did not come up then.

“The allegations against Ms. Winner are very serious, and if true, directly threaten our national security,” the spokeswoman said. “I trust our Justice Department will get to the bottom of this and handle it appropriately.”

Using a pseudonym, Winner frequently posted to Twitter about her liberal political views and her revulsion to President Donald Trump and his policies. Her feeds show she was particularly passionate about climate change, refugees, Syria’s civil war and the citizens of Iran, one of the U.S.’ top adversaries.

After a friend asked about her meeting with Perdue’s staff, Winner said it went “really well.”

“I can’t believe I got a private 30 minute meeting, and his state policy director is going to send me email updates on some of my concerns regarding climate change and what the state of Georgia is doing to reduce dependency on fossil fuels,” she wrote.

Winner said she also told Perdue staffers that senators should “not be afraid to directly state when our president or his cabinet tell outright lies.” She said her suggestion was “well heard.”

“I was able to draw the parallel between the 2011 interview of President Bashar al Assad claiming utter ignorance of the human rights violations his citizens were protesting,” Winner wrote, “to Trump’s statement last week that the White House hadn’t received any calls about the DAPL (Dakota Access Pipeline), nor were there any protests before last week. They got the message.”

http://www.ajc.com/news/state–regional-govt–politics/alleged-nsa-leaker-met-with-perdue-staff-months-before-arrest/3hkGgsRJhbN9mRl9gsy8aK/

Story 4: Wikileaks Julian Assange Critical Of Intercept and Reporter That Lead To Arrest of NSA Contractor Leaker Reality Winner –Videos

 

Image result for wikileaks julian assange critical reality winner leaker of classified documents

INTERCEPT BETRAYS WHISTLEBLOWER TO FEDS: Reporter Possibly Betrays Reality Leigh Winner

The Intercept Burns Reality Winner: Deep State NSA Dupe and Clueless Unwitting Shill

Reality Winner Psy-Op: The Intercept Rats Out Deep State NSA Contractor Shill and Top Secret Leaker

WikiLeaks Declares War on The Intercept

The FBI says a reporter led them to an NSA leaker. Julian Assange says that person, whom he suspects is an Intercept reporter, is a “menace” to sources, journalists, and democracy.

WikiLeaks founder Julian Assange told The Daily Beast he holds reporters—not just the Trump administration—responsible for the arrest of a U.S. intelligence contractor charged with leaking classified information.On Monday, the Justice Department said Reality Winner, a 25-year-old National Security Agency contractor, sent top secret information to a news outlet. The announcement came shortly after The Intercept published a series of NSA documents claiming that Russian hackers targeted a voting-software supplier and local election officials just prior to Election Day.
According to the affidavit, reporters for the unnamed news organization provided a copy of the printed NSA report to the agency in order to seek comment. The NSA claimed six people had printed out the report including Winner, who the agency said had been in contact with an unnamed news outlet.

“If the FBI affidavit is accurate the reporter concerned must be named, shamed and fired by whomever they work for to maintain industry standards,” Assange said via Twitter direct message through the WikiLeaks account on Tuesday.

“Source burning reporters are a menace,” he said. “They chill trust in all journalists which impedes public understanding.”

WikiLeaks offered a $10,000 reward for information “leading to the public exposure & termination” of the reporter.

“It seems likely that the FBI affidavit refers to The Intercept, but not certain, hence we say ‘suspected Intercept reporter,’ said Assange. “But whomever this reporter was they are a menace not only to sources but to all journalists by decreasing the trust between sources and journalist and ultimately the public. Democracy dies in darkness.”

Assange’s defense of leaking NSA documents that accuse Russia of interfering in the U.S. election is in contrast to his agreement last year that he was “1,000 percent” confident Russia did not give WikiLeaks hacked Democratic National Committee emails. While Assange did not comment on the content of the leaks, he defended the alleged leaker Monday night.

It doesn’t matter why she did it or the quality the report. Acts of non-elite sources communicating knowledge should be strongly encouraged.

As for The Intercept, it said in a statement Tuesday that it has “no knowledge of the identity of the person who provided us with the document,” before adding “the U.S. government has told news organizations that Winner was that individual.”

“While the FBI’s allegations against Winner have been made public through the release of an affidavit and search warrant, which were unsealed at the government’s request, it is important to keep in mind that these documents contain unproven assertions and speculation designed to serve the government’s agenda and as such warrant skepticism,” The Intercept’s statement reads.

The Intercept added it will not make further comments at this time.

With President Donald Trump’s call to prosecute leakers, WikiLeaks and Assange find themselves opposing the man who once said, “I love WikiLeaks.”

“The Trump administration has already capitalized on the incompetence or treachery of this reporter by gloating about her arrest in press release hours after the Intercept story broke,” Assange said. “Such press releases are designed to deter future sources.”

On his personal Twitter account, Assange expressed support for Winner’s actions, saying “she is a young women [sic] accused of courage in trying to help us know.”

View image on Twitter

Alleged NSA whistleblower Reality Leigh Winner must be supported. She is a young women accused of courage in trying to help us know.

The Intercept was launched in 2014 initially for the purposes of publishing documents released by Edward Snowden. They have faced criticism from WikiLeaks before. In 2014, The Intercept published a story about the NSA’s recording of cell phone calls from the Bahamas and WikiLeaks took issue with the publication redacting Afghanistan in its report.

http://www.thedailybeast.com/wikileaks-declares-war-on-the-intercept

 

Did the Intercept Betray Its NSA Source?

By Jake Swearingen

Image
Alleged leaker Reality Leigh Winner. Photo: reezlie/Instagram

How, exactly, did the FBI zero in on alleged NSA leaker Reality Leigh Winner? Winner, a contractor for the NSA, was quietly arrested on Sunday and charged with leaking top secret documents. According to the Justice Department, she confessed to printing out classified information while authorities were searching her home and vehicle. Those documents are now confirmed to be the same documents published by the Intercept on Monday afternoon about a Russian cyberattack on U.S. voting machines and officials. About an hour after the Intercept published the story, the Justice Department revealed to the press that it already had Winner in custody, and would be prosecuting her under the Espionage Act. It was an effective bit of showmanship.

The Intercept, for obvious reasons, is saying very little. A statement posted to the site describes the claims made in the government search affidavit and the criminal complaint as “unproven assertions and speculation designed to serve the government’s agenda and as such warrant skepticism.” Naturally, any specific details revealed by the publication could be used to build a case against its sources.

The understandable silence from the Intercept, combined with the fragmented details provided by the court documents, has led to a significant amount of back and forth on Twitter on how much culpability the Intercept has in Winner’s arrest — whether the Intercept’s bad “opsec” led to the government charging Winner, or if Winner’s own missteps led to her arrest. The discussion is more than just a journalistic pissing match: Not only does the site’s reputation as a safe place for anonymous leaks hang in the balance, but journalists and their sources at all publications are nervous about the capabilities of a Trump administration that has declared war on leakers everywhere.

If you go strictly by what’s contained in the FBI’s search affidavit, there were three important pieces of circumstantial evidence that led the Feds to Winner.

The first is that Winner had previous contact with the Intercept. It’s important to note here that — contra the assumptions of many on Twitter — her contact had nothing to do with the story, and occurred months before she even allegedly accessed the report that was leaked. She emailed the site on March 30 from her private Gmail account, asking for a transcript of a podcast. She emailed the site again on March 31, confirming “subscription to the service,” (likely one of the Intercept’s newsletters).

The second is that on May 24, a reporter from the Intercept reached out to an unnamed government contractor, trying to determine the validity of the leak. During the exchange, the Intercept revealed that the leak had been mailed with a postmark of Augusta, Georgia, where Winner lives. (Checking with other sources about the validity of a leak is not necessarily bad opsec; revealing specific information about the leak almost certainly is — though it’s also probably more common than journalists would like to admit.) The contractor told the Intercept that they believed the leak to be fake; when the Intercept returned on June 1, saying that the leak’s authenticity had been confirmed, the original anonymous government contractor turned around and alerted the NSA to the matter — including the key detail that the document had been mailed from Augusta.

The third, and most glaring, is that the Intercept provided a copy of the report itself to the NSA on May 30. It’s unclear if the Intercept gave the NSA a scanned copy of the printed material it had received, or a retyped or otherwise altered version, but the NSA then turned the report over to the FBI for further investigation. According to the FBI’s affidavit, Feds noticed that pages of the intelligence reporting appeared “folded and/or creased,” thus alerting them that the information had been printed. Per the affidavit, the government then found that only six people had printed that report, and Winner had no reason to do so — the report was outside of her job duties.

The “crease” has been bandied about in the press, but there’s good reason to believe that the Feds had a more sophisticated way of figuring out that the document had been printed out. The Intercept’s PDF of the document also contains “tracking dots,” barely visible yellow dots available on printed pages that allow anyone to determine the serial number, model date, and date and time of printed material. You can see these for yourself: Just screenshot the top-left corner of any page of the PDF and invert the colors in an image-editing tool. The dots should become immediately apparent. The tracking dots on the documents from the Intercept show a print date of May 9 at 6:20 from a printer with model number 54, serial number 29535218. (The last page of the PDF has a different set of tracking dots — it’s unclear why.)

If this is the copy that the Intercept also provided to the NSA, then the government likely knew enough to determine which employee had used that specific printer at that specific time — no need to see “creases” at all. In fact, the crease may be pretext to avoid mentioning tracking dots (or another forensic method) used to determine that the document was printed — a prosecutorial technique known as “parallel construction” that avoids revealing how evidence on a case was actually gathered.

The problem with apportioning blame in this case is that we don’t know if the Intercept handed over to the NSA the original copy of the report that they’d received — which would have been a grave security error — or if it was a photocopy or reprint that nonetheless betrayed some evidence.

And it’s important to note that the FBI and NSA didn’t need to know that the pages had even been printed. All material classified “top secret” (the highest security rating a document can receive) are stored in a massive government intranet known as the Joint Worldwide Intelligence Communications System, or JWICS. As detailed by New York Magazine contributer Yashar Ali on Twitter, this system logs everyone who accesses top secret documents, as well as what they do with them. Even if the Intercept had verified the document without alerting the NSA, and then paraphrased the entire report, after it published its story, the government would have quickly moved to determine who had accessed the document — and Winner would have, eventually, come under the same scrutiny.

Nonetheless, it’s clear that there were serious mistakes made by both the Intercept and its leaker. It’s quite reasonable for the Intercept to seek confirmation that the document in question was real with third-party sources, and eventually the NSA. But revealing the Augusta, Georgia, postmark to the third-party source clearly helped the government build its case. Providing a copy of the report seems to have, in some way, added to the government’s pile of evidence. And the decision to publish the PDF with the tracker dots unobscured — especially considering the Intercept likely had no knowledge that Winner was the leaker, and she was already in custody — is a baffling unforced error from a site that hinges on being a secure place to send documents.

Assuming Winner is the leaker, too, she made a mistake in contacting the Intercept at work — though given that it happened months before she allegedly sent the report, it’s hard to blame her. Still, Winner, as a contractor for the NSA and an Air Force veteran with top secret clearance, would have known as well as anyone that her traffic would be logged, and would also likely have known that accessing top secret documents — even without printing them out — would have thrown up red flags in the aftermath of a leak.

It’s worth reiterating that the FBI has a strong incentive to cast the Intercept as incompetent handlers of sources. There’s a decent chance that the case was built against Winner in a completely different way — one that didn’t rely on mistakes by the journalists at all — and this particular parallel construction of the case is being put forward to cast aspersions on one of the most notorious investigative outfits online. But there’s no escaping that the mistakes made by the Intercept and Winner — small as they may have been — were enough to get a search warrant and indictment signed. If there’s any consolation for leakers and the journalists they rely on, it’s that the affidavit provides an object lesson in protecting sources.

http://nymag.com/selectall/2017/06/intercept-nsa-leaker-reality-winner.html

The Pronk Pops Show Podcasts Portfolio

Listen To Pronk Pops Podcast or Download Shows 897-905

Listen To Pronk Pops Podcast or Download Shows 889-896

Listen To Pronk Pops Podcast or Download Shows 884-888

Listen To Pronk Pops Podcast or Download Shows 878-883

Listen To Pronk Pops Podcast or Download Shows 870-877

Listen To Pronk Pops Podcast or Download Shows 864-869

Listen To Pronk Pops Podcast or Download Shows 857-863

Listen To Pronk Pops Podcast or Download Shows 850-856

Listen To Pronk Pops Podcast or Download Shows 845-849

Listen To Pronk Pops Podcast or Download Shows 840-844

Listen To Pronk Pops Podcast or Download Shows 833-839

Listen To Pronk Pops Podcast or Download Shows 827-832

Listen To Pronk Pops Podcast or Download Shows 821-826

Listen To Pronk Pops Podcast or Download Shows 815-820

Listen To Pronk Pops Podcast or Download Shows 806-814

Listen To Pronk Pops Podcast or Download Shows 800-805

Listen To Pronk Pops Podcast or Download Shows 793-799

Listen To Pronk Pops Podcast or Download Shows 785-792

Listen To Pronk Pops Podcast or Download Shows 777-784

Listen To Pronk Pops Podcast or Download Shows 769-776

Listen To Pronk Pops Podcast or Download Shows 759-768

Listen To Pronk Pops Podcast or Download Shows 751-758

Listen To Pronk Pops Podcast or Download Shows 745-750

Listen To Pronk Pops Podcast or Download Shows 738-744

Listen To Pronk Pops Podcast or Download Shows 732-737

Listen To Pronk Pops Podcast or Download Shows 727-731

Listen To Pronk Pops Podcast or Download Shows 720-726

Listen To Pronk Pops Podcast or DownloadShows 713-719

Listen To Pronk Pops Podcast or DownloadShows 705-712

Listen To Pronk Pops Podcast or Download Shows 695-704

Listen To Pronk Pops Podcast or Download Shows 685-694

Listen To Pronk Pops Podcast or Download Shows 675-684

Listen To Pronk Pops Podcast or Download Shows 668-674

Listen To Pronk Pops Podcast or Download Shows 660-667

Listen To Pronk Pops Podcast or Download Shows 651-659

Listen To Pronk Pops Podcast or Download Shows 644-650

Listen To Pronk Pops Podcast or Download Shows 637-643

Listen To Pronk Pops Podcast or Download Shows 629-636

Listen To Pronk Pops Podcast or Download Shows 617-628

Listen To Pronk Pops Podcast or Download Shows 608-616

Listen To Pronk Pops Podcast or Download Shows 599-607

Listen To Pronk Pops Podcast or Download Shows 590-598

Listen To Pronk Pops Podcast or Download Shows 585- 589

Listen To Pronk Pops Podcast or Download Shows 575-584

Listen To Pronk Pops Podcast or Download Shows 565-574

Listen To Pronk Pops Podcast or Download Shows 556-564

Listen To Pronk Pops Podcast or Download Shows 546-555

Listen To Pronk Pops Podcast or Download Shows 538-545

Listen To Pronk Pops Podcast or Download Shows 532-537

Listen To Pronk Pops Podcast or Download Shows 526-531

Listen To Pronk Pops Podcast or Download Shows 519-525

Listen To Pronk Pops Podcast or Download Shows 510-518

Listen To Pronk Pops Podcast or Download Shows 500-509

Listen To Pronk Pops Podcast or Download Shows 490-499

Listen To Pronk Pops Podcast or Download Shows 480-489

Listen To Pronk Pops Podcast or Download Shows 473-479

Listen To Pronk Pops Podcast or Download Shows 464-472

Listen To Pronk Pops Podcast or Download Shows 455-463

Listen To Pronk Pops Podcast or Download Shows 447-454

Listen To Pronk Pops Podcast or Download Shows 439-446

Listen To Pronk Pops Podcast or Download Shows 431-438

Listen To Pronk Pops Podcast or Download Shows 422-430

Listen To Pronk Pops Podcast or Download Shows 414-421

Listen To Pronk Pops Podcast or Download Shows 408-413

Listen To Pronk Pops Podcast or Download Shows 400-407

Listen To Pronk Pops Podcast or Download Shows 391-399

Listen To Pronk Pops Podcast or Download Shows 383-390

Listen To Pronk Pops Podcast or Download Shows 376-382

Listen To Pronk Pops Podcast or Download Shows 369-375

Listen To Pronk Pops Podcast or Download Shows 360-368

Listen To Pronk Pops Podcast or Download Shows 354-359

Listen To Pronk Pops Podcast or Download Shows 346-353

Listen To Pronk Pops Podcast or Download Shows 338-345

Listen To Pronk Pops Podcast or Download Shows 328-337

Listen To Pronk Pops Podcast or Download Shows 319-327

Listen To Pronk Pops Podcast or Download Shows 307-318

Listen To Pronk Pops Podcast or Download Shows 296-306

Listen To Pronk Pops Podcast or Download Shows 287-295

Listen To Pronk Pops Podcast or Download Shows 277-286

Listen To Pronk Pops Podcast or Download Shows 264-276

Listen To Pronk Pops Podcast or Download Shows 250-263

Listen To Pronk Pops Podcast or Download Shows 236-249

Listen To Pronk Pops Podcast or Download Shows 222-235

Listen To Pronk Pops Podcast or Download Shows 211-221

Listen To Pronk Pops Podcast or Download Shows 202-210

Listen To Pronk Pops Podcast or Download Shows 194-201

Listen To Pronk Pops Podcast or Download Shows 184-193

Listen To Pronk Pops Podcast or Download Shows 174-183

Listen To Pronk Pops Podcast or Download Shows 165-173

Listen To Pronk Pops Podcast or Download Shows 158-164

Listen To Pronk Pops Podcast or Download Shows151-157

Listen To Pronk Pops Podcast or Download Shows 143-150

Listen To Pronk Pops Podcast or Download Shows 135-142

Listen To Pronk Pops Podcast or Download Shows 131-134

Listen To Pronk Pops Podcast or Download Shows 124-130

Listen To Pronk Pops Podcast or Download Shows 121-123

Listen To Pronk Pops Podcast or Download Shows 118-120

Listen To Pronk Pops Podcast or Download Shows 113 -117

Listen To Pronk Pops Podcast or Download Show 112

Listen To Pronk Pops Podcast or Download Shows 108-111

Listen To Pronk Pops Podcast or Download Shows 106-108

Listen To Pronk Pops Podcast or Download Shows 104-105

Listen To Pronk Pops Podcast or Download Shows 101-103

Listen To Pronk Pops Podcast or Download Shows 98-100

Listen To Pronk Pops Podcast or Download Shows 94-97

Listen To Pronk Pops Podcast or Download Show 93

Listen To Pronk Pops Podcast or Download Show 92

Listen To Pronk Pops Podcast or Download Show 91

Listen To Pronk Pops Podcast or Download Shows 88-90

Listen To Pronk Pops Podcast or Download Shows 84-87

Listen To Pronk Pops Podcast or Download Shows 79-83

Listen To Pronk Pops Podcast or Download Shows 74-78

Listen To Pronk Pops Podcast or Download Shows 71-73

Listen To Pronk Pops Podcast or Download Shows 68-70

Listen To Pronk Pops Podcast or Download Shows 65-67

Listen To Pronk Pops Podcast or Download Shows 62-64

Listen To Pronk Pops Podcast or Download Shows 58-61

Listen To Pronk Pops Podcast or Download Shows 55-57

Listen To Pronk Pops Podcast or Download Shows 52-54

Listen To Pronk Pops Podcast or Download Shows 49-51

Listen To Pronk Pops Podcast or Download Shows 45-48

Listen To Pronk Pops Podcast or Download Shows 41-44

Listen To Pronk Pops Podcast or Download Shows 38-40

Listen To Pronk Pops Podcast or Download Shows 34-37

Listen To Pronk Pops Podcast or Download Shows 30-33

Listen To Pronk Pops Podcast or Download Shows 27-29

Listen To Pronk Pops Podcast or Download Shows 17-26

Listen To Pronk Pops Podcast or Download Shows 16-22

Listen To Pronk Pops Podcast or Download Shows 10-15

Listen To Pronk Pops Podcast or Download Shows 1-9

Advertisements
Read Full Post | Make a Comment ( None so far )

The Pronk Pops Show 903, June 1, 2017, Breaking — Story 1: The United States Ceases Implementation of Non-Binding Paris Accord on Climate Change — American Jobs Matter — Videos — Story 2: Part 2: Portrait of A Paranoid:  Hillary Clinton Unplugged And Weaponized — Blames Russians, Comey, Democratic Party, Fake News, Wikileaks, and Many Others — Not Herself  — The Emails and Server Were A “Nothing Burger” (Actually Criminal Behavior)  — Videos —

Posted on June 1, 2017. Filed under: American History, Benghazi, Blogroll, Breaking News, Chemical Explosion, Coal, Communications, Countries, Donald J. Trump, Donald Trump, Economics, Elections, Employment, Energy, Foreign Policy, Free Trade, Freedom of Speech, Government, Government Dependency, Government Spending, Hillary Clinton, History, Human, Law, Life, Natural Gas, News, Obama, Oil, People, Philosophy, Photos, Politics, Polls, Progressives, Radio, Raymond Thomas Pronk, Regulation, Rule of Law, Scandals, Security, Spying, Spying on American People, Success, Taxation, Taxes, Technology, Terror, Terrorism, Trump Surveillance/Spying, Unemployment, United States of America, Videos, Wealth, Wisdom | Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , |

Project_1

The Pronk Pops Show Podcasts

Pronk Pops Show 903,  June 1, 2017

Pronk Pops Show 902,  May 31, 2017

Pronk Pops Show 901,  May 30, 2017

Pronk Pops Show 900,  May 25, 2017

Pronk Pops Show 899,  May 24, 2017

Pronk Pops Show 898,  May 23, 2017

Pronk Pops Show 897,  May 22, 2017

Pronk Pops Show 896,  May 18, 2017

Pronk Pops Show 895,  May 17, 2017

Pronk Pops Show 894,  May 16, 2017

Pronk Pops Show 893,  May 15, 2017

Pronk Pops Show 892,  May 12, 2017

Pronk Pops Show 891,  May 11, 2017

Pronk Pops Show 890,  May 10, 2017

Pronk Pops Show 889,  May 9, 2017

Pronk Pops Show 888,  May 8, 2017

Pronk Pops Show 887,  May 5, 2017

Pronk Pops Show 886,  May 4, 2017

Pronk Pops Show 885,  May 3, 2017

Pronk Pops Show 884,  May 1, 2017

Pronk Pops Show 883 April 28, 2017

Pronk Pops Show 882: April 27, 2017

Pronk Pops Show 881: April 26, 2017

Pronk Pops Show 880: April 25, 2017

Pronk Pops Show 879: April 24, 2017

Pronk Pops Show 878: April 21, 2017

Pronk Pops Show 877: April 20, 2017

Pronk Pops Show 876: April 19, 2017

Pronk Pops Show 875: April 18, 2017

Pronk Pops Show 874: April 17, 2017

Pronk Pops Show 873: April 13, 2017

Pronk Pops Show 872: April 12, 2017

Pronk Pops Show 871: April 11, 2017

Pronk Pops Show 870: April 10, 2017

Pronk Pops Show 869: April 7, 2017

Pronk Pops Show 868: April 6, 2017

Pronk Pops Show 867: April 5, 2017

Pronk Pops Show 866: April 3, 2017

Pronk Pops Show 865: March 31, 2017

Pronk Pops Show 864: March 30, 2017

Pronk Pops Show 863: March 29, 2017

Pronk Pops Show 862: March 28, 2017

Pronk Pops Show 861: March 27, 2017

Pronk Pops Show 860: March 24, 2017

Pronk Pops Show 859: March 23, 2017

Pronk Pops Show 858: March 22, 2017

Pronk Pops Show 857: March 21, 2017

Pronk Pops Show 856: March 20, 2017

Pronk Pops Show 855: March 10, 2017

Pronk Pops Show 854: March 9, 2017

Pronk Pops Show 853: March 8, 2017

Pronk Pops Show 852: March 6, 2017

Pronk Pops Show 851: March 3, 2017

Pronk Pops Show 850: March 2, 2017

Pronk Pops Show 849: March 1, 2017

Image result for cartoons trump withdraws from paris accordImage result for june 1, 2017 president trump withdraws from paris accord on climate changeImage result for cartoons hillary clinton blames losing on othersImage result for cartoons hillary clinton blames losing on others

Image result for Hillary Clinton blames Now's she's blaming 39 problemsImage result for Hillary Clinton interview at codecon 2017

Image result for cartoons hillary clinton blames losing on others

Story 1: The United States Ceases Implementation of Non-Binding Paris Accord on Climate Change — American Jobs Matter — Videos —

“As of today, the United States will cease all implementation of the non-binding Paris accord and the draconian financial and economic burdens the agreement imposes on our country”

~President Donald J. Trump, June 1, 2017

Image result for climate temperatures over 400000 yearsImage result for climate temperatures over 400000 years

Image result for climate models vs. reality

Image result for climate models vs. reality

 

President Trump: “The United States will withdraw from the Paris Climate Accord.” (C-SPAN)

Trump: U.S. will withdraw from Paris climate accord

President Trump Leaves Paris Agreement Climate Deal FULL Speech 6/1/17

Trump Withdraws U.S. From Paris Climate Agreement Choosing Pittsburgh Over Paris

LAURA INGRAHAM FULL ONE ON ONE EXPLOSIVE INTERVIEW WITH SEAN HANNITY 5 31 2017

Tucker: Trump gets US out of bad deal and left melts down

Rand Paul Slams Jake Tapper and Climate Alarmists on Doomsday Predictions

The Paris Climate Agreement Won’t Change the Climate

Climate Change: What Do Scientists Say?

What They Haven’t Told You about Climate Change

Do 97% of Climate Scientists Really Agree?

President Trump Will Pull Out of Paris Climate Agreement. New Report!

Trump ready to pull out of Paris climate deal

Climate Deal in Paris: Everything You Need to Know

Global Warming / Climate Change Hoax – Dr. Roy Spencer (1)

Climate Change in 12 Minutes – The Skeptic’s Case

Dr David Evans: Global Warming is Manmade? (1 of 2)

Dr David Evans: Global Warming is Manmade? (2 of 2)

Dr Easterbrook Global Warming HOAX & Facts

The Great Global Warming Swindle Full Movie

 

Trump announces US withdrawal from Paris climate deal

Andrew BEATTY
AFP June 1, 2017

US President Donald Trump said the United States would abandon the Paris climate deal -- but was open to negotiating a new one

US President Donald Trump said the United States would abandon the Paris climate deal — but was open to negotiating a new one (AFP Photo/Brendan Smialowski)

Washington (AFP) – President Donald Trump on Thursday announced America’s withdrawal from the Paris climate deal, signaling a policy shift with wide-ranging repercussions for the climate and Washington’s ties with the world.

In a highly anticipated statement from the White House Rose Garden, Trump said the United States would abandon the current deal — but was open to negotiating a new one.

“As of today, the United States will cease all implementation of the non-binding Paris accord and the draconian financial and economic burdens the agreement imposes on our country,” Trump said.

“We’re getting out but we’ll start to negotiate and we will see if we can make a deal that’s fair. And if we can, that’s great. And if we can’t, that’s fine.”

Although details and the timeframe are still unclear, Trump argued that the agreement was a bad deal for Americans and that he was keeping a campaign promise to put American workers first.

“I cannot, in good conscience, support a deal that punishes the United States, which is what it does,” Trump said.

The White House has told allies the 2015 deal was signed by President Barack Obama out of “desperation.”

Trump faced last-minute pressure from business tycoons, foreign allies and from inside his own White House not to pull out of the 196-party accord.

Ever the showman, the 70-year-old gave his decision a reality-TV-style tease, refusing to indicate his preference either way until his announcement.

His decision could seriously hamper efforts to cut emissions and limit global temperature increases. The United States is the world’s second largest emitter of greenhouse gases, after China.

Opponents of withdrawal — said to include Trump’s own daughter Ivanka — have warned that America’s reputation and its leadership role on the world stage are also at stake, as is the environment.

Nicaragua and Syria are the only countries not party to the Paris accord, the former seeing it as not ambitious enough and the latter being racked by a brutal civil war.

– Diplomatic pressure –

Trump’s long wind-up prompted fierce lobbying, with his environmental protection chief Scott Pruitt and chief strategist Steve Bannon urging the president to leave.

A dozen large companies including oil major BP, agrochemical giant DuPont, Google, Intel and Microsoft, have also urged Trump to remain part of the deal.

Tesla and SpaceX boss Elon Musk said he would have “no choice” but to leave White House-backed business councils if Trump pulls out.

On the diplomatic front, German Chancellor Angela Merkel led the “remain” camp, publicly describing the deal as “essential,” and suggesting other countries would press ahead regardless.

Trump raised alarm bells when he refused to sign up to a pledge on the deal at last week’s G7 meeting in Italy.

Merkel on Saturday labelled the result of the “six against one” discussion “very difficult, not to say very unsatisfactory.”

European Commission President Jean-Claude Juncker was less diplomatic, all but accusing the US president of being ill-informed.

“I am a transatlanticist. But if the US president in the next hours and days says that he will get out of the Paris accord, then it’s the responsibility of Europe to say: that’s not acceptable.”

He noted that it would likely take three or four years to exit from the Paris deal, and revealed that world leaders had sought to explain that to Trump at the G7 summit.

“As it appears, that attempt failed,” said Juncker.

– China pledge –

Hours ahead of Trump’s announcement, China’s Premier Li Keqiang also pledged to stay the course on implementing the climate accord, and urged other countries to do likewise.

“China will continue to implement promises made in the Paris Agreement, to move towards the 2030 goal step by step steadfastly,” Li said in a Berlin joint press conference with Merkel.

“But of course, we also hope to do this in cooperation with others.”

China has been investing billions in clean energy infrastructure, as its leaders battle to clear up the choking pollution enveloping its biggest cities, including Beijing.

China and the US are responsible for some 40 percent of the world’s emissions and experts warn is vital for both to remain in the Paris agreement if it is to succeed.

The leader of Asia’s other behemoth, Indian Prime Minister Narendra Modi, said this week failing to act on climate change would be “morally criminal”.

– Contradictory signals –

Trump’s announcement comes less than 18 months after the historic climate pact was adopted in the French capital, the fruit of a hard-fought agreement between Beijing and Washington under Obama’s leadership.

The Paris Agreement commits signatories to efforts to reduce greenhouse gas emissions that cause global warming, which is blamed for melting ice caps and glaciers, rising sea levels and more violent weather events.

They vowed steps to keep the worldwide rise in temperatures “well below” two degrees Celsius (3.6 degrees Fahrenheit) from pre-industrial times and to “pursue efforts” to hold the increase under 1.5 degrees Celsius.

Since taking office on January 20, Trump, who has called climate change a “hoax”, has sent contradictory signals on the Paris deal.

When asked on Tuesday whether Trump believes human activity is contributing to climate change, White House spokesman Sean Spicer told reporters, “Honestly, I haven’t asked him that. I can get back to you.”

https://www.yahoo.com/news/china-europe-lead-climate-world-waits-trump-103213516.html

Paris Agreement

From Wikipedia, the free encyclopedia
Paris Agreement
Paris Agreement under the United Nations Framework Convention on Climate Change
{{{image_alt}}}

  Parties
  Signatories
  Parties also covered by European Union ratification
  Signatories also covered by European Union ratification
Drafted 30 November – 12 December 2015
Signed 22 April 2016
Location New York
Sealed 12 December 2015
Effective 4 November 2016[1][2]
Condition Ratification/Accession by 55 UNFCCC Parties, accounting for 55% of global greenhouse gas emissions
Signatories 195[1]
Parties 147[1]
Depositary Secretary-General of the United Nations
Languages Arabic, Chinese, English, French, Russian and Spanish
Paris Agreement at Wikisource

The Paris Agreement (French: Accord de Paris) is an agreement within the United Nations Framework Convention on Climate Change (UNFCCC) dealing with greenhouse gas emissions mitigation, adaptation and finance starting in the year 2020. The language of the agreement was negotiated by representatives of 195 countries at the 21st Conference of the Parties of the UNFCCC in Paris and adopted by consensus on 12 December 2015.[3][4] It was opened for signature on 22 April 2016 (Earth Day) at a ceremony in New York.[5] As of May 2017, 195 UNFCCC members have signed the agreement, 147 of which have ratified it.[1] After several European Union states ratified the agreement in October 2016, there were enough countries that had ratified the agreement that produce enough of the world’s greenhouse gases for the agreement to enter into force.[6] The agreement went into effect on 4 November 2016.[2]

The head of the Paris Conference, France’s foreign minister Laurent Fabius, said this “ambitious and balanced” plan is a “historic turning point” in the goal of reducing global warming.[7] One year on, the ratification of the Paris Agreement was celebrated by the Mayor of Paris Anne Hidalgo by illuminating the Eiffel Tower and the Arc de Triomphe, Paris’ most iconic monuments, in green.[8]

On June 1, 2017, U.S. PresidentDonald Trump announced that the United States would withdraw from the agreement.[9][10]

Content

Aims

The aim of the convention is described in Article 2, “enhancing the implementation” of the UNFCCC through:[11]

“(a) Holding the increase in the global average temperature to well below 2 °C above pre-industrial levels and to pursue efforts to limit the temperature increase to 1.5 °C above pre-industrial levels, recognizing that this would significantly reduce the risks and impacts of climate change;
(b) Increasing the ability to adapt to the adverse impacts of climate change and foster climate resilience and low greenhouse gas emissions development, in a manner that does not threaten food production;
(c) Making finance flows consistent with a pathway towards low greenhouse gas emissions and climate-resilient development.”

Countries furthermore aim to reach “global peaking of greenhouse gas emissions as soon as possible”. The agreement has been described as an incentive for and driver of fossil fuel divestment.[12][13]

The Paris deal is the world’s first comprehensive climate agreement.[14]

Nationally determined contributions and their limits

The contribution that each individual country should make in order to achieve the worldwide goal are determined by all countries individually and called “nationally determined contributions” (NDCs).[15] Article 3 requires them to be “ambitious”, “represent a progression over time” and set “with the view to achieving the purpose of this Agreement”. The contributions should be reported every five years and are to be registered by the UNFCCC Secretariat.[16] Each further ambition should be more ambitious than the previous one, known as the principle of ‘progression’.[17] Countries can cooperate and pool their nationally determined contributions. The Intended Nationally Determined Contributions pledged during the 2015 Climate Change Conference serve—unless provided otherwise—as the initial Nationally determined contribution.

The level of NDCs set by each country[18] will set that country’s targets. However the ‘contributions’ themselves are not binding as a matter of international law, as they lack the specificity, normative character, or obligatory language necessary to create binding norms.[19] Furthermore, there will be no mechanism to force[20] a country to set a target in their NDC by a specific date and no enforcement if a set target in an NDC is not met.[18][21] There will be only a “name and shame” system[22] or as János Pásztor, the U.N. assistant secretary-general on climate change, told CBS News (US), a “name and encourage” plan.[23] As the agreement provides no consequences if countries do not meet their commitments, consensus of this kind is fragile. A trickle of nations exiting the agreement may trigger the withdrawal of more governments, bringing about a total collapse of the agreement.[24]

The negotiators of the Agreement however stated that the NDCs and the 2 °C reduction target were insufficient, instead, a 1.5 °C target is required, noting “with concern that the estimated aggregate greenhouse gas emission levels in 2025 and 2030 resulting from the intended nationally determined contributions do not fall within least-cost 2 ̊C scenarios but rather lead to a projected level of 55 gigatonnes in 2030”, and recognizing furthermore “that much greater emission reduction efforts will be required in order to hold the increase in the global average temperature to below 2 ̊C by reducing emissions to 40 gigatonnes or to 1.5 ̊C”.[25]

Although not the sustained temperatures over the long term to which the Agreement addresses, in the first half of 2016 average temperatures were about 1.3 °C (2.3 degrees Fahrenheit) above the average in 1880, when global record-keeping began.[26]

When the agreement achieved enough signatures to cross the threshold on 5 October 2016, US President Barack Obama claimed that “Even if we meet every target, we will only get to part of where we need to go,” and that “This agreement will help delay or avoid some of the worse consequences of climate change will help other nations ratchet down their emissions over time.”[27]

Global stocktake

The global stocktake will kick off with a “facilitative dialogue” in 2018. At this convening, parties will evaluate how their NDCs stack up to the nearer-term goal of peaking global emissions and the long-term goal of achieving net zero emissions by the second half of this century.[28]

The implementation of the agreement by all member countries together will be evaluated every 5 years, with the first evaluation in 2023. The outcome is to be used as input for new nationally determined contributions of member states.[29]The stocktake will not be of contributions/achievements of individual countries but a collective analysis of what has been achieved and what more needs to be done.

The stocktake works as part of the Paris Agreement’s effort to create a “ratcheting up” of ambition in emissions cuts. Because analysts have agreed that the current NDCs will not limit rising temperatures below 2 degrees Celsius, the global stocktake reconvenes parties to assess how their new NDCs must evolve so that they continually reflect a country’s “highest possible ambition”.[28]

While ratcheting up the ambition of NDCs is a major aim of the global stocktake, it assesses efforts beyond mitigation. The 5 year reviews will also evaluate adaptation, climate finance provisions, and technology development and transfer.[28]

Structure

The Paris Agreement has a ‘bottom up’ structure in contrast to most international environmental law treaties which are ‘top down’, characterised by standards and targets set internationally, for states to implement.[30] Unlike its predecessor, the Kyoto Protocol, which sets commitment targets that have legal force, the Paris Agreement, with its emphasis on consensus-building, allows for voluntary and nationally determined targets.[31] The specific climate goals are thus politically encouraged, rather than legally bound. Only the processes governing the reporting and review of these goals are mandated under international law. This structure is especially notable for the United States—because there are no legal mitigation or finance targets, the agreement is considered an “executive agreement rather than a treaty”. Because the UNFCCC treaty of 1992 received the consent of the Senate, this new agreement does not require further legislation from Congress for it to take effect.[31]

Another key difference between Paris Agreement and the Kyoto Protocol is its scope. While the Kyoto Protocol differentiated between Annex-1 and non-Annex-1 countries, this bifurcation is blurred in the Paris Agreement, as all parties will be required to submit emissions reductions plans.[32] While the Paris Agreement still emphasizes the principle of “Common but Differentiated Responsibility and Respective Capabilities”—the acknowledgement that different nations have different capacities and duties to climate action—it does not provide a specific division between developed and developing nations.[32]

Mitigation provisions and carbon markets

Article 6 has been flagged as containing some of the key provisions of the Paris Agreement.[33] Broadly, it outlines the cooperative approaches that parties can take in achieving their nationally determined carbon emissions reductions. In doing so, it helps establish the Paris Agreement as a framework for a global carbon market.[34]

Linkages and ITMOs

Paragraphs 6.2 and 6.3 establish a framework to govern the international transfer of mitigation outcomes (ITMOs). The Agreement recognizes the rights of Parties to use emissions reductions outside of their own jurisdiction toward their NDC, in a system of carbon accounting and trading.[34]

This provision requires the “linkage” of various carbon emissions trading systems—because measured emissions reductions must avoid “double counting”, transferred mitigation outcomes must be recorded as a gain of emission units for one party and a reduction of emission units for the other.[33] Because the NDCs, and domestic carbon trading schemes, are heterogeneous, the ITMOs will provide a format for global linkage under the auspices of the UNFCCC.[35]The provision thus also creates a pressure for countries to adopt emissions management systems—if a country wants to use more cost-effective cooperative approaches to achieve their NDCs, they will need to monitor carbon units for their economies.[36]

The Sustainable Development Mechanism

Paragraphs 6.4-6.7 establish a mechanism “to contribute to the mitigation of greenhouse gases and support sustainable development”.[37] Though there is no specific name for the mechanism as yet, many Parties and observers have informally coalesced around the name “Sustainable Development Mechanism” or “SDM”.[38][39] The SDM is considered to be the successor to the Clean Development Mechanism, a flexible mechanism under the Kyoto Protocol, by which parties could collaboratively pursue emissions reductions for their Intended Nationally Determined Contributions. The Sustainable Development Mechanism lays the framework for the future of the Clean Development Mechanism post-Kyoto (in 2020).

In its basic aim, the SDM will largely resemble the Clean Development Mechanism, with the dual mission to 1. contribute to global GHG emissions reductions and 2. support sustainable development.[40] Though the structure and processes governing the SDM are not yet determined, certain similarities and differences from the Clean Development Mechanism can already be seen. Notably, the SDM, unlike the Clean Development Mechanism, will be available to all parties as opposed to only Annex-1 parties, making it much wider in scope.[41]

Since the Kyoto Protocol went into force, the Clean Development Mechanism has been criticized for failing to produce either meaningful emissions reductions or sustainable development benefits in most instances.[42] It has also suffered from the low price of Certified Emissions Reductions (CERs), creating less demand for projects. These criticisms have motivated the recommendations of various stakeholders, who have provided through working groups and reports, new elements they hope to see in SDM that will bolster its success.[35] The specifics of the governance structure, project proposal modalities, and overall design are expected to come during the next[when?]Conference of the Parties in Marrakesh.

Adaptation provisions

Adaptation issues garnered more focus in the formation of the Paris Agreement. Collective, long-term adaptation goals are included in the Agreement, and countries must report on their adaptation actions, making adaptation a parallel component of the agreement with mitigation.[43] The adaptation goals focus on enhancing adaptive capacity, increasing resilience, and limiting vulnerability.[44]

Ensuring finance

In the Paris Agreement, the developed countries reaffirmed the commitment to mobilize $100 billion a year in climate finance by 2020, and agreed to continue mobilizing finance at the level of $100 billion a year until 2025.[45] The commitment refers to the pre-existing plan to provide US$100 billion a year in aid to developing countries for actions on climate change adaptation and mitigation.[46]

Though both mitigation and adaptation require increased climate financing, adaptation has typically received lower levels of support and has mobilised less action from the private sector.[43] A 2014 report by the OECD found that just 16 percent of global finance was directed toward climate adaptation in 2014.[47] The Paris Agreement called for a balance of climate finance between adaptation and mitigation, and specifically underscoring the need to increase adaptation support for parties most vulnerable to the effects of climate change, including Least Developed Countries and Small Island Developing States. The agreement also reminds parties of the importance of public grants, because adaptation measures receive less investment from the public sector.[43] John Kerry, as Secretary of State, announced that grant-based adaptation finance would double by 2020.[31]

Some specific outcomes of the elevated attention to adaptation financing in Paris include the G7 countries’ announcement to provide US $420 million for Climate Risk Insurance, and the launching of a Climate Risk and Early Warning Systems (CREWS) Initiative.[48] In early March 2016, the Obama administration gave a $500 million grant to the “Green Climate Fund” as “the first chunk of a $3 billion commitment made at the Paris climate talks.”[49][50][52]So far, the Green Climate Fund has now received over $10 billion in pledges. Notably, the pledges come from developed nations like France, the US, and Japan, but also from developing countries such as Mexico, Indonesia, and Vietnam.[31]

Loss and damage

A new issue that emerged as a focal point in the Paris negotiations rose from the fact that many of the worst effects of climate change will be too severe or come too quickly to be avoided by adaptation measures.[51] The Paris Agreement specifically acknowledges the need to address loss and damage of this kind, and aims to find appropriate responses.[51] It specifies that loss and damage can take various forms—both as immediate impacts from extreme weather events, and slow onset impacts, such as the loss of land to sea-level rise for low-lying islands.[31]

The push to address loss and damage as a distinct issue in the Paris Agreement came from the Alliance of Small Island States and the Least Developed Countries, whose economies and livelihoods are most vulnerable to the negative impacts of climate change.[31] Developed countries, however, worried that classifying the issue as one separate and beyond adaptation measures would create yet another climate finance provision, or might imply legal liability for catastrophic climate events.

In the end, all parties acknowledged the need for “averting, minimizing, and addressing loss and damage” but notably excludes any mention of compensation or liability.[11] The agreement also adopts the Warsaw International Mechanism for Loss and Damage, an institution that will attempt to address questions about how to classify, address, and share responsibility for loss and damage.[51]

Enhanced transparency framework

While each Party’s NDC is not legally binding, the Parties are legally bound to have their progress tracked by technical expert review to assess achievement toward the NDC, and to determine ways to strengthen ambition.[52] Article 13 of the Paris Agreement articulates an “enhanced transparency framework for action and support” that establishes harmonized monitoring, reporting, and verification (MRV) requirements. Thus, both developed and developing nations must report every two years on their mitigation efforts, and all parties will be subject to both technical and peer review.[52]

Flexibility mechanisms

While the enhanced transparency framework is universal, along with the global stocktaking to occur every 5 years, the framework is meant to provide “built-in flexibility” to distinguish between developed and developing countries’ capacities. In conjunction with this, the Paris Agreement has provisions for an enhanced framework for capacity building.[53] The agreement recognizes the varying circumstances of some countries, and specifically notes that the technical expert review for each country consider that country’s specific capacity for reporting.[53] The agreement also develops a Capacity-Building Initiative for Transparency to assist developing countries in building the necessary institutions and processes for complying with the transparency framework.[53]

There are several ways in which flexibility mechanisms can be incorporated into the enhanced transparency framework. The scope, level of detail, or frequency of reporting may all be adjusted and tiered based on a country’s capacity. The requirement for in-country technical reviews could be lifted for some less developed or small island developing countries. Ways to assess capacity include financial and human resources in a country necessary for NDC review.[53]

Adoption

Negotiations

Within the United Nations Framework Convention on Climate Change, legal instruments may be adopted to reach the goals of the convention. For the period from 2008 to 2012, greenhouse gas reduction measures were agreed in the Kyoto Protocol in 1997. The scope of the protocol was extended until 2020 with the Doha Amendment to that protocol in 2012.[54]

During the 2011 United Nations Climate Change Conference, the Durban Platform (and the Ad Hoc Working Group on the Durban Platform for Enhanced Action) was established with the aim to negotiate a legal instrument governing climate change mitigation measures from 2020. The resulting agreement was to be adopted in 2015.[55]

Adoption

Heads of delegations at the 2015 United Nations Climate Change Conference in Paris.

At the conclusion of COP 21 (the 21st meeting of the Conference of the Parties, which guides the Conference), on 12 December 2015, the final wording of the Paris Agreement was adopted by consensus by all of the 195 UNFCCC participating member states and the European Union[3] to reduce emissions as part of the method for reducing greenhouse gas. In the 12 page Agreement,[56]the members promised to reduce their carbon output “as soon as possible” and to do their best to keep global warming “to well below 2 degrees C” [3.6 degrees F].[57]

Signature and entry into force

Signing by John Kerry in United Nations General Assembly Hall for the United States

The Paris Agreement was open for signature by States and regional economic integration organizations that are Parties to the UNFCCC (the Convention) from 22 April 2016 to 21 April 2017 at the UN Headquarters in New York.[58]

The agreement stated that it would enter into force (and thus become fully effective) only if 55 countries that produce at least 55% of the world’s greenhouse gas emissions (according to a list produced in 2015)[59] ratify, accept, approve or accede to the agreement.[60][61] On 1 April 2016, the United States and China, which together represent almost 40% of global emissions, issued a joint statement confirming that both countries would sign the Paris Climate Agreement.[62][63] 175 Parties (174 states and the European Union) signed the treaty on the first date it was open for signature.[5][64] On the same day, more than 20 countries issued a statement of their intent to join as soon as possible with a view to joining in 2016. With ratification by the European Union, the Agreement obtained enough parties to enter into effect as of 4 November 2016.

European Union and its member states

Both the EU and its member states are individually responsible for ratifying the Paris Agreement. A strong preference was reported that the EU and its 28 member states deposit their instruments of ratification at the same time to ensure that neither the EU nor its member states engage themselves to fulfilling obligations that strictly belong to the other,[65] and there were fears that disagreement over each individual member state’s share of the EU-wide reduction target, as well as Britain’s vote to leave the EU might delay the Paris pact.[66] However, the European Parliament approved ratification of the Paris Agreement on 4 October 2016,[6] and the EU deposited its instruments of ratification on 5 October 2016, along with several individual EU member states.[66]

Parties and signatories

As of December 2016, 191 states and the European Union have signed the Agreement. 147 of those parties have ratified or acceded to the Agreement, most notably China and India, the countries with three of the four largest greenhouse gas emissions of the signatories’ total (about 42% together).[1][67][68]

Party or signatory[1] Percentage of greenhouse
gases for ratification[59]
Date of signature Date of deposit of instruments
of ratification or accession
Date when agreement
enters into force
 Afghanistan 0.05% 22 April 2016 15 February 2017 17 March 2017
 Albania 0.02% 22 April 2016 21 September 2016 4 November 2016
 Algeria 0.30% 22 April 2016 20 October 2016 19 November 2016
 Andorra 0.00% 22 April 2016 24 March 2017 23 April 2017
 Angola 0.17% 22 April 2016
 Antigua and Barbuda 0.00% 22 April 2016 21 September 2016 4 November 2016
 Argentina 0.89% 22 April 2016 21 September 2016 4 November 2016
 Armenia 0.02% 20 September 2016 23 March 2017 22 April 2017
 Australia 1.46% 22 April 2016 9 November 2016 9 December 2016
 Austria 0.21% 22 April 2016 5 October 2016 4 November 2016
 Azerbaijan 0.13% 22 April 2016 9 January 2017 8 February 2017
 Bahamas, The 0.00% 22 April 2016 22 August 2016 4 November 2016
 Bahrain 0.06% 22 April 2016 23 December 2016 22 January 2017
 Bangladesh 0.27% 22 April 2016 21 September 2016 4 November 2016
 Barbados 0.01% 22 April 2016 22 April 2016 4 November 2016
 Belarus 0.24% 22 April 2016 21 September 2016 4 November 2016
 Belgium 0.32% 22 April 2016 6 April 2017 6 May 2017
 Belize 0.00% 22 April 2016 22 April 2016 4 November 2016
 Benin 0.02% 22 April 2016 31 October 2016 30 November 2016
 Bhutan 0.00% 22 April 2016
 Bolivia 0.12% 22 April 2016 5 October 2016 4 November 2016
 Bosnia and Herzegovina 0.08% 22 April 2016 16 March 2017 15 April 2017
 Botswana 0.02% 22 April 2016 11 November 2016 11 December 2016
 Brazil 2.48% 22 April 2016 21 September 2016 4 November 2016
 Brunei N/A[a] 22 April 2016 21 September 2016 4 November 2016
 Bulgaria 0.15% 22 April 2016 29 November 2016 29 December 2016
 Burkina Faso 0.06% 22 April 2016 11 November 2016 11 December 2016
 Burundi 0.07% 22 April 2016
 Cambodia 0.03% 22 April 2016 6 February 2017 8 March 2017
 Cameroon 0.45% 22 April 2016 29 July 2016 4 November 2016
 Canada 1.95% 22 April 2016 5 October 2016 4 November 2016
 Cape Verde 0.00% 22 April 2016
 Central African Republic 0.01% 22 April 2016 11 October 2016 10 November 2016
 Chad 0.06% 22 April 2016 12 January 2017 11 February 2017
 Chile[69] 0.25% 20 September 2016 10 February 2017 12 March 2017
 China, People’s Republic of
 Hong Kong
 Macao
20.09% 22 April 2016 3 September 2016[67][70] 4 November 2016
 Colombia 0.41% 22 April 2016
 Comoros 0.00% 22 April 2016 23 November 2016 23 December 2016
 Congo, Democratic Republic of the 0.06% 22 April 2016
 Congo, Republic of the 0.01% 22 April 2016 21 April 2017 21 May 2017
 Cook Islands 0.00% 24 June 2016 1 September 2016 4 November 2016
 Costa Rica 0.03% 22 April 2016 13 October 2016 12 November 2016
 Côte d’Ivoire 0.73% 22 April 2016 25 October 2016 24 November 2016
 Croatia 0.07% 22 April 2016 24 May 2017 23 June 2017
 Cuba 0.10% 22 April 2016 28 December 2016 27 January 2017
 Cyprus 0.02% 22 April 2016 4 January 2017 3 February 2017
 Czech Republic 0.34% 22 April 2016
 Denmark[71] 0.15% 22 April 2016 1 November 2016 1 December 2016
 Djibouti 0.00% 22 April 2016 11 November 2016 11 December 2016
 Dominica 0.00% 22 April 2016 21 September 2016 4 November 2016
 Dominican Republic 0.07% 22 April 2016
 East Timor 0.00% 22 April 2016
 Ecuador 0.67% 26 July 2016
 Egypt 0.52% 22 April 2016
 El Salvador 0.03% 22 April 2016 27 March 2017 26 April 2017
 Equatorial Guinea N/A[a] 22 April 2016
 Eritrea 0.01% 22 April 2016
 Estonia 0.06% 22 April 2016 4 November 2016 4 December 2016
 Ethiopia 0.13% 22 April 2016 9 March 2017 8 April 2017
 European Union N/A[b] 22 April 2016 5 October 2016 4 November 2016
 Fiji 0.01% 22 April 2016 22 April 2016 4 November 2016
 Finland 0.17% 22 April 2016 14 November 2016 14 December 2016
 France 1.34% 22 April 2016 5 October 2016 4 November 2016
 Gabon 0.02% 22 April 2016 2 November 2016 2 December 2016
 Gambia, The 0.05% 26 April 2016 7 November 2016 7 December 2016
 Georgia 0.03% 22 April 2016 8 May 2017 7 June 2017
 Germany 2.56% 22 April 2016 5 October 2016 4 November 2016
 Ghana 0.09% 22 April 2016 21 September 2016 4 November 2016
 Greece 0.28% 22 April 2016 14 October 2016 13 November 2016
 Grenada 0.00% 22 April 2016 22 April 2016 4 November 2016
 Guatemala 0.04% 22 April 2016 25 January 2017 24 February 2017
 Guinea 0.01% 22 April 2016 21 September 2016 4 November 2016
 Guinea-Bissau 0.02% 22 April 2016
 Guyana 0.01% 22 April 2016 20 May 2016 4 November 2016
 Haiti 0.02% 22 April 2016
 Honduras 0.03% 22 April 2016 21 September 2016 4 November 2016
 Hungary 0.15% 22 April 2016 5 October 2016 4 November 2016
 Iceland 0.01% 22 April 2016 21 September 2016 4 November 2016
 India 4.10% 22 April 2016 2 October 2016 4 November 2016
 Indonesia 1.49% 22 April 2016 31 October 2016 30 November 2016
 Iran 1.30% 22 April 2016
 Iraq 0.20% 8 December 2016
 Ireland 0.16% 22 April 2016 4 November 2016 4 December 2016
 Israel 0.20% 22 April 2016 22 November 2016 22 December 2016
 Italy 1.18% 22 April 2016 11 November 2016 11 December 2016
 Jamaica 0.04% 22 April 2016 10 April 2017 10 May 2017
 Japan 3.79% 22 April 2016 8 November 2016 8 December 2016
 Jordan 0.07% 22 April 2016 4 November 2016 4 December 2016
 Kazakhstan 0.84% 2 August 2016 6 December 2016 5 January 2017
 Kenya 0.06% 22 April 2016 28 December 2016 27 January 2017
 Kiribati 0.00% 22 April 2016 21 September 2016 4 November 2016
 Korea, North 0.23% 22 April 2016 1 August 2016 4 November 2016
 Korea, South 1.85% 22 April 2016 3 November 2016 3 December 2016
 Kuwait 0.09% 22 April 2016
 Kyrgyzstan 0.03% 21 September 2016
 Laos 0.02% 22 April 2016 7 September 2016 4 November 2016
 Latvia 0.03% 22 April 2016 16 March 2017 15 April 2017
 Lebanon 0.07% 22 April 2016
 Lesotho 0.01% 22 April 2016 20 January 2017 19 February 2017
 Liberia 0.02% 22 April 2016
 Libya N/A[a] 22 April 2016
 Liechtenstein 0.00% 22 April 2016
 Lithuania 0.05% 22 April 2016 2 February 2017 4 March 2017
 Luxembourg 0.03% 22 April 2016 4 November 2016 4 December 2016
 Macedonia, Republic of 0.03% 22 April 2016
 Madagascar 0.08% 22 April 2016 21 September 2016 4 November 2016
 Malawi 0.07% 20 September 2016
 Malaysia 0.52% 22 April 2016 16 November 2016 16 December 2016
 Maldives 0.00% 22 April 2016 22 April 2016 4 November 2016
 Mali 0.03% 22 April 2016 23 September 2016 4 November 2016
 Malta 0.01% 22 April 2016 5 October 2016 4 November 2016
 Marshall Islands 0.00% 22 April 2016 22 April 2016 4 November 2016
 Mauritania 0.02% 22 April 2016 27 February 2017 29 March 2017
 Mauritius 0.01% 22 April 2016 22 April 2016 4 November 2016
 Mexico 1.70% 22 April 2016 21 September 2016 4 November 2016
 Micronesia 0.00% 22 April 2016 15 September 2016 4 November 2016
 Moldova 0.04% 21 September 2016
 Monaco 0.00% 22 April 2016 24 October 2016 23 November 2016
 Mongolia 0.05% 22 April 2016 21 September 2016 4 November 2016
 Montenegro 0.01% 22 April 2016
 Morocco 0.16% 22 April 2016 21 September 2016 4 November 2016
 Mozambique 0.02% 22 April 2016
 Myanmar 0.10% 22 April 2016
 Namibia 0.01% 22 April 2016 21 September 2016 4 November 2016
 Nauru 0.00% 22 April 2016 22 April 2016 4 November 2016
   Nepal 0.07% 22 April 2016 5 October 2016 4 November 2016
 Netherlands 0.53% 22 April 2016
 New Zealand[72] 0.22% 22 April 2016 4 October 2016 4 November 2016
 Niger 0.04% 22 April 2016 21 September 2016 4 November 2016
 Nigeria 0.57% 22 September 2016 16 May 2017 15 June 2017
 Niue 0.01% 28 October 2016 28 October 2016 27 November 2016
 Norway 0.14% 22 April 2016 20 June 2016 4 November 2016
 Oman 0.06% 22 April 2016
 Pakistan 0.43% 22 April 2016 10 November 2016 10 December 2016
 Palau 0.00% 22 April 2016 22 April 2016 4 November 2016
 Palestine N/A[c] 22 April 2016 22 April 2016 4 November 2016
 Panama 0.03% 22 April 2016 21 September 2016 4 November 2016
 Papua New Guinea 0.01% 22 April 2016 21 September 2016 4 November 2016
 Paraguay 0.06% 22 April 2016 14 October 2016 13 November 2016
 Peru 0.22% 22 April 2016 25 July 2016 4 November 2016
 Philippines 0.34% 22 April 2016 23 March 2017 22 April 2017
 Poland 1.06% 22 April 2016 7 October 2016 6 November 2016
 Portugal 0.18% 22 April 2016 5 October 2016 4 November 2016
 Qatar 0.17% 22 April 2016
 Romania 0.30% 22 April 2016
 Russia 7.53% 22 April 2016
 Rwanda 0.02% 22 April 2016 6 October 2016 5 November 2016
 Saint Kitts and Nevis 0.00% 22 April 2016 22 April 2016 4 November 2016
 Saint Lucia 0.00% 22 April 2016 22 April 2016 4 November 2016
 Saint Vincent and the Grenadines 0.00% 22 April 2016 29 June 2016 4 November 2016
 Samoa 0.00% 22 April 2016 22 April 2016 4 November 2016
 San Marino 0.00% 22 April 2016
 São Tomé and Príncipe 0.00% 22 April 2016 2 November 2016 2 December 2016
 Saudi Arabia 0.80% 3 November 2016 3 November 2016 3 December 2016
 Senegal 0.05% 22 April 2016 21 September 2016 4 November 2016
 Serbia 0.18% 22 April 2016
 Seychelles 0.00% 25 April 2016 29 April 2016 4 November 2016
 Sierra Leone 0.98%† 22 September 2016 1 November 2016 1 December 2016
 Singapore 0.13% 22 April 2016 21 September 2016 4 November 2016
 Slovakia 0.12% 22 April 2016 5 October 2016 4 November 2016
 Slovenia 0.05% 22 April 2016 16 December 2016 15 January 2017
 Solomon Islands 0.00% 22 April 2016 21 September 2016 4 November 2016
 Somalia N/A[a] 22 April 2016 22 April 2016 4 November 2016
 South Africa 1.46% 22 April 2016 1 November 2016 1 December 2016
 South Sudan N/A[a] 22 April 2016
 Spain 0.87% 22 April 2016 12 January 2017 11 February 2017
 Sri Lanka 0.05% 22 April 2016 21 September 2016 4 November 2016
 Sudan 0.18% 22 April 2016
 Suriname 0.01% 22 April 2016
 Swaziland 0.05% 22 April 2016 21 September 2016 4 November 2016
 Sweden 0.15% 22 April 2016 13 October 2016 12 November 2016
  Switzerland 0.14% 22 April 2016
 Tajikistan 0.02% 22 April 2016 22 March 2017 21 April 2017
 Tanzania 0.11% 22 April 2016
 Thailand 0.64% 22 April 2016 21 September 2016 4 November 2016
 Togo 0.02% 19 September 2016
 Tonga 0.00% 22 April 2016 21 September 2016 4 November 2016
 Trinidad and Tobago 0.04% 22 April 2016
 Tunisia 0.11% 22 April 2016 10 February 2017 12 March 2017
 Turkey 1.24% 22 April 2016
 Turkmenistan 0.20% 23 September 2016 20 October 2016 19 November 2016
 Tuvalu 0.00% 22 April 2016 22 April 2016 4 November 2016
 Uganda 0.07% 22 April 2016 21 September 2016 4 November 2016
 Ukraine 1.04% 22 April 2016 19 September 2016 4 November 2016
 United Arab Emirates 0.53% 22 April 2016 21 September 2016 4 November 2016
 United Kingdom 1.55% 22 April 2016 18 November 2016 18 December 2016
 Uruguay 0.05% 22 April 2016 19 October 2016 18 November 2016
 Uzbekistan 0.54% 19 April 2017
 Vanuatu 0.00% 22 April 2016 21 September 2016 4 November 2016
 Venezuela 0.52% 22 April 2016
 Vietnam 0.72% 22 April 2016 3 November 2016 3 December 2016
 Yemen 0.07% 23 September 2016
 Zambia 0.04% 20 September 2016 9 December 2016 8 January 2017
 Zimbabwe 0.18% 22 April 2016
Total 81.86% 194 146[1] (65.64% of global emissions[59])

† Though corresponding with the source the provided number for Sierra Leone’s emissions is incorrect. According to World Bank data, the correct 2000 emissions for Sierra Leone is 14,763 kt CO2-equivalents (not 365,107 kt), or 0.04% of the world total (not 0.98%).[74]

Non-signatories

The following UNFCCC member states are entitled to sign the Paris Agreement but have not done so. The Holy See is an observer state and can sign the Paris Agreement once it ascends to full membership.

Party or signatory Percentage of greenhouse
gases for ratification[59]
UNFCCC
membership
Notes
 Holy See N/A[a] Observer state The Holy See can’t sign the Paris Agreement until it becomes a full member of the UNFCCC. In 2015, Bernardito Auza stated that the Holy See intended to join the UNFCCC in order to sign the Paris Agreement.[75]
 Nicaragua 0.03% Member state In 2015, Nicaraguan envoy Paul Oquist criticized the Paris Agreement for not punishing countries who didn’t follow it. He stated Nicaragua will continue countering climate change on its own, with plans being that the country will be “90 percent renewable” by 2020.[76]
 Syria 0.21% Member state Syria was not expected to sign the Paris Agreement in 2015 due to the still ongoing Syrian Civil War.[76]
Total 0.24% 3

Withdrawn signatories

Party or signatory Percentage of greenhouse
gases for ratification[59]
Date of signature Date of deposit of instruments
of ratification or accession
Date when agreement
enters into force
Date of withdrawal
 United States 17.89% 22 April 2016 3 September 2016[67] 4 November 2016 1 June 2017
Total 17.89% 1

Critical reception

UNEP

According to UNEP the emission cut targets in November 2016 will result in temperature rise by 3 °C above preindustrial levels, far above the 2 °C of the Paris climate agreement.[77]

Perfectible accord

Al Gore stated that “no agreement is perfect, and this one must be strengthened over time, but groups across every sector of society will now begin to reduce dangerous carbon pollution through the framework of this agreement.”[78]

According to a study published in Nature in June 2016, current country pledges are too low to lead to a temperature rise below the Paris Agreement temperature limit of “well below 2 °C”.[79][80]

Lack of binding enforcement mechanism

Although the agreement was lauded by many, including French President François Hollande and UN Secretary General Ban Ki-moon,[61] criticism has also surfaced. For example, James Hansen, a former NASA scientist and a climate change expert, voiced anger that most of the agreement consists of “promises” or aims and not firm commitments.[81]

Institutional asset owners associations and think-tanks such as the World Pensions Council (WPC) have also observed that the stated objectives of the Paris Agreement are implicitly “predicated upon an assumption – that member states of the United Nations, including high polluters such as China, the US, India, Brazil, Canada, Russia, Indonesia and Australia, which generate more than half the world’s greenhouse gas emissions, will somehow drive down their carbon pollution voluntarily and assiduously without any binding enforcement mechanism to measure and control CO2 emissions at any level from factory to state, and without any specific penalty gradation or fiscal pressure (for example a carbon tax) to discourage bad behaviour. A shining example of what Roman lawyers called circular logic: an agreement (or argument) presupposing in advance what it wants to achieve.”[82]

See also

Notes

  1. ^ Jump up to:a b c d e f Emissions of parties to the UNFCCC that had not yet submitted their first national communication to the UNFCCC secretariat with an emissions inventory at the time of adoption of the Paris Agreement were not included in the figure for entry into force of the Agreement.[59]
  2. Jump up^ The emissions of the European Union are accounted for in the total of its individual member states.
  3. Jump up^ Emissions of states that were not a party to the UNFCCC at the time of adoption of the Paris Agreement,[73] which were thus not permitted to sign the Agreement, were not included in the totals for entry into force for the Agreement.

References

https://en.wikipedia.org/wiki/Paris_Agreement

 

Story 2: Portrait of A Paranoid:  Hillary Clinton Unplugged And Weaponized — Blames Russians, Comey, Democratic Party, Fake News, Wikileaks, and Many Others — Not Herself  — The Emails and Server Were A “Nothing Burger” (Actually Criminal Behavior)  — Videos —

FULL EVENT: Hillary Clinton Speaks at Recode’s Code Conference (5-31-17)

FULL Hillary Clinton tears into Donald Trump at CodeCon

 Hillary Clinton: Russians Influenced Voters In The Election | CNBC

Published on May 31, 2017

Former Secretary of State and 2016 Democratic Presidential Nominee Hillary Clinton speaks with Recode’s Kara Swisher and The Verge’s Walt Mossberg at the Code Conference about her loss in the election and how Russia and technology played into that.
» Subscribe to CNBC: http://cnb.cx/SubscribeCNBC

BLAME COMEY: Hillary Clinton Says “Yes, We Thought We Were Going to Win” the Day Before Election

TWITTER: GOOD OR BAD? Hillary Clinton Addresses Conspiracies, Lies, Disinformation on Social Media

WATCH: Hillary Clinton Explains Trump’s “Bizarre Behavior and Appeal”

WATCH: Hillary Clinton Q&A at #CodeCon Code Conference

Story 2: Portrait of A Paranoid:  Hillary Clinton Unplugged And Weaponized — Blames Russians, Comey, Democratic Party, Fake News, Wikileaks, and Many Others — Not Herself  — The Emails and Server Were A “Nothing Burger” (Actually Criminal Behavior)  — Videos —

FULL EVENT: Hillary Clinton Speaks at Recode’s Code Conference (5-31-17)

FULL Hillary Clinton tears into Donald Trump at CodeCon

 Hillary Clinton: Russians Influenced Voters In The Election | CNBC

Published on May 31, 2017

Former Secretary of State and 2016 Democratic Presidential Nominee Hillary Clinton speaks with Recode’s Kara Swisher and The Verge’s Walt Mossberg at the Code Conference about her loss in the election and how Russia and technology played into that.
» Subscribe to CNBC: http://cnb.cx/SubscribeCNBC

BLAME COMEY: Hillary Clinton Says “Yes, We Thought We Were Going to Win” the Day Before Election

TWITTER: GOOD OR BAD? Hillary Clinton Addresses Conspiracies, Lies, Disinformation on Social Media

WATCH: Hillary Clinton Explains Trump’s “Bizarre Behavior and Appeal”

WATCH: Hillary Clinton Q&A at #CodeCon Code Conference

Story 2: Portrait of A Paranoid:  Hillary Clinton Unplugged And Weaponized — Blames Russians, Comey, Democratic Party, Fake News, Wikileaks, and Many Others — Not Herself  — The Emails and Server Were A “Nothing Burger” (Actually Criminal Behavior)  — Videos —

FULL EVENT: Hillary Clinton Speaks at Recode’s Code Conference (5-31-17)

FULL Hillary Clinton tears into Donald Trump at CodeCon

 Hillary Clinton: Russians Influenced Voters In The Election | CNBC

Published on May 31, 2017

Former Secretary of State and 2016 Democratic Presidential Nominee Hillary Clinton speaks with Recode’s Kara Swisher and The Verge’s Walt Mossberg at the Code Conference about her loss in the election and how Russia and technology played into that.
» Subscribe to CNBC: http://cnb.cx/SubscribeCNBC

BLAME COMEY: Hillary Clinton Says “Yes, We Thought We Were Going to Win” the Day Before Election

TWITTER: GOOD OR BAD? Hillary Clinton Addresses Conspiracies, Lies, Disinformation on Social Media

WATCH: Hillary Clinton Explains Trump’s “Bizarre Behavior and Appeal”

WATCH: Hillary Clinton Q&A at #CodeCon Code Conference

Story 2: Part 2: Portrait of A Paranoid:  Hillary Clinton Unplugged And Weaponized — Blames Russians, Comey, Democratic Party, Fake News, Wikileaks, and Many Others — Not Herself  — The Emails and Server Were A “Nothing Burger” (Actually Criminal Behavior)  — Videos —

Image result for cartoons hillary clinton blames losing on others

Image result for cartoons hillary clinton blames losing on othersImage result for Hillary Clinton blames Now's she's blaming 39 problems

Hillary’s Excuse Tour Continues | Tucker Hilariously Trolls

Now’s she’s blaming 39 problems, but a Hillary ain’t one.

FULL EVENT: Hillary Clinton Speaks at Recode’s Code Conference (5-31-17)

FULL Hillary Clinton tears into Donald Trump at CodeCon

 Hillary Clinton: Russians Influenced Voters In The Election | CNBC

Published on May 31, 2017

Former Secretary of State and 2016 Democratic Presidential Nominee Hillary Clinton speaks with Recode’s Kara Swisher and The Verge’s Walt Mossberg at the Code Conference about her loss in the election and how Russia and technology played into that.
» Subscribe to CNBC: http://cnb.cx/SubscribeCNBC

Hillary Clinton complains about DNC

BLAME COMEY: Hillary Clinton Says “Yes, We Thought We Were Going to Win” the Day Before Election

WATCH: Hillary Clinton Q&A at #CodeCon Code Conference

Hillary Clinton Blames Russians, James Comey, Fake News For Her Defeat In 2016 | TODAY

Clinton ‘Basket of Deplorables’ Remark Draws Fire

Donald Trump Absolutely Destroys Hillary Clinton On Her Basket Of Deplorable Remarks!

Hillary Clinton lying for 13 minutes straight.

The Truth about “Paranoia” (Reality Distortion)

Are you distorting reality? How do you know?

The truth about “pathological liars”

The Pronk Pops Show Podcasts Portfolio

Listen To Pronk Pops Podcast or Download Shows 897-903

Listen To Pronk Pops Podcast or Download Shows 889-896

Listen To Pronk Pops Podcast or Download Shows 884-888

Listen To Pronk Pops Podcast or Download Shows 878-883

Listen To Pronk Pops Podcast or Download Shows 870-877

Listen To Pronk Pops Podcast or Download Shows 864-869

Listen To Pronk Pops Podcast or Download Shows 857-863

Listen To Pronk Pops Podcast or Download Shows 850-856

Listen To Pronk Pops Podcast or Download Shows 845-849

Listen To Pronk Pops Podcast or Download Shows 840-844

Listen To Pronk Pops Podcast or Download Shows 833-839

Listen To Pronk Pops Podcast or Download Shows 827-832

Listen To Pronk Pops Podcast or Download Shows 821-826

Listen To Pronk Pops Podcast or Download Shows 815-820

Listen To Pronk Pops Podcast or Download Shows 806-814

Listen To Pronk Pops Podcast or Download Shows 800-805

Listen To Pronk Pops Podcast or Download Shows 793-799

Listen To Pronk Pops Podcast or Download Shows 785-792

Listen To Pronk Pops Podcast or Download Shows 777-784

Listen To Pronk Pops Podcast or Download Shows 769-776

Listen To Pronk Pops Podcast or Download Shows 759-768

Listen To Pronk Pops Podcast or Download Shows 751-758

Listen To Pronk Pops Podcast or Download Shows 745-750

Listen To Pronk Pops Podcast or Download Shows 738-744

Listen To Pronk Pops Podcast or Download Shows 732-737

Listen To Pronk Pops Podcast or Download Shows 727-731

Listen To Pronk Pops Podcast or Download Shows 720-726

Listen To Pronk Pops Podcast or DownloadShows 713-719

Listen To Pronk Pops Podcast or DownloadShows 705-712

Listen To Pronk Pops Podcast or Download Shows 695-704

Listen To Pronk Pops Podcast or Download Shows 685-694

Listen To Pronk Pops Podcast or Download Shows 675-684

Listen To Pronk Pops Podcast or Download Shows 668-674

Listen To Pronk Pops Podcast or Download Shows 660-667

Listen To Pronk Pops Podcast or Download Shows 651-659

Listen To Pronk Pops Podcast or Download Shows 644-650

Listen To Pronk Pops Podcast or Download Shows 637-643

Listen To Pronk Pops Podcast or Download Shows 629-636

Listen To Pronk Pops Podcast or Download Shows 617-628

Listen To Pronk Pops Podcast or Download Shows 608-616

Listen To Pronk Pops Podcast or Download Shows 599-607

Listen To Pronk Pops Podcast or Download Shows 590-598

Listen To Pronk Pops Podcast or Download Shows 585- 589

Listen To Pronk Pops Podcast or Download Shows 575-584

Listen To Pronk Pops Podcast or Download Shows 565-574

Listen To Pronk Pops Podcast or Download Shows 556-564

Listen To Pronk Pops Podcast or Download Shows 546-555

Listen To Pronk Pops Podcast or Download Shows 538-545

Listen To Pronk Pops Podcast or Download Shows 532-537

Listen To Pronk Pops Podcast or Download Shows 526-531

Listen To Pronk Pops Podcast or Download Shows 519-525

Listen To Pronk Pops Podcast or Download Shows 510-518

Listen To Pronk Pops Podcast or Download Shows 500-509

Listen To Pronk Pops Podcast or Download Shows 490-499

Listen To Pronk Pops Podcast or Download Shows 480-489

Listen To Pronk Pops Podcast or Download Shows 473-479

Listen To Pronk Pops Podcast or Download Shows 464-472

Listen To Pronk Pops Podcast or Download Shows 455-463

Listen To Pronk Pops Podcast or Download Shows 447-454

Listen To Pronk Pops Podcast or Download Shows 439-446

Listen To Pronk Pops Podcast or Download Shows 431-438

Listen To Pronk Pops Podcast or Download Shows 422-430

Listen To Pronk Pops Podcast or Download Shows 414-421

Listen To Pronk Pops Podcast or Download Shows 408-413

Listen To Pronk Pops Podcast or Download Shows 400-407

Listen To Pronk Pops Podcast or Download Shows 391-399

Listen To Pronk Pops Podcast or Download Shows 383-390

Listen To Pronk Pops Podcast or Download Shows 376-382

Listen To Pronk Pops Podcast or Download Shows 369-375

Listen To Pronk Pops Podcast or Download Shows 360-368

Listen To Pronk Pops Podcast or Download Shows 354-359

Listen To Pronk Pops Podcast or Download Shows 346-353

Listen To Pronk Pops Podcast or Download Shows 338-345

Listen To Pronk Pops Podcast or Download Shows 328-337

Listen To Pronk Pops Podcast or Download Shows 319-327

Listen To Pronk Pops Podcast or Download Shows 307-318

Listen To Pronk Pops Podcast or Download Shows 296-306

Listen To Pronk Pops Podcast or Download Shows 287-295

Listen To Pronk Pops Podcast or Download Shows 277-286

Listen To Pronk Pops Podcast or Download Shows 264-276

Listen To Pronk Pops Podcast or Download Shows 250-263

Listen To Pronk Pops Podcast or Download Shows 236-249

Listen To Pronk Pops Podcast or Download Shows 222-235

Listen To Pronk Pops Podcast or Download Shows 211-221

Listen To Pronk Pops Podcast or Download Shows 202-210

Listen To Pronk Pops Podcast or Download Shows 194-201

Listen To Pronk Pops Podcast or Download Shows 184-193

Listen To Pronk Pops Podcast or Download Shows 174-183

Listen To Pronk Pops Podcast or Download Shows 165-173

Listen To Pronk Pops Podcast or Download Shows 158-164

Listen To Pronk Pops Podcast or Download Shows151-157

Listen To Pronk Pops Podcast or Download Shows 143-150

Listen To Pronk Pops Podcast or Download Shows 135-142

Listen To Pronk Pops Podcast or Download Shows 131-134

Listen To Pronk Pops Podcast or Download Shows 124-130

Listen To Pronk Pops Podcast or Download Shows 121-123

Listen To Pronk Pops Podcast or Download Shows 118-120

Listen To Pronk Pops Podcast or Download Shows 113 -117

Listen To Pronk Pops Podcast or Download Show 112

Listen To Pronk Pops Podcast or Download Shows 108-111

Listen To Pronk Pops Podcast or Download Shows 106-108

Listen To Pronk Pops Podcast or Download Shows 104-105

Listen To Pronk Pops Podcast or Download Shows 101-103

Listen To Pronk Pops Podcast or Download Shows 98-100

Listen To Pronk Pops Podcast or Download Shows 94-97

Listen To Pronk Pops Podcast or Download Show 93

Listen To Pronk Pops Podcast or Download Show 92

Listen To Pronk Pops Podcast or Download Show 91

Listen To Pronk Pops Podcast or Download Shows 88-90

Listen To Pronk Pops Podcast or Download Shows 84-87

Listen To Pronk Pops Podcast or Download Shows 79-83

Listen To Pronk Pops Podcast or Download Shows 74-78

Listen To Pronk Pops Podcast or Download Shows 71-73

Listen To Pronk Pops Podcast or Download Shows 68-70

Listen To Pronk Pops Podcast or Download Shows 65-67

Listen To Pronk Pops Podcast or Download Shows 62-64

Listen To Pronk Pops Podcast or Download Shows 58-61

Listen To Pronk Pops Podcast or Download Shows 55-57

Listen To Pronk Pops Podcast or Download Shows 52-54

Listen To Pronk Pops Podcast or Download Shows 49-51

Listen To Pronk Pops Podcast or Download Shows 45-48

Listen To Pronk Pops Podcast or Download Shows 41-44

Listen To Pronk Pops Podcast or Download Shows 38-40

Listen To Pronk Pops Podcast or Download Shows 34-37

Listen To Pronk Pops Podcast or Download Shows 30-33

Listen To Pronk Pops Podcast or Download Shows 27-29

Listen To Pronk Pops Podcast or Download Shows 17-26

Listen To Pronk Pops Podcast or Download Shows 16-22

Listen To Pronk Pops Podcast or Download Shows 10-15

Listen To Pronk Pops Podcast or Download Shows 1-9

Read Full Post | Make a Comment ( None so far )

The Pronk Pops Show 854, March 8, 2017, Story 1: FBI Search For Vault 7 Leaker Who Gave Wikileaks The CIA Collection of Hacking and Malware Software Tools — Sources and Methods — Treason By The Lying Lunatic Left — Videos — Story 2: -Soros’ and Obama’s Seditious and Subversive War On Trump With Organizing For Action Applying Saul Alinsky’s Rules for Radicals — Videos

Posted on March 9, 2017. Filed under: American History, Blogroll, Breaking News, Congress, Corruption, Countries, Crime, Culture, Donald J. Trump, Donald J. Trump, Donald Trump, Donald Trump, Education, Empires, Employment, Foreign Policy, Fourth Amendment, Freedom of Speech, Government, Health, High Crimes, History, House of Representatives, News, Obama, Philosophy, Photos, Politics, Polls, President Trump, Progressives, Raymond Thomas Pronk, Rule of Law, Scandals, Second Amendment, Senate, Taxation, Taxes, Terror, Terrorism, Unemployment, United States Constitution, United States of America, United States Supreme Court, Videos, Violence, War, Wealth, Weather, Wisdom | Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , |

Project_1

The Pronk Pops Show Podcasts

Pronk Pops Show 854: March 9, 2017

Pronk Pops Show 853: March 8, 2017

Pronk Pops Show 852: March 6, 2017

Pronk Pops Show 851: March 3, 2017

Pronk Pops Show 850: March 2, 2017

Pronk Pops Show 849: March 1, 2017

Pronk Pops Show 848: February 28, 2017

Pronk Pops Show 847: February 27, 2017

Pronk Pops Show 846: February 24, 2017

Pronk Pops Show 845: February 23, 2017

Pronk Pops Show 844: February 22, 2017

Pronk Pops Show 843: February 21, 2017

Pronk Pops Show 842: February 20, 2017

Pronk Pops Show 841: February 17, 2017

Pronk Pops Show 840: February 16, 2017

Pronk Pops Show 839: February 15, 2017

Pronk Pops Show 838: February 14, 2017

Pronk Pops Show 837: February 13, 2017

Pronk Pops Show 836: February 10, 2017

Pronk Pops Show 835: February 9, 2017

Pronk Pops Show 834: February 8, 2017

Pronk Pops Show 833: February 7, 2017

Pronk Pops Show 832: February 6, 2017

Pronk Pops Show 831: February 3, 2017

Pronk Pops Show 830: February 2, 2017

Pronk Pops Show 829: February 1, 2017

Pronk Pops Show 828: January 31, 2017

Pronk Pops Show 827: January 30, 2017

Pronk Pops Show 826: January 27, 2017

Pronk Pops Show 825: January 26, 2017

Pronk Pops Show 824: January 25, 2017

Pronk Pops Show 823: January 24, 2017

Pronk Pops Show 822: January 23, 2017

Pronk Pops Show 821: January 20, 2017

Pronk Pops Show 820: January 19, 2017

Pronk Pops Show 819: January 18, 2017

Pronk Pops Show 818: January 17, 2017

Pronk Pops Show 817: January 13, 2017

Pronk Pops Show 816: January 12, 2017

Pronk Pops Show 815: January 11, 2017

Pronk Pops Show 814: January 10, 2017

Pronk Pops Show 813: January 9, 2017

Pronk Pops Show 812: December 12, 2016

Pronk Pops Show 811: December 9, 2016

Pronk Pops Show 810: December 8, 2016

Pronk Pops Show 809: December 7, 2016

Pronk Pops Show 808: December 6, 2016

Pronk Pops Show 807: December 5, 2016

Pronk Pops Show 806: December 2, 2016

Pronk Pops Show 805: December 1, 2016

 Story 1: FBI Search For Vault 7 Leaker Who Gave Wikileaks The CIA Collection of Hacking and Malware Software Tools — Treason By The Lying Lunatic Left — Videos —

 

Image result for cia wikileaks hacker tools

Image result for cia wikileaks hacker tools

Image result for cartoons cia hacker tools

Image result for cartoons cia hacker tools

Image result for intelligence communityImage result for cia wikileaks hacker tools

TREASON OR BETRAYAL? FBI SET TO LAUNCH CRIMINAL INVESTIGATION INTO WIKILEAKS OVER CIA HACK

Hannity : Former intelligence officials on surveillance tactics and document leaks : 3/8/2017

Treason is in the air

Investigating national security leaks

UK: Assange holds presser on CIA hacking leaks

WATCH: WikiLeaks Julian Assange Press Conference On CIA Hacking (3/9/2017)

Julian Assange Press Conference On The CIA Vault 7 Release | March 9th, 2017

Julian Assange Wikileaks Press Conference, Q&A on CIA Vault 7, Year Zero [03/09/2017]

WikiLeaks publishes apparent CIA hacking tools

WikiLeaks Dump Shows CIA Using Cell Phones And Smart TVs To Listen And WATCH “Everyday Americans”

Can the CIA control your phone? WikiLeaks claims explained

What Pisses Me Off About Wikileaks Vault 7 Release

WikiLeaks Vault 7: What You Should Know and Fear, CIA vs. NSA Turf Battles, How Trump Was Right

VAULT 7: CIA Staged Fake Russian Hacking to Set Up Trump — Russian Cyber-Attack M.O. As False Flag

Lionel “Wikileaks Vault 7 Shows That Trump Is Not Crazy. The CIA Spy On Everybody.”

Wikileaks Claims CIA Is Hacking Americans’ Electronics – Tucker Carlson Tonight – Fox News – 3/7/17

Silent Coup: Obama, FISA, NSA, Deep State vs. President Donald Trump

TUCKER CARLSON reacts to latest CIA scandal and the big story ‘OBAMA CARE LITE’

Former CIA Director: Wikileaks Dump Could Be ‘Very Damaging’ | Andrea Mitchell | MSNBC

CIA lost control of its hacking tools – Wikileaks Vault7 report finding

Fall Out of Wikileak’s Vault 7 Year Zero Release Has Begun. Investigations Initiated.

WikiLeaks Fallout: CIA Revelations Rock The Political Establishment

Bombshell: WikiLeaks Releases Trove Of CIA Documents

Whistleblower: NSA Collecting Data On Every U.S. Citizen

NSA Whistleblower William Binney: The Future of FREEDOM

NSA Surveillance and What To Do About It

Our Almost Orwellian State & NSA Surveillance Forum

How the Government Tracks You: NSA Surveillance

US Surveillance: An Analysis of EO 12333 and Its Global Implications

E.O: 12333 VS Kyle from Secular Talk, debunked again.

Executive Order 12333 (The President’s Inherent Article II Power to Conduct Foreign Intelligence)

Executive Order 12333 (Greatest Hits)

The Silent Order NSA Sees Everything Hears Everything Documentary HD

Judge Rules NSA Surveillance “Almost Orwellian” — Obama Prepares to Leave Spying Program Intact

Glenn Greenwald: The NSA Can “Literally Watch Every Keystroke You Make”

NSA has collected bulk data on Americans since Reagan

NSA surveillance program “almost Orwellian,” federal judge rules

Judgement NSA Violates Unconstitutional Patriot Act

ALGORITHM: The Hacker Movie

FBI prepares for new hunt for WikiLeaks’ source

March 7 at 6:55 PM
The FBI has begun preparing for a major mole hunt to determine how anti-secrecy group WikiLeaks got an alleged arsenal of hacking tools the CIA has used to spy on espionage targets, according to people familiar with the matter.

The leak rattled government and technology industry officials, who spent Tuesday scrambling to determine the accuracy and scope of the thousands of documents released by the group. They were also trying to assess the damage the revelations may cause, and what damage may come from future releases promised by WikiLeaks, these people said.

It was all a familiar scenario for a government that has repeatedly seen sensitive information compromised in recent years.

But cracks keep appearing in the system. Last year, the FBI arrested Harold T. Martin III, an NSA contractor who took home documents detailing some of the agency’s most sensitive offensive cyberweapons. Some of those files later appeared online, although investigators are still trying to determine Martin’s role, if any, in that part of the case.

WikiLeaks says it has a trove on the CIA’s hacking secrets. Washington Post national security reporter Greg Miller explains what these documents reveal. (Dalton Bennett, Greg Miller/The Washington Post)

He has pleaded not guilty to charges that he violated the Espionage Act. Officials call the Martin case the largest theft of classified information in U.S. history.

Now, less than a year after the Martin case, U.S. intelligence agencies are rushing to determine whether they again have suffered an embarrassing compromise at the hands of one of their own.

“Anybody who thinks that the Manning and Snowden problems were one-offs is just dead wrong,’’ said Joel Brenner, former head of U.S. counterintelligence at the office of the Director of National Intelligence. “Ben Franklin said three people can keep a secret if two of them are dead. If secrets are shared on systems in which thousands of people have access to them, that may really not be a secret anymore. This problem is not going away, and it’s a condition of our existence.’’

In Silicon Valley, industry figures said they received no heads-up from the government or the hacking community that such a move by WikiLeaks was in the works. By midday Tuesday, industry officials said they still had not heard from the FBI.

It wasn’t immediately clear if the CIA had sent a crimes report to the Justice Department — a formal mechanism alerting law enforcement of a potentially damaging and illegal national security leak. Such a report would offer the FBI a road map for where to begin investigating, and whom to question.

The FBI and CIA both declined to comment.

Once investigators verify the accuracy of the WikiLeaks documents, a key question to answer is who had access to the information, according to veterans of past leak probes. The FBI has spent years investigating WikiLeaks, and authorities are eager to figure out whether it has recruited a new, well-placed source from the U.S. government.

Anti-secrecy group Wikileaks on Tuesday said it had obtained a top-secret trove of hacking tools used by the CIA to break into phones, communication apps and other electronic devices, and published confidential documents on those programs. (Reuters)

In releasing thousands of pages of documents, WikiLeaks indicated that its source was a former government employee or contractor.

“This extraordinary collection, which amounts to more than several hundred million lines of code, gives its possessor the entire hacking capacity of the CIA,’’ WikiLeaks said in announcing the first release of documents. “The archive appears to have been circulated among former U.S. government hackers and contractors in an unauthorized manner, one of whom has provided WikiLeaks with portions of the archive.’’

One former intelligence official said if that claim is accurate, “there’s going to be another major mole hunt . . . If this is all correct, it’s a big deal.’’

A key distinction for investigators will be whether WikiLeaks reveals the actual computer code — or enough details about such code — that others can develop and deploy some of the hacking tools, according to current and former officials.

The security failures highlighted by damaging leaks from Snowden and Manning have proven difficult to address.

Manning was arrested in Iraq in May 2010 after transmitting documents to WikiLeaks that came to be known as the Iraq and Afghanistan “War Logs.’’ She also leaked a video showing a U.S. Apache helicopter in Baghdad opening fire on a group of people that the crew thought were insurgents. Among the dead were two journalists who worked for Reuters. She also leaked documents pertaining to Guantanamo Bay prisoners, as well as 250,000 State Department cables.

In response to the Manning case, the Obama administration created the National Insider Threat Task Force, designed to teach and train government workers and contractors to spot potential leakers.

Manning, formerly known as Bradley Manning, came out as transgender after her 2013 conviction. In the waning days of his presidency, Barack Obama commuted her 35-year prison sentence, and she is due to be released in coming months.

The post-Manning efforts did not stop Snowden from taking reams of data about sensitive bulk intelligence collection in 2013 and giving the material to reporters. Those revelations, including a court document showing how the government gathered Americans’ phone records, sparked years of political debate about privacy and government surveillance in the digital age.

Snowden has remained out of reach of the U.S. government, living in Russia.

Brenner, the former counterintelligence official, said the net effect of the new leaks could be “very dangerous to us, because they “accelerate the leveling of the playing field between the United States and its adversaries in cyberspace.’’

The bigger lesson of the newest leak, Brenner argued, is that U.S. pursuit of dominance in cyberspace may actually be destabilizing over the long run. “That is a very unsettling debate for our military and our intelligence services, but I think it’s coming,’’ he said.

Snowden also weighed in regarding the alleged CIA documents, tweeting: “What @Wikileaks has here is genuinely a big deal. Looks authentic.’’

https://www.washingtonpost.com/world/national-security/fbi-prepares-for-new-hunt-for-wikileaks-source/2017/03/07/28dcb9e0-0356-11e7-ad5b-d22680e18d10_story.html?utm_term=.0d9871aa3c4c

U.S. aware of CIA security breach in 2016; contractors suspected in leak

By John Walcott and Andrea Shalal | WASHINGTON/BERLIN

U.S. intelligence and law enforcement officials said on Wednesday they have been aware since the end of last year of a security breach at the CIA and were focusing on contractors as the likeliest source of documents being passed on to anti-secrecy group WikiLeaks detailing the agency’s hacking tools.

The officials, who spoke on condition of anonymity, told Reuters that they believed documents published by WikiLeaks on Tuesday about CIA techniques used between 2013 and 2016 were authentic.

The documents showed that CIA hackers could get into Apple Inc (AAPL.O) iPhones, Google Inc (GOOGL.O) Android devices and other gadgets in order to capture text and voice messages before they were encrypted with sophisticated software.

The White House said on Wednesday that President Donald Trump was “extremely concerned” about a CIA security breach that led to the Wikileaks release, and the administration would be tough on leakers.

“Anybody who leaks classified information will be held to the highest degree of law,” spokesman Sean Spicer told reporters.

One official with knowledge of the investigation said companies that are contractors for the CIA have been checking to see which of their employees had access to the material that Wikileaks published, and then going over their computer logs, emails and other communications for any evidence of who might be responsible.

One reason the investigation is focused on a potential leak by contractors rather than for example a hack by Russian intelligence, another official said, is that so far there is no evidence that Russian intelligence agencies tried to exploit any of the leaked material before it was published.

One European official, speaking on condition of anonymity, said the Wikileaks material could in fact lead to closer cooperation between European intelligence agencies and U.S. counterparts, which share concerns about Russian intelligence operations.

U.S. intelligence agencies have accused Russia of seeking to tilt last year’s U.S. presidential election in Trump’s favor, including by hacking into Democratic Party emails. Moscow has denied the allegation.

The lobby of the CIA Headquarters Building in Langley, Virginia, U.S. on August 14, 2008. REUTERS/Larry Downing/File Photo

One major security problem was that the number of contractors with access to information with the highest secrecy classification has “exploded” because of federal budget constraints, the first U.S. official said.

U.S. intelligence agencies have been unable to hire additional permanent staff needed to keep pace with technological advances such as the “Internet of Things” that connects cars, home security and heating systems and other devices to computer networks, or to pay salaries competitive with the private sector, the official said.

Reuters could not immediately verify the contents of the published documents. On Tuesday, several contractors and private cyber security experts said the materials appeared to be legitimate.

A person familiar with Wikileaks’ activities said Wikileaks has had the CIA hacking material for months, and that the release of the material was in the works “for a long time.”

A Congressional official said that the U.S. House of Representatives Intelligence Committee has begun asking questions about the WikiLeaks disclosures.

GERMAN CONCERN

In Germany on Wednesday, the chief federal prosecutor’s office said that it would review the Wikileaks documents because some suggested that the CIA ran a hacking hub from the U.S. consulate in Frankfurt.

“We’re looking at it very carefully,” a spokesman for the federal prosecutor’s office told Reuters. “We will initiate an investigation if we see evidence of concrete criminal acts or specific perpetrators.”

Chancellor Angela Merkel is scheduled to visit Washington on March 14 for her first meeting with Trump, who has sharply criticized Berlin for everything from its trade policy to what he considers inadequate levels of military spending.

The Wikileaks documents may also complicate bilateral intelligence ties that have just begun to recover after a series of scandals, including news in 2013 that the U.S. National Security Agency had bugged Merkel’s cellphone. The Frankfurt consulate was investigated by German lawmakers after that incident.

Merkel told lawmakers last month she did not know how closely Germany’s spies cooperated with their U.S. counterparts until 2015 when former NSA contractor Edward Snowden revealed the BND spy agency had for years passed on information to the NSA about European companies and politicians.

Germany scaled back the level of cooperation with the NSA after those revelations.

U.S. officials have acknowledged that the consulate in Frankfurt is home to a CIA base. A facility adjacent to the city’s airport and the Rhein-Main Air Base has for many years been home to the CIA’s “Tefran” station, a U.S. center for collecting intelligence on Iranian activities in Europe, maintaining surveillance on Iranian officials and targeting potential defectors working in Iran’s nuclear weapons program.

Foreign ministry spokesman Sebastian Fischer told a regular government news conference that Germany took the issue seriously, but more work needed to be done to verify the authenticity of the documents. Berlin was in close touch with Washington about the case and such matters generally, he said.

Government spokesman Steffen Seibert said Germany’s domestic intelligence agency had the job of uncovering espionage activities in Germany, and carried out its work comprehensively.

Wikileaks reported that CIA employees had been given diplomatic passports and State Department identities to carry out their work in Frankfurt, focused on targets in Europe, the Middle East and Africa. The documents included advice for CIA experts about life in Germany, noting that shops are closed on Sundays, and to have “your cover-for-action story down pat” when they were asked by German authorities when entering the country.

(Reporting by John Walcott, Mark Hosenball, Yara Bayoumy in Washington and Matthias Sobolewski and Andrea Shalal in Berlin; Writing by Grant McCool; Editing by Peter Graff, Grant McCool and Frances Kerry)

http://www.reuters.com/article/us-cia-wikileaks-idUSKBN16F2AP?il=0

Wikileaks to hand over alleged CIA spying tools to tech companies

Assange
Assange said he would give tech companies the details of hacks affecting their products  CREDIT: WIKILEAKS

Wikileaks will hand Central Intelligence Agency hacking tools to technology companies in order for them to defend their customers against spying.

Julian Assange, founder of the website, said he had decided to provide the classified information to giants such as Microsoft, Samsung and Apple whose products were implicated in the alleged CIA leaks.

The announcement comes after Wikileaks on Tuesday released a raft of documents that it claims detail tools the CIA used to hack into peoples computers, televisions and smartphones, among other internet-connected devices.

Wikileaks didn’t disclose details of how the tools worked, but basic information that allegedly proves the cyber weapons arsenal exists.

Samsung F8000
The CIA could have hacked Samsung’s F8000 smart TVs to turn them into spying toolsCREDIT: SAMSUNG

In the wake of the release, Assange said tech companies had asked Wikileaks to pass them details of the hacks that affect their products in order for them to fix them.

“After considering what we think is the best way to proceed and hearing calls from some of the manufacturers we have decided to work with them, to give them exclusive access to some of the technical details we have,” said Assange.

With the information Assange said the companies can “effectively disarm” the alleged CIA hacking tools.

It is not clear how long it will take for all of the vulnerabilities to be fixed or if they can all be solved. Some could be blocked in a couple of days, said Assange, while other more critical one could take weeks.

Assange warned that other hacks, such as the one used to turn on a “fake off” spying mode on Samsung smart TVs, may have to be manually blocked. This could prove difficult as it would require people to know their device had been infected in order for it to be fixed.

https://cf-particle-html.eip.telegraph.co.uk/25f7b704-4ac6-4678-a1a0-b3beeb494718.html?ref=http://www.telegraph.co.uk/technology/2017/03/09/wikileaks-hand-alleged-cia-spying-tools-tech-companies/&title=Wikileaks%20to%20hand%20over%20alleged%20CIA%20spying%20tools%20to%20tech%20companies

Apple has responded directly to the alleged CIA hacking tools mentioned in the documents. It says the security vulnerabilities that could have been used to access iPhones were fixed as of its latest security update. Samsung and Google meanwhile have said they are investigating the claims but it is unclear what action they have taken.

The CIA has not commented on the authenticity of the leaks.

http://www.telegraph.co.uk/technology/2017/03/09/wikileaks-hand-alleged-cia-spying-tools-tech-companies/

Assange: WikiLeaks Will Work With Tech Companies

 WikiLeaks has offered to help the likes of Google and Apple identify the software holes used by purported CIA hacking tools – and that puts the tech industry in something of a bind.

While companies have both a responsibility and financial incentive to fix problems in their software, accepting help from WikiLeaks raises legal and ethical questions. And it’s not even clear at this point exactly what kind of assistance WikiLeaks can offer.

THE PROMISE

WikiLeaks founder Julian Assange said Thursday that the anti-secrecy site will help technology companies find and fix software vulnerabilities in everyday gadgets such as phones and TVs. In an online news conference, Assange said some companies had asked for more details about the purported CIA cyberespionage toolkit that he revealed in a massive disclosure on Tuesday.

“We have decided to work with them, to give them some exclusive access to the additional technical details we have, so that fixes can be developed and pushed out,” Assange said. The digital blueprints for what he described as “cyberweapons” would be published to the world “once this material is effectively disarmed by us.”

Any conditions WikiLeaks might set for its cooperation weren’t immediately known. Nor was it clear if WikiLeaks holds additional details on specific vulnerabilities, or merely the tools designed to exploit them.

Apple declined comment on the WikiLeaks offer, and Google didn’t respond to requests for comment. Microsoft said it hopes that anyone with knowledge of software vulnerabilities would report them through the company’s usual channels.

LEGAL QUESTIONS

Tech companies could run into legal difficulties in accepting the offer, especially if they have government contracts or employees with security clearances.

“The unauthorized release of classified documents does not mean it’s unclassified,” said Stewart Baker, a former official at the Department of Homeland Security and former legal counsel for the National Security Agency. “Doing business with WikiLeaks and reviewing classified documents poses a real risk for at least their government contracting arms and their cleared employees.”

Other lawyers, however, are convinced that much of the information in the documents is so widely known that they are now part of the public domain. That means tech companies would be unlikely to face any legal liability for digging deeper with WikiLeaks.

Alternatively, suppose tech companies don’t accept WikiLeaks’ offer to help fix any security flaws – and are subsequently hacked. At that point, they could face charges of negligence, particularly in Europe where privacy laws are much stricter than in the U.S., said Michael Zweiback, a former assistant U.S. attorney and cybercrime adviser now in private practice.

GETTING TOO CLOSE TO WIKILEAKS

Public perception might be a bigger problem. “They don’t want to be seen as endorsing or supporting an organization with a tainted reputation and an unclear agenda,” said Robert Cattanach, a former U.S. Department of Justice attorney.

During the 2016 election, WikiLeaks published thousands of emails, some embarrassing, from breached Democratic Party computers and the account of a top aide to Hillary Clinton. U.S. intelligence agencies concluded those emails were stolen by hackers connected to the Russian government in an attempt to help Donald Trump win the presidency.

The CIA did not respond directly to Assange’s offer, but it appeared to take a dim view of it.

“Julian Assange is not exactly a bastion of truth and integrity,” CIA spokeswoman Heather Fritz Horniak said.

But most tech companies already have digital hotlines to receive tips about security weaknesses, even if they come from unsavory characters. So it wouldn’t break new ground for them to consult with a shadowy organization such as WikiLeaks.

A BETTER PATH

Ideally, the CIA would have shared such vulnerabilities directly with companies, as other government agencies have long done. In that case, companies would not only be dealing with a known entity in an aboveboard fashion, they might also obtain a more nuanced understanding of the problems than their engineers could glean from documents or lines of computer code.

And if companies could learn details about how the CIA found these vulnerabilities, they might also find additional holes using the same technique, said Johannes Ullrich, director of the Internet Storm Center at the SANS Institute.

And there are risks obtaining actual hacking tools from WikiLeaks. Some might have unadvertised features that could, for instance, start extracting data as soon as they launch. Ullrich said the CIA also might have left some traps to attack people running its exploits. If these aren’t detailed in the documents, only the CIA would be able to help tech companies avoid setting them off.

If all goes well, WikiLeaks could emerge looking better than some parts of the U.S. government.

“I am not a fan of WikiLeaks, but I don’t think it is fair to throw rocks at everything they do,” said Cindy Cohn, executive director of the Electronic Frontier Foundation, a group specializing in online privacy and other digital rights. “What WikiLeaks is demonstrating is that the CIA does not have the best interests of these companies at heart.”

BETTER THAN NOTHING

There’s one more unknown, which is just how much help WikiLeaks can actually provide. Apple, Google and Microsoft say they’ve already rendered many of the alleged CIA cyberespionage tools obsolete with earlier updates that patched related software holes.

Still, the companies will probably want to check out what WikiLeaks has, assuming that the organization hasn’t set unreasonable conditions on its cooperation. Some privacy and security experts believe the CIA’s own refusal to contact the affected companies about the vulnerabilities gives them little choice.

“We all should have better security, and certainly at this point, not trying to fixing them makes no sense,” Cohn said.

Liedtke reported from San Ramon, Calif. Raphael Satter in Paris, Paisley Dodds in London and Deb Riechmann in Washington contributed to this report.

This story has been corrected to reflect that purported CIA tools are not aimed at “defeating encryption” but at hijacking computers.

http://hosted.ap.org/dynamic/stories/U/US_WIKILEAKS_CIA?SITE=AP&SECTION=HOME&TEMPLATE=DEFAULT&CTIME=2017-03-09-17-09-24

Why Is Obama Expanding Surveillance Powers Right Before He Leaves Office?

It could be to prevent Trump from extending them even more.

Obama waves at the end of his farewell address in Chicago
The Obama administration made it easier for the NSA to share information with other intelligence agencies, just weeks before the inauguration.Jonathan Ernst / Reuters
On Thursday, the Obama administration finalized new rules that allow the National Security Agency to share information it gleans from its vast international surveillance apparatus with the 16 other agencies that make up the U.S. intelligence community.With the new changes, which were long in the works, those agencies can apply for access to various feeds of raw, undoctored NSA intelligence. Analysts will then be able to sift through the contents of those feeds as they see fit, before implementing required privacy protections. Previously, the NSA applied those privacy protections itself, before forwarding select pieces of information to agencies that might need to see them.The updated procedures will multiply the number of intelligence analysts who have access to NSA surveillance, which is captured in large quantities and often isn’t subject to warrant requirements. The changes rankled privacy advocates, who oppose a broadening of surveillance powers—especially on the cusp of Donald Trump’s inauguration. Trump and Mike Pompeo, the president-elect’s nominee for CIA director, have made it clear that they think overzealous civil-liberties protections should be cleared away in favor of stronger surveillance laws.
But while the changes may subject more Americans to warrantless surveillance, the last-minute timing of the announcement actually might have been designed to cut future privacy losses. Susan Hennessey, a Brookings fellow and the managing editor of Lawfare, says firming up the changes before Trump takes office makes it harder for the incoming president to encroach even further on civil liberties.I spoke with Hennessey, who was previously an attorney in the NSA general counsel’s office, about the lasting effects of the new intelligence-sharing procedures. A transcript of our conversation follows, lightly edited for clarity and concision.


Kaveh Waddell: First off, what do these changes mean for the intelligence community? Has a lack of information-sharing among agencies been holding back investigations?

Susan Hennessey: The origin of these changes dates back, honestly, to just after 9/11. There was this identified issue of “stovepiping”: Intelligence wasn’t being shared frequently or fast enough. Some modifications have already been made throughout the years.

Under Executive Order 12333 as it previously existed, NSA analysts had to make an initial determination and apply a set of privacy rules before sharing raw signals-intelligence information with other parts of the intelligence community. After this change, it doesn’t necessarily have to be an NSA analyst that makes that determination—that information can be shared with other parts of the intelligence community.

So it doesn’t change the substantive rules, it doesn’t change the scope of collection, it doesn’t change the types of protection, it doesn’t change the possible uses; it essentially just broadens the group of people who can apply those protections to the raw intelligence.

Waddell: And by extension, it broadens the group of people who get to see raw intelligence, before those rules are applied?

Hennessey: Yes. This is something that has been at the forefront of privacy and civil-liberties advocates’ minds when they’ve expressed concern with this type of collection. But it’s not accurate to say the rule change means it’s a raw signals-intelligence free-for-all, that anybody can get signals intelligence.

Intelligence agencies other than the NSA will have to provide justification for why they need access to that data. It can only be for foreign intelligence, or other enumerated purposes. So it’s not that those agencies will just be able to see whatever they want—it’s that they will be able to request, with particular justifications, access to more raw signals intelligence than they had before. Then, they will need to apply those minimization procedures for themselves.

The civil-liberties concern often surrounds the use of incidentally collected information. Under the new rule, the FBI could not obtain access to or search raw intelligence information for ordinary criminals in an ordinary criminal investigation against a U.S. person. However, if the FBI incidentally seized evidence of a crime, they are allowed to use that information. So that tends to be where the tension is for people who are concerned with the potential impacts that this change could have on U.S. persons.

Waddell: The fact that more Americans could potentially be subject to warrantless searches, just by virtue of being caught up in the raw signals intelligence that’s shared—is that something that concerns you?

Hennessey: No. Look, I think it’s important to understand that these minimization procedures are taken very seriously, and all other agencies that are handling raw signals intelligence are essentially going to have to import these very complex oversight and compliance mechanisms that currently exist at the NSA.

Within the NSA, those are extremely strong and protective mechanisms. I think people should feel reassured that the rules cannot be violated—certainly not without it coming to the attention of oversight and compliance bodies. I am confident that all of the agencies in the U.S. intelligence community will discharge those very same obligations with the same level of diligence and rigor, adhering to both the spirit and the letter of the law.

That said, there are potentially broader reforms that might be undertaken. I don’t think that they necessarily need to be linked to the sharing of data. But it’s reasonable to at least engage in a conversation about whether or not it’s appropriate to have particular post-collection reforms, like for example imposing an obligation for law enforcement to obtain a warrant in particular circumstances.

That’s a long way of saying that nothing about this particular rule change exposing Americans to additional privacy risks. However, that doesn’t mean that there are not still reasonable and responsible reforms which might take place.

Waddell: I found it interesting that you said the change could, in one way, actually be viewed as a “huge source of comfort.” I think you were referring to the timing of the change. Why is that?

Hennessey: These changes have actually been in process for eight or nine years. One of the things that I think individuals who had insight into intelligence activities and were concerned about the election of Donald Trump—specifically, some of the statements he’s made about adherence to the rule of law—a lot of those people’s minds went very quickly to these procedures.

It’s important to understand the distinction between Executive Order 12333 and the Foreign Intelligence Surveillance Act: One very oversimplified way to think about it is that FISA is a statute that governs collection that takes place within the United States, but that is aimed at a foreign target; 12333 collection is aimed at a foreign target, and takes place outside the United States. That’s shorthand that glosses over some technical and legal nuance, but those are the broad buckets people should be thinking about.

FISA is a statute, so you’d need congressional action to change those rules, and you have a built-in check there. But 12333 is not constrained by statute; it’s constrained by executive order. In theory, a president could change an executive order—that’s within his constitutional power. It’s not as easy as just a pen stroke, but it’s theoretically possible.

Executive Order 12333 requires that this series of protective procedures exist and are adhered to. The procedures are kind of where the rubber meets the road on privacy. They’re the details, the nitty-gritty: What can you actually see? What can you share? What do you have to minimize? So they’re really, really important in terms of what the relationship between U.S. citizens and the intelligence community looks like.

When they were in rewrites, they were sort of vulnerable. There was the possibility that an incoming administration would say, “Hey! While you’re in the process of rewriting, let’s go ahead and adjust some of the domestic protections.” And I think a reasonable observer might assume that while the protections the Obama administration was interested in putting into place increased privacy protections—or at the very least did not reduce them—that the incoming administration has indicated that they are less inclined to be less protective of privacy and civil liberties. So I think it is a good sign that these procedures have been finalized, in part because it’s so hard to change procedures once they’re finalized.

Waddell: Is that why we just went through an eight- or nine-year process to get here?

Hennessey: Exactly. For questions both of genuine complexity and just government bureaucracy, the time horizon here is longer than a single term of the presidency.

So I don’t think that it’s necessarily true that the intelligence community or the Department of Justice was rushing to get these procedures passed; if anything, they’re a little bit late. But I think the bottom line is that it’s comforting to a large national-security community that these are procedures that are signed off by Director of National Intelligence James Clapper and Attorney General Loretta Lynch, and not by the DNI and attorney general that will ultimately be confirmed under the Trump Administration.

Waddell: Is there anything else we should be thinking about with these new changes?

Hennessey: People sometimes focus on the top-line stuff and end up missing the things that aren’t necessarily the symbolic expressions of privacy—the things that make us feel good—but are the functional elements of privacy and civil liberties. What rules do people apply day-to-day and how? There’s going to be a need moving forward to have disciplined conversations about the legal protections that really matter.

If there is a silver lining to some of the anxieties that the incoming administration has produced, I think it’s the potential to move the conversation into a much more productive place. But that opportunity will end up being lost if the responses are the same old same. That’s my last shred of optimism, and I’m hanging on to it.

https://www.theatlantic.com/technology/archive/2017/01/obama-expanding-nsa-powers/513041/

Executive Orders

Executive Order 12333–United States intelligence activities

Source: The provisions of Executive Order 12333 of Dec. 4, 1981, appear at 46 FR 59941, 3 CFR, 1981 Comp., p. 200, unless otherwise noted.

Table of Contents

Preamble

Part 1.Goals, Direction, Duties, and Responsibilities With Respect to the National Intelligence Effort
1.1 Goals
1.2 The National Security Council
1.3 National Foreign Intelligence Advisory Groups
1.4 The Intelligence Community
1.5 Director of Central Intelligence
1.6 Duties and Responsibilities of the Heads of Executive Branch Departments and Agencies
1.7 Senior Officials of the Intelligence Community
1.8 The Central Intelligence Agency
1.9 The Department of State
1.10 The Department of the Treasury
1.11 The Department of Defense
1.12 Intelligence Components Utilized by the Secretary of Defense
1.13 The Department of Energy
1.14 The Federal Bureau of Investigation
Part 2.Conduct of Intelligence Activities
2.1 Need
2.2 Purpose
2.3 Collection of Information
2.4 Collection Techniques
2.5 Attorney General Approval
2.6 Assistance to Law Enforcement Authorities
2.7 Contracting
2.8 Consistency With Other Laws
2.9 Undisclosed Participation in Organizations Within the United States
2.10 Human Experimentation
2.11 Prohibition on Assassination
2.12 Indirect Participation
Part 3.General Provisions
3.1 Congressional Oversight
3.2 Implementation
3.3 Procedures
3.4 Definitions
3.5 Purpose and Effect
3.6 Revocation

Timely and accurate information about the activities, capabilities, plans, and intentions of foreign powers, organizations, and persons and their agents, is essential to the national security of the United States. All reasonable and lawful means must be used to ensure that the United States will receive the best intelligence available. For that purpose, by virtue of the authority vested in me by the Constitution and statutes of the United States of America, including the National Security Act of 1947, as amended, and as President of the United States of America, in order to provide for the effective conduct of United States intelligence activities and the protection of constitutional rights, it is hereby ordered as follows:

Part 1

Goals, Direction, Duties and Responsibilities With Respect to the National Intelligence Effort

1.1Goals. The United States intelligence effort shall provide the President and the National Security Council with the necessary information on which to base decisions concerning the conduct and development of foreign, defense and economic policy, and the protection of United States national interests from foreign security threats. All departments and agencies shall cooperate fully to fulfill this goal.
(a) Maximum emphasis should be given to fostering analytical competition among appropriate elements of the Intelligence Community.
(b) All means, consistent with applicable United States law and this Order, and with full consideration of the rights of United States persons, shall be used to develop intelligence information for the President and the National Security Council. A balanced approach between technical collection efforts and other means should be maintained and encouraged.
(c) Special emphasis should be given to detecting and countering espionage and other threats and activities directed by foreign intelligence services against the United States Government, or United States corporations, establishments, or persons.
(d) To the greatest extent possible consistent with applicable United States law and this Order, and with full consideration of the rights of United States persons, all agencies and departments should seek to ensure full and free exchange of information in order to derive maximum benefit from the United States intelligence effort.

1.2The National Security Council.
(a) Purpose. The National Security Council (NSC) was established by the National Security Act of 1947 to advise the President with respect to the integration of domestic, foreign and military policies relating to the national security. The NSC shall act as the highest Executive Branch entity that provides review of, guidance for and direction to the conduct of all national foreign intelligence, counterintelligence, and special activities, and attendant policies and programs.
(b) Committees. The NSC shall establish such committees as may be necessary to carry out its functions and responsibilities under this Order. The NSC, or a committee established by it, shall consider and submit to the President a policy recommendation, including all dissents, on each special activity and shall review proposals for other sensitive intelligence operations.

1.3National Foreign Intelligence Advisory Groups.
(a) Establishment and Duties. The Director of Central Intelligence shall establish such boards, councils, or groups as required for the purpose of obtaining advice from within the Intelligence Community concerning:
(1) Production, review and coordination of national foreign intelligence;
(2) Priorities for the National Foreign Intelligence Program budget;
(3) Interagency exchanges of foreign intelligence information;
(4) Arrangements with foreign governments on intelligence matters;
(5) Protection of intelligence sources and methods;
(6) Activities of common concern; and
(7) Such other matters as may be referred by the Director of Central Intelligence.
(b) Membership. Advisory groups established pursuant to this section shall be chaired by the Director of Central Intelligence or his designated representative and shall consist of senior representatives from organizations within the Intelligence Community and from departments or agencies containing such organizations, as designated by the Director of Central Intelligence. Groups for consideration of substantive intelligence matters will include representatives of organizations involved in the collection, processing and analysis of intelligence. A senior representative of the Secretary of Commerce, the Attorney General, the Assistant to the President for National Security Affairs, and the Office of the Secretary of Defense shall be invited to participate in any group which deals with other than substantive intelligence matters.

1.4The Intelligence Community. The agencies within the Intelligence Community shall, in accordance with applicable United States law and with the other provisions of this Order, conduct intelligence activities necessary for the conduct of foreign relations and the protection of the national security of the United States, including:
(a) Collection of information needed by the President, the National Security Council, the Secretaries of State and Defense, and other Executive Branch officials for the performance of their duties and responsibilities;
(b) Production and dissemination of intelligence;
(c) Collection of information concerning, and the conduct of activities to protect against, intelligence activities directed against the United States, international terrorist and international narcotics activities, and other hostile activities directed against the United States by foreign powers, organizations, persons, and their agents;
(d) Special activities;
(e) Administrative and support activities within the United States and abroad necessary for the performance of authorized activities; and
(f) Such other intelligence activities as the President may direct from time to time.

1.5Director of Central Intelligence. In order to discharge the duties and responsibilities prescribed by law, the Director of Central Intelligence shall be responsible directly to the President and the NSC and shall:
(a) Act as the primary adviser to the President and the NSC on national foreign intelligence and provide the President and other officials in the Executive Branch with national foreign intelligence;
(b) Develop such objectives and guidance for the Intelligence Community as will enhance capabilities for responding to expected future needs for national foreign intelligence;
(c) Promote the development and maintenance of services of common concern by designated intelligence organizations on behalf of the Intelligence Community;
(d) Ensure implementation of special activities;
(e) Formulate policies concerning foreign intelligence and counterintelligence arrangements with foreign governments, coordinate foreign intelligence and counterintelligence relationships between agencies of the Intelligence Community and the intelligence or internal security services of foreign governments, and establish procedures governing the conduct of liaison by any department or agency with such services on narcotics activities;
(f) Participate in the development of procedures approved by the Attorney General governing criminal narcotics intelligence activities abroad to ensure that these activities are consistent with foreign intelligence programs;
(g) Ensure the establishment by the Intelligence Community of common security and access standards for managing and handling foreign intelligence systems, information, and products;
(h) Ensure that programs are developed which protect intelligence sources, methods, and analytical procedures;
(i) Establish uniform criteria for the determination of relative priorities for the transmission of critical national foreign intelligence, and advise the Secretary of Defense concerning the communications requirements of the Intelligence Community for the transmission of such intelligence;
(j) Establish appropriate staffs, committees, or other advisory groups to assist in the execution of the Director’s responsibilities;
(k) Have full responsibility for production and dissemination of national foreign intelligence, and authority to levy analytic tasks on departmental intelligence production organizations, in consultation with those organizations, ensuring that appropriate mechanisms for competitive analysis are developed so that diverse points of view are considered fully and differences of judgment within the Intelligence Community are brought to the attention of national policymakers;
(l) Ensure the timely exploitation and dissemination of data gathered by national foreign intelligence collection means, and ensure that the resulting intelligence is disseminated immediately to appropriate government entities and military commands;
(m) Establish mechanisms which translate national foreign intelligence objectives and priorities approved by the NSC into specific guidance for the Intelligence Community, resolve conflicts in tasking priority, provide to departments and agencies having information collection capabilities that are not part of the National Foreign Intelligence Program advisory tasking concerning collection of national foreign intelligence, and provide for the development of plans and arrangements for transfer of required collection tasking authority to the Secretary of Defense when directed by the President;
(n) Develop, with the advice of the program managers and departments and agencies concerned, the consolidated National Foreign Intelligence Program budget, and present it to the President and the Congress;
(o) Review and approve all requests for reprogramming National Foreign Intelligence Program funds, in accordance with guidelines established by the Office of Management and Budget;
(p) Monitor National Foreign Intelligence Program implementation, and, as necessary, conduct program and performance audits and evaluations;
(q) Together with the Secretary of Defense, ensure that there is no unnecessary overlap between national foreign intelligence programs and Department of Defense intelligence programs consistent with the requirement to develop competitive analysis, and provide to and obtain from the Secretary of Defense all information necessary for this purpose;
(r) In accordance with law and relevant procedures approved by the Attorney General under this Order, give the heads of the departments and agencies access to all intelligence, developed by the CIA or the staff elements of the Director of Central Intelligence, relevant to the national intelligence needs of the departments and agencies; and
(s) Facilitate the use of national foreign intelligence products by Congress in a secure manner.

1.6Duties and Responsibilities of the Heads of Executive Branch Departments and Agencies.
(a) The heads of all Executive Branch departments and agencies shall, in accordance with law and relevant procedures approved by the Attorney General under this Order, give the Director of Central Intelligence access to all information relevant to the national intelligence needs of the United States, and shall give due consideration to the requests from the Director of Central Intelligence for appropriate support for Intelligence Community activities.
(b) The heads of departments and agencies involved in the National Foreign Intelligence Program shall ensure timely development and submission to the Director of Central Intelligence by the program managers and heads of component activities of proposed national programs and budgets in the format designated by the Director of Central Intelligence, and shall also ensure that the Director of Central Intelligence is provided, in a timely and responsive manner, all information necessary to perform the Director’s program and budget responsibilities.
(c) The heads of departments and agencies involved in the National Foreign Intelligence Program may appeal to the President decisions by the Director of Central Intelligence on budget or reprogramming matters of the National Foreign Intelligence Program.

1.7Senior Officials of the Intelligence Community. The heads of departments and agencies with organizations in the Intelligence Community or the heads of such organizations, as appropriate, shall:
(a) Report to the Attorney General possible violations of federal criminal laws by employees and of specified federal criminal laws by any other person as provided in procedures agreed upon by the Attorney General and the head of the department or agency concerned, in a manner consistent with the protection of intelligence sources and methods, as specified in those procedures;
(b) In any case involving serious or continuing breaches of security, recommend to the Attorney General that the case be referred to the FBI for further investigation;
(c) Furnish the Director of Central Intelligence and the NSC, in accordance with applicable law and procedures approved by the Attorney General under this Order, the information required for the performance of their respective duties;
(d) Report to the Intelligence Oversight Board, and keep the Director of Central Intelligence appropriately informed, concerning any intelligence activities of their organizations that they have reason to believe may be unlawful or contrary to Executive order or Presidential directive;
(e) Protect intelligence and intelligence sources and methods from unauthorized disclosure consistent with guidance from the Director of Central Intelligence;
(f) Disseminate intelligence to cooperating foreign governments under arrangements established or agreed to by the Director of Central Intelligence;
(g) Participate in the development of procedures approved by the Attorney General governing production and dissemination of intelligence resulting from criminal narcotics intelligence activities abroad if their departments, agencies, or organizations have intelligence responsibilities for foreign or domestic narcotics production and trafficking;
(h) Instruct their employees to cooperate fully with the Intelligence Oversight Board; and
(i) Ensure that the Inspectors General and General Counsels for their organizations have access to any information necessary to perform their duties assigned by this Order.

1.8The Central Intelligence Agency. All duties and responsibilities of the CIA shall be related to the intelligence functions set out below. As authorized by this Order; the National Security Act of 1947, as amended; the CIA Act of 1949, as amended; appropriate directives or other applicable law, the CIA shall:
(a) Collect, produce and disseminate foreign intelligence and counterintelligence, including information not otherwise obtainable. The collection of foreign intelligence or counterintelligence within the United States shall be coordinated with the FBI as required by procedures agreed upon by the Director of Central Intelligence and the Attorney General;
(b) Collect, produce and disseminate intelligence on foreign aspects of narcotics production and trafficking;
(c) Conduct counterintelligence activities outside the United States and, without assuming or performing any internal security functions, conduct counterintelligence activities within the United States in coordination with the FBI as required by procedures agreed upon by the Director of Central Intelligence and the Attorney General;
(d) Coordinate counterintelligence activities and the collection of information not otherwise obtainable when conducted outside the United States by other departments and agencies;
(e) Conduct special activities approved by the President. No agency except the CIA (or the Armed Forces of the United States in time of war declared by Congress or during any period covered by a report from the President to the Congress under the War Powers Resolution (87 Stat. 855)1) may conduct any special activity unless the President determines that another agency is more likely to achieve a particular objective;
(f) Conduct services of common concern for the Intelligence Community as directed by the NSC;
(g) Carry out or contract for research, development and procurement of technical systems and devices relating to authorized functions;
(h) Protect the security of its installations, activities, information, property, and employees by appropriate means, including such investigations of applicants, employees, contractors, and other persons with similar associations with the CIA as are necessary; and
(i) Conduct such administrative and technical support activities within and outside the United States as are necessary to perform the functions described in sections (a) through (h) above, including procurement and essential cover and proprietary arrangements.

1.9The Department of State. The Secretary of State shall:
(a) Overtly collect information relevant to United States foreign policy concerns;
(b) Produce and disseminate foreign intelligence relating to United States foreign policy as required for the execution of the Secretary’s responsibilities;
(c) Disseminate, as appropriate, reports received from United States diplomatic and consular posts;
(d) Transmit reporting requirements of the Intelligence Community to the Chiefs of United States Missions abroad; and
(e) Support Chiefs of Missions in discharging their statutory responsibilities for direction and coordination of mission activities.

1.10The Department of the Treasury. The Secretary of the Treasury shall:
(a) Overtly collect foreign financial and monetary information;
(b) Participate with the Department of State in the overt collection of general foreign economic information;
(c) Produce and disseminate foreign intelligence relating to United States economic policy as required for the execution of the Secretary’s responsibilities; and
(d) Conduct, through the United States Secret Service, activities to determine the existence and capability of surveillance equipment being used against the President of the United States, the Executive Office of the President, and, as authorized by the Secretary of the Treasury or the President, other Secret Service protectees and United States officials. No information shall be acquired intentionally through such activities except to protect against such surveillance, and those activities shall be conducted pursuant to procedures agreed upon by the Secretary of the Treasury and the Attorney General.

1.11The Department of Defense. The Secretary of Defense shall:
(a) Collect national foreign intelligence and be responsive to collection tasking by the Director of Central Intelligence;
(b) Collect, produce and disseminate military and military-related foreign intelligence and counterintelligence as required for execution of the Secretary’s responsibilities;
(c) Conduct programs and missions necessary to fulfill national, departmental and tactical foreign intelligence requirements;
(d) Conduct counterintelligence activities in support of Department of Defense components outside the United States in coordination with the CIA, and within the United States in coordination with the FBI pursuant to procedures agreed upon by the Secretary of Defense and the Attorney General;
(e) Conduct, as the executive agent of the United States Government, signals intelligence and communications security activities, except as otherwise directed by the NSC;
(f) Provide for the timely transmission of critical intelligence, as defined by the Director of Central Intelligence, within the United States Government;
(g) Carry out or contract for research, development and procurement of technical systems and devices relating to authorized intelligence functions;
(h) Protect the security of Department of Defense installations, activities, property, information, and employees by appropriate means, including such investigations of applicants, employees, contractors, and other persons with similar associations with the Department of Defense as are necessary;
(i) Establish and maintain military intelligence relationships and military intelligence exchange programs with selected cooperative foreign defense establishments and international organizations, and ensure that such relationships and programs are in accordance with policies formulated by the Director of Central Intelligence;
(j) Direct, operate, control and provide fiscal management for the National Security Agency and for defense and military intelligence and national reconnaissance entities; and
(k) Conduct such administrative and technical support activities within and outside the United States as are necessary to perform the functions described in sections (a) through (j) above.

1.12Intelligence Components Utilized by the Secretary of Defense. In carrying out the responsibilities assigned in section 1.11, the Secretary of Defense is authorized to utilize the following:
(a) Defense Intelligence Agency, whose responsibilities shall include;
(1) Collection, production, or, through tasking and coordination, provision of military and military-related intelligence for the Secretary of Defense, the Joint Chiefs of Staff, other Defense components, and, as appropriate, non-Defense agencies;
(2) Collection and provision of military intelligence for national foreign intelligence and counterintelligence products;
(3) Coordination of all Department of Defense intelligence collection requirements;
(4) Management of the Defense Attache system; and
(5) Provision of foreign intelligence and counterintelligence staff support as directed by the Joint Chiefs of Staff.
(b) National Security Agency, whose responsibilities shall include:
(1) Establishment and operation of an effective unified organization for signals intelligence activities, except for the delegation of operational control over certain operations that are conducted through other elements of the Intelligence Community. No other department or agency may engage in signals intelligence activities except pursuant to a delegation by the Secretary of Defense;
(2) Control of signals intelligence collection and processing activities, including assignment of resources to an appropriate agent for such periods and tasks as required for the direct support of military commanders;
(3) Collection of signals intelligence information for national foreign intelligence purposes in accordance with guidance from the Director of Central Intelligence;
(4) Processing of signals intelligence data for national foreign intelligence purposes in accordance with guidance from the Director of Central Intelligence;
(5) Dissemination of signals intelligence information for national foreign intelligence purposes to authorized elements of the Government, including the military services, in accordance with guidance from the Director of Central Intelligence;
(6) Collection, processing and dissemination of signals intelligence information for counterintelligence purposes;
(7) Provision of signals intelligence support for the conduct of military operations in accordance with tasking, priorities, and standards of timeliness assigned by the Secretary of Defense. If provision of such support requires use of national collection systems, these systems will be tasked within existing guidance from the Director of Central Intelligence;
(8) Executing the responsibilities of the Secretary of Defense as executive agent for the communications security of the United States Government;
(9) Conduct of research and development to meet the needs of the United States for signals intelligence and communications security;
(10) Protection of the security of its installations, activities, property, information, and employees by appropriate means, including such investigations of applicants, employees, contractors, and other persons with similar associations with the NSA as are necessary;
(11) Prescribing, within its field of authorized operations, security regulations covering operating practices, including the transmission, handling and distribution of signals intelligence and communications security material within and among the elements under control of the Director of the NSA, and exercising the necessary supervisory control to ensure compliance with the regulations;
(12) Conduct of foreign cryptologic liaison relationships, with liaison for intelligence purposes conducted in accordance with policies formulated by the Director of Central Intelligence; and
(13) Conduct of such administrative and technical support activities within and outside the United States as are necessary to perform the functions described in sections (1) through (12) above, including procurement.
(c) Offices for the collection of specialized intelligence through reconnaissance programs, whose responsibilities shall include:
(1) Carrying out consolidated reconnaissance programs for specialized intelligence;
(2) Responding to tasking in accordance with procedures established by the Director of Central Intelligence; and
(3) Delegating authority to the various departments and agencies for research, development, procurement, and operation of designated means of collection.

(d)

The foreign intelligence and counterintelligence elements of the Army, Navy, Air Force, and Marine Corps,

whose responsibilities shall include:

(1) Collection, production and dissemination of military and military-related foreign intelligence and counterintelligence, and information on the foreign aspects of narcotics production and trafficking. When collection is conducted in response to national foreign intelligence requirements, it will be conducted in accordance with guidance from the Director of Central Intelligence. Collection of national foreign intelligence, not otherwise obtainable, outside the United States shall be coordinated with the CIA, and such collection within the United States shall be coordinated with the FBI;
(2) Conduct of counterintelligence activities outside the United States in coordination with the CIA, and within the United States in coordination with the FBI; and
(3) Monitoring of the development, procurement and management of tactical intelligence systems and equipment and conducting related research, development, and test and evaluation activities.
(e) Other offices within the Department of Defense appropriate for conduct of the intelligence missions and responsibilities assigned to the Secretary of Defense. If such other offices are used for intelligence purposes, the provisions of Part 2 of this Order shall apply to those offices when used for those purposes.

1.13The Department of Energy. The Secretary of Energy shall:
(a) Participate with the Department of State in overtly collecting information with respect to foreign energy matters;
(b) Produce and disseminate foreign intelligence necessary for the Secretary’s responsibilities;
(c) Participate in formulating intelligence collection and analysis requirements where the special expert capability of the Department can contribute; and
(d) Provide expert technical, analytical and research capability to other agencies within the Intelligence Community.

1.14The Federal Bureau of Investigation. Under the supervision of the Attorney General and pursuant to such regulations as the Attorney General may establish, the Director of the FBI shall:
(a) Within the United States conduct counterintelligence and coordinate counterintelligence activities of other agencies within the Intelligence Community. When a counterintelligence activity of the FBI involves military or civilian personnel of the Department of Defense, the FBI shall coordinate with the Department of Defense;
(b) Conduct counterintelligence activities outside the United States in coordination with the CIA as required by procedures agreed upon by the Director of Central Intelligence and the Attorney General;
(c) Conduct within the United States, when requested by officials of the Intelligence Community designated by the President, activities undertaken to collect foreign intelligence or support foreign intelligence collection requirements of other agencies within the Intelligence Community, or, when requested by the Director of the National Security Agency, to support the communications security activities of the United States Government;
(d) Produce and disseminate foreign intelligence and counterintelligence; and
(e) Carry out or contract for research, development and procurement of technical systems and devices relating to the functions authorized above.

Part 2

Conduct of Intelligence Activities

2.1Need. Accurate and timely information about the capabilities, intentions and activities of foreign powers, organizations, or persons and their agents is essential to informed decisionmaking in the areas of national defense and foreign relations. Collection of such information is a priority objective and will be pursued in a vigorous, innovative and responsible manner that is consistent with the Constitution and applicable law and respectful of the principles upon which the United States was founded.

2.2Purpose. This Order is intended to enhance human and technical collection techniques, especially those undertaken abroad, and the acquisition of significant foreign intelligence, as well as the detection and countering of international terrorist activities and espionage conducted by foreign powers. Set forth below are certain general principles that, in addition to and consistent with applicable laws, are intended to achieve the proper balance between the acquisition of essential information and protection of individual interests. Nothing in this Order shall be construed to apply to or interfere with any authorized civil or criminal law enforcement responsibility of any department or agency.

2.3Collection of Information. Agencies within the Intelligence Community are authorized to collect, retain or disseminate information concerning United States persons only in accordance with procedures established by the head of the agency concerned and approved by the Attorney General, consistent with the authorities provided by Part 1 of this Order. Those procedures shall permit collection, retention and dissemination of the following types of information:
(a) Information that is publicly available or collected with the consent of the person concerned;
(b) Information constituting foreign intelligence or counterintelligence, including such information concerning corporations or other commercial organizations. Collection within the United States of foreign intelligence not otherwise obtainable shall be undertaken by the FBI or, when significant foreign intelligence is sought, by other authorized agencies of the Intelligence Community, provided that no foreign intelligence collection by such agencies may be undertaken for the purpose of acquiring information concerning the domestic activities of United States persons;
(c) Information obtained in the course of a lawful foreign intelligence, counterintelligence, international narcotics or international terrorism investigation;
(d) Information needed to protect the safety of any persons or organizations, including those who are targets, victims or hostages of international terrorist organizations;
(e) Information needed to protect foreign intelligence or counterintelligence sources or methods from unauthorized disclosure. Collection within the United States shall be undertaken by the FBI exceptthat other agencies of the Intelligence Community may also collect such information concerning present or former employees, present or former intelligence agency contractors or their present or former employees, or applicants for any such employment or contracting;
(f) Information concerning persons who are reasonably believed to be potential sources or contacts for the purpose of determining their suitability or credibility;
(g) Information arising out of a lawful personnel, physical or communications security investigation;
(h) Information acquired by overhead reconnaissance not directed at specific United States persons;
(i) Incidentally obtained information that may indicate involvement in activities that may violate federal, state, local or foreign laws; and
(j) Information necessary for administrative purposes.
In addition, agencies within the Intelligence Community may disseminate information, other than information derived from signals intelligence, to each appropriate agency within the Intelligence Community for purposes of allowing the recipient agency to determine whether the information is relevant to its responsibilities and can be retained by it.

2.4Collection Techniques. Agencies within the Intelligence Community shall use the least intrusive collection techniques feasible within the United States or directed against United States persons abroad. Agencies are not authorized to use such techniques as electronic surveillance, unconsented physical search, mail surveillance, physical surveillance, or monitoring devices unless they are in accordance with procedures established by the head of the agency concerned and approved by the Attorney General. Such procedures shall protect constitutional and other legal rights and limit use of such information to lawful governmental purposes. These procedures shall not authorize:
(a) The CIA to engage in electronic surveillance within the United States except for the purpose of training, testing, or conducting countermeasures to hostile electronic surveillance;
(b) Unconsented physical searches in the United States by agencies other than the FBI, except for:
(1) Searches by counterintelligence elements of the military services directed against military personnel within the United States or abroad for intelligence purposes, when authorized by a military commander empowered to approve physical searches for law enforcement purposes, based upon a finding of probable cause to believe that such persons are acting as agents of foreign powers; and
(2) Searches by CIA of personal property of non-United States persons lawfully in its possession.
(c) Physical surveillance of a United States person in the United States by agencies other than the FBI, except for:
(1) Physical surveillance of present or former employees, present or former intelligence agency contractors or their present of former employees, or applicants for any such employment or contracting; and
(2) Physical surveillance of a military person employed by a nonintelligence element of a military service.
(d) Physical surveillance of a United States person abroad to collect foreign intelligence, except to obtain significant information that cannot reasonably be acquired by other means.

2.5Attorney General Approval. The Attorney General hereby is delegated the power to approve the use for intelligence purposes, within the United States or against a United States person abroad, of any technique for which a warrant would be required if undertaken for law enforcement purposes, provided that such techniques shall not be undertaken unless the Attorney General has determined in each case that there is probable cause to believe that the technique is directed against a foreign power or an agent of a foreign power. Electronic surveillance, as defined in the Foreign Intelligence Surveillance Act of 1978, shall be conducted in accordance with that Act, as well as this Order.

2.6Assistance to Law Enforcement Authorities. Agencies within the Intelligence Community are authorized to:
(a) Cooperate with appropriate law enforcement agencies for the purpose of protecting the employees, information, property and facilities of any agency within the Intelligence Community;
(b) Unless otherwise precluded by law or this Order, participate in law enforcement activities to investigate or prevent clandestine intelligence activities by foreign powers, or international terrorist or narcotics activities;
(c) Provide specialized equipment, technical knowledge, or assistance of expert personnel for use by any department or agency, or, when lives are endangered, to support local law enforcement agencies. Provision of assistance by expert personnel shall be approved in each case by the General Counsel of the providing agency; and
(d) Render any other assistance and cooperation to law enforcement authorities not precluded by applicable law.

2.7Contracting. Agencies within the Intelligence Community are authorized to enter into contracts or arrangements for the provision of goods or services with private companies or institutions in the United States and need not reveal the sponsorship of such contracts or arrangements for authorized intelligence purposes. Contracts or arrangements with academic institutions may be undertaken only with the consent of appropriate officials of the institution.

2.8Consistency With Other Laws. Nothing in this Order shall be construed to authorize any activity in violation of the Constitution or statutes of the United States.

2.9Undisclosed Participation in Organizations Within the United States. No one acting on behalf of agencies within the Intelligence Community may join or otherwise participate in any organization in the United States on behalf of any agency within the Intelligence Community without disclosing his intelligence affiliation to appropriate officials of the organization, except in accordance with procedures established by the head of the agency concerned and approved by the Attorney General. Such participation shall be authorized only if it is essential to achieving lawful purposes as determined by the agency head or designee. No such participation may be undertaken for the purpose of influencing the activity of the organization or its members except in cases where:
(a) The participation is undertaken on behalf of the FBI in the course of a lawful investigation; or
(b) The organization concerned is composed primarily of individuals who are not United States persons and is reasonably believed to be acting on behalf of a foreign power.

2.10Human Experimentation. No agency within the Intelligence Community shall sponsor, contract for or conduct research on human subjects except in accordance with guidelines issued by the Department of Health and Human Services. The subject’s informed consent shall be documented as required by those guidelines.

2.11Prohibition on Assassination. No person employed by or acting on behalf of the United States Government shall engage in, or conspire to engage in, assassination.

2.12Indirect Participation. No agency of the Intelligence Community shall participate in or request any person to undertake activities forbidden by this Order.

Part 3

General Provisions

3.1Congressional Oversight. The duties and responsibilities of the Director of Central Intelligence and the heads of other departments, agencies, and entities engaged in intelligence activities to cooperate with the Congress in the conduct of its responsibilities for oversight of intelligence activities shall be as provided in title 50, United States Code, section 413. The requirements of section 662 of the Foreign Assistance Act of 1961, as amended (22 U.S.C. 2422), and section 501 of the National Security Act of 1947, as amended (50 U.S.C. 413), shall apply to all special activities as defined in this Order.

3.2Implementation. The NSC, the Secretary of Defense, the Attorney General, and the Director of Central Intelligence shall issue such appropriate directives and procedures as are necessary to implement this Order. Heads of agencies within the Intelligence Community shall issue appropriate supplementary directives and procedures consistent with this Order. The Attorney General shall provide a statement of reasons for not approving any procedures established by the head of an agency in the Intelligence Community other than the FBI. The National Security Council may establish procedures in instances where the agency head and the Attorney General are unable to reach agreement on other than constitutional or other legal grounds.

3.3Procedures. Until the procedures required by this Order have been established, the activities herein authorized which require procedures shall be conducted in accordance with existing procedures or requirements established under Executive Order No. 12036. Procedures required by this Order shall be established as expeditiously as possible. All procedures promulgated pursuant to this Order shall be made available to the congressional intelligence committees.

3.4Definitions. For the purposes of this Order, the following terms shall have these meanings:
(a) Counterintelligence means information gathered and activities conducted to protect against espionage, other intelligence activities, sabotage, or assassinations conducted for or on behalf of foreign powers, organizations or persons, or international terrorist activities, but not including personnel, physical, document or communications security programs.
(b) Electronic surveillance means acquisition of a nonpublic communication by electronic means without the consent of a person who is a party to an electronic communication or, in the case of a nonelectronic communication, without the consent of a person who is visibly present at the place of communication, but not including the use of radio direction-finding equipment solely to determine the location of a transmitter.
(c) Employee means a person employed by, assigned to or acting for an agency within the Intelligence Community.
(d) Foreign intelligence means information relating to the capabilities, intentions and activities of foreign powers, organizations or persons, but not including counterintelligence except for information on international terrorist activities.
(e) Intelligence activities means all activities that agencies within the Intelligence Community are authorized to conduct pursuant to this Order.
(f) Intelligence Community and agencies within the Intelligence Community refer to the following agencies or organizations:
(1) The Central Intelligence Agency (CIA);
(2) The National Security Agency (NSA);
(3) The Defense Intelligence Agency (DIA);
(4) The offices within the Department of Defense for the collection of specialized national foreign intelligence through reconnaissance programs;
(5) The Bureau of Intelligence and Research of the Department of State;
(6) The intelligence elements of the Army, Navy, Air Force, and Marine Corps, the Federal Bureau of Investigation (FBI), the Department of the Treasury, and the Department of Energy; and
(7) The staff elements of the Director of Central Intelligence.
(g) The National Foreign Intelligence Program includes the programs listed below, but its composition shall be subject to review by the National Security Council and modification by the President:
(1) The programs of the CIA;
(2) The Consolidated Cryptologic Program, the General Defense Intelligence Program, and the programs of the offices within the Department of Defense for the collection of specialized national foreign intelligence through reconnaissance, except such elements as the Director of Central Intelligence and the Secretary of Defense agree should be excluded;
(3) Other programs of agencies within the Intelligence Community designated jointly by the Director of Central Intelligence and the head of the department or by the President as national foreign intelligence or counterintelligence activities;
(4) Activities of the staff elements of the Director of Central Intelligence;
(5) Activities to acquire the intelligence required for the planning and conduct of tactical operations by the United States military forces are not included in the National Foreign Intelligence Program.
(h) Special activities means activities conducted in support of national foreign policy objectives abroad which are planned and executed so that the role of the United States Government is not apparent or acknowledged publicly, and functions in support of such activities, but which are not intended to influence United States political processes, public opinion, policies, or media and do not include diplomatic activities or the collection and production of intelligence or related support functions.
(i) United States person means a United States citizen, an alien known by the intelligence agency concerned to be a permanent resident alien, an unincorporated association substantially composed of United States citizens or permanent resident aliens, or a corporation incorporated in the United States, except for a corporation directed and controlled by a foreign government or governments.

3.5Purpose and Effect. This Order is intended to control and provide direction and guidance to the Intelligence Community. Nothing contained herein or in any procedures promulgated hereunder is intended to confer any substantive or procedural right or privilege on any person or organization.

3.6Revocation. Executive Order No. 12036 of January 24, 1978, as amended, entitled “United States Intelligence Activities,” is revoked.


1Editorial note: The correct citation is (87 Stat. 555).

https://www.archives.gov/federal-register/codification/executive-order/12333.html

 

Story 2: -Soros’ and Obama’s  Seditious and Subversive War On Trump With  Organizing For Action Applying Saul Alinsky’s Rules for Radicals — Videos

Judge Nap: If Obama Wiretapped Trump, It Would ‘Destroy Whatever Legacy’ He Has

SARA CARTER VS SEAN HANNITY (3/8/2017)

Laura Ingraham: New WikiLeaks Release Could Be ‘Really Damning’ For CIA

IS THIS THE END OF BARACK OBAMA? More proofs of illegal acts during Barack Obama’s administration

Gingrich talks ‘deep state’ bureaucrats’ attacks on Trump

On the Russia Lunacy & Wikileaks BOMBSHELL Leak of CIA Hacking Force

‘Everyday, a new piece falls into place’׃ Maddow spells out the Trump Russia connection 2

Former DOJ Lawyer: Lynch, Comey Could Have ‘Intimate Knowledge’ of Alleged Wiretapping

REAKING NEWS 03⁄08⁄2017 TRUMP: OBAMA “WEAK”

BREAKING NEWS March 8, 2017 WAR IN WHITE HOUSE, TRUMP vs OBAMA

ORGANIZING FOR ACTION OBAMA TEAM OF 80,000 PROTESTERS NATIONWIDE

Organizing for Action fights President Trump’s policies

Political Group “Organizing for Action” Relaunches For Trump Era

How Obama is Scheming to Sabotage Trump’s Presidency

Lou Dobbs: Obama Looking Very Close To Sedition

Monica Crowley: What happened to me was a political hit job

Tomi Lahren, Jessica Tarlov on attacks against the Trumps

Tomi Lahren – So you want me fired – Final Thoughts With Tomi Lahren

Tomi Lahren – Tantrums Against Trump (Final Thoughts)

Not My President’s Day Protests – Tomi Lahren Final Thoughts – The Blaze

Hannity With 3 Special Guest Uncover Obama’s Sedition Against The Republic For Which WE STAND!

HANNITY 3/7/17 – Ingraham – Crowley, ‘Deep State Plan to Imprison Trump.’

EXPOSED: Trump National Security Pick Monica Crowley Plagiarizes Book, Rewarded Title By President

Trump pick Monica Crowley has a plagiarism problem Viral news US

Lou Dobbs : Paul Sperry – Obama’s ‘shadow government’ is organizing to sabotage Trump : 2/15/2017

BREAKING Obama’s Plan to SABOTAGE Trump’s Presidency EXPOSED No Former President Has Ever Done This

Billionaire Soros linked to anti-Trump protests – WikiLeaks

Personal attacks on President Trump

Obama Moves to Bunker & Prepares To ‘Fight Trump’—30,000 Man Activist Army READY At His COMMAND

What is Organizing for Action?

Obama’s Organizing for Action Partners with Soros-Linked ‘Indivisible’ to Disrupt Trump’s Agenda

Organizing for Action, the activist group that morphed from Barack Obama’s first presidential campaign, has partnered with the newly-formed Indivisible Project for “online trainings” on how to protest President Donald Trump’s agenda.

Last week, Breitbart News extensively reported that Indivisible leaders are openly associated with groups financed by billionaire George Soros.

Politico earlier this month profiled Indivisible in an article titled, “Inside the protest movement that has Republicans reeling.”  The news agency not only left out the Soros links, but failed to note that the organizations cited in its article as helping to amplify Indivisible’s message are either financed directly by Soros or have close ties to groups funded by the billionaire, as Breitbart News documented.

Organizing for Action (OFA) is a so-called community organizing project that sprung from Obama’s 2012 campaign organization, Organizing for America, becoming a nonprofit described by the Washington Post as “advocate[ing] for the president’s policies.”

In a recent Facebook post titled, “Take a deep breath. Then take action,” OFA called on constituents to lobby particularly hard between now and February 26, when lawmakers will be in their home districts.

The post included a link to a guide released by Indivisible on how to organize against Trump. “Stay tuned for online trainings and invitations to calls with coalition partners like Indivisible Guide,” the OFA post states.

Paul Sperry, writing at the New York Post, relates:

The manual, published with OFA partner “Indivisible,” advises protesters to go into halls quietly so as not to raise alarms, and “grab seats at the front of the room but do not all sit together.” Rather, spread out in pairs to make it seem like the whole room opposes the Republican host’s positions. “This will help reinforce the impression of broad consensus.” It also urges them to ask “hostile” questions — while keeping “a firm hold on the mic” — and loudly boo the the GOP politician if he isn’t “giving you real answers.”

“Express your concern [to the event’s hosts] they are giving a platform to pro-Trump authoritarianism, racism, and corruption,” it says.

…“Even the safest [Republican] will be deeply alarmed by signs of organized opposition,” the document states, “because these actions create the impression that they’re not connected to their district and not listening to their constituents.”

Sperry reported OFA “plans to stage 400 rallies across 42 states this year to attack Trump and Republicans over ObamaCare’s repeal.”

Earlier this month, NBC News reported on OFA’s new actions and its partnership with Indivisible:

OFA has hired 14 field organizers in states home to key senators as part of its campaign to defend Obama’s signature healthcare law. To run that campaign, the group hired Saumya Narechania — the former national field director at Enroll America, which worked to sign people up for Obamacare — and a deputy campaign manager.

…OFA says more than 1,800 people have applied to its Spring Community Engagement Fellowship, a six-week training program, two-thirds of whom have not previously been involved with OFA.

And the group has teamed up with Indivisible, a buzzy newcomer to the progressive movement, to offer organizing training that began Thursday night with a video conference. A combined 25,000 people have registered to participate in those trainings, OFA said.

Indivisible’s DC branch was implicated in a scuffle last week that reportedly injured a 71-year-old staffer for Rep. Dana Rohrabacher (R-CA) as well as reportedly knocking a 2-year-old to the ground.  Protesters claimed they were only delivering Valentine’s Day cards.

Indivisible is a part of a coalition of activist groups slated to hold a massive anti-Trump Tax March in Washington and at least 60 other locations on April 15.

Unreported by the news media is that most of the listed partners and support organizers of the march are openly financed by Soros or have close links to Soros financing, as Breitbart News documented last week.

Meanwhile, earlier this month, Politico profiled Indivisible and reported that “conservatives” are “spreading unfounded rumors” that the group is “being driven by wealthy donors like George Soros.”

Politico, however, seemingly failed to do even the most minimal research on the Indivisible leaders cited in the news outlet’s own profile.  Some of those personalities are openly associated with groups financed by Soros.

Politico further failed to note that the organizations cited in its article as helping to amplify Indivisible’s message are either financed directly by Soros or have close ties to groups funded by the billionaire.

Citing Angel Padilla, a co-founder of the group, Politico reported:

Dubbed “Indivisible,” the group launched as a way for Padilla and a handful of fellow ex-Democratic aides to channel their post-election heartbreak into a manual for quashing President Donald Trump’s agenda. They drafted a 26-page protest guide for activists, full of pointers on how to bird dog their members of Congress in the language of Capitol insiders.

The manual has since been downloaded over one million times. Indivisible says on its website that over 4,500 local groups across the nation have “signed up to resist the Trump agenda in nearly every congressional district in the country.”

The manual has been utilized to form the basis of a protest movement. The group’s website states: “What’s more, you all are putting the guide into action—showing up en masse to congressional district offices and events, and flooding the congressional phone lines. You’re resisting—and it’s working.”

Politico reported on “unfounded” rumors being spread about Soros’s involvement with Indivisible (emphasis added by this reporter):

Its handful of senior leaders count about 100 contributors to their national organizing work but insist that all are working on a volunteer basis. They know conservatives are spreading unfounded rumors that their success is being driven by wealthy donors like George Soros, which they flatly deny.

That paragraph was followed by the following quote from co-founder Padilla (emphasis again added by this reporter):

“It doesn’t matter who we take money from — we’re always going to get blamed as a Soros group, even if we don’t take money from Soros,” said Padilla, now an analyst with the National Immigration Law Center. “That’s one of the attacks and that’s fine.”

While “Indivisible” has yet to disclose its donors, Politico failed to inform readers that the National Immigration Law Center where the news outlet reported Padilla serves as an analyst is financed by Soros’s Open Society Foundations. The Center has received numerous Open Society grants earmarked for general support.

Also unmentioned by Politico is that Padilla previously served as an immigration policy consultant at the radical National Council of La Raza. Soros is a major La Raza donor.

Politico went on to detail how Indivisible has been aided by MoveOn.org and the ACLU.  The news website failed to tell readers that MoveOn.org and the ACLU are both financed by Soros, a relevant tidbit given Politico’s claim about “unfounded rumors” that Indivisibles’ success was being driven by Soros . 

The news website reported:

In addition, MoveOn.org and the Working Families Party joined with Indivisible for its first nationwide call on Jan. 22. Nearly 60,000 people phoned in that day, according to Levin and MoveOn organizing director Victoria Kaplan. Indivisible estimates that its second national call, on the impact of Trump’s immigration order with assistance from the ACLU and Padilla’s group, drew 35,000 people.

Politico also missed that, according to its Twitter account, another organizer of the conference call with MoveOn.org was the International Refugee Assistance Project, a project of the Urban Justice Center, another recipient of an Open Society grant.

Taryn Higashi, executive director of the Center’s International Refugee Assistance Project, currently serves on the Advisory Board of the International Migration Initiative of Soros’s Open Society Foundations.

Politico further reported on Indivisible’s ties to the organizers of last month’s anti-Trump Women’s March while failing to mention that Soros reportedly has ties to more than 50 “partners” of that march. Also, this journalist first reported on the march leaders’ own close associations with Soros.

Regarding Indivisible and the Women’s March, Politico reported:

Indivisible is also embracing collaboration with other major anti-Trump protest outlets. Leaders of the group were in communication with Women’s March organizers before their main event on Jan. 21, and that partnership will become official when the March unveils the third in its series of 10 direct actions that attendees have been asked to pursue in their communities.

Another Indivisible leader mentioned in the Politico article is Jeremy Haile. Not reported by Politico is that is Haile served as federal advocacy counsel for the Sentencing Project.  The Sentencing Project is reportedly financed by Soros’s Open Society Foundations, which has also hosted the Project to promote its cause.

Aaron Klein is Breitbart’s Jerusalem bureau chief and senior investigative reporter. He is a New York Times bestselling author and hosts the popular weekend talk radio program, “Aaron Klein Investigative Radio.” Follow him on Twitter @AaronKleinShow. Follow him on Facebook.

http://www.breitbart.com/big-government/2017/02/19/obamas-organizing-action-partners-soros-linked-indivisible-disrupt-trumps-agenda/

Obama-linked activists have a ‘training manual’ for protesting Trump

An Obama-tied activist group training tens of thousands of agitators to protest President Trump’s policies plans to hit Republican lawmakers supporting those policies even harder this week, when they return home for the congressional recess and hold town hall meetings and other functions.

Organizing for Action, a group founded by former President Barack Obama and featured prominently on his new post-presidency website, is distributing a training manual to anti-Trump activists that advises them to bully GOP lawmakers into backing off support for repealing ObamaCare, curbing immigration from high-risk Islamic nations and building a border wall.

In a new Facebook post, OFA calls on activists to mobilize against Republicans from now until Feb. 26, when “representatives are going to be in their home districts.”

The protesters disrupted town halls earlier this month, including one held in Utah by House Oversight Committee Chairman Jason Chaffetz, who was confronted by hundreds of angry demonstrators claiming to be his constituents.

The manual, published with OFA partner “Indivisible,” advises protesters to go into halls quietly so as not to raise alarms, and “grab seats at the front of the room but do not all sit together.” Rather, spread out in pairs to make it seem like the whole room opposes the Republican host’s positions. “This will help reinforce the impression of broad consensus.” It also urges them to ask “hostile” questions — while keeping “a firm hold on the mic” — and loudly boo the GOP politician if he isn’t “giving you real answers.”

“Express your concern [to the event’s hosts] they are giving a platform to pro-Trump authoritarianism, racism, and corruption,” it says.

The goal is to make Republicans, even from safe districts, second-guess their support for the Trump agenda, and to prime “the ground for the 2018 midterms when Democrats retake power.”

The goal is to make Republicans, even from safe districts, second-guess their support for the Trump agenda.

“Even the safest [Republican] will be deeply alarmed by signs of organized opposition,” the document states, “because these actions create the impression that they’re not connected to their district and not listening to their constituents.”

After the event, protesters are advised to feed video footage to local and national media.

“Unfavorable exchanges caught on video can be devastating” for Republican lawmakers, it says, when “shared through social media and picked up by local and national media.” After protesters gave MSNBC, CNN and the networks footage of their dust-up with Chaffetz, for example, the outlets ran them continuously, forcing Chaffetz to issue statements defending himself.

The manual also advises protesters to flood “Trump-friendly” lawmakers’ Hill offices with angry phone calls and emails demanding the resignation of top White House adviser Steve Bannon.

A script advises callers to complain: “I’m honestly scared that a known racist and anti-Semite will be working just feet from the Oval Office … It is everyone’s business if a man who promoted white supremacy is serving as an adviser to the president.”

The document provides no evidence to support such accusations.

Protesters, who may or may not be affiliated with OFA, are also storming district offices. Last week, GOP Rep. Dana Rohrabacher blamed a “mob” of anti-Trump activists for knocking unconscious a 71-year-old female staffer at his Southern California office. A video of the incident, showing a small crowd around an opening door, was less conclusive.

Separately, OFA, which is run by ex-Obama officials and staffers, plans to stage 400 rallies across 42 states this year to attack Trump and Republicans over ObamaCare’s repeal.

“This is a fight we can win,” OFA recently told its foot soldiers. “They’re starting to waver.”

On Thursday, Trump insisted he’s moving ahead with plans to repeal and replace the Affordable Care Act, which has ballooned health insurance premiums and deductibles. “ObamaCare is a disaster, folks,” he said, adding that activists protesting its repeal are hijacking GOP town halls and other events.

“They fill up our rallies with people that you wonder how they get there,” the president said. “But they’re not the Republican people that our representatives are representing.”

As The Post reported, OFA boasts more than 250 offices nationwide and more than 32,000 organizers, with another 25,000 actively under training. Since November, it’s beefed up staff and fundraising, though as a “social welfare” nonprofit, it does not have to reveal its donors.

These aren’t typical Black Lives Matter or Occupy Wall Street marchers, but rather professionally trained organizers who go through a six-week training program similar to the training — steeped in Alinsky agitation tactics — Obama received in Chicago when he was a community organizer.

Chicago socialist Saul Alinsky, known by the left as “the father of community organizing,” taught radicals to “rub raw the sores of discontent” and create the conditions for a “revolution.” He dedicated his book, “Rules for Radicals,” to “Lucifer.” Michelle Obama quoted from the book when she helped launch OFA in 2013.

Obama appears to be behind the anti-Trump protests. He praised recent demonstrations against Trump’s travel ban. And last year, after Trump’s upset victory, he personally rallied OFA troops to “protect” his legacy in a conference call. “Now is the time for some organizing,” he said. “So don’t mope” over the election results.

He promised OFA activists he would soon join them in the fray.

“Understand that I’m going to be constrained in what I do with all of you until I am again a private citizen, but that’s not so far off,” he said. “You’re going to see me early next year, and we’re going to be in a position where we can start cooking up all kinds of great stuff.”

Added the ex-president: “I promise you that next year Michelle and I are going to be right there with you, and the clouds are going to start parting, and we’re going to be busy. I’ve got all kinds of thoughts and ideas about it, but this isn’t the best time to share them.

“Point is, I’m still fired up and ready to go, and I hope that all of you are, as well.”

http://nypost.com/2017/02/18/obama-linked-activists-have-a-training-manual-for-protesting-trump/

Obama’s Shadow Government Is Organizing To Undermine Trump

The leaks that led to Michael Flynn’s resignation are just the beginning. Obama and his loyalists in and outside government are working to undermine Trump.

By John Daniel Davidson

Once out of office, ex-presidents usually fade into private life and stay out of politics. They write memoirs, serve on corporate boards, and start charitable foundations. George W. Bush retired to his ranch in Texas and, most recently, painted portraits of veterans wounded in Iraq and Afghanistan. Bill Clinton was briefly thrust back into politics during Hillary’s two failed presidential campaigns, but most of his post-White House career consisted of flying around the world raising boatloads of money for his family’s now-defunct charity.

There are exceptions, of course. Jimmy Carter threw himself into international diplomacy, mediating an agreement in 1994 to return exiled President Jean-Bertrand Aristide to power in Haiti, and generally agitating for a Palestinian state.

Then there is Obama. Less than a month out of office, the broad contours of Obama’s post-presidency career are already taking shape. Obama and his loyalists, it seems, will remain in the center of the political fray, officially and unofficially, in an organized effort to undermine the Trump administration.

The bizarre scandal now unfolding over the resignation of national security advisor Michael Flynn is a case in point. Flynn’s resignation was prompted by a series of coordinated and anonymous leaks from current and former Obama administration officials in our domestic intelligence agencies.

Regardless of any valid criticism of Flynn, the leaks are part of a larger, loosely organized effort now underway to preserve Obama’s legacy. This effort involves Obama-era officials still inside the federal government, former Obama staffers working in the private sector, and Obama himself.

This isn’t some conspiracy theory. After the election, Obama indicated he intends to stay involved in the political fray. In an email to his supporters on his last day in office, Obama encouraged them to stay engaged, promising “I’ll be right there with you every step of the way.” Less than two weeks later, he issued a statement saying he was “heartened” by anti-Trump protests over the executive order on immigration.

Obama Is Jumping Back Into The Political Fray

But there’s more to all this than Obama issuing solidarity statements to Trump protestors. For one thing, the former president isn’t moving back to Chicago. The Obama family will remain in Washington DC, within a couple miles of the White House, for the next two years as Obama’s youngest daughter finishes high school.

From there, Obama will help direct his new foundation, which he has said will be a “startup for citizenship.” That could mean a lot things, but in light of his other plans it suggests the Obama Foundation will be a political grassroots organization designed to mobilize progressive activists.

Obama has also announced he’ll be working with former Attorney General Eric Holder on a political action group called the National Democratic Redistricting Committee. Its goal is to get Democrats elected at the state and local level ahead of the next redrawing of congressional districts. Last month, Obama reportedly met with Senate Minority Leader Chuck Schumer, House Minority Leader Nancy Pelosi, and Virginia Gov. Terry McAuliffe to strategize about redistricting.

In addition to these pursuits, the former president will likely play a prominent role in a network of progressive nonprofits, most notably Organizing for Action, the political group that grew out of Obama’s first campaign. OFA has kept a low profile in recent years, and if Clinton had won it likely would have shut down.

But last week, OFA officials told NBC News the organization was ramping up operations nationwide in an effort to preserve Obama’s signature achievements like the Affordable Care Act. As part of that effort, the group recently hired 14 field organizers in key states, adding to a growing infrastructure that boasts more than 250 offices nationwide and more than 32,000 volunteers.

Former Obama Staffers Are Speaking Out

Obama of course isn’t alone in all this. Trump’s victory has mobilized his top aides and staffers to take action, too. Former Obama staffer Tommy Vietor told the Daily Beast that, had Clinton won, “I would have been inclined to feel comfortable that Obama’s legacy and the things we worked on were safe.”

Instead, Vietor, along with former Obama administration staffers Jon Favreau and Jon Lovett, are launching a new podcast, Pod Save America, under their new joint media venture, Crooked Media.

The purpose of the company should be fairly obvious. “In the battle between Donald Trump and the media, we are firmly on the side of the media,” Favreau told the Daily Beast, adding that he’s not interested in “the veneer of objectivity.” “We’re always going to be Obama guys, we’re very open and honest about that.”

Favreau has also been helping create Obama’s new foundation, whose mission, he says, “is to get people involved in civic life and get people engaged in politics.” Of Crooked Media, Favreau says, “I think we would very much like to be the media company version of that. So it’s certainly inspired by a lot of what Obama has talked about in terms of the media over the last several months.”

A host of other former Obama staffers have simply taken to social media to voice their opposition to Trump. One former senior administration official told Yahoo News, “There are more than a few of us who believe deeply in holding this administration’s feet to the fire—especially when they offer falsehoods to the American people and distort our record. We have an email chain going where we share impressions, etc.”

As the leaks keep flowing from our intelligence agencies and the tweets keep flying from former Obama officials, keep in mind that although we haven’t heard much from Obama himself yet, the Trump administration is going to keep feeling the disruptions of what amounts to a shadow government.

Obama had eight years in the White House to secure his legacy. Any efforts on his part to undermine his successor aren’t just an affront to the principles of our democracy, they’re an admission that he and his acolytes never put much stock in democracy to begin with.

http://thefederalist.com/2017/02/16/obamas-shadow-government-organizing-undermine-trump/

The Pronk Pops Show Podcasts Portfolio

Listen To Pronk Pops Podcast or Download Shows 850-854

Listen To Pronk Pops Podcast or Download Shows 845-849

Listen To Pronk Pops Podcast or Download Shows 840-844

Listen To Pronk Pops Podcast or Download Shows 833-839

Listen To Pronk Pops Podcast or Download Shows 827-832

Listen To Pronk Pops Podcast or Download Shows 821-826

Listen To Pronk Pops Podcast or Download Shows 815-820

Listen To Pronk Pops Podcast or Download Shows 806-814

Listen To Pronk Pops Podcast or Download Shows 800-805

Listen To Pronk Pops Podcast or Download Shows 793-799

Listen To Pronk Pops Podcast or Download Shows 785-792

Listen To Pronk Pops Podcast or Download Shows 777-784

Listen To Pronk Pops Podcast or Download Shows 769-776

Listen To Pronk Pops Podcast or Download Shows 759-768

Listen To Pronk Pops Podcast or Download Shows 751-758

Listen To Pronk Pops Podcast or Download Shows 745-750

Listen To Pronk Pops Podcast or Download Shows 738-744

Listen To Pronk Pops Podcast or Download Shows 732-737

Listen To Pronk Pops Podcast or Download Shows 727-731

Listen To Pronk Pops Podcast or Download Shows 720-726

Listen To Pronk Pops Podcast or DownloadShows 713-719

Listen To Pronk Pops Podcast or DownloadShows 705-712

Listen To Pronk Pops Podcast or Download Shows 695-704

Listen To Pronk Pops Podcast or Download Shows 685-694

Listen To Pronk Pops Podcast or Download Shows 675-684

Listen To Pronk Pops Podcast or Download Shows 668-674

Listen To Pronk Pops Podcast or Download Shows 660-667

Listen To Pronk Pops Podcast or Download Shows 651-659

Listen To Pronk Pops Podcast or Download Shows 644-650

Listen To Pronk Pops Podcast or Download Shows 637-643

Listen To Pronk Pops Podcast or Download Shows 629-636

Listen To Pronk Pops Podcast or Download Shows 617-628

Listen To Pronk Pops Podcast or Download Shows 608-616

Listen To Pronk Pops Podcast or Download Shows 599-607

Listen To Pronk Pops Podcast or Download Shows 590-598

Listen To Pronk Pops Podcast or Download Shows 585- 589

Listen To Pronk Pops Podcast or Download Shows 575-584

Listen To Pronk Pops Podcast or Download Shows 565-574

Listen To Pronk Pops Podcast or Download Shows 556-564

Listen To Pronk Pops Podcast or Download Shows 546-555

Listen To Pronk Pops Podcast or Download Shows 538-545

Listen To Pronk Pops Podcast or Download Shows 532-537

Listen To Pronk Pops Podcast or Download Shows 526-531

Listen To Pronk Pops Podcast or Download Shows 519-525

Listen To Pronk Pops Podcast or Download Shows 510-518

Listen To Pronk Pops Podcast or Download Shows 500-509

Listen To Pronk Pops Podcast or Download Shows 490-499

Listen To Pronk Pops Podcast or Download Shows 480-489

Listen To Pronk Pops Podcast or Download Shows 473-479

Listen To Pronk Pops Podcast or Download Shows 464-472

Listen To Pronk Pops Podcast or Download Shows 455-463

Listen To Pronk Pops Podcast or Download Shows 447-454

Listen To Pronk Pops Podcast or Download Shows 439-446

Listen To Pronk Pops Podcast or Download Shows 431-438

Listen To Pronk Pops Podcast or Download Shows 422-430

Listen To Pronk Pops Podcast or Download Shows 414-421

Listen To Pronk Pops Podcast or Download Shows 408-413

Listen To Pronk Pops Podcast or Download Shows 400-407

Listen To Pronk Pops Podcast or Download Shows 391-399

Listen To Pronk Pops Podcast or Download Shows 383-390

Listen To Pronk Pops Podcast or Download Shows 376-382

Listen To Pronk Pops Podcast or Download Shows 369-375

Listen To Pronk Pops Podcast or Download Shows 360-368

Listen To Pronk Pops Podcast or Download Shows 354-359

Listen To Pronk Pops Podcast or Download Shows 346-353

Listen To Pronk Pops Podcast or Download Shows 338-345

Listen To Pronk Pops Podcast or Download Shows 328-337

Listen To Pronk Pops Podcast or Download Shows 319-327

Listen To Pronk Pops Podcast or Download Shows 307-318

Listen To Pronk Pops Podcast or Download Shows 296-306

Listen To Pronk Pops Podcast or Download Shows 287-295

Listen To Pronk Pops Podcast or Download Shows 277-286

Listen To Pronk Pops Podcast or Download Shows 264-276

Listen To Pronk Pops Podcast or Download Shows 250-263

Listen To Pronk Pops Podcast or Download Shows 236-249

Listen To Pronk Pops Podcast or Download Shows 222-235

Listen To Pronk Pops Podcast or Download Shows 211-221

Listen To Pronk Pops Podcast or Download Shows 202-210

Listen To Pronk Pops Podcast or Download Shows 194-201

Listen To Pronk Pops Podcast or Download Shows 184-193

Listen To Pronk Pops Podcast or Download Shows 174-183

Listen To Pronk Pops Podcast or Download Shows 165-173

Listen To Pronk Pops Podcast or Download Shows 158-164

Listen To Pronk Pops Podcast or Download Shows151-157

Listen To Pronk Pops Podcast or Download Shows 143-150

Listen To Pronk Pops Podcast or Download Shows 135-142

Listen To Pronk Pops Podcast or Download Shows 131-134

Listen To Pronk Pops Podcast or Download Shows 124-130

Listen To Pronk Pops Podcast or Download Shows 121-123

Listen To Pronk Pops Podcast or Download Shows 118-120

Listen To Pronk Pops Podcast or Download Shows 113 -117

Listen To Pronk Pops Podcast or Download Show 112

Listen To Pronk Pops Podcast or Download Shows 108-111

Listen To Pronk Pops Podcast or Download Shows 106-108

Listen To Pronk Pops Podcast or Download Shows 104-105

Listen To Pronk Pops Podcast or Download Shows 101-103

Listen To Pronk Pops Podcast or Download Shows 98-100

Listen To Pronk Pops Podcast or Download Shows 94-97

Listen To Pronk Pops Podcast or Download Show 93

Listen To Pronk Pops Podcast or Download Show 92

Listen To Pronk Pops Podcast or Download Show 91

Listen To Pronk Pops Podcast or Download Shows 88-90

Listen To Pronk Pops Podcast or Download Shows 84-87

Listen To Pronk Pops Podcast or Download Shows 79-83

Listen To Pronk Pops Podcast or Download Shows 74-78

Listen To Pronk Pops Podcast or Download Shows 71-73

Listen To Pronk Pops Podcast or Download Shows 68-70

Listen To Pronk Pops Podcast or Download Shows 65-67

Listen To Pronk Pops Podcast or Download Shows 62-64

Listen To Pronk Pops Podcast or Download Shows 58-61

Listen To Pronk Pops Podcast or Download Shows 55-57

Listen To Pronk Pops Podcast or Download Shows 52-54

Listen To Pronk Pops Podcast or Download Shows 49-51

Listen To Pronk Pops Podcast or Download Shows 45-48

Listen To Pronk Pops Podcast or Download Shows 41-44

Listen To Pronk Pops Podcast or Download Shows 38-40

Listen To Pronk Pops Podcast or Download Shows 34-37

Listen To Pronk Pops Podcast or Download Shows 30-33

Listen To Pronk Pops Podcast or Download Shows 27-29

Listen To Pronk Pops Podcast or Download Shows 17-26

Listen To Pronk Pops Podcast or Download Shows 16-22

Listen To Pronk Pops Podcast or Download Shows 10-15

Listen To Pronk Pops Podcast or Download Shows 1-9

Read Full Post | Make a Comment ( None so far )

The Pronk Pops Show 853, March 8, 2017, Story 1: Republicans United For Clean Repeal of Obamacare and Divided On Obamacare Replacement — Conservatives, Classical Liberals and Libertarians Oppose House Rollover Republican Ryancare — CATO Institute, Club for Growth, Freedom Works Heritage Foundation and House Freedom Caucus, Republican Study Committee and American People All Oppose Obamacare 2.0 Lite — Support Senator Rand Paul’s Bill and Freedom Caucus — Negotiate — Negotiate — Negotiate — Videos — Story 2: Wikileaks Vault 7 Release Reveals CIA’s Collection of Hacking Tools and Malware of Secret Surveillance Spying Security State (S5) — Intelligence Community Are Listening and Watching — George Orwell Was An Optimist — Two Party Turnkey Tyranny — Videos -_

Posted on March 8, 2017. Filed under: Addiction, American History, Animal, Benghazi, Blogroll, Breaking News, Communications, Congress, Constitutional Law, Corruption, Countries, Culture, Defense Spending, Donald J. Trump, Donald Trump, Elections, Fast and Furious, Government, Government Dependency, Government Spending, Hate Speech, Health, Health Care, Health Care Insurance, Hillary Clinton, History, House of Representatives, Human Behavior, Illegal Immigration, Illegal Immigration, Immigration, Independence, Iran Nuclear Weapons Deal, Islam, Law, Legal Immigration, Life, Lying, Medicare, Obama, Philosophy, Photos, Politics, Polls, Progressives, Rand Paul, Raymond Thomas Pronk, Religion, Scandals, Science, Security, Senate, Social Science, Social Security, Socials Security, Spying, Taxation, Taxes, Terror, Terrorism, Unemployment, Videos, Violence, War, Wealth, Weather, Welfare Spending, Wisdom | Tags: , , , , , , , , , , , , |

Project_1

The Pronk Pops Show Podcasts

Pronk Pops Show 853: March 8, 2017

Pronk Pops Show 852: March 6, 2017

Pronk Pops Show 851: March 3, 2017

Pronk Pops Show 850: March 2, 2017

Pronk Pops Show 849: March 1, 2017

Pronk Pops Show 848: February 28, 2017

Pronk Pops Show 847: February 27, 2017

Pronk Pops Show 846: February 24, 2017

Pronk Pops Show 845: February 23, 2017

Pronk Pops Show 844: February 22, 2017

Pronk Pops Show 843: February 21, 2017

Pronk Pops Show 842: February 20, 2017

Pronk Pops Show 841: February 17, 2017

Pronk Pops Show 840: February 16, 2017

Pronk Pops Show 839: February 15, 2017

Pronk Pops Show 838: February 14, 2017

Pronk Pops Show 837: February 13, 2017

Pronk Pops Show 836: February 10, 2017

Pronk Pops Show 835: February 9, 2017

Pronk Pops Show 834: February 8, 2017

Pronk Pops Show 833: February 7, 2017

Pronk Pops Show 832: February 6, 2017

Pronk Pops Show 831: February 3, 2017

Pronk Pops Show 830: February 2, 2017

Pronk Pops Show 829: February 1, 2017

Pronk Pops Show 828: January 31, 2017

Pronk Pops Show 827: January 30, 2017

Pronk Pops Show 826: January 27, 2017

Pronk Pops Show 825: January 26, 2017

Pronk Pops Show 824: January 25, 2017

Pronk Pops Show 823: January 24, 2017

Pronk Pops Show 822: January 23, 2017

Pronk Pops Show 821: January 20, 2017

Pronk Pops Show 820: January 19, 2017

Pronk Pops Show 819: January 18, 2017

Pronk Pops Show 818: January 17, 2017

Pronk Pops Show 817: January 13, 2017

Pronk Pops Show 816: January 12, 2017

Pronk Pops Show 815: January 11, 2017

Pronk Pops Show 814: January 10, 2017

Pronk Pops Show 813: January 9, 2017

Pronk Pops Show 812: December 12, 2016

Pronk Pops Show 811: December 9, 2016

Pronk Pops Show 810: December 8, 2016

Pronk Pops Show 809: December 7, 2016

Pronk Pops Show 808: December 6, 2016

Pronk Pops Show 807: December 5, 2016

Pronk Pops Show 806: December 2, 2016

Pronk Pops Show 805: December 1, 2016

 

Story 1: Republicans United For Clean Repeal of Obamacare and Divided On Obamacare Replacement — Conservatives, Classical Liberals and Libertarians Oppose House Rollover Republican Ryancare — CATO Institute, Club for Growth, Freedom Works Heritage Foundation and House Freedom Caucus,  Republican Study Committee and American People  All Oppose Obamacare 2.0 Lite — Support Senator Rand Paul’s Bill and Freedom Caucus — Negotiate — Negotiate — Negotiate — Videos — 

Image result for cartoons on repeal and repace obamacare

Image result for cartoon branco republican repeal and replace obamacare

Image result for vault 7 cia

Image result for cartoons on obamacare

Conservative Freedom Caucus Torpedoes GOP Obamacare Replacement

MAJOR: Paul Ryan Introduces American Health Care Act, House GOP’s Obamacare Replacement

SABOTAGE! WHAT PAUL RYAN JUST DID TO TRUMPCARE PROVES HE’S A TRAITOR TO THE PRESIDENT

Speaker Paul Ryan: There isn’t chaos in GOP-led Congress

SEAN HANNITY INTERVIEWS TOM PRICE ABOUT TRUMP’S NEW HEALTHCARE PLAN – 3/7/17

Trump’s HHS Secretary On Obamacare Replacement Bill

Ingraham takes issue with GOP’s health care replacement bill

Herman Cain on Obamacare replacement bill: Consumers now back in charge

Laffer: Obamacare replacement bill worth 2,000-3,000 points on the Dow

President Trump Holds Meeting On Obamacare Replacement with House Deputy Whip Team 3/7/17

GOP releases Obamacare replacement details

York: Fate of GOP health care bill lies with Freedom Caucus

Republicans unveil Obamacare replacement

Trump backs healthcare tax credit amid conservative opposition

Sen. Rand Paul unveils ObamaCare replacement plan

Conservatives lash out at House GOP’s Obamacare replacement bill

March 7 at 3:01 PM
Influential conservative lawmakers and activist groups panned health-care legislation drafted by House Republican leaders Tuesday, throwing the GOP’s plan to undo the Affordable Care Act in serious doubt less than 24 hours after it was released.Those groups dubbed the House bill, backed by House Speaker Paul D. Ryan (R-Wis.), as “Obamacare Lite,” “RyanCare” or “RINOcare” — a reference to “Republican in name only,” a popular conservative epithet for establishment politicians.The Ryan-backed bill offers a more conservative vision for the nation’s health-care system, replacing federal insurance subsidies with a new form of individual tax credits and phasing out most of the ACA’s taxes. But key lawmakers and outside groups, who can rile up the party’s base against legislative plans, said the legislation does not go far enough in pulling back elements of President Barack Obama’s overhaul.“The House Republican proposal released last night not only accepts the flawed progressive premises of Obamacare but expands upon them,” Michael Needham, the head of Heritage Action for America, said in a statement Tuesday. “Congressional Republicans should fully repeal the failed law and begin a genuine effort to deliver on longstanding campaign promises that create a free market health care system.”Two other groups, FreedomWorks and the Club for Growth, decried the plans Tuesday as a betrayal of campaign promises.

A day after House Republicans released a plan to supplant the Affordable Care Act, Sen. Rand Paul (R-Ky.) outlined the issues he has with their proposal, indicating it might be unconstitutional. (Alice Li, Jayne Orenstein/The Washington Post)

“If this warmed-over substitute for government-run health care remains unchanged, the Club for Growth will key vote against it,” said the group’s president, David McIntosh, referring to a process in which lawmakers are graded on their votes, the better to use them as ammunition on the campaign trail.

The dilemma Republican congressional leaders face is, if they change the legislation to appease hard-line conservatives, they are likely to alienate more-moderate members who are wary of disrupting insurance markets and taking coverage away from those who gained it under the ACA.

The margin for dissent is slim: Assuming no Democrats break ranks to support the bill, for the overhaul to pass, Republicans can lose only 21 votes in the House and two votes in the Senate.

CONTENT FROM WELLS FARGO ADVISORS
Keep these factors in mind when planning for retirement
Understanding the risks that can come between you and the retirement you want is an important step toward meeting your goals.

Four key Republicans in the Senate have expressed worries about the plan’s possible impact on lower-income people who received Medicaid coverage through the ACA’s expansion of that program. The four senators are split on exactly what proposals would meet their standards, but none are likely to support the course of action favored by many conservatives — passing a 2015 bill that repealed key ACA provisions without immediately including replacement provisions.

There were some signs of hope for the House plan Tuesday. President Trump offered an early boost to GOP leaders with a morning tweet: “Our wonderful new Healthcare Bill is now out for review and negotiation. ObamaCare is a complete and total disaster — is imploding fast!”

Vice President Pence attended a Senate Republican policy luncheon Tuesday and, in a break with normal practice, joined Senate Majority Leader Mitch McConnell and other GOP leaders at a news conference afterward to defend the House approach as “the framework for reform.”

“We are certainly open to improvements and recommendations in the legislative process, but this is the bill, and the president supports the American Health Care Act,” he said. “We are looking forward to working very directly with leadership in the House and the Senate in the weeks ahead. We are very confident that the American Health Care Act, with their help, will be on the president’s desk.”

In another sign of the administration’s support, Health and Human Services Secretary Tom Price sent a letter Tuesday to the chairmen of the two House committees processing the legislation, calling it a “necessary and important first step toward fulfilling our promises to the American people.”

But Price, who authored a similar ACA replacement proposal when he served in the House, said that achieving all of Trump’s health-care goals “will require more than what is possible” in the current legislation, which is limited in its scope to take advantage of special budget rules allowing for easier Senate passage.

He specifically mentioned allowing insurance to be sold across state lines, pharmaceutical cost reductions and “medical legal reforms,” an apparent reference to long-standing GOP proposals to limit malpractice liability.

Senate Majority Leader Mitch McConnell (R-Ky.) offered measured support for the proposed legislation and said he would bring it to the Senate floor should it pass the House.

“I encourage every member to review [the legislation] because I hope to call it up when we receive it from the House,” McConnell said Tuesday on the Senate floor. “We’ve come a long way. We’ve got a lot further to go, but we’re making significant progress. Working arm in arm with the House and the new administration, we’re going to keep our promise to the American people.”

While some of the fiercest criticism came from hard-right activist groups that have dogged Republican congressional leaders for years, other more establishment-minded organs joined the chorus of dissent.

National Review published an editorial Tuesday that said the legislation was “a disappointment” and has “serious flaws even as a first step toward full repeal and replacement.”

Republicans, the influential conservative magazine said, “would be better off rallying behind a bill in which they really believe, even if Democrats kill it with a filibuster,than trying and failing to enact a bill that they support only tepidly.”

Leaders involved in drafting the bills sought to defend their plan against the onslaught of criticism, describing it as the product of months of internal discussions and saying its details could still change.

“We now have a bill that’s available for all to read,” said Rep. Greg Walden (R-Ore.), chairman of the House Energy and Commerce Committee, which helped craft one of them, at a news conference Tuesday. “I’d encourage them to do it. I’d encourage them to look against their own bills and what they’ve supported in the past. And then let’s have a thoughtful legislative discussion.”

Rep. Kevin Brady (R-Tex.), chairman of the House Ways and Means Committee, which produced the other bill, said: “As Republicans, we have a choice. We can act now, or we can keep fiddling around and squander this opportunity to repeal Obamacare and begin a new chapter of freedom for the American people. House Republicans are choosing to act now.”

Still, agitation among conservatives was evident Monday night and poured into Tuesday.

CONTENT FROM WELLS FARGO ADVISORS
Keep these factors in mind when planning for retirement
Understanding the risks that can come between you and the retirement you want is an important step toward meeting your goals.

“Keep the ‘Cadillac’ tax in place? Keep Medicaid in place until 2020?” said Rep. Jim Jordan (R-Ohio), a co-founder of the House Freedom Caucus, referring to high-priced health-care plans. “We didn’t have Medicaid expansion in the bill we sent to President Obama, but we have it in the one we send to President Trump? That makes no sense to me.”

“Obamacare 2.0,” tweeted Rep. Justin Amash (R-Mich.), a libertarian who frequently breaks with GOP leadership.

Under two bills drafted by separate House committees, the government would no longer penalize Americans for failing to have health insurance but would try to encourage people to maintain coverage by allowing insurers to impose a 30 percent surcharge for those who do not have continuous coverage.

The legislation would preserve two of the most popular features of the 2010 health-care law, letting young adults stay on their parents’ health plans until age 26 and forbidding insurers to deny coverage or charge more to people with preexisting medical problems. It would also target Planned Parenthood, rendering the women’s health organization ineligible for Medicaid reimbursements or federal family -planning grants — a key priority for antiabortion groups.

Taken together, the bills introduced Monday represent the Republicans’ first attempt — and best shot to date, with an ally in the White House — to translate into action seven years of talking points about demolishing the ACA.

At the same time, major aspects of the House GOP plan reflect the treacherous terrain that Republicans face to win enough votes within their own conferences in the GOP-controlled House and Senate.

The bills must address concerns of both conservatives worried about the plan’s cost and the notion it might enshrine a new federal entitlement, as well as more moderate members who want to ensure that their constituents, including those who received coverage under the ACA’s Medicaid expansion, retain access to affordable health care.

The Freedom Caucus, a block of roughly 30 House hard-liners who criticized earlier versions of the bill, is set to meet Tuesday night to discuss the health-care bill and perhaps develop a list of demands to present to GOP leaders.

Members of the Republican Study Committee, a larger conservative group, were already critical of key elements of the plan. “This is a Republican welfare entitlement,” reads an RSC analysis distributed late Monday, addressing the inclusion of refundable tax credits in the plan.

With no Democrats expected to vote to pass the bill and four House GOP seats vacant, Republicans can afford to lose no more than 21 members in the lower chamber.

In recognition of the close vote that is expected, House Majority Whip Steve Scalise (R-La.) and several deputy whips are expected to visit the White House Tuesday afternoon to discuss the health-care bill with Trump administration officials.

On Tuesday morning, Trump signaled the work on the proposal was not completely finished, referring to selling insurance across state lines and saying that change would come in “phase 2 & 3 of healthcare rollout.” The president also said he was “working on new system where there will be competition in the Drug Industry” that will lead prices to “come way down.”

Conservative critics of the measure had noted the plan’s exclusion of selling insurance across state lines. “The problems with this bill are not just what’s in it, but also what’s missing,” said McIntosh.

Yet attacks from the right were not the only challenge facing Republican leaders.

Four key Republican senators, all from states that opted to expand Medicaid under the ACA, said they would oppose any new plan that would leave millions of Americans uninsured.

“We will not support a plan that does not include stability for Medicaid expansion populations or flexibility for states,” Sens. Rob Portman (Ohio), Shelley Moore Capito (W.Va.), Cory Gardner (Colo.) and Lisa Murkowski (Alaska) wrote in a letter to McConnell on Monday.

The plan from House Republicans would substantially redesign Medicaid with the goal of balancing the GOP’s antipathy toward the ACA’s expansion of the program against the concerns of a significant cadre of Republican governors — and the lawmakers from their states — who fear losing millions of dollars that the law has funneled to help insure low-income residents.

Democrats, meanwhile, have given no indication that they intend to work with Republicans, and top party leaders decried the GOP plan Monday as a betrayal of everyday Americans. “Trumpcare doesn’t replace the Affordable Care Act, it forces millions of Americans to pay more for less care,” said Senate Minority Leader Charles E. Schumer (D-N.Y.).

In particular, the plan to target Planned Parenthood has already generated fierce pushback from Democrats and doubts from some Republicans who have noted that federal funds are already barred from funding abortions and that Planned Parenthood provides routine medical care to millions of American women.

https://www.washingtonpost.com/powerpost/house-leaders-brace-for-the-task-ahead-selling-obamacare-lite/2017/03/07/ab2f721e-02e5-11e7-ad5b-d22680e18d10_story.html?utm_term=.b64bbc38491c

A Disappointing Start

by THE EDITORS March 7, 2017 12:45 PM We believe that Obamacare should be repealed and replaced with policies that enable Americans to make their own decisions about what sort of health insurance to

We believe that Obamacare should be repealed and replaced with policies that enable Americans to make their own decisions about what sort of health insurance to buy, and that their options should include low-premium coverage that protects them against the risk of major financial setbacks resulting from health care. The legislation released last night by House Republicans is, even on the most charitable reading, only a first step toward that goal.

It does not repeal all of Obamacare, leaving many of its regulations in place. The apparent rationale for this omission is that eliminating the regulations would subject the legislation to a fatal Senate filibuster. We have recommended that Republicans defang the regulations by replacing Obamacare’s subsidies with a simple new tax credit that people could use to buy insurance governed by a new, lighter regulatory regime. That way Obamacare’s regulations would stay on the books but no longer hinder consumer choice. But Republicans shrank from this option, too.

We disagree with this tactical decision, which places Senate parliamentary rules — or, rather, places guesses about how those rules would operate — ahead of good health policy and making good on longstanding party promises. It also seems to us that Republicans would be better off rallying behind a bill in which they really believe, even if Democrats kill it with a filibuster, than trying and failing to enact a bill that they support only tepidly. That second outcome may now take place.

Moreover, the legislation has some serious flaws even as a first step toward full repeal and replacement. It eliminates Obamacare’s fines on people who go without insurance, but in their place creates a new surcharge for people who let their insurance lapse and then try to purchase a new policy. The goal is to keep healthy people from leaving the insurance rolls and thus destabilizing insurance markets.

The surcharge is a heavy-handed instrument: Insurers would be obligated to impose it regardless of their preferences. Yet the surcharge might not achieve its goal. A lot of healthy people might well decide to go without insurance and run the risk of paying a surcharge if they get sick later. The surcharge even undermines its own goal, since it would discourage healthy people who had already left the insurance rolls from getting back on them.

The bill has its good points. If the surcharge works, the deregulation in the bill would lower premiums. Many of Obamacare’s taxes would be repealed. Obamacare’s tax credits create high effective marginal tax rates for people in the lower middle class; the bill’s replacement tax credits would avoid this problem. Permissible contributions to and limits on health savings accounts would be loosened. Federal contributions to Medicaid would be capped, ending the perverse incentives that have for decades enabled the growth of the program. All in all, though, the bill is a disappointment. And it is not too late to get a second opinion.

All in all, though, the bill is a disappointment. And it is not too late to get a second opinion.

 http://www.nationalreview.com/article/445558/obamacare-replacement-republican-plan-house-representatives-disappointing

Story 2: Wikileaks Vault 7 Release Reveals CIA’s Collection of Hacking Tools and Malware of Secret Surveillance Spying Security State (S5) — Intelligence Community Are Listening and Watching — George Orwell Was An Optimist — Two Party Turnkey Tyranny — Videos — 

Image result for vault 7 cia

Image result for vault 7 cia

Image result for george orwell quotesImage result for george orwell quotesImage result for george orwell quotesImage result for george orwell quotesImage result for george orwell quotesImage result for george orwell quotesImage result for george orwell quotesImage result for george orwell quotesImage result for george orwell quotesImage result for george orwell quotesImage result for george orwell quotesImage result for george orwell quotesImage result for george orwell quotesImage result for george orwell quotesImage result for george orwell quotesImage result for george orwell quotes

Image result for george orwell quotesImage result for george orwell quotes

Image result for george orwell quotesImage result for george orwell quotesImage result for george orwell quotesImage result for george orwell quotesImage result for george orwell quotesImage result for george orwell quotesImage result for george orwell quotesImage result for george orwell quotes

Image result for george orwell quotes

Ari Fleischer on CIA leaks, wiretapping claims

Wikileaks Claims CIA Is Hacking Americans’ Electronics – Tucker Carlson Tonight – Fox News – 3/7/17

Wikileaks dumps information claiming proof of CIA hacking

What Pisses Me Off About Wikileaks Vault 7 Release

‘Cyber warfare is a new frontline’: CIA created malware designed to penetrate software – WikiLeaks

VAULT 7: CIA Staged Fake Russian Hacking to Set Up Trump — Russian Cyber-Attack M.O. As False Flag

Former CIA Director: Wikileaks Dump Could Be ‘Very Damaging’ | Andrea Mitchell | MSNBC

On the Russia Lunacy & Wikileaks BOMBSHELL Leak of CIA Hacking Force

Wikileaks Vault 7: A Massive and Confusing Revelation

WikiLeaks UNLEASHES ‘Year Zero’ CIA Hacking Tools (Vault 7)

WIKILEAKS VAULT 7: The C.I.A. Is Listening Via Everything

Inside Vault 7: CIA Hacking Tools Published by Wikileaks

George Orwell 1984 Telescreen Exercise

Nineteen Eighty-Four (1984) – Last Scene

ANIMAL FARM – full movie

1984 George Orwell – Full Movie – Hollywood best Greatest blockbuster movie Film

Watch Nineteen Eighty Four Watch Movies Online Free

George Orwell: A Life in Pictures Full Documentary (High Quality)

A Final Warning from George Orwell

Wikileaks Unveils ‘Vault 7’: “The Largest Ever Publication Of Confidential CIA Documents”; Another Snowden Emerges

Tyler Durden's picture

TwitterFacebookReddit

WikiLeaks has published what it claims is the largest ever release of confidential documents on the CIA. It includes more than 8,000 documents as part of ‘Vault 7’, a series of leaks on the agency, which have allegedly emerged from the CIA’s Center For Cyber Intelligence in Langley, and which can be seen on the org chart below, which Wikileaks also released:

A total of 8,761 documents have been published as part of ‘Year Zero’, the first in a series of leaks the whistleblower organization has dubbed ‘Vault 7.’ WikiLeaks said that ‘Year Zero’ revealed details of the CIA’s “global covert hacking program,” including “weaponized exploits” used against company products including “Apple’s iPhone, Google’s Android and Microsoft’s Windows and even Samsung TVs, which are turned into covert microphones.”

WikiLeaks tweeted the leak, which it claims came from a network inside the CIA’s Center for Cyber Intelligence in Langley, Virginia.

Among the more notable disclosures which, if confirmed, “would rock the technology world“, the CIA had managed to bypass encryption on popular phone and messaging services such as Signal, WhatsApp and Telegram. According to the statement from WikiLeaks, government hackers can penetrate Android phones and collect “audio and message traffic before encryption is applied.”

Another profound revelation is that the CIA can engage in “false flag” cyberattacks which portray Russia as the assailant. Discussing the CIA’s Remote Devices Branch’s UMBRAGE group, Wikileaks’ source notes that it “collects and maintains a substantial library of attack techniques ‘stolen’ from malware produced in other states including the Russian Federation.

“With UMBRAGE and related projects the CIA cannot only increase its total number of attack types but also misdirect attribution by leaving behind the “fingerprints” of the groups that the attack techniques were stolen from. UMBRAGE components cover keyloggers, password collection, webcam capture, data destruction, persistence, privilege escalation, stealth, anti-virus (PSP) avoidance and survey techniques.”

As Kim Dotcom summarizes this finding, “CIA uses techniques to make cyber attacks look like they originated from enemy state. It turns DNC/Russia hack allegation by CIA into a JOKE

CIA uses techniques to make cyber attacks look like they originated from enemy state. It turns DNC/Russia hack allegation by CIA into a JOKE

But perhaps what is most notable is the purported emergence of another Snowden-type whistleblower: the source of the information told WikiLeaks in a statement that they wish to initiate a public debate about the “security, creation, use, proliferation and democratic control of cyberweapons.”  Policy questions that should be debated in public include “whether the CIA’s hacking capabilities exceed its mandated powers and the problem of public oversight of the agency,” WikiLeaks claims the source said.

The FAQ section of the release, shown below, provides further details on the extent of the leak, which was “obtained recently and covers through 2016”. The time period covered in the latest leak is between the years 2013 and 2016, according to the CIA timestamps on the documents themselves. Secondly, WikiLeaks has asserted that it has not mined the entire leak and has only verified it, asking that journalists and activists do the leg work.

Among the various techniques profiled by WikiLeaks is “Weeping Angel”, developed by the CIA’s Embedded Devices Branch (EDB), which infests smart TVs, transforming them into covert microphones. After infestation, Weeping Angel places the target TV in a ‘Fake-Off’ mode, so that the owner falsely believes the TV is off when it is on. In ‘Fake-Off’ mode the TV operates as a bug, recording conversations in the room and sending them over the Internet to a covert CIA server.

As Kim Dotcom chimed in on Twitter, “CIA turns Smart TVs, iPhones, gaming consoles and many other consumer gadgets into open microphones” and added ” CIA turned every Microsoft Windows PC in the world into spyware. Can activate backdoors on demand, including via Windows update”

BREAKING: CIA turns Smart TVs, iPhones, gaming consoles and many other consumer gadgets into open microphones.

Dotcom also added that “Obama accused Russia of cyberattacks while his CIA turned all internet enabled consumer electronics in Russia into listening devices. Wow!”

Obama accused Russia of cyberattacks while his CIA turned all internet enabled consumer electronics in Russia into listening devices. Wow!

Julian Assange, WikiLeaks editor stated that “There is an extreme proliferation risk in the development of cyber ‘weapons’. Comparisons can be drawn between the uncontrolled proliferation of such ‘weapons’, which results from the inability to contain them combined with their high market value, and the global arms trade. But the significance of “Year Zero” goes well beyond the choice between cyberwar and cyberpeace. The disclosure is also exceptional from a political, legal and forensic perspective.”

Key Highlights from the Vault 7 release so far:

  • “Year Zero” introduces the scope and direction of the CIA’s global covert hacking program, its malware arsenal and dozens of “zero day” weaponized exploits against a wide range of U.S. and European company products, include Apple’s iPhone, Google’s Android and Microsoft’s Windows and even Samsung TVs, which are turned into covert microphones.
  • Wikileaks claims that the CIA lost control of the majority of its hacking arsenal including malware, viruses, trojans, weaponized “zero day” exploits, malware remote control systems and associated documentation. This extraordinary collection, which amounts to more than several hundred million lines of code, gives its possessor the entire hacking capacity of the CIA. The archive appears to have been circulated among former U.S. government hackers and contractors in an unauthorized manner, one of whom has provided WikiLeaks with portions of the archive.
  • By the end of 2016, the CIA’s hacking division, which formally falls under the agency’s Center for Cyber Intelligence (CCI), had over 5000 registered users and had produced more than a thousand hacking systems, trojans, viruses, and other “weaponized” malware. Such is the scale of the CIA’s undertaking that by 2016, its hackers had utilized more code than that used to run Facebook.
  • The CIA had created, in effect, its “own NSA” with even less accountability and without publicly answering the question as to whether such a massive budgetary spend on duplicating the capacities of a rival agency could be justified.
  • Once a single cyber ‘weapon’ is ‘loose’ it can spread around the world in seconds, to be used by rival states, cyber mafia and teenage hackers alike.

Snowden 2.0?

  • In a statement to WikiLeaks the source details policy questions that they say urgently need to be debated in public, including whether the CIA’s hacking capabilities exceed its mandated powers and the problem of public oversight of the agency. The source wishes to initiate a public debate about the security, creation, use, proliferation and democratic control of cyberweapons.

CIA targets iPhones, Androids, smart TVs:

  • CIA malware and hacking tools are built by EDG (Engineering Development Group), a software development group within CCI (Center for Cyber Intelligence), a department belonging to the CIA’s DDI (Directorate for Digital Innovation). The DDI is one of the five major directorates of the CIA (see this organizational chart of the CIA for more details).
  • The increasing sophistication of surveillance techniques has drawn comparisons with George Orwell’s 1984, but “Weeping Angel”, developed by the CIA’s Embedded Devices Branch (EDB), which infests smart TVs, transforming them into covert microphones, is surely its most emblematic realization.

Also cars, suggesting that the CIA may have a role in the death of Michael Hastings:

  • As of October 2014 the CIA was also looking at infecting the vehicle control systems used by modern cars and trucks.
  • The purpose of such control is not specified, but it would permit the CIA to engage in nearly undetectable assassinations.

And computers:

  • The CIA also runs a very substantial effort to infect and control Microsoft Windows users with its malware. This includes multiple local and remote weaponized “zero days”, air gap jumping viruses such as “Hammer Drill” which infects software distributed on CD/DVDs, infectors for removable media such as USBs, systems to hide data in images or in covert disk areas ( “Brutal Kangaroo”) and to keep its malware infestations going.

Hoarding of Zero Day exploits:

  • In the wake of Edward Snowden’s leaks about the NSA, the U.S. technology industry secured a commitment from the Obama administration that the executive would disclose on an ongoing basis — rather than hoard — serious vulnerabilities, exploits, bugs or “zero days” to Apple, Google, Microsoft, and other US-based manufacturers.
  • Serious vulnerabilities not disclosed to the manufacturers places huge swathes of the population and critical infrastructure at risk to foreign intelligence or cyber criminals who independently discover or hear rumors of the vulnerability. If the CIA can discover such vulnerabilities so can others.

Proliferation of leaked/hacked Cyberwar programs:

  • While nuclear proliferation has been restrained by the enormous costs and visible infrastructure involved in assembling enough fissile material to produce a critical nuclear mass, cyber ‘weapons’, once developed, are very hard to retain. Cyber ‘weapons’ are in fact just computer programs which can be pirated like any other. Since they are entirely comprised of information they can be copied quickly with no marginal cost.
  • Over the last three years the United States intelligence sector, which consists of government agencies such as the CIA and NSA and their contractors, such as Booze Allan Hamilton, has been subject to unprecedented series of data exfiltrations by its own workers.
  • Once a single cyber ‘weapon’ is ‘loose’ it can spread around the world in seconds, to be used by peer states, cyber mafia and teenage hackers alike.

The U.S. Consulate in Frankfurt is a covert CIA hacker base

  • In addition to its operations in Langley, Virginia the CIA also uses the U.S. consulate in Frankfurt as a covert base for its hackers covering Europe, the Middle East and Africa. CIA hackers operating out of the Frankfurt consulate ( “Center for Cyber Intelligence Europe” or CCIE) are given diplomatic (“black”) passports and State Department cover.
  • The instructions for incoming CIA hackers make Germany’s counter-intelligence efforts appear inconsequential: “Breeze through German Customs because you have your cover-for-action story down pat, and all they did was stamp your passport”

Examples of CIA projects

  • The CIA’s Engineering Development Group (EDG) management system contains around 500 different projects (only some of which are documented by “Year Zero”) each with their own sub-projects, malware and hacker tools. The majority of these projects relate to tools that are used for penetration, infestation (“implanting”), control, and exfiltration.
  • Umbrage: The CIA’s Remote Devices Branch’s UMBRAGE group collects and maintains a substantial library of attack techniques ‘stolen’ from malware produced in other states including the Russian Federation. With UMBRAGE and related projects the CIA cannot only increase its total number of attack types but also misdirect attribution by leaving behind the “fingerprints” of the groups that the attack techniques were stolen from.
  • Fine Dining:  Fine Dining comes with a standardized questionnaire i.e menu that CIA case officers fill out. The questionnaire is used by the agency’s OSB (Operational Support Branch) to transform the requests of case officers into technical requirements for hacking attacks (typically “exfiltrating” information from computer systems) for specific operations.  Among the list of possible targets of the collection are ‘Asset’, ‘Liason Asset’, ‘System Administrator’, ‘Foreign Information Operations’, ‘Foreign Intelligence Agencies’ and ‘Foreign Government Entities’. Notably absent is any reference to extremists or transnational criminals.
  • ‘Improvise’; a toolset for configuration, post-processing, payload setup and execution vector selection for survey/exfiltration tools supporting all major operating systems like Windows (Bartender), MacOS (JukeBox) and Linux (DanceFloor).
  • HIVE: HIVE is a multi-platform CIA malware suite and its associated control software. The project provides customizable implants for Windows, Solaris, MikroTik (used in internet routers) and Linux platforms and a Listening Post (LP)/Command and Control (C2) infrastructure to communicate with these implants. The implants are configured to communicate via HTTPS with the webserver of a cover domain; each operation utilizing these implants has a separate cover domain and the infrastructure can handle any number of cover domains.

And some key sections from the FAQ:

  • What time period is covered? The years 2013 to 2016. The sort order of the pages within each level is determined by date (oldest first). WikiLeaks has obtained the CIA’s creation/last modification date for each page but these do not yet appear for technical reasons. Usually the date can be discerned or approximated from the content and the page order. If it is critical to know the exact time/date contact WikiLeaks.
  • What is “Vault 7” “Vault 7” is a substantial collection of material about CIA activities obtained by WikiLeaks.
  • What is the total size of “Vault 7”? The series is the largest intelligence publication in history.
  • When was each part of “Vault 7” obtained?: Part one was obtained recently and covers through 2016. Details on the other parts will be available at the time of publication.
  • Is each part of “Vault 7” from a different source? Details on the other parts will be available at the time of publication.
  • How did WikiLeaks obtain each part of “Vault 7”? Sources trust WikiLeaks to not reveal information that might help identify them.
  • Isn’t WikiLeaks worried that the CIA will act against its staff to stop the series? No. That would be certainly counter-productive.

* * *

PREVIOUSLY

As a reminder, last night Wikileaks announced that it has released an encrypted torrent file which reportedly contains information on the mysterious “Vault 7”, and which we now know is the biggest “collection of material about CIA activities obtained by WikiLeaks.publication in history.” It can be downloaded now at the following URL, and accessed using the password “SplinterItIntoAThousandPiecesAndScatterItIntoTheWinds”

Wikileaks had previously announced that it would hold an 8am Eastern press conference, as part of the unveiling.

ANNOUNCE: WikiLeaks press conference in under five hours at 8am ET / 1pm UTC / 14:00 CET. Streamed live.

However, there appeared to have been some complications, with Wikileaks tweeting that “the press conference is under attack: Facebook+Periscope video used by WikiLeaks’ editor Julian Assange have been attacked. Activating contingency plans”

Press conf under attack: Facebook+Periscope video used by WikiLeaks’ editor Julian Assange have been attacked. Activating contingency (1/2)

Wikileaks then announced that “As Mr. Assange’s Perscipe+Facebook video stream links are under attack his video press conference will be rescheduled.”

NOTICE: As Mr. Assange’s Perscipe+Facebook video stream links are under attack his video press conference will be rescheduled.

In a separate tweet, Wikileaks has just released the passphrase to decrypt the torrent file: RELEASE: CIA Vault 7 Year Zero decryption passphrase:

SplinterItIntoAThousandPiecesAndScatterItIntoTheWinds

RELEASE: CIA Vault 7 Year Zero decryption passphrase:

SplinterItIntoAThousandPiecesAndScatterItIntoTheWinds

As a result, since Assange appears to have been unable to launch his previously scheduled press conference, he has gone ahead and issued the press release on Vault 7 Part 1 “Year Zero, which is titled: Inside the CIA’s global hacking force:

Press Release

Vault 7: CIA Hacking Tools Revealed

Today, Tuesday 7 March 2017, WikiLeaks begins its new series of leaks on the U.S. Central Intelligence Agency. Code-named “Vault 7” by WikiLeaks, it is the largest ever publication of confidential documents on the agency.

The first full part of the series, “Year Zero”, comprises 8,761 documents and files from an isolated, high-security network situated inside the CIA’s Center for Cyber Intelligence in Langley, Virgina. It follows an introductory disclosure last month of CIA targeting French political parties and candidates in the lead up to the 2012 presidential election.

Recently, the CIA lost control of the majority of its hacking arsenal including malware, viruses, trojans, weaponized “zero day” exploits, malware remote control systems and associated documentation. This extraordinary collection, which amounts to more than several hundred million lines of code, gives its possessor the entire hacking capacity of the CIA. The archive appears to have been circulated among former U.S. government hackers and contractors in an unauthorized manner, one of whom has provided WikiLeaks with portions of the archive.

“Year Zero” introduces the scope and direction of the CIA’s global covert hacking program, its malware arsenal and dozens of “zero day” weaponized exploits against a wide range of U.S. and European company products, include Apple’s iPhone, Google’s Android and Microsoft’s Windows and even Samsung TVs, which are turned into covert microphones.

Since 2001 the CIA has gained political and budgetary preeminence over the U.S. National Security Agency (NSA). The CIA found itself building not just its now infamous drone fleet, but a very different type of covert, globe-spanning force — its own substantial fleet of hackers. The agency’s hacking division freed it from having to disclose its often controversial operations to the NSA (its primary bureaucratic rival) in order to draw on the NSA’s hacking capacities.

By the end of 2016, the CIA’s hacking division, which formally falls under the agency’s Center for Cyber Intelligence (CCI), had over 5000 registered users and had produced more than a thousand hacking systems, trojans, viruses, and other “weaponized” malware. Such is the scale of the CIA’s undertaking that by 2016, its hackers had utilized more code than that used to run Facebook. The CIA had created, in effect, its “own NSA” with even less accountability and without publicly answering the question as to whether such a massive budgetary spend on duplicating the capacities of a rival agency could be justified.

In a statement to WikiLeaks the source details policy questions that they say urgently need to be debated in public, including whether the CIA’s hacking capabilities exceed its mandated powers and the problem of public oversight of the agency. The source wishes to initiate a public debate about the security, creation, use, proliferation and democratic control of cyberweapons.

Once a single cyber ‘weapon’ is ‘loose’ it can spread around the world in seconds, to be used by rival states, cyber mafia and teenage hackers alike.

Julian Assange, WikiLeaks editor stated that “There is an extreme proliferation risk in the development of cyber ‘weapons’. Comparisons can be drawn between the uncontrolled proliferation of such ‘weapons’, which results from the inability to contain them combined with their high market value, and the global arms trade. But the significance of “Year Zero” goes well beyond the choice between cyberwar and cyberpeace. The disclosure is also exceptional from a political, legal and forensic perspective.”

Wikileaks has carefully reviewed the “Year Zero” disclosure and published substantive CIA documentation while avoiding the distribution of ‘armed’ cyberweapons until a consensus emerges on the technical and political nature of the CIA’s program and how such ‘weapons’ should analyzed, disarmed and published.

Wikileaks has also decided to redact and anonymise some identifying information in “Year Zero” for in depth analysis. These redactions include ten of thousands of CIA targets and attack machines throughout Latin America, Europe and the United States. While we are aware of the imperfect results of any approach chosen, we remain committed to our publishing model and note that the quantity of published pages in “Vault 7” part one (“Year Zero”) already eclipses the total number of pages published over the first three years of the Edward Snowden NSA leaks.

* * *

Analysis

CIA malware targets iPhone, Android, smart TVs

CIA malware and hacking tools are built by EDG (Engineering Development Group), a software development group within CCI (Center for Cyber Intelligence), a department belonging to the CIA’s DDI (Directorate for Digital Innovation). The DDI is one of the five major directorates of the CIA (see this organizational chart of the CIA for more details).

The EDG is responsible for the development, testing and operational support of all backdoors, exploits, malicious payloads, trojans, viruses and any other kind of malware used by the CIA in its covert operations world-wide.

The increasing sophistication of surveillance techniques has drawn comparisons with George Orwell’s 1984, but “Weeping Angel”, developed by the CIA’s Embedded Devices Branch (EDB), which infests smart TVs, transforming them into covert microphones, is surely its most emblematic realization.

The attack against Samsung smart TVs was developed in cooperation with the United Kingdom’s MI5/BTSS. After infestation, Weeping Angel places the target TV in a ‘Fake-Off’ mode, so that the owner falsely believes the TV is off when it is on. In ‘Fake-Off’ mode the TV operates as a bug, recording conversations in the room and sending them over the Internet to a covert CIA server.

As of October 2014 the CIA was also looking at infecting the vehicle control systems used by modern cars and trucks. The purpose of such control is not specified, but it would permit the CIA to engage in nearly undetectable assassinations.

The CIA’s Mobile Devices Branch (MDB) developed numerous attacks to remotely hack and control popular smart phones. Infected phones can be instructed to send the CIA the user’s geolocation, audio and text communications as well as covertly activate the phone’s camera and microphone.

Despite iPhone’s minority share (14.5%) of the global smart phone market in 2016, a specialized unit in the CIA’s Mobile Development Branch produces malware to infest, control and exfiltrate data from iPhones and other Apple products running iOS, such as iPads. CIA’s arsenal includes numerous local and remote “zero days” developed by CIA or obtained from GCHQ, NSA, FBI or purchased from cyber arms contractors such as Baitshop. The disproportionate focus on iOS may be explained by the popularity of the iPhone among social, political, diplomatic and business elites.

A similar unit targets Google’s Android which is used to run the majority of the world’s smart phones (~85%) including Samsung, HTC and Sony. 1.15 billion Android powered phones were sold last year. “Year Zero” shows that as of 2016 the CIA had 24 “weaponized” Android “zero days” which it has developed itself and obtained from GCHQ, NSA and cyber arms contractors.

These techniques permit the CIA to bypass the encryption of WhatsApp, Signal, Telegram, Wiebo, Confide and Cloackman by hacking the “smart” phones that they run on and collecting audio and message traffic before encryption is applied.

CIA malware targets Windows, OSx, Linux, routers

The CIA also runs a very substantial effort to infect and control Microsoft Windows users with its malware. This includes multiple local and remote weaponized “zero days”, air gap jumping viruses such as “Hammer Drill” which infects software distributed on CD/DVDs, infectors for removable media such as USBs, systems to hide data in images or in covert disk areas ( “Brutal Kangaroo”) and to keep its malware infestations going.

Many of these infection efforts are pulled together by the CIA’s Automated Implant Branch (AIB), which has developed several attack systems for automated infestation and control of CIA malware, such as “Assassin” and “Medusa”.

Attacks against Internet infrastructure and webservers are developed by the CIA’s Network Devices Branch (NDB).

The CIA has developed automated multi-platform malware attack and control systems covering Windows, Mac OS X, Solaris, Linux and more, such as EDB’s “HIVE” and the related “Cutthroat” and “Swindle” tools, which are described in the examples section below.

CIA ‘hoarded’ vulnerabilities (“zero days”)

In the wake of Edward Snowden’s leaks about the NSA, the U.S. technology industry secured a commitment from the Obama administration that the executive would disclose on an ongoing basis — rather than hoard — serious vulnerabilities, exploits, bugs or “zero days” to Apple, Google, Microsoft, and other US-based manufacturers.

Serious vulnerabilities not disclosed to the manufacturers places huge swathes of the population and critical infrastructure at risk to foreign intelligence or cyber criminals who independently discover or hear rumors of the vulnerability. If the CIA can discover such vulnerabilities so can others.

The U.S. government’s commitment to the Vulnerabilities Equities Process came after significant lobbying by US technology companies, who risk losing their share of the global market over real and perceived hidden vulnerabilities. The government stated that it would disclose all pervasive vulnerabilities discovered after 2010 on an ongoing basis.

“Year Zero” documents show that the CIA breached the Obama administration’s commitments. Many of the vulnerabilities used in the CIA’s cyber arsenal are pervasive and some may already have been found by rival intelligence agencies or cyber criminals.

As an example, specific CIA malware revealed in “Year Zero” is able to penetrate, infest and control both the Android phone and iPhone software that runs or has run presidential Twitter accounts. The CIA attacks this software by using undisclosed security vulnerabilities (“zero days”) possessed by the CIA but if the CIA can hack these phones then so can everyone else who has obtained or discovered the vulnerability. As long as the CIA keeps these vulnerabilities concealed from Apple and Google (who make the phones) they will not be fixed, and the phones will remain hackable.

The same vulnerabilities exist for the population at large, including the U.S. Cabinet, Congress, top CEOs, system administrators, security officers and engineers. By hiding these security flaws from manufacturers like Apple and Google the CIA ensures that it can hack everyone &mdsh; at the expense of leaving everyone hackable.

‘Cyberwar’ programs are a serious proliferation risk

Cyber ‘weapons’ are not possible to keep under effective control.

While nuclear proliferation has been restrained by the enormous costs and visible infrastructure involved in assembling enough fissile material to produce a critical nuclear mass, cyber ‘weapons’, once developed, are very hard to retain.

Cyber ‘weapons’ are in fact just computer programs which can be pirated like any other. Since they are entirely comprised of information they can be copied quickly with no marginal cost.

Securing such ‘weapons’ is particularly difficult since the same people who develop and use them have the skills to exfiltrate copies without leaving traces — sometimes by using the very same ‘weapons’ against the organizations that contain them. There are substantial price incentives for government hackers and consultants to obtain copies since there is a global “vulnerability market” that will pay hundreds of thousands to millions of dollars for copies of such ‘weapons’. Similarly, contractors and companies who obtain such ‘weapons’ sometimes use them for their own purposes, obtaining advantage over their competitors in selling ‘hacking’ services.

Over the last three years the United States intelligence sector, which consists of government agencies such as the CIA and NSA and their contractors, such as Booze Allan Hamilton, has been subject to unprecedented series of data exfiltrations by its own workers.

A number of intelligence community members not yet publicly named have been arrested or subject to federal criminal investigations in separate incidents.

Most visibly, on February 8, 2017 a U.S. federal grand jury indicted Harold T. Martin III with 20 counts of mishandling classified information. The Department of Justice alleged that it seized some 50,000 gigabytes of information from Harold T. Martin III that he had obtained from classified programs at NSA and CIA, including the source code for numerous hacking tools.

Once a single cyber ‘weapon’ is ‘loose’ it can spread around the world in seconds, to be used by peer states, cyber mafia and teenage hackers alike.

http://www.zerohedge.com/news/2017-03-07/wikileaks-hold-press-conference-vault-7-release-8am-eastern

WikiLeaks Posts Thousands of Purported CIA Cyberhacking Documents

Records show CIA able to spy on smartphones, internet TVs

WikiLeaks released thousands of documents and files Tuesday that it said exposed hacking tools the Central Intelligence Agency uses.

WikiLeaks released thousands of documents and files Tuesday that it said exposed hacking tools the Central Intelligence Agency uses.PHOTO: LARRY DOWNING/REUTERS

WASHINGTON—WikiLeaks released thousands of documents and files Tuesday that it said exposed tools the Central Intelligence Agency uses to hack smartphones, computer operating systems, messenger applications and internet-connected televisions.

The unauthorized disclosure—the first part of which WikiLeaks said consisted of 8,761 documents and files from the CIA’s Center for Cyber Intelligence—confronts President Donald Trump with a threat from the very organization that leaked documents on his opponent, Democrat Hillary Clinton, during the 2016 presidential campaign.

WikiLeaks named the series of files “Vault 7” and called the unauthorized disclosure the “largest ever publication of confidential documents on the agency,” saying it exposed the malware and exploits the agency amassed to hack smartphones and turn some televisions into covert microphones.

A CIA spokesman declined to comment “on the authenticity or content of purported intelligence documents.”

An intelligence source said some of the information does pertain to tools that the CIA uses to hack computers and other devices. This person said disclosing the information would jeopardize ongoing intelligence-gathering operations and the revelations were far more significant than the leaks of Edward Snowden, a former contractor for the National Security Agency who exposed active surveillance programs in 2013.

Mr. Snowden’s leaks revealed names of programs, companies that assist the NSA in surveillance and in some cases the targets of American spying. But the recent leak purports to contain highly technical details about how surveillance is carried out. That would make them far more revealing and useful to an adversary, this person said.

In one sense, Mr. Snowden provided a briefing book on U.S. surveillance, but the CIA leaks could provide the blueprints.

WikiLeaks said in its statement that it was not publishing such information as computer source code that could be used to replicate the tools it claims to have exposed. But the group left open the possibility of publishing those crucial details if “a consensus emerges on the technical and political nature of the CIA’s program and how such ‘weapons’ should [sic] analyzed, disarmed and published.”

Mr. Snowden said in a tweet Tuesday, “Still working through the publication, but what @Wikileaks has here is genuinely a big deal. Looks authentic.”

WikiLeaks said the CIA recently “lost control” of the majority of its hacking arsenal. “This extraordinary collection, which amounts to more than several hundred million lines of code, gives its possessor the entire hacking capacity of the CIA,” the site said in a statement. “The archive appears to have been circulating among former U.S. government hackers and contractors in an unauthorized manner, one of whom has provided WikiLeaks with portions of the archive.”

The website put out what it called the first installment in a series of planned leaks on Tuesday, calling it “Year Zero.” It said the first installment “introduces the scope and direction of the CIA’s global covert hacking program, its malware arsenal and dozens of ‘zero day’ weaponized exploits against a wide range of U.S. and European company products.”

WikiLeaks said the information on CIA hacking came from an unidentified source who believes the spy agency’s hacking authorities “urgently need to be debated in public, including whether the CIA’s hacking capabilities exceed its mandated powers and the problem of public oversight of the agency.”

Much of what WikiLeaks posted Tuesday appeared to be a kind of internal Wikipedia for U.S. cyber-warfare developers to collaborate, post and access information about available hacking tools. In many instances, WikiLeaks has redacted entries that appear to link to specific executable files. The documents show, for example, what capabilities exist to bypass antivirus software, with a different entry for each antivirus company.

The revelations are sure to fuel an ongoing debate over whether intelligence agencies that discover security flaws in popular technology should disclose them, so that the users can defend themselves from hackers, or keep that information secret for use in intelligence operations.

One document claims that the CIA has discovered numerous ways to hack into versions of Apple’s iOS, the mobile operating system used on iPhones. In general, hacking tools for the iPhone are considered especially valuable because the technology is so widely used, experts said. One particular hacking tool appears to remain on an iPhone even after it has been rebooted, which would make it particularly valuable to an intruder.

“These documents, which appear to be authentic, show that the intelligence community has deliberately maintained vulnerabilities in the most common devices used by hundreds of millions of people,” Ben Wizner, the director of the Speech, Privacy, and Technology Project at the American Civil Liberties Union, said in a statement.

“Those vulnerabilities will be exploited not just by our security agencies, but by hackers and governments around the world. The government has the capacity and obligation to help technology companies fix vulnerabilities as soon as they are discovered,” Mr. Wizner said.

This is the latest high-profile leak of information by WikiLeaks, which last fall published emails stolen from Mrs. Clinton’s campaign chairman, John Podesta. U.S. intelligence agencies concluded that Russian government hackers stole those emails and provided them to WikiLeaks.

WikiLeaks said the documents show the CIA’s ability to bypass the encryption of popular messenger applications, including WhatsApp, Signal, Telegram and Confide by hacking the smartphones they run on and collecting audio and message traffic before the applications encrypt the user’s texts.

The site said the documents also show how the CIA developed other mobile hacking technologies, including the ability to activate the camera and microphone of a target’s smartphone covertly and surreptitiously retrieve a target’s geolocation, audio and text communications.

WikiLeaks said one of the documents also shows how the CIA developed a program to hack internet-connected televisions in conjunction with British intelligence. The attacks can place Samsung smart TVs in a fake off mode, so the owner believes the television is switched off, while in reality it is functioning as a bug and recording conversations in the room, WikiLeaks said.

https://www.wsj.com/articles/wikileaks-posts-thousands-of-purported-cia-cyberhacking-documents-1488905823

WikiLeaks publishes massive trove of CIA spying files in ‘Vault 7’ release

Julian Assange claims that documents are the most comprehensive CIA release ever and are far larger than the Snowden files

The Independent Tech

WikiLeaks has published a huge trove of what appear to be CIA spying secrets.

The files are the most comprehensive release of US spying files ever made public, according to Julian Assange. In all, there are 8,761 documents that account for “the entire hacking capacity of the CIA”, Mr Assange claimed in a release, and the trove is just the first of a series of “Vault 7” leaks.

Already, the files include far more pages than the Snowden files that exposed the vast hacking power of the NSA and other agencies.

 In publishing the documents, WikiLeaks had ensured that the CIA had “lost control of its arsenal”, he claimed. That included a range of software and exploits that if real could allow unparalleled control of computers around the world.

It includes software that could allow people to take control of the most popular consumer electronics products used today, claimed WikiLeaks.

“‘Year Zero’ introduces the scope and direction of the CIA’s global covert hacking program, its malware arsenal and dozens of “zero day” weaponized exploits against a wide range of U.S. and European company products, include Apple’s iPhone, Google’s Android and Microsoft’s Windows and even Samsung TVs, which are turned into covert microphones,” the organisation said in a release.

The public files don’t include the cyber weapons themselves, according to a statement. The organisation will refrain from distributing “armed” software “until a consensus emerges on the technical and political nature of the CIA’s program and how such ‘weapons’ should analyzed, disarmed and published”, it said.

The files were made available by a source who intended for them to start a conversation about whether the CIA had gained too much power, according to the organisation.

“In a statement to WikiLeaks the source details policy questions that they say urgently need to be debated in public, including whether the CIA’s hacking capabilities exceed its mandated powers and the problem of public oversight of the agency,” a release read. “The source wishes to initiate a public debate about the security, creation, use, proliferation and democratic control of cyberweapons.”

It also redacts the details of some of the names, locations and targets that are identified in the documents.

The organisation had teased the release in advance with strange messages about the release being “Year Zero”, and references to “Vault 7”. It had planned to release the files later on but that plan was thrown off when its press conference came under cyber attack, Mr Assange claimed.

http://www.independent.co.uk/life-style/gadgets-and-tech/news/wikileaks-cia-vault-7-julian-assange-year-zero-documents-download-spying-secrets-a7616031.html

WikiLeaks releases ‘entire hacking capacity of the CIA’

Gutfeld: ‘Day Without a Woman’ strike sends wrong message

WikiLeaks on Tuesday released what it said is the full hacking capacity of the CIA in a stunning 8,000-plus page disclosure the anti-secrecy website contends is “the largest ever publication of confidential documents on the agency.”

The 8,761 documents and files — released as “Vault 7 Part 1” and titled “Year Zero” — were obtained from an “isolated, high-security network” at the CIA’s Center for Cyber Intelligence in Langley, Va., a press release from the website said. The trove had been “circulated among former U.S. government hackers and contractors,” one of whom “recently” gave the archive to WikiLeaks. The CIA allegedly employs more than 5,000 people in its cyber spying operation and had produced more than 1,000 programs as of 2016.

“We do not comment on the authenticity or content of purported intelligence documents,” a CIA spokesperson told Fox News.

The collection of purported intelligence documents includes information on CIA-developed malware — bearing names such as “Assassin” and “Medusa” — intended to target iPhones, Android phones, smart TVs and Microsoft, Mac and Linux operating systems, among others. An entire unit in the CIA is devoted to inventing programs to hack data from Apple products, according to WikiLeaks.

WIKILEAKS OFFERS REWARD FOR INFO ON OBAMA MISDEEDS

Some of the remote hacking programs can allegedly turn numerous electronic devices into recording and transmitting stations to spy on their targets, with the information then sent back to secret CIA servers. One document appears to show the CIA was trying to “infect” vehicle control systems in cars and trucks for unspecified means.

WikiLeaks hinted that the capabilites revealed in Tuesday’s disclosure could have even darker utility than simply spying.

“It would permit the CIA to engage in nearly undetectable assassinations,” the release stated.

WikiLeaks confirms CIA can effectively bypass Signal + Telegram + WhatsApp + Confide encryptionhttps://wikileaks.org/ciav7p1 

FLASHBACK: WIKILEAKS REVEALS CLINTON ‘HITS’ FILE ON SANDERS

The site said the CIA additionally failed to disclose security vulnerabilities and bugs to major U.S. software manufacturers, violating an Obama administration commitment made in January 2014. Instead, the agency used the software vulnerabilities — which could also be exploited by rival agencies, nations and groups — for its own ends, WikiLeaks said.

CIA hackers celebrated what they saw as the financial largesse of Obama towards them with “Make It Rain” gifhttps://wikileaks.org/ciav7p1/cms/files/makeitrain.gif 

“As an example, specific CIA malware revealed in ‘Year Zero’ is able to penetrate, infest and control both the Android phone and iPhone software that runs or has run presidential Twitter accounts,” the WikiLeaks release stated.

Digital rights non-profit Access Now said in a statement on Tuesday it was “fantasy to believe only the ‘good guys'” would be able to use the discovered vulnerabilities.

“Today, our digital security has been compromised because the CIA has been stockpiling vulnerabilities rather than working with companies to patch them,” Senior Legislative Manager Nathan White said.

The CIA allegedly also maintains a database of malware created in other nations — WikiLeaks specifically cites Russia — in order to disguise its own hacking attempts as the work of another group.

In what is described by WikiLeaks as “one of the most astounding intelligence own goals in living memory,” the CIA is said to have made most of its programs unclassified to avoid legal consequences for transmitting classified information through the Internet — a move that increased the risk of outside groups pirating the cyber spying tools.

WikiLeaks also revealed the U.S. Consulate in Frankfurt is a hacking base, and the website provided the methods by which agents obfuscate customs officers to gain entry to Germany, pretending to provide technical consultation.

WikiLeaks said its source released the files because they believed questions surrounding the CIA’s reach “urgently need to be debated in public,” echoing the motives of many previous leakers.

PSA: This incorrectly implies CIA hacked these apps / encryption. But the docs show iOS/Android are what got hacked – a much bigger problem. https://twitter.com/wikileaks/status/839120909625606152 

Still working through the publication, but what @Wikileaks has here is genuinely a big deal. Looks authentic.

One such former leaker, Edward Snowden, tweeted Tuesday afternoon about the WikiLeaks release.

“Still working through the publication, but what @Wikileaks has here is genuinely a big deal. Looks authentic,” wrote Snowden, who has been granted asylum in Russia as he seeks to avoid criminal prosecution in the U.S.

Some of the WikiLeaks files include redacted information, such as tens “of thousands of CIA targets and attack machines throughout Latin America, Europe and the United States.”

http://www.foxnews.com/us/2017/03/07/wikileaks-releases-entire-hacking-capacity-cia.html

Vault 7: CIA Hacking Tools Revealed

  • Releases
  • Documents

Press Release

Today, Tuesday 7 March 2017, WikiLeaks begins its new series of leaks on the U.S. Central Intelligence Agency. Code-named “Vault 7” by WikiLeaks, it is the largest ever publication of confidential documents on the agency.

The first full part of the series, “Year Zero”, comprises 8,761 documents and files from an isolated, high-security network situated inside the CIA’s Center for Cyber Intelligence in Langley, Virgina. It follows an introductory disclosure last month of CIA targeting French political parties and candidates in the lead up to the 2012 presidential election.

Recently, the CIA lost control of the majority of its hacking arsenal including malware, viruses, trojans, weaponized “zero day” exploits, malware remote control systems and associated documentation. This extraordinary collection, which amounts to more than several hundred million lines of code, gives its possessor the entire hacking capacity of the CIA. The archive appears to have been circulated among former U.S. government hackers and contractors in an unauthorized manner, one of whom has provided WikiLeaks with portions of the archive.

“Year Zero” introduces the scope and direction of the CIA’s global covert hacking program, its malware arsenal and dozens of “zero day” weaponized exploits against a wide range of U.S. and European company products, include Apple’s iPhone, Google’s Android and Microsoft’s Windows and even Samsung TVs, which are turned into covert microphones.

Since 2001 the CIA has gained political and budgetary preeminence over the U.S. National Security Agency (NSA). The CIA found itself building not just its now infamous drone fleet, but a very different type of covert, globe-spanning force — its own substantial fleet of hackers. The agency’s hacking division freed it from having to disclose its often controversial operations to the NSA (its primary bureaucratic rival) in order to draw on the NSA’s hacking capacities.

By the end of 2016, the CIA’s hacking division, which formally falls under the agency’s Center for Cyber Intelligence (CCI), had over 5000 registered users and had produced more than a thousand hacking systems, trojans, viruses, and other “weaponized” malware. Such is the scale of the CIA’s undertaking that by 2016, its hackers had utilized more code than that used to run Facebook. The CIA had created, in effect, its “own NSA” with even less accountability and without publicly answering the question as to whether such a massive budgetary spend on duplicating the capacities of a rival agency could be justified.

In a statement to WikiLeaks the source details policy questions that they say urgently need to be debated in public, including whether the CIA’s hacking capabilities exceed its mandated powers and the problem of public oversight of the agency. The source wishes to initiate a public debate about the security, creation, use, proliferation and democratic control of cyberweapons.

Once a single cyber ‘weapon’ is ‘loose’ it can spread around the world in seconds, to be used by rival states, cyber mafia and teenage hackers alike.

Julian Assange, WikiLeaks editor stated that “There is an extreme proliferation risk in the development of cyber ‘weapons’. Comparisons can be drawn between the uncontrolled proliferation of such ‘weapons’, which results from the inability to contain them combined with their high market value, and the global arms trade. But the significance of “Year Zero” goes well beyond the choice between cyberwar and cyberpeace. The disclosure is also exceptional from a political, legal and forensic perspective.”

Wikileaks has carefully reviewed the “Year Zero” disclosure and published substantive CIA documentation while avoiding the distribution of ‘armed’ cyberweapons until a consensus emerges on the technical and political nature of the CIA’s program and how such ‘weapons’ should analyzed, disarmed and published.

Wikileaks has also decided to redact and anonymise some identifying information in “Year Zero” for in depth analysis. These redactions include ten of thousands of CIA targets and attack machines throughout Latin America, Europe and the United States. While we are aware of the imperfect results of any approach chosen, we remain committed to our publishing model and note that the quantity of published pages in “Vault 7” part one (“Year Zero”) already eclipses the total number of pages published over the first three years of the Edward Snowden NSA leaks.

Analysis

CIA malware targets iPhone, Android, smart TVs

CIA malware and hacking tools are built by EDG (Engineering Development Group), a software development group within CCI (Center for Cyber Intelligence), a department belonging to the CIA’s DDI (Directorate for Digital Innovation). The DDI is one of the five major directorates of the CIA (see this organizational chart of the CIA for more details).

The EDG is responsible for the development, testing and operational support of all backdoors, exploits, malicious payloads, trojans, viruses and any other kind of malware used by the CIA in its covert operations world-wide.

The increasing sophistication of surveillance techniques has drawn comparisons with George Orwell’s 1984, but “Weeping Angel”, developed by the CIA’s Embedded Devices Branch (EDB), which infests smart TVs, transforming them into covert microphones, is surely its most emblematic realization.

The attack against Samsung smart TVs was developed in cooperation with the United Kingdom’s MI5/BTSS. After infestation, Weeping Angel places the target TV in a ‘Fake-Off’ mode, so that the owner falsely believes the TV is off when it is on. In ‘Fake-Off’ mode the TV operates as a bug, recording conversations in the room and sending them over the Internet to a covert CIA server.

As of October 2014 the CIA was also looking at infecting the vehicle control systems used by modern cars and trucks. The purpose of such control is not specified, but it would permit the CIA to engage in nearly undetectable assassinations.

The CIA’s Mobile Devices Branch (MDB) developed numerous attacks to remotely hack and control popular smart phones. Infected phones can be instructed to send the CIA the user’s geolocation, audio and text communications as well as covertly activate the phone’s camera and microphone.

Despite iPhone’s minority share (14.5%) of the global smart phone market in 2016, a specialized unit in the CIA’s Mobile Development Branch produces malware to infest, control and exfiltrate data from iPhones and other Apple products running iOS, such as iPads. CIA’s arsenal includesnumerous local and remote “zero days” developed by CIA or obtained from GCHQ, NSA, FBI or purchased from cyber arms contractors such as Baitshop. The disproportionate focus on iOS may be explained by the popularity of the iPhone among social, political, diplomatic and business elites.

A similar unit targets Google’s Android which is used to run the majority of the world’s smart phones (~85%) including Samsung, HTC and Sony. 1.15 billion Android powered phones were sold last year. “Year Zero” shows that as of 2016 the CIA had 24 “weaponized” Android “zero days” which it has developed itself and obtained from GCHQ, NSA and cyber arms contractors.

These techniques permit the CIA to bypass the encryption of WhatsApp, Signal, Telegram, Wiebo, Confide and Cloackman by hacking the “smart” phones that they run on and collecting audio and message traffic before encryption is applied.

CIA malware targets Windows, OSx, Linux, routers

The CIA also runs a very substantial effort to infect and control Microsoft Windows users with its malware. This includes multiple local and remote weaponized “zero days”, air gap jumping viruses such as “Hammer Drill” which infects software distributed on CD/DVDs, infectors for removable media such as USBs, systems to hide data in images or in covert disk areas ( “Brutal Kangaroo”) and to keep its malware infestations going.

Many of these infection efforts are pulled together by the CIA’s Automated Implant Branch (AIB), which has developed several attack systems for automated infestation and control of CIA malware, such as “Assassin” and “Medusa”.

Attacks against Internet infrastructure and webservers are developed by the CIA’s Network Devices Branch (NDB).

The CIA has developed automated multi-platform malware attack and control systems covering Windows, Mac OS X, Solaris, Linux and more, such as EDB’s “HIVE” and the related “Cutthroat” and “Swindle” tools, which are described in the examples section below.

CIA ‘hoarded’ vulnerabilities (“zero days”)

In the wake of Edward Snowden’s leaks about the NSA, the U.S. technology industry secured a commitment from the Obama administration that the executive would disclose on an ongoing basis — rather than hoard — serious vulnerabilities, exploits, bugs or “zero days” to Apple, Google, Microsoft, and other US-based manufacturers.

Serious vulnerabilities not disclosed to the manufacturers places huge swathes of the population and critical infrastructure at risk to foreign intelligence or cyber criminals who independently discover or hear rumors of the vulnerability. If the CIA can discover such vulnerabilities so can others.

The U.S. government’s commitment to the Vulnerabilities Equities Process came after significant lobbying by US technology companies, who risk losing their share of the global market over real and perceived hidden vulnerabilities. The government stated that it would disclose all pervasive vulnerabilities discovered after 2010 on an ongoing basis.

“Year Zero” documents show that the CIA breached the Obama administration’s commitments. Many of the vulnerabilities used in the CIA’s cyber arsenal are pervasive and some may already have been found by rival intelligence agencies or cyber criminals.

As an example, specific CIA malware revealed in “Year Zero” is able to penetrate, infest and control both the Android phone and iPhone software that runs or has run presidential Twitter accounts. The CIA attacks this software by using undisclosed security vulnerabilities (“zero days”) possessed by the CIA but if the CIA can hack these phones then so can everyone else who has obtained or discovered the vulnerability. As long as the CIA keeps these vulnerabilities concealed from Apple and Google (who make the phones) they will not be fixed, and the phones will remain hackable.

The same vulnerabilities exist for the population at large, including the U.S. Cabinet, Congress, top CEOs, system administrators, security officers and engineers. By hiding these security flaws from manufacturers like Apple and Google the CIA ensures that it can hack everyone &mdsh; at the expense of leaving everyone hackable.

‘Cyberwar’ programs are a serious proliferation risk

Cyber ‘weapons’ are not possible to keep under effective control.

While nuclear proliferation has been restrained by the enormous costs and visible infrastructure involved in assembling enough fissile material to produce a critical nuclear mass, cyber ‘weapons’, once developed, are very hard to retain.

Cyber ‘weapons’ are in fact just computer programs which can be pirated like any other. Since they are entirely comprised of information they can be copied quickly with no marginal cost.

Securing such ‘weapons’ is particularly difficult since the same people who develop and use them have the skills to exfiltrate copies without leaving traces — sometimes by using the very same ‘weapons’ against the organizations that contain them. There are substantial price incentives for government hackers and consultants to obtain copies since there is a global “vulnerability market” that will pay hundreds of thousands to millions of dollars for copies of such ‘weapons’. Similarly, contractors and companies who obtain such ‘weapons’ sometimes use them for their own purposes, obtaining advantage over their competitors in selling ‘hacking’ services.

Over the last three years the United States intelligence sector, which consists of government agencies such as the CIA and NSA and their contractors, such as Booz Allan Hamilton, has been subject to unprecedented series of data exfiltrations by its own workers.

A number of intelligence community members not yet publicly named have been arrested or subject to federal criminal investigations in separate incidents.

Most visibly, on February 8, 2017 a U.S. federal grand jury indicted Harold T. Martin III with 20 counts of mishandling classified information. The Department of Justice alleged that it seized some 50,000 gigabytes of information from Harold T. Martin III that he had obtained from classified programs at NSA and CIA, including the source code for numerous hacking tools.

Once a single cyber ‘weapon’ is ‘loose’ it can spread around the world in seconds, to be used by peer states, cyber mafia and teenage hackers alike.

U.S. Consulate in Frankfurt is a covert CIA hacker base

In addition to its operations in Langley, Virginia the CIA also uses the U.S. consulate in Frankfurt as a covert base for its hackers covering Europe, the Middle East and Africa.

CIA hackers operating out of the Frankfurt consulate ( “Center for Cyber Intelligence Europe” or CCIE) are given diplomatic (“black”) passports and State Department cover. The instructions for incoming CIA hackers make Germany’s counter-intelligence efforts appear inconsequential: “Breeze through German Customs because you have your cover-for-action story down pat, and all they did was stamp your passport”

Your Cover Story (for this trip)
Q: Why are you here?
A: Supporting technical consultations at the Consulate.

Two earlier WikiLeaks publications give further detail on CIA approaches to customs and secondary screening procedures.

Once in Frankfurt CIA hackers can travel without further border checks to the 25 European countries that are part of the Shengen open border area — including France, Italy and Switzerland.

A number of the CIA’s electronic attack methods are designed for physical proximity. These attack methods are able to penetrate high security networks that are disconnected from the internet, such as police record database. In these cases, a CIA officer, agent or allied intelligence officer acting under instructions, physically infiltrates the targeted workplace. The attacker is provided with a USB containing malware developed for the CIA for this purpose, which is inserted into the targeted computer. The attacker then infects and exfiltrates data to removable media. For example, the CIA attack system Fine Dining, provides 24 decoy applications for CIA spies to use. To witnesses, the spy appears to be running a program showing videos (e.g VLC), presenting slides (Prezi), playing a computer game (Breakout2, 2048) or even running a fake virus scanner (Kaspersky, McAfee, Sophos). But while the decoy application is on the screen, the underlaying system is automatically infected and ransacked.

How the CIA dramatically increased proliferation risks

In what is surely one of the most astounding intelligence own goals in living memory, the CIA structured its classification regime such that for the most market valuable part of “Vault 7” — the CIA’s weaponized malware (implants + zero days), Listening Posts (LP), and Command and Control (C2) systems — the agency has little legal recourse.

The CIA made these systems unclassified.

Why the CIA chose to make its cyberarsenal unclassified reveals how concepts developed for military use do not easily crossover to the ‘battlefield’ of cyber ‘war’.

To attack its targets, the CIA usually requires that its implants communicate with their control programs over the internet. If CIA implants, Command & Control and Listening Post software were classified, then CIA officers could be prosecuted or dismissed for violating rules that prohibit placing classified information onto the Internet. Consequently the CIA has secretly made most of its cyber spying/war code unclassified. The U.S. government is not able to assert copyright either, due to restrictions in the U.S. Constitution. This means that cyber ‘arms’ manufactures and computer hackers can freely “pirate” these ‘weapons’ if they are obtained. The CIA has primarily had to rely on obfuscation to protect its malware secrets.

Conventional weapons such as missiles may be fired at the enemy (i.e into an unsecured area). Proximity to or impact with the target detonates the ordnance including its classified parts. Hence military personnel do not violate classification rules by firing ordnance with classified parts. Ordnance will likely explode. If it does not, that is not the operator’s intent.

Over the last decade U.S. hacking operations have been increasingly dressed up in military jargon to tap into Department of Defense funding streams. For instance, attempted “malware injections” (commercial jargon) or “implant drops” (NSA jargon) are being called “fires” as if a weapon was being fired. However the analogy is questionable.

Unlike bullets, bombs or missiles, most CIA malware is designed to live for days or even years after it has reached its ‘target’. CIA malware does not “explode on impact” but rather permanently infests its target. In order to infect target’s device, copies of the malware must be placed on the target’s devices, giving physical possession of the malware to the target. To exfiltrate data back to the CIA or to await further instructions the malware must communicate with CIA Command & Control (C2) systems placed on internet connected servers. But such servers are typically not approved to hold classi